/linux/samples/bpf/ |
H A D | tracex5.bpf.c | 40 bpf_trace_printk(fmt, sizeof(fmt), sc_nr); in bpf_prog1() 53 bpf_trace_printk(fmt, sizeof(fmt), in PROG() 66 bpf_trace_printk(fmt, sizeof(fmt), in PROG() 77 bpf_trace_printk(fmt, sizeof(fmt)); in PROG() 87 bpf_trace_printk(fmt, sizeof(fmt)); in PROG()
|
H A D | trace_event_kern.c | 57 bpf_trace_printk(fmt, sizeof(fmt), cpu, ctx->sample_period, in bpf_prog1() 64 bpf_trace_printk(time_fmt1, sizeof(time_fmt1), value_buf.enabled, value_buf.running); in bpf_prog1() 66 bpf_trace_printk(time_fmt2, sizeof(time_fmt2), ret); in bpf_prog1() 69 bpf_trace_printk(addr_fmt, sizeof(addr_fmt), ctx->addr); in bpf_prog1()
|
H A D | tracex1.bpf.c | 40 bpf_trace_printk(fmt, sizeof(fmt), skb, len); in bpf_prog1()
|
H A D | parse_varlen.c | 44 bpf_trace_printk(fmt, sizeof(fmt)); in udp()
|
H A D | test_lwt_bpf.c | 21 bpf_trace_printk(____fmt, sizeof(____fmt), \
|
H A D | map_perf_test.bpf.c | 243 bpf_trace_printk(fmt, sizeof(fmt), ret); in BPF_KSYSCALL()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_helper_value_access.c | 116 __imm(bpf_trace_printk), in access_to_map_empty_range() 148 __imm(bpf_trace_printk), in access_to_map_possibly_empty_range() 279 __imm(bpf_trace_printk), in via_const_imm_empty_range() 445 __imm(bpf_trace_printk), in via_const_reg_empty_range() 616 __imm(bpf_trace_printk), in map_via_variable_empty_range()
|
H A D | trace_printk.c | 19 trace_printk_ret = bpf_trace_printk(fmt, sizeof(fmt), in sys_enter()
|
H A D | test_xdp_devmap_helpers.c | 16 bpf_trace_printk(fmt, sizeof(fmt), in xdpdm_devlog()
|
H A D | dev_cgroup.c | 41 bpf_trace_printk(fmt, sizeof(fmt), ctx->major, ctx->minor); in bpf_prog1()
|
H A D | test_xdp_with_devmap_helpers.c | 38 bpf_trace_printk(fmt, sizeof(fmt), in xdp_dummy_dm()
|
H A D | verifier_movsx.c | 223 : __imm(bpf_trace_printk) in mov64sx_s16_r10()
|
H A D | verifier_unpriv.c | 172 : __imm(bpf_trace_printk) in check_that_printk_is_disallowed()
|
/linux/tools/perf/util/bpf_skel/ |
H A D | bench_uprobe.bpf.c | 20 bpf_trace_printk(fmt, sizeof(fmt), ++nr_uprobes); in BPF_UPROBE() 35 bpf_trace_printk(fmt, sizeof(fmt), ++nr_uretprobes);
|
/linux/kernel/trace/ |
H A D | bpf_trace.h | 11 TRACE_EVENT(bpf_trace_printk,
|
H A D | bpf_trace.c | 363 BPF_CALL_5(bpf_trace_printk, char *, fmt, u32, fmt_size, u64, arg1, in BPF_CALL_5() argument 388 .func = bpf_trace_printk,
|
/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-prog.rst | 172 the **bpf_trace_printk**\ () helper. This should be used only for debugging 234 the **bpf_trace_printk**\ () helper to log each step of loading BTF, 350 bpftool-620059 [004] d... 2634685.517903: bpf_trace_printk: btf_load size 665 r=5 351 …bpftool-620059 [004] d... 2634685.517912: bpf_trace_printk: map_create sample_map idx 0 type 2 va… 352 bpftool-620059 [004] d... 2634685.517997: bpf_trace_printk: prog_load sample insn_cnt 13 r=7 353 bpftool-620059 [004] d... 2634685.517999: bpf_trace_printk: close(5) = 0
|
H A D | bpftool-feature.rst | 41 () and **bpf_trace_printk**\() helpers which print warnings to kernel logs.
|
/linux/tools/lib/bpf/ |
H A D | bpf_helpers.h | 287 bpf_trace_printk(____fmt, sizeof(____fmt), \
|
/linux/Documentation/translations/zh_CN/core-api/ |
H A D | printk-formats.rst | 149 在BPF的bpf_trace_printk()之外使用时,它会读取它所指向的内存,不会出现错误。
|
/linux/Documentation/core-api/ |
H A D | printk-formats.rst | 152 and (u) annotation is ignored, however, when used out of BPF's bpf_trace_printk(),
|