Searched refs:bpf_perf_event_data_kern (Results 1 – 7 of 7) sorted by relevance
/linux-6.12.1/tools/perf/util/bpf_skel/ |
D | sample_filter.bpf.c | 74 static inline __u64 perf_get_sample(struct bpf_perf_event_data_kern *kctx, in perf_get_sample() 207 struct bpf_perf_event_data_kern *kctx; in perf_sample_filter()
|
/linux-6.12.1/tools/perf/util/bpf_skel/vmlinux/ |
D | vmlinux.h | 184 struct bpf_perf_event_data_kern { struct
|
/linux-6.12.1/include/linux/ |
D | bpf_types.h | 44 struct bpf_perf_event_data, struct bpf_perf_event_data_kern)
|
D | perf_event.h | 1052 struct bpf_perf_event_data_kern { struct
|
/linux-6.12.1/kernel/trace/ |
D | bpf_trace.c | 1138 BPF_CALL_1(bpf_get_attach_cookie_pe, struct bpf_perf_event_data_kern *, ctx) in BPF_CALL_1() argument 1726 BPF_CALL_3(bpf_perf_prog_read_value, struct bpf_perf_event_data_kern *, ctx, in BPF_CALL_3() argument 1752 BPF_CALL_4(bpf_read_branch_records, struct bpf_perf_event_data_kern *, ctx, in BPF_CALL_4() argument 2122 *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_perf_event_data_kern, in pe_prog_convert_ctx_access() 2124 offsetof(struct bpf_perf_event_data_kern, data)); in pe_prog_convert_ctx_access() 2130 *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_perf_event_data_kern, in pe_prog_convert_ctx_access() 2132 offsetof(struct bpf_perf_event_data_kern, data)); in pe_prog_convert_ctx_access() 2138 *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_perf_event_data_kern, in pe_prog_convert_ctx_access() 2140 offsetof(struct bpf_perf_event_data_kern, regs)); in pe_prog_convert_ctx_access()
|
/linux-6.12.1/kernel/bpf/ |
D | stackmap.c | 348 BPF_CALL_3(bpf_get_stackid_pe, struct bpf_perf_event_data_kern *, ctx, in BPF_CALL_3() argument 579 BPF_CALL_4(bpf_get_stack_pe, struct bpf_perf_event_data_kern *, ctx, in BPF_CALL_4() argument
|
/linux-6.12.1/kernel/events/ |
D | core.c | 9712 struct bpf_perf_event_data_kern ctx = { in bpf_overflow_handler()
|