Symbol: augmented_arg
tools/perf/builtin-trace.c
1048
struct augmented_arg *augmented_arg = arg->augmented.args;
tools/perf/builtin-trace.c
1069
consumed = sizeof(*augmented_arg) + augmented_arg->size;
tools/perf/builtin-trace.c
1814
struct augmented_arg *augmented_arg = arg->augmented.args;
tools/perf/builtin-trace.c
1815
size_t printed = scnprintf(bf, size, "\"%.*s\"", augmented_arg->size, augmented_arg->value);
tools/perf/builtin-trace.c
1820
int consumed = sizeof(*augmented_arg) + augmented_arg->size;
tools/perf/builtin-trace.c
1848
struct augmented_arg *augmented_arg = arg->augmented.args;
tools/perf/builtin-trace.c
1849
unsigned char *orig = (unsigned char *)augmented_arg->value;
tools/perf/builtin-trace.c
1853
if (augmented_arg == NULL)
tools/perf/builtin-trace.c
1856
for (int j = 0; j < augmented_arg->size; ++j) {
tools/perf/builtin-trace.c
1862
consumed = sizeof(*augmented_arg) + augmented_arg->size;
tools/perf/trace/beauty/beauty.h
110
struct augmented_arg *args;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
119
struct augmented_arg arg, arg2; // We have to reserve space for two arguments (rename, etc)
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
139
struct augmented_arg aug_args[6];
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
167
unsigned int augmented_arg__read_str(struct augmented_arg *augmented_arg, const void *arg, unsigned int arg_len)
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
169
unsigned int augmented_len = sizeof(*augmented_arg);
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
170
int string_len = bpf_probe_read_user_str(&augmented_arg->value, arg_len, arg);
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
172
augmented_arg->size = augmented_arg->err = 0;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
178
augmented_len -= sizeof(augmented_arg->value) - string_len;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
179
_Static_assert(is_power_of_2(sizeof(augmented_arg->value)), "sizeof(augmented_arg->value) needs to be a power of two");
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
180
augmented_len &= sizeof(augmented_arg->value) - 1;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
181
augmented_arg->size = string_len;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
187
augmented_arg->err = string_len;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
188
augmented_len = offsetof(struct augmented_arg, value);
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
296
struct augmented_arg *arg2 = (void *)&augmented_args->arg.value + augmented_args->arg.size;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
327
struct augmented_arg *arg2 = (void *)&augmented_args->arg.value + augmented_args->arg.size;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
435
int zero = 0, index, value_size = sizeof(struct augmented_arg) - offsetof(struct augmented_arg, value);
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
479
aug_size = bpf_probe_read_user_str(((struct augmented_arg *)payload_offset)->value, value_size, arg);
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
486
if (!bpf_probe_read_user(((struct augmented_arg *)payload_offset)->value, size, arg))
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
495
if (!bpf_probe_read_user(((struct augmented_arg *)payload_offset)->value, aug_size, arg))
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
506
int written = offsetof(struct augmented_arg, value) + aug_size;
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
508
if (written < 0 || written > sizeof(struct augmented_arg))
tools/perf/util/bpf_skel/augmented_raw_syscalls.bpf.c
511
((struct augmented_arg *)payload_offset)->size = aug_size;