Searched refs:uprobe (Results 1 – 11 of 11) sorted by relevance
/linux-6.3-rc2/kernel/events/ |
A D | uprobes.c | 81 struct uprobe *uprobe; argument 303 du->uprobe = uprobe; in delayed_uprobe_add() 328 if (uprobe && du->uprobe != uprobe) in delayed_uprobe_remove() 463 struct uprobe *uprobe; in uprobe_write_opcode() local 672 struct uprobe *uprobe; in find_uprobe() local 1106 struct uprobe *uprobe; in uprobe_unregister() local 1140 struct uprobe *uprobe; in __uprobe_register() local 1215 struct uprobe *uprobe; in uprobe_apply() local 2106 struct uprobe *uprobe = ri->uprobe; in handle_uretprobe_chain() local 2188 struct uprobe *uprobe; in handle_swbp() local [all …]
|
/linux-6.3-rc2/Documentation/bpf/libbpf/ |
A D | program_types.rst | 84 … | | ``uprobe+`` [#uprobe]_ … 86 … | | ``uprobe.s+`` [#uprobe]_ |… 88 … | | ``uretprobe+`` [#uprobe]_ | … 90 … | | ``uretprobe.s+`` [#uprobe]_ | Yes … 195 .. [#uprobe] The ``uprobe`` attach format is ``uprobe[.s]/<path>:<function>[+<offset>]``.
|
/linux-6.3-rc2/Documentation/trace/ |
A D | uprobetracer.rst | 18 However unlike kprobe-event tracer, the uprobe event interface expects the 29 p[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a uprobe 30 r[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe) 31 p[:[GRP/][EVENT]] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe) 32 -:[GRP/][EVENT] : Clear uprobe or uretprobe event 58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, becuse uprobe 87 * Add a probe as a new uprobe event, write a new definition to uprobe_events 88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash):: 118 0x00400000. Hence the command to uprobe would be:: 184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
|
/linux-6.3-rc2/include/linux/ |
A D | uprobes.h | 76 struct uprobe *active_uprobe; 84 struct uprobe *uprobe; member
|
/linux-6.3-rc2/tools/bpf/bpftool/Documentation/ |
A D | bpftool-perf.rst | 59 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159 69 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
|
/linux-6.3-rc2/tools/perf/util/ |
A D | probe-file.c | 74 static void print_open_warning(int err, bool uprobe, bool readwrite) in print_open_warning() argument 81 if (print_configure_probe_event(uprobe ? 0 : err, uprobe ? err : 0)) in print_open_warning() 85 tracing_path_mount(), uprobe ? 'u' : 'k', in print_open_warning()
|
A D | probe-event.c | 878 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument 882 if (uprobe) in post_process_probe_trace_events() 2861 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument 2866 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
|
/linux-6.3-rc2/tools/perf/Documentation/ |
A D | perf-buildid-cache.txt | 74 used when creating a uprobe for a process that resides in a
|
A D | perf-probe.txt | 135 used when creating a uprobe for a process that resides in a 173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe. 281 Add a uprobe to a target process running in a different mount namespace
|
/linux-6.3-rc2/tools/lib/bpf/ |
A D | libbpf.c | 9862 static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name, in perf_event_open_probe() argument 9875 type = uprobe ? determine_uprobe_perf_type() in perf_event_open_probe() 9879 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe() 9884 int bit = uprobe ? determine_uprobe_retprobe_bit() in perf_event_open_probe() 9889 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe()
|
/linux-6.3-rc2/kernel/trace/ |
A D | Kconfig | 716 This allows the user to attach BPF programs to kprobe, uprobe, and
|
Completed in 43 milliseconds