Searched refs:uprobe (Results 1 – 10 of 10) sorted by relevance
/linux/kernel/events/ |
A D | uprobes.c | 82 struct uprobe *uprobe; argument 309 du->uprobe = uprobe; in delayed_uprobe_add() 334 if (uprobe && du->uprobe != uprobe) in delayed_uprobe_remove() 468 struct uprobe *uprobe; in uprobe_write_opcode() local 677 struct uprobe *uprobe; in find_uprobe() local 1111 struct uprobe *uprobe; in uprobe_unregister() local 1145 struct uprobe *uprobe; in __uprobe_register() local 1219 struct uprobe *uprobe; in uprobe_apply() local 2108 struct uprobe *uprobe = ri->uprobe; in handle_uretprobe_chain() local 2190 struct uprobe *uprobe; in handle_swbp() local [all …]
|
/linux/Documentation/trace/ |
A D | uprobetracer.rst | 18 However unlike kprobe-event tracer, the uprobe event interface expects the 29 p[:[GRP/]EVENT] PATH:OFFSET [FETCHARGS] : Set a uprobe 30 r[:[GRP/]EVENT] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe) 31 p[:[GRP/]EVENT] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe) 32 -:[GRP/]EVENT : Clear uprobe or uretprobe event 58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, becuse uprobe 87 * Add a probe as a new uprobe event, write a new definition to uprobe_events 88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash):: 118 0x00400000. Hence the command to uprobe would be:: 184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
|
/linux/include/linux/ |
A D | uprobes.h | 76 struct uprobe *active_uprobe; 84 struct uprobe *uprobe; member
|
/linux/tools/bpf/bpftool/Documentation/ |
A D | bpftool-perf.rst | 55 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159 65 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
|
/linux/tools/perf/util/ |
A D | probe-file.c | 74 static void print_open_warning(int err, bool uprobe, bool readwrite) in print_open_warning() argument 81 if (print_configure_probe_event(uprobe ? 0 : err, uprobe ? err : 0)) in print_open_warning() 85 tracing_path_mount(), uprobe ? 'u' : 'k', in print_open_warning()
|
A D | probe-event.c | 875 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument 879 if (uprobe) in post_process_probe_trace_events() 2856 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument 2861 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
|
/linux/tools/perf/Documentation/ |
A D | perf-buildid-cache.txt | 74 used when creating a uprobe for a process that resides in a
|
A D | perf-probe.txt | 135 used when creating a uprobe for a process that resides in a 173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe. 281 Add a uprobe to a target process running in a different mount namespace
|
/linux/tools/lib/bpf/ |
A D | libbpf.c | 9563 static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name, in perf_event_open_probe() argument 9573 type = uprobe ? determine_uprobe_perf_type() in perf_event_open_probe() 9577 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe() 9582 int bit = uprobe ? determine_uprobe_retprobe_bit() in perf_event_open_probe() 9587 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe() 9607 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe()
|
/linux/kernel/trace/ |
A D | Kconfig | 653 This allows the user to attach BPF programs to kprobe, uprobe, and
|
Completed in 39 milliseconds