Home
last modified time | relevance | path

Searched refs:uprobe (Results 1 – 25 of 25) sorted by relevance

/openbmc/linux/kernel/events/
H A Duprobes.c54 struct uprobe { struct
81 struct uprobe *uprobe; argument
282 delayed_uprobe_check(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_check() argument
287 if (du->uprobe == uprobe && du->mm == mm) in delayed_uprobe_check()
292 static int delayed_uprobe_add(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_add() argument
296 if (delayed_uprobe_check(uprobe, mm)) in delayed_uprobe_add()
303 du->uprobe = uprobe; in delayed_uprobe_add()
317 static void delayed_uprobe_remove(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_remove() argument
322 if (!uprobe && !mm) in delayed_uprobe_remove()
328 if (uprobe && du->uprobe != uprobe) in delayed_uprobe_remove()
[all …]
/openbmc/linux/Documentation/bpf/libbpf/
H A Dprogram_types.rst84 … | | ``uprobe+`` [#uprobe]_ …
86 … | | ``uprobe.s+`` [#uprobe]_ |…
88 … | | ``uretprobe+`` [#uprobe]_ | …
90 … | | ``uretprobe.s+`` [#uprobe]_ | Yes …
195 .. [#uprobe] The ``uprobe`` attach format is ``uprobe[.s]/<path>:<function>[+<offset>]``.
/openbmc/linux/Documentation/trace/
H A Duprobetracer.rst18 However unlike kprobe-event tracer, the uprobe event interface expects the
29 p[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a uprobe
30 r[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe)
31 p[:[GRP/][EVENT]] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe)
32 -:[GRP/][EVENT] : Clear uprobe or uretprobe event
58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, because uprobe
87 * Add a probe as a new uprobe event, write a new definition to uprobe_events
88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash)::
118 0x00400000. Hence the command to uprobe would be::
184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/
H A Dfill_link_info.c97 ASSERT_EQ(info.perf_event.uprobe.offset, offset, "uprobe_offset"); in verify_perf_link_info()
99 ASSERT_EQ(info.perf_event.uprobe.name_len, strlen(UPROBE_FILE) + 1, in verify_perf_link_info()
101 if (!info.perf_event.uprobe.file_name) { in verify_perf_link_info()
102 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in verify_perf_link_info()
103 info.perf_event.uprobe.name_len = sizeof(buf); in verify_perf_link_info()
107 ASSERT_EQ(info.perf_event.uprobe.cookie, PERF_EVENT_COOKIE, "uprobe_cookie"); in verify_perf_link_info()
109 err = strncmp(u64_to_ptr(info.perf_event.uprobe.file_name), UPROBE_FILE, in verify_perf_link_info()
H A Duprobe_multi_test.c164 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, pid, in __test_attach_api()
166 if (!ASSERT_OK_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) in __test_attach_api()
266 prog_fd = bpf_program__fd(skel->progs.uprobe); in __test_link_api()
H A Dbpf_cookie.c295 link1 = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in uprobe_multi_attach_api_subtest()
/openbmc/linux/include/linux/
H A Duprobes.h76 struct uprobe *active_uprobe;
86 struct uprobe *uprobe; member
/openbmc/linux/tools/perf/tests/shell/
H A Dtest_uprobe_from_different_cu.sh13 temp_dir=$(mktemp -d /tmp/perf-uprobe-different-cu-sh.XXXXXXXXXX)
18 if [[ "${temp_dir}" =~ ^/tmp/perf-uprobe-different-cu-sh.*$ ]]; then
/openbmc/linux/tools/bpf/bpftool/Documentation/
H A Dbpftool-perf.rst59 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159
69 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
/openbmc/linux/tools/bpf/bpftool/
H A Dlink.c311 u64_to_ptr(info->perf_event.uprobe.file_name)); in show_perf_event_uprobe_json()
312 jsonw_uint_field(wtr, "offset", info->perf_event.uprobe.offset); in show_perf_event_uprobe_json()
693 buf = u64_to_ptr(info->perf_event.uprobe.file_name); in show_perf_event_uprobe_plain()
701 printf("%s+%#x ", buf, info->perf_event.uprobe.offset); in show_perf_event_uprobe_plain()
896 if (!info.perf_event.uprobe.file_name) { in do_show_link()
897 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in do_show_link()
898 info.perf_event.uprobe.name_len = sizeof(buf); in do_show_link()
/openbmc/linux/kernel/trace/
H A Dbpf_trace.c3062 struct bpf_uprobe *uprobe; member
3101 static int uprobe_prog_run(struct bpf_uprobe *uprobe, in uprobe_prog_run() argument
3105 struct bpf_uprobe_multi_link *link = uprobe->link; in uprobe_prog_run()
3108 .uprobe = uprobe, in uprobe_prog_run()
3141 struct bpf_uprobe *uprobe; in uprobe_multi_link_filter() local
3143 uprobe = container_of(con, struct bpf_uprobe, consumer); in uprobe_multi_link_filter()
3144 return uprobe->link->task->mm == mm; in uprobe_multi_link_filter()
3150 struct bpf_uprobe *uprobe; in uprobe_multi_link_handler() local
3152 uprobe = container_of(con, struct bpf_uprobe, consumer); in uprobe_multi_link_handler()
3153 return uprobe_prog_run(uprobe, instruction_pointer(regs), regs); in uprobe_multi_link_handler()
[all …]
H A DKconfig757 This allows the user to attach BPF programs to kprobe, uprobe, and
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Duprobe_multi.c70 int uprobe(struct pt_regs *ctx) in uprobe() function
/openbmc/linux/tools/perf/bench/
H A DBuild20 perf-y += uprobe.o
/openbmc/linux/tools/perf/Documentation/
H A Dperf-bench.txt70 'uprobe'::
71 Benchmark overhead of uprobe + BPF.
H A Dperf-buildid-cache.txt74 used when creating a uprobe for a process that resides in a
H A Dperf-probe.txt135 used when creating a uprobe for a process that resides in a
173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe.
281 Add a uprobe to a target process running in a different mount namespace
/openbmc/linux/tools/perf/util/
H A Dprobe-file.c74 static void print_open_warning(int err, bool uprobe, bool readwrite) in print_open_warning() argument
81 if (print_configure_probe_event(uprobe ? 0 : err, uprobe ? err : 0)) in print_open_warning()
85 tracing_path_mount(), uprobe ? 'u' : 'k', in print_open_warning()
H A Dprobe-event.c888 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument
892 if (uprobe) in post_process_probe_trace_events()
2881 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument
2886 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
/openbmc/openbmc/poky/meta/recipes-kernel/lttng/lttng-tools/
H A D0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch1061 -skip $ist_root "non-root user: skipping uprobe tests" 6 || {
1062 +check_skip_kernel_test 6 "Skipping uprobe tests." || {
1063 test_success "--condition event-rule-matches uprobe" "uprobe-trigger-0" \
1064 --name="uprobe-trigger-0" \
1065 …--condition event-rule-matches --type=kernel:uprobe --location=${uprobe_elf_binary}:test_function …
1066 @@ -274,7 +268,7 @@ skip $ist_root "non-root user: skipping uprobe tests" 6 || {
1110 -skip $ist_root "non-root user: skipping uprobe tests" 9 || test_event_rule_matches_userspace_probe…
1113 +check_skip_kernel_test 48 "Skipping kprobe, uprobe, SDT and syscall tests." || {
/openbmc/linux/kernel/bpf/
H A Dsyscall.c3542 uname = u64_to_user_ptr(info->perf_event.uprobe.file_name); in bpf_perf_link_fill_uprobe()
3543 ulen = info->perf_event.uprobe.name_len; in bpf_perf_link_fill_uprobe()
3553 info->perf_event.uprobe.name_len = ulen; in bpf_perf_link_fill_uprobe()
3554 info->perf_event.uprobe.offset = offset; in bpf_perf_link_fill_uprobe()
3555 info->perf_event.uprobe.cookie = event->bpf_cookie; in bpf_perf_link_fill_uprobe()
/openbmc/linux/include/uapi/linux/
H A Dbpf.h6560 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ member
/openbmc/linux/tools/include/uapi/linux/
H A Dbpf.h6563 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ member
/openbmc/linux/tools/lib/bpf/
H A Dlibbpf.c10255 static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name, in perf_event_open_probe() argument
10268 type = uprobe ? determine_uprobe_perf_type() in perf_event_open_probe()
10272 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe()
10277 int bit = uprobe ? determine_uprobe_retprobe_bit() in perf_event_open_probe()
10282 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe()
/openbmc/linux/
H A Dopengrok1.0.log[all...]