/openbmc/linux/kernel/events/ |
H A D | uprobes.c | 37 * allows us to skip the uprobe_mmap if there are no uprobe events active 45 /* serialize uprobe->pending_list */ 54 struct uprobe { struct 81 struct uprobe *uprobe; member 282 delayed_uprobe_check(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_check() argument 287 if (du->uprobe == uprobe && du->mm == mm) in delayed_uprobe_check() 292 static int delayed_uprobe_add(struct uprobe *uprob argument 60 consumersuprobe global() argument 76 archuprobe global() argument 317 delayed_uprobe_remove(struct uprobe * uprobe,struct mm_struct * mm) delayed_uprobe_remove() argument 337 valid_ref_ctr_vma(struct uprobe * uprobe,struct vm_area_struct * vma) valid_ref_ctr_vma() argument 351 find_ref_ctr_vma(struct uprobe * uprobe,struct mm_struct * mm) find_ref_ctr_vma() argument 402 update_ref_ctr_warn(struct uprobe * uprobe,struct mm_struct * mm,short d) update_ref_ctr_warn() argument 412 update_ref_ctr(struct uprobe * uprobe,struct mm_struct * mm,short d) update_ref_ctr() argument 462 struct uprobe *uprobe; uprobe_write_opcode() local 590 get_uprobe(struct uprobe * uprobe) get_uprobe() argument 596 put_uprobe(struct uprobe * uprobe) put_uprobe() argument 670 struct uprobe *uprobe; find_uprobe() local 679 __insert_uprobe(struct uprobe * uprobe) __insert_uprobe() argument 700 insert_uprobe(struct uprobe * uprobe) insert_uprobe() argument 712 ref_ctr_mismatch_warn(struct uprobe * cur_uprobe,struct uprobe * uprobe) ref_ctr_mismatch_warn() argument 724 struct uprobe *uprobe, *cur_uprobe; alloc_uprobe() local 753 consumer_add(struct uprobe * uprobe,struct uprobe_consumer * uc) consumer_add() argument 766 consumer_del(struct uprobe * uprobe,struct uprobe_consumer * uc) consumer_del() argument 806 copy_insn(struct uprobe * uprobe,struct file * filp) copy_insn() argument 832 prepare_uprobe(struct uprobe * uprobe,struct file * file,struct mm_struct * mm,unsigned long vaddr) prepare_uprobe() argument 872 filter_chain(struct uprobe * uprobe,enum uprobe_filter_ctx ctx,struct mm_struct * mm) filter_chain() argument 890 install_breakpoint(struct uprobe * uprobe,struct mm_struct * mm,struct vm_area_struct * vma,unsigned long vaddr) install_breakpoint() argument 918 remove_breakpoint(struct uprobe * uprobe,struct mm_struct * mm,unsigned long vaddr) remove_breakpoint() argument 924 uprobe_is_active(struct uprobe * uprobe) uprobe_is_active() argument 933 delete_uprobe(struct uprobe * uprobe) delete_uprobe() argument 1029 register_for_each_vma(struct uprobe * uprobe,struct uprobe_consumer * new) register_for_each_vma() argument 1083 __uprobe_unregister(struct uprobe * uprobe,struct uprobe_consumer * uc) __uprobe_unregister() argument 1104 struct uprobe *uprobe; uprobe_unregister() local 1138 struct uprobe *uprobe; __uprobe_register() local 1213 struct uprobe *uprobe; uprobe_apply() local 1232 unapply_uprobe(struct uprobe * uprobe,struct mm_struct * mm) unapply_uprobe() argument 1360 struct uprobe *uprobe, *u; uprobe_mmap() local 1605 xol_get_insn_slot(struct uprobe * uprobe) xol_get_insn_slot() argument 1855 prepare_uretprobe(struct uprobe * uprobe,struct pt_regs * regs) prepare_uretprobe() argument 1923 pre_ssout(struct uprobe * uprobe,struct pt_regs * regs,unsigned long bp_vaddr) pre_ssout() argument 2041 struct uprobe *uprobe = NULL; find_active_uprobe() local 2067 handler_chain(struct uprobe * uprobe,struct pt_regs * regs) handler_chain() argument 2104 struct uprobe *uprobe = ri->uprobe; handle_uretprobe_chain() local 2186 struct uprobe *uprobe; handle_swbp() local 2259 struct uprobe *uprobe; handle_singlestep() local [all...] |
/openbmc/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 84 … | | ``uprobe+`` [#uprobe]_ … 86 … | | ``uprobe.s+`` [#uprobe]_ |… 88 … | | ``uretprobe+`` [#uprobe]_ | … 90 … | | ``uretprobe.s+`` [#uprobe]_ | Yes … 195 .. [#uprobe] The ``uprobe`` attach format is ``uprobe[.s]/<path>:<function>[+<offset>]``.
|
/openbmc/linux/Documentation/trace/ |
H A D | uprobetracer.rst | 18 However unlike kprobe-event tracer, the uprobe event interface expects the 29 p[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a uprobe 30 r[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe) 31 p[:[GRP/][EVENT]] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe) 32 -:[GRP/][EVENT] : Clear uprobe or uretprobe event 58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, because uprobe 87 * Add a probe as a new uprobe event, write a new definition to uprobe_events 88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash):: 118 0x00400000. Hence the command to uprobe would be:: 184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | fill_link_info.c | 97 ASSERT_EQ(info.perf_event.uprobe.offset, offset, "uprobe_offset"); in verify_perf_link_info() 99 ASSERT_EQ(info.perf_event.uprobe.name_len, strlen(UPROBE_FILE) + 1, in verify_perf_link_info() 101 if (!info.perf_event.uprobe.file_name) { in verify_perf_link_info() 102 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in verify_perf_link_info() 103 info.perf_event.uprobe.name_len = sizeof(buf); in verify_perf_link_info() 107 ASSERT_EQ(info.perf_event.uprobe.cookie, PERF_EVENT_COOKIE, "uprobe_cookie"); in verify_perf_link_info() 109 err = strncmp(u64_to_ptr(info.perf_event.uprobe.file_name), UPROBE_FILE, in verify_perf_link_info()
|
H A D | uprobe_multi_test.c | 164 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, pid, in __test_attach_api() 166 if (!ASSERT_OK_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) in __test_attach_api() 266 prog_fd = bpf_program__fd(skel->progs.uprobe); in __test_link_api()
|
H A D | bpf_cookie.c | 295 link1 = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in uprobe_multi_attach_api_subtest()
|
/openbmc/linux/include/linux/ |
H A D | uprobes.h | 76 struct uprobe *active_uprobe; 86 struct uprobe *uprobe; member
|
/openbmc/linux/tools/perf/tests/shell/ |
H A D | test_uprobe_from_different_cu.sh | 13 temp_dir=$(mktemp -d /tmp/perf-uprobe-different-cu-sh.XXXXXXXXXX) 18 if [[ "${temp_dir}" =~ ^/tmp/perf-uprobe-different-cu-sh.*$ ]]; then
|
/openbmc/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-perf.rst | 59 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159 69 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
|
/openbmc/linux/tools/bpf/bpftool/ |
H A D | link.c | 311 u64_to_ptr(info->perf_event.uprobe.file_name)); in show_perf_event_uprobe_json() 312 jsonw_uint_field(wtr, "offset", info->perf_event.uprobe.offset); in show_perf_event_uprobe_json() 693 buf = u64_to_ptr(info->perf_event.uprobe.file_name); in show_perf_event_uprobe_plain() 701 printf("%s+%#x ", buf, info->perf_event.uprobe.offset); in show_perf_event_uprobe_plain() 896 if (!info.perf_event.uprobe.file_name) { in do_show_link() 897 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in do_show_link() 898 info.perf_event.uprobe.name_len = sizeof(buf); in do_show_link()
|
/openbmc/linux/kernel/trace/ |
H A D | bpf_trace.c | 3062 struct bpf_uprobe *uprobe; member 3101 static int uprobe_prog_run(struct bpf_uprobe *uprobe, in uprobe_prog_run() argument 3105 struct bpf_uprobe_multi_link *link = uprobe->link; in uprobe_prog_run() 3108 .uprobe = uprobe, in uprobe_prog_run() 3141 struct bpf_uprobe *uprobe; in uprobe_multi_link_filter() local 3143 uprobe = container_of(con, struct bpf_uprobe, consumer); in uprobe_multi_link_filter() 3144 return uprobe->link->task->mm == mm; in uprobe_multi_link_filter() 3150 struct bpf_uprobe *uprobe; in uprobe_multi_link_handler() local 3152 uprobe = container_of(con, struct bpf_uprobe, consumer); in uprobe_multi_link_handler() 3153 return uprobe_prog_run(uprobe, instruction_pointer(regs), regs); in uprobe_multi_link_handler() [all …]
|
H A D | Kconfig | 757 This allows the user to attach BPF programs to kprobe, uprobe, and
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | uprobe_multi.c | 70 int uprobe(struct pt_regs *ctx) in uprobe() function
|
/openbmc/linux/tools/perf/bench/ |
H A D | Build | 20 perf-y += uprobe.o
|
/openbmc/linux/tools/perf/Documentation/ |
H A D | perf-bench.txt | 70 'uprobe':: 71 Benchmark overhead of uprobe + BPF.
|
H A D | perf-buildid-cache.txt | 74 used when creating a uprobe for a process that resides in a
|
H A D | perf-probe.txt | 135 used when creating a uprobe for a process that resides in a 173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe. 281 Add a uprobe to a target process running in a different mount namespace
|
/openbmc/linux/tools/perf/util/ |
H A D | probe-file.c | 74 static void print_open_warning(int err, bool uprobe, bool readwrite) in print_open_warning() argument 81 if (print_configure_probe_event(uprobe ? 0 : err, uprobe ? err : 0)) in print_open_warning() 85 tracing_path_mount(), uprobe ? 'u' : 'k', in print_open_warning()
|
H A D | probe-event.c | 888 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument 892 if (uprobe) in post_process_probe_trace_events() 2881 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument 2886 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
|
/openbmc/openbmc/poky/meta/recipes-kernel/lttng/lttng-tools/ |
H A D | 0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch | 1061 -skip $ist_root "non-root user: skipping uprobe tests" 6 || { 1062 +check_skip_kernel_test 6 "Skipping uprobe tests." || { 1063 test_success "--condition event-rule-matches uprobe" "uprobe-trigger-0" \ 1064 --name="uprobe-trigger-0" \ 1065 …--condition event-rule-matches --type=kernel:uprobe --location=${uprobe_elf_binary}:test_function … 1066 @@ -274,7 +268,7 @@ skip $ist_root "non-root user: skipping uprobe tests" 6 || { 1110 -skip $ist_root "non-root user: skipping uprobe tests" 9 || test_event_rule_matches_userspace_probe… 1113 +check_skip_kernel_test 48 "Skipping kprobe, uprobe, SDT and syscall tests." || {
|
/openbmc/linux/kernel/bpf/ |
H A D | syscall.c | 3542 uname = u64_to_user_ptr(info->perf_event.uprobe.file_name); in bpf_perf_link_fill_uprobe() 3543 ulen = info->perf_event.uprobe.name_len; in bpf_perf_link_fill_uprobe() 3553 info->perf_event.uprobe.name_len = ulen; in bpf_perf_link_fill_uprobe() 3554 info->perf_event.uprobe.offset = offset; in bpf_perf_link_fill_uprobe() 3555 info->perf_event.uprobe.cookie = event->bpf_cookie; in bpf_perf_link_fill_uprobe()
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf.h | 6560 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ member
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6563 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ member
|
/openbmc/linux/tools/lib/bpf/ |
H A D | libbpf.c | 10255 static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name, in perf_event_open_probe() argument 10268 type = uprobe ? determine_uprobe_perf_type() in perf_event_open_probe() 10272 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe() 10277 int bit = uprobe ? determine_uprobe_retprobe_bit() in perf_event_open_probe() 10282 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe()
|
/openbmc/linux/ |
H A D | opengrok1.0.log | [all...] |