Searched refs:binary_path (Results 1 – 6 of 6) sorted by relevance
/linux/tools/lib/bpf/ |
H A D | elf.c | 25 int elf_open(const char *binary_path, struct elf_fd *elf_fd) in elf_open() argument 34 pr_warn("elf: failed to init libelf for %s\n", binary_path); in elf_open() 37 fd = open(binary_path, O_RDONLY | O_CLOEXEC); in elf_open() 40 pr_warn("elf: failed to open %s: %s\n", binary_path, errstr(ret)); in elf_open() 45 pr_warn("elf: could not read elf from %s: %s\n", binary_path, elf_errmsg(-1)); in elf_open() 98 Elf *elf, const char *binary_path, in elf_sym_iter_new() argument 108 pr_warn("elf: failed to get ehdr from %s: %s\n", binary_path, elf_errmsg(-1)); in elf_sym_iter_new() 115 binary_path); in elf_sym_iter_new() 126 binary_path, elf_errmsg(-1)); in elf_sym_iter_new() 148 pr_warn("elf: failed to get verdef ELF section in '%s'\n", binary_path); in elf_sym_iter_new() [all …]
|
H A D | libbpf.h | 620 * @param binary_path Path to binary 629 const char *binary_path, 695 * binary_path. 715 * @param binary_path Path to binary that contains the function symbol 722 pid_t pid, const char *binary_path, 733 * @param binary_path Path to binary that contains the function symbol 741 const char *binary_path, size_t func_offset, 762 * @param binary_path Path to binary that contains provided USDT probe 771 pid_t pid, const char *binary_path,
|
H A D | libbpf.c | 11853 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe_multi() local 11860 &probe_type, &binary_path, &func_name); in attach_uprobe_multi() 11870 *link = bpf_program__attach_uprobe_multi(prog, -1, binary_path, func_name, &opts); in attach_uprobe_multi() 11879 free(binary_path); in attach_uprobe_multi() 11885 const char *binary_path, size_t offset) in add_uprobe_event_legacy() argument 11890 probe_name, binary_path, offset); in add_uprobe_event_legacy() 11910 const char *binary_path, size_t offset, int pid) in perf_event_uprobe_open_legacy() argument 11916 err = add_uprobe_event_legacy(probe_name, retprobe, binary_path, offset); in perf_event_uprobe_open_legacy() 11919 binary_path, (size_t)offset, errstr(err)); in perf_event_uprobe_open_legacy() 11926 binary_path, offset, errstr(err)); in perf_event_uprobe_open_legacy() [all …]
|
/linux/samples/bpf/ |
H A D | task_fd_query_user.c | 227 static int test_debug_fs_uprobe(char *binary_path, long offset, bool is_return) in test_debug_fs_uprobe() argument 248 binary_path, offset); in test_debug_fs_uprobe() 284 printf("FAIL: %s, binary_path %s\n", __func__, binary_path); in test_debug_fs_uprobe() 294 if (strcmp(binary_path, buf) != 0) { in test_debug_fs_uprobe()
|
/linux/tools/testing/selftests/exec/ |
H A D | check-exec.c | 111 static const char binary_path[] = "./false"; variable 186 fd_in = open(binary_path, O_CLOEXEC | O_RDONLY); in fill_exec_fd()
|
/linux/tools/perf/util/ |
H A D | srcline.c | 467 const char *binary_path) in addr2line_subprocess_init() argument 471 "-e", binary_path, in addr2line_subprocess_init() 493 addr2line_path, binary_path, start_command_status); in addr2line_subprocess_init()
|