| /linux/kernel/events/ |
| H A D | uprobes.c | 62 struct uprobe { struct 93 struct uprobe *uprobe; argument 224 delayed_uprobe_check(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_check() argument 229 if (du->uprobe == uprobe && du->mm == mm) in delayed_uprobe_check() 234 static int delayed_uprobe_add(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_add() argument 238 if (delayed_uprobe_check(uprobe, mm)) in delayed_uprobe_add() 245 du->uprobe = uprobe; in delayed_uprobe_add() 259 static void delayed_uprobe_remove(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_remove() argument 264 if (!uprobe && !mm) in delayed_uprobe_remove() 270 if (uprobe && du->uprobe != uprobe) in delayed_uprobe_remove() [all …]
|
| /linux/include/linux/ |
| H A D | uprobes.h | 22 struct uprobe; 30 * Allowed return values from uprobe consumer's handler callback 34 * - Remove the uprobe breakpoint from current->mm. 48 * unregister uprobe for current process. If UPROBE_HANDLER_REMOVE is 50 * should return false to "confirm" the decision to uninstall uprobe 75 /* The state of hybrid-lifetime uprobe inside struct return_instance */ 77 HPROBE_LEASED, /* uretprobes_srcu-protected uprobe */ 78 HPROBE_STABLE, /* refcounted uprobe */ 79 HPROBE_GONE, /* NULL uprobe, SRCU expired, refcount failed */ 80 HPROBE_CONSUMED, /* uprobe "consume 119 struct uprobe *uprobe; global() member 261 uprobe_apply(struct uprobe * uprobe,struct uprobe_consumer * uc,bool add) uprobe_apply() argument 266 uprobe_unregister_nosync(struct uprobe * uprobe,struct uprobe_consumer * uc) uprobe_unregister_nosync() argument [all...] |
| /linux/tools/testing/selftests/bpf/test_kmods/ |
| H A D | bpf_testmod.c | 616 struct uprobe *uprobe; member 622 static struct testmod_uprobe uprobe = { variable 631 if (uprobe.uprobe) in testmod_register_uprobe() 636 if (uprobe.uprobe) in testmod_register_uprobe() 639 err = kern_path("/proc/self/exe", LOOKUP_FOLLOW, &uprobe.path); in testmod_register_uprobe() 643 uprobe.uprobe = uprobe_register(d_real_inode(uprobe.path.dentry), in testmod_register_uprobe() 644 offset, 0, &uprobe.consumer); in testmod_register_uprobe() 645 if (IS_ERR(uprobe.uprobe)) { in testmod_register_uprobe() 646 err = PTR_ERR(uprobe.uprobe); in testmod_register_uprobe() 647 path_put(&uprobe.path); in testmod_register_uprobe() [all …]
|
| /linux/Documentation/trace/ |
| H A D | uprobetracer.rst | 18 However unlike kprobe-event tracer, the uprobe event interface expects the 29 p[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a uprobe 30 r[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe) 31 p[:[GRP/][EVENT]] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe) 32 -:[GRP/][EVENT] : Clear uprobe or uretprobe event 58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, because uprobe 87 * Add a probe as a new uprobe event, write a new definition to uprobe_events 88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash):: 118 0x00400000. Hence the command to uprobe would be:: 184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
|
| /linux/kernel/trace/ |
| H A D | trace_uprobe.c | 65 struct uprobe *uprobe; member 1105 struct uprobe *uprobe; in trace_uprobe_enable() local 1108 uprobe = uprobe_register(inode, tu->offset, tu->ref_ctr_offset, &tu->consumer); in trace_uprobe_enable() 1109 if (IS_ERR(uprobe)) in trace_uprobe_enable() 1110 return PTR_ERR(uprobe); in trace_uprobe_enable() 1112 tu->uprobe = uprobe; in trace_uprobe_enable() 1125 if (!tu->uprobe) in __probe_event_disable() 1128 uprobe_unregister_nosync(tu->uprobe, &tu->consumer); in __probe_event_disable() 1130 tu->uprobe = NULL; in __probe_event_disable() 1329 ret = uprobe_apply(tu->uprobe, &tu->consumer, false); in uprobe_perf_close() [all …]
|
| H A D | bpf_trace.c | 2905 struct uprobe *uprobe; member 2921 struct bpf_uprobe *uprobe; member 2929 uprobe_unregister_nosync(uprobes[i].uprobe, &uprobes[i].consumer); in bpf_uprobe_unregister() 3072 static int uprobe_prog_run(struct bpf_uprobe *uprobe, in uprobe_prog_run() argument 3077 struct bpf_uprobe_multi_link *link = uprobe->link; in uprobe_prog_run() 3084 .uprobe = uprobe, in uprobe_prog_run() 3117 struct bpf_uprobe *uprobe; in uprobe_multi_link_filter() local 3119 uprobe = container_of(con, struct bpf_uprobe, consumer); in uprobe_multi_link_filter() 3120 return uprobe->link->task->mm == mm; in uprobe_multi_link_filter() 3127 struct bpf_uprobe *uprobe; in uprobe_multi_link_handler() local [all …]
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | fill_link_info.c | 29 /* uprobe attach point */ 100 ASSERT_EQ(info.perf_event.uprobe.offset, offset, "uprobe_offset"); in verify_perf_link_info() 101 ASSERT_EQ(info.perf_event.uprobe.ref_ctr_offset, ref_ctr_offset, "uprobe_ref_ctr_offset"); in verify_perf_link_info() 103 ASSERT_EQ(info.perf_event.uprobe.name_len, strlen(UPROBE_FILE) + 1, in verify_perf_link_info() 105 if (!info.perf_event.uprobe.file_name) { in verify_perf_link_info() 106 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in verify_perf_link_info() 107 info.perf_event.uprobe.name_len = sizeof(buf); in verify_perf_link_info() 111 ASSERT_EQ(info.perf_event.uprobe.cookie, PERF_EVENT_COOKIE, "uprobe_cookie"); in verify_perf_link_info() 113 err = strncmp(u64_to_ptr(info.perf_event.uprobe.file_name), UPROBE_FILE, in verify_perf_link_info()
|
| H A D | uprobe_multi_test.c | 278 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, pid, in __test_attach_api() 280 if (!ASSERT_OK_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) in __test_attach_api() 575 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in attach_uprobe_fail_trap() 577 if (!ASSERT_ERR_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) { in attach_uprobe_fail_trap() 578 bpf_link__destroy(skel->links.uprobe); in attach_uprobe_fail_trap() 579 skel->links.uprobe = NULL; in attach_uprobe_fail_trap() 688 prog_fd = bpf_program__fd(skel->progs.uprobe); in __test_link_api()
|
| H A D | bpf_cookie.c | 16 /* uprobe attach point */ 295 link1 = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in uprobe_multi_attach_api_subtest() 359 /* trigger uprobe && uretprobe */ in uprobe_subtest() 746 if (test__start_subtest("uprobe")) in test_bpf_cookie()
|
| /linux/tools/perf/tests/shell/ |
| H A D | test_uprobe_from_different_cu.sh | 19 temp_dir=$(mktemp -d /tmp/perf-uprobe-different-cu-sh.XXXXXXXXXX) 24 if [[ "${temp_dir}" =~ ^/tmp/perf-uprobe-different-cu-sh.*$ ]]; then
|
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-perf.rst | 59 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159 69 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
|
| /linux/tools/testing/selftests/bpf/benchs/ |
| H A D | run_bench_uprobes.sh | 5 for i in usermode-count syscall-count {uprobe,uretprobe}-{nop,push,ret,nop5}
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | uprobe_multi.c | 19 int __attribute__((weak)) uprobe(void) in uprobe() function 114 (void)uprobe(); in trigger_uprobe()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | uprobe_multi.c | 84 SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*") in uprobe_sleep() 85 int uprobe(struct pt_regs *ctx) in uprobe_sleep() 98 SEC("uprobe.multi.s//proc/self/exe:uprobe_multi_func_*") in uprobe_extra() 112 SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*") 70 int uprobe(struct pt_regs *ctx) uprobe() function
|
| /linux/tools/perf/bench/ |
| H A D | Build | 21 perf-bench-y += uprobe.o
|
| /linux/tools/perf/util/ |
| H A D | probe-file.c | 75 static void print_open_warning(int err, bool uprobe, bool readwrite) in print_open_warning() argument 82 if (print_configure_probe_event(uprobe ? 0 : err, uprobe ? err : 0)) in print_open_warning() 86 tracing_path_mount(), uprobe ? 'u' : 'k', in print_open_warning()
|
| H A D | probe-event.c | 907 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument 911 if (uprobe) in post_process_probe_trace_events() 2963 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument 2968 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-bench.txt | 70 'uprobe':: 71 Benchmark overhead of uprobe + BPF.
|
| H A D | perf-buildid-cache.txt | 74 used when creating a uprobe for a process that resides in a
|
| H A D | perf-probe.txt | 135 used when creating a uprobe for a process that resides in a 173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe. 281 Add a uprobe to a target process running in a different mount namespace
|
| /linux/kernel/ |
| H A D | sys_ni.c | 396 COND_SYSCALL(uprobe);
|
| /linux/tools/perf/arch/x86/entry/syscalls/ |
| H A D | syscall_64.tbl | 348 336 common uprobe sys_uprobe
|
| /linux/kernel/bpf/ |
| H A D | syscall.c | 3986 uname = u64_to_user_ptr(info->perf_event.uprobe.file_name); in bpf_perf_link_fill_uprobe() 3987 ulen = info->perf_event.uprobe.name_len; in bpf_perf_link_fill_uprobe() 3997 info->perf_event.uprobe.name_len = ulen; in bpf_perf_link_fill_uprobe() 3998 info->perf_event.uprobe.offset = offset; in bpf_perf_link_fill_uprobe() 3999 info->perf_event.uprobe.cookie = event->bpf_cookie; in bpf_perf_link_fill_uprobe() 4000 info->perf_event.uprobe.ref_ctr_offset = ref_ctr_offset; in bpf_perf_link_fill_uprobe()
|
| /linux/arch/x86/kernel/ |
| H A D | uprobes.c | 804 SYSCALL_DEFINE0(uprobe) in SYSCALL_DEFINE0() argument
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 569 * or uprobe perf event, then the *prog_id* and *fd_type* will 572 * uprobe, the *probe_offset* and *probe_addr* will also be 575 * the tracepoint, kprobe or uprobe. 1780 * filename for uprobe 5367 * When called for kprobe program attached as uprobe it returns 5368 * probe address for both entry and return uprobe. 5373 * Address of the probe for uprobe and return uprobe. 5383 * - kprobe/uprobe; 6820 } uprobe; /* BPF_PERF_EVENT_UPROB 6787 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ global() member [all...] |