| /linux/kernel/events/ |
| H A D | uprobes.c | 62 struct uprobe { struct 93 struct uprobe *uprobe; argument 224 delayed_uprobe_check(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_check() argument 229 if (du->uprobe == uprobe && du->mm == mm) in delayed_uprobe_check() 234 static int delayed_uprobe_add(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_add() argument 238 if (delayed_uprobe_check(uprobe, mm)) in delayed_uprobe_add() 245 du->uprobe = uprobe; in delayed_uprobe_add() 259 static void delayed_uprobe_remove(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_remove() argument 264 if (!uprobe && !mm) in delayed_uprobe_remove() 270 if (uprobe && du->uprobe != uprobe) in delayed_uprobe_remove() [all …]
|
| /linux/include/linux/ |
| H A D | uprobes.h | 22 struct uprobe; 119 struct uprobe *uprobe; member 147 struct uprobe *active_uprobe; 209 extern struct uprobe *uprobe_register(struct inode *inode, loff_t offset, loff_t ref_ctr_offset, st… 210 extern int uprobe_apply(struct uprobe *uprobe, struct uprobe_consumer *uc, bool); 211 extern void uprobe_unregister_nosync(struct uprobe *uprobe, struct uprobe_consumer *uc); 255 static inline struct uprobe * 261 uprobe_apply(struct uprobe* uprobe, struct uprobe_consumer *uc, bool add) in uprobe_apply() argument 266 uprobe_unregister_nosync(struct uprobe *uprobe, struct uprobe_consumer *uc) in uprobe_unregister_nosync() argument
|
| /linux/tools/testing/selftests/bpf/test_kmods/ |
| H A D | bpf_testmod.c | 589 struct uprobe *uprobe; member 595 static struct testmod_uprobe uprobe = { variable 604 if (uprobe.uprobe) in testmod_register_uprobe() 609 if (uprobe.uprobe) in testmod_register_uprobe() 612 err = kern_path("/proc/self/exe", LOOKUP_FOLLOW, &uprobe.path); in testmod_register_uprobe() 616 uprobe.uprobe = uprobe_register(d_real_inode(uprobe.path.dentry), in testmod_register_uprobe() 617 offset, 0, &uprobe.consumer); in testmod_register_uprobe() 618 if (IS_ERR(uprobe.uprobe)) { in testmod_register_uprobe() 619 err = PTR_ERR(uprobe.uprobe); in testmod_register_uprobe() 620 path_put(&uprobe.path); in testmod_register_uprobe() [all …]
|
| /linux/Documentation/trace/ |
| H A D | uprobetracer.rst | 18 However unlike kprobe-event tracer, the uprobe event interface expects the 29 p[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a uprobe 30 r[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe) 31 p[:[GRP/][EVENT]] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe) 32 -:[GRP/][EVENT] : Clear uprobe or uretprobe event 58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, because uprobe 87 * Add a probe as a new uprobe event, write a new definition to uprobe_events 88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash):: 118 0x00400000. Hence the command to uprobe would be:: 184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
|
| /linux/kernel/trace/ |
| H A D | trace_uprobe.c | 65 struct uprobe *uprobe; member 1105 struct uprobe *uprobe; in trace_uprobe_enable() local 1108 uprobe = uprobe_register(inode, tu->offset, tu->ref_ctr_offset, &tu->consumer); in trace_uprobe_enable() 1109 if (IS_ERR(uprobe)) in trace_uprobe_enable() 1110 return PTR_ERR(uprobe); in trace_uprobe_enable() 1112 tu->uprobe = uprobe; in trace_uprobe_enable() 1125 if (!tu->uprobe) in __probe_event_disable() 1128 uprobe_unregister_nosync(tu->uprobe, &tu->consumer); in __probe_event_disable() 1130 tu->uprobe = NULL; in __probe_event_disable() 1329 ret = uprobe_apply(tu->uprobe, &tu->consumer, false); in uprobe_perf_close() [all …]
|
| H A D | bpf_trace.c | 2184 /* kprobe/uprobe */ in bpf_get_perf_event_info() 2891 struct uprobe *uprobe; member 2907 struct bpf_uprobe *uprobe; member 2915 uprobe_unregister_nosync(uprobes[i].uprobe, &uprobes[i].consumer); in bpf_uprobe_unregister() 3058 static int uprobe_prog_run(struct bpf_uprobe *uprobe, in uprobe_prog_run() argument 3063 struct bpf_uprobe_multi_link *link = uprobe->link; in uprobe_prog_run() 3070 .uprobe = uprobe, in uprobe_prog_run() 3103 struct bpf_uprobe *uprobe; in uprobe_multi_link_filter() local 3113 struct bpf_uprobe *uprobe; uprobe_multi_link_handler() local 3127 struct bpf_uprobe *uprobe; uprobe_multi_link_ret_handler() local [all...] |
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | fill_link_info.c | 29 /* uprobe attach point */ 100 ASSERT_EQ(info.perf_event.uprobe.offset, offset, "uprobe_offset"); in verify_perf_link_info() 101 ASSERT_EQ(info.perf_event.uprobe.ref_ctr_offset, ref_ctr_offset, "uprobe_ref_ctr_offset"); in verify_perf_link_info() 103 ASSERT_EQ(info.perf_event.uprobe.name_len, strlen(UPROBE_FILE) + 1, in verify_perf_link_info() 105 if (!info.perf_event.uprobe.file_name) { in verify_perf_link_info() 106 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in verify_perf_link_info() 107 info.perf_event.uprobe.name_len = sizeof(buf); in verify_perf_link_info() 111 ASSERT_EQ(info.perf_event.uprobe.cookie, PERF_EVENT_COOKIE, "uprobe_cookie"); in verify_perf_link_info() 113 err = strncmp(u64_to_ptr(info.perf_event.uprobe.file_name), UPROBE_FILE, in verify_perf_link_info()
|
| H A D | uprobe_multi_test.c | 278 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, pid, in __test_attach_api() 280 if (!ASSERT_OK_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) in __test_attach_api() 575 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in attach_uprobe_fail_trap() 577 if (!ASSERT_ERR_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) { in attach_uprobe_fail_trap() 578 bpf_link__destroy(skel->links.uprobe); in attach_uprobe_fail_trap() 579 skel->links.uprobe = NULL; in attach_uprobe_fail_trap() 688 prog_fd = bpf_program__fd(skel->progs.uprobe); in __test_link_api()
|
| H A D | bpf_cookie.c | 16 /* uprobe attach point */ 295 link1 = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in uprobe_multi_attach_api_subtest() 359 /* trigger uprobe && uretprobe */ in uprobe_subtest() 746 if (test__start_subtest("uprobe")) in test_bpf_cookie()
|
| /linux/tools/perf/tests/shell/ |
| H A D | test_uprobe_from_different_cu.sh | 19 temp_dir=$(mktemp -d /tmp/perf-uprobe-different-cu-sh.XXXXXXXXXX) 24 if [[ "${temp_dir}" =~ ^/tmp/perf-uprobe-different-cu-sh.*$ ]]; then
|
| /linux/tools/bpf/bpftool/Documentation/ |
| H A D | bpftool-perf.rst | 59 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159 69 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
|
| /linux/tools/testing/selftests/bpf/benchs/ |
| H A D | run_bench_uprobes.sh | 5 for i in usermode-count syscall-count {uprobe,uretprobe}-{nop,push,ret,nop5}
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | uprobe_multi.c | 19 int __attribute__((weak)) uprobe(void) in uprobe() function 114 (void)uprobe(); in trigger_uprobe()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | uprobe_multi.c | 84 SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*") in uprobe_sleep() 85 int uprobe(struct pt_regs *ctx) in uprobe_sleep() 98 SEC("uprobe.multi.s//proc/self/exe:uprobe_multi_func_*") in uprobe_extra() 112 SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*") 70 int uprobe(struct pt_regs *ctx) uprobe() function
|
| /linux/tools/perf/bench/ |
| H A D | Build | 21 perf-bench-y += uprobe.o
|
| /linux/tools/perf/util/ |
| H A D | probe-file.c | 74 static void print_open_warning(int err, bool uprobe, bool readwrite) in print_open_warning() argument 81 if (print_configure_probe_event(uprobe ? 0 : err, uprobe ? err : 0)) in print_open_warning() 85 tracing_path_mount(), uprobe ? 'u' : 'k', in print_open_warning()
|
| H A D | probe-event.c | 907 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument 911 if (uprobe) in post_process_probe_trace_events() 2963 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument 2968 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
|
| /linux/tools/perf/Documentation/ |
| H A D | perf-bench.txt | 70 'uprobe':: 71 Benchmark overhead of uprobe + BPF.
|
| H A D | perf-buildid-cache.txt | 74 used when creating a uprobe for a process that resides in a
|
| H A D | perf-probe.txt | 135 used when creating a uprobe for a process that resides in a 173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe. 281 Add a uprobe to a target process running in a different mount namespace
|
| /linux/kernel/ |
| H A D | sys_ni.c | 395 COND_SYSCALL(uprobe);
|
| /linux/arch/x86/entry/syscalls/ |
| H A D | syscall_64.tbl | 348 336 common uprobe sys_uprobe
|
| /linux/tools/perf/arch/x86/entry/syscalls/ |
| H A D | syscall_64.tbl | 348 336 common uprobe sys_uprobe
|
| /linux/kernel/bpf/ |
| H A D | syscall.c | 3970 uname = u64_to_user_ptr(info->perf_event.uprobe.file_name); in bpf_perf_link_fill_uprobe() 3971 ulen = info->perf_event.uprobe.name_len; in bpf_perf_link_fill_uprobe() 3981 info->perf_event.uprobe.name_len = ulen; in bpf_perf_link_fill_uprobe() 3982 info->perf_event.uprobe.offset = offset; in bpf_perf_link_fill_uprobe() 3983 info->perf_event.uprobe.cookie = event->bpf_cookie; in bpf_perf_link_fill_uprobe() 3984 info->perf_event.uprobe.ref_ctr_offset = ref_ctr_offset; in bpf_perf_link_fill_uprobe()
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 561 * or uprobe perf event, then the *prog_id* and *fd_type* will 564 * uprobe, the *probe_offset* and *probe_addr* will also be 567 * the tracepoint, kprobe or uprobe. 1758 * filename for uprobe 5339 * When called for kprobe program attached as uprobe it returns 5340 * probe address for both entry and return uprobe. 5345 * Address of the probe for uprobe and return uprobe. 5355 * - kprobe/uprobe; 6792 } uprobe; /* BPF_PERF_EVENT_UPROB 6787 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ global() member [all...] |