/linux/kernel/events/ |
H A D | uprobes.c | 61 struct uprobe { struct 92 struct uprobe *uprobe; argument 296 delayed_uprobe_check(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_check() argument 301 if (du->uprobe == uprobe && du->mm == mm) in delayed_uprobe_check() 306 static int delayed_uprobe_add(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_add() argument 310 if (delayed_uprobe_check(uprobe, mm)) in delayed_uprobe_add() 317 du->uprobe = uprobe; in delayed_uprobe_add() 331 static void delayed_uprobe_remove(struct uprobe *uprobe, struct mm_struct *mm) in delayed_uprobe_remove() argument 336 if (!uprobe && !mm) in delayed_uprobe_remove() 342 if (uprobe && du->uprobe != uprobe) in delayed_uprobe_remove() [all …]
|
/linux/tools/testing/selftests/bpf/test_kmods/ |
H A D | bpf_testmod.c | 512 struct uprobe *uprobe; member 518 static struct testmod_uprobe uprobe = { variable 526 if (uprobe.uprobe) in testmod_register_uprobe() 531 if (uprobe.uprobe) in testmod_register_uprobe() 534 err = kern_path("/proc/self/exe", LOOKUP_FOLLOW, &uprobe.path); in testmod_register_uprobe() 538 uprobe.uprobe = uprobe_register(d_real_inode(uprobe.path.dentry), in testmod_register_uprobe() 539 offset, 0, &uprobe.consumer); in testmod_register_uprobe() 540 if (IS_ERR(uprobe.uprobe)) { in testmod_register_uprobe() 541 err = PTR_ERR(uprobe.uprobe); in testmod_register_uprobe() 542 path_put(&uprobe.path); in testmod_register_uprobe() [all …]
|
/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 94 … | | ``uprobe+`` [#uprobe]_ … 96 … | | ``uprobe.s+`` [#uprobe]_ |… 98 … | | ``uretprobe+`` [#uprobe]_ | … 100 … | | ``uretprobe.s+`` [#uprobe]_ | Yes … 221 .. [#uprobe] The ``uprobe`` attach format is ``uprobe[.s]/<path>:<function>[+<offset>]``.
|
/linux/Documentation/trace/ |
H A D | uprobetracer.rst | 18 However unlike kprobe-event tracer, the uprobe event interface expects the 29 p[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a uprobe 30 r[:[GRP/][EVENT]] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe) 31 p[:[GRP/][EVENT]] PATH:OFFSET%return [FETCHARGS] : Set a return uprobe (uretprobe) 32 -:[GRP/][EVENT] : Clear uprobe or uretprobe event 58 (\*3) Unlike kprobe event, "u" prefix will just be ignored, because uprobe 87 * Add a probe as a new uprobe event, write a new definition to uprobe_events 88 as below (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash):: 118 0x00400000. Hence the command to uprobe would be:: 184 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
|
/linux/kernel/trace/ |
H A D | trace_uprobe.c | 63 struct uprobe *uprobe; member 1105 struct uprobe *uprobe; in trace_uprobe_enable() local 1108 uprobe = uprobe_register(inode, tu->offset, tu->ref_ctr_offset, &tu->consumer); in trace_uprobe_enable() 1109 if (IS_ERR(uprobe)) in trace_uprobe_enable() 1110 return PTR_ERR(uprobe); in trace_uprobe_enable() 1112 tu->uprobe = uprobe; in trace_uprobe_enable() 1125 if (!tu->uprobe) in __probe_event_disable() 1128 uprobe_unregister_nosync(tu->uprobe, &tu->consumer); in __probe_event_disable() 1130 tu->uprobe = NULL; in __probe_event_disable() 1329 ret = uprobe_apply(tu->uprobe, &tu->consumer, false); in uprobe_perf_close() [all …]
|
H A D | bpf_trace.c | 3146 struct uprobe *uprobe; member 3163 struct bpf_uprobe *uprobe; member 3171 uprobe_unregister_nosync(uprobes[i].uprobe, &uprobes[i].consumer); in bpf_uprobe_unregister() 3270 static int uprobe_prog_run(struct bpf_uprobe *uprobe, in uprobe_prog_run() argument 3275 struct bpf_uprobe_multi_link *link = uprobe->link; in uprobe_prog_run() 3282 .uprobe = uprobe, in uprobe_prog_run() 3315 struct bpf_uprobe *uprobe; in uprobe_multi_link_filter() local 3317 uprobe = container_of(con, struct bpf_uprobe, consumer); in uprobe_multi_link_filter() 3318 return uprobe->link->task->mm == mm; in uprobe_multi_link_filter() 3325 struct bpf_uprobe *uprobe; in uprobe_multi_link_handler() local [all …]
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | fill_link_info.c | 99 ASSERT_EQ(info.perf_event.uprobe.offset, offset, "uprobe_offset"); in verify_perf_link_info() 101 ASSERT_EQ(info.perf_event.uprobe.name_len, strlen(UPROBE_FILE) + 1, in verify_perf_link_info() 103 if (!info.perf_event.uprobe.file_name) { in verify_perf_link_info() 104 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in verify_perf_link_info() 105 info.perf_event.uprobe.name_len = sizeof(buf); in verify_perf_link_info() 109 ASSERT_EQ(info.perf_event.uprobe.cookie, PERF_EVENT_COOKIE, "uprobe_cookie"); in verify_perf_link_info() 111 err = strncmp(u64_to_ptr(info.perf_event.uprobe.file_name), UPROBE_FILE, in verify_perf_link_info()
|
H A D | uprobe_multi_test.c | 278 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, pid, in __test_attach_api() 280 if (!ASSERT_OK_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) in __test_attach_api() 575 skel->links.uprobe = bpf_program__attach_uprobe_multi(skel->progs.uprobe, -1, in attach_uprobe_fail_trap() 577 if (!ASSERT_ERR_PTR(skel->links.uprobe, "bpf_program__attach_uprobe_multi")) { in attach_uprobe_fail_trap() 578 bpf_link__destroy(skel->links.uprobe); in attach_uprobe_fail_trap() 579 skel->links.uprobe = NULL; in attach_uprobe_fail_trap() 688 prog_fd = bpf_program__fd(skel->progs.uprobe); in __test_link_api()
|
/linux/tools/perf/tests/shell/ |
H A D | test_uprobe_from_different_cu.sh | 20 temp_dir=$(mktemp -d /tmp/perf-uprobe-different-cu-sh.XXXXXXXXXX) 25 if [[ "${temp_dir}" =~ ^/tmp/perf-uprobe-different-cu-sh.*$ ]]; then
|
/linux/tools/bpf/bpftool/ |
H A D | link.c | 380 u64_to_ptr(info->perf_event.uprobe.file_name)); in show_perf_event_uprobe_json() 381 jsonw_uint_field(wtr, "offset", info->perf_event.uprobe.offset); in show_perf_event_uprobe_json() 382 jsonw_uint_field(wtr, "cookie", info->perf_event.uprobe.cookie); in show_perf_event_uprobe_json() 815 buf = u64_to_ptr(info->perf_event.uprobe.file_name); in show_perf_event_uprobe_plain() 823 printf("%s+%#x ", buf, info->perf_event.uprobe.offset); in show_perf_event_uprobe_plain() 824 if (info->perf_event.uprobe.cookie) in show_perf_event_uprobe_plain() 825 printf("cookie %llu ", info->perf_event.uprobe.cookie); in show_perf_event_uprobe_plain() 1081 if (!info.perf_event.uprobe.file_name) { in do_show_link() 1082 info.perf_event.uprobe.file_name = ptr_to_u64(&buf); in do_show_link() 1083 info.perf_event.uprobe.name_len = sizeof(buf); in do_show_link()
|
/linux/tools/bpf/bpftool/Documentation/ |
H A D | bpftool-perf.rst | 59 pid 21800 fd 5: prog_id 9 uprobe filename /home/yhs/a.out offset 1159 69 {"pid":21800,"fd":5,"prog_id":9,"fd_type":"uprobe","filename":"/home/yhs/a.out","offset":1159}]
|
/linux/tools/testing/selftests/bpf/benchs/ |
H A D | run_bench_uprobes.sh | 5 for i in usermode-count syscall-count {uprobe,uretprobe}-{nop,push,ret}
|
/linux/tools/testing/selftests/bpf/ |
H A D | uprobe_multi.c | 19 int __attribute__((weak)) uprobe(void) in uprobe() function 114 (void)uprobe(); in trigger_uprobe()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | uprobe_multi.c | 84 SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*") in uprobe_sleep() 85 int uprobe(struct pt_regs *ctx) in uprobe_sleep() 98 SEC("uprobe.multi.s//proc/self/exe:uprobe_multi_func_*") in uprobe_extra() 112 SEC("uprobe.multi//proc/self/exe:uprobe_multi_func_*") 70 int uprobe(struct pt_regs *ctx) uprobe() function
|
/linux/tools/perf/bench/ |
H A D | Build | 20 perf-bench-y += uprobe.o
|
/linux/tools/perf/Documentation/ |
H A D | perf-bench.txt | 70 'uprobe':: 71 Benchmark overhead of uprobe + BPF.
|
H A D | perf-buildid-cache.txt | 74 used when creating a uprobe for a process that resides in a
|
H A D | perf-probe.txt | 135 used when creating a uprobe for a process that resides in a 173 …p name by 'GROUP', if omitted, set 'probe' is used for kprobe and 'probe_<bin>' is used for uprobe. 281 Add a uprobe to a target process running in a different mount namespace
|
/linux/tools/perf/util/ |
H A D | probe-event.c | 904 bool uprobe, struct debuginfo *dinfo) in post_process_probe_trace_events() argument 908 if (uprobe) in post_process_probe_trace_events() 2958 static int __open_probe_file_and_namelist(bool uprobe, in __open_probe_file_and_namelist() argument 2963 fd = probe_file__open(PF_FL_RW | (uprobe ? PF_FL_UPROBE : 0)); in __open_probe_file_and_namelist()
|
/linux/kernel/bpf/ |
H A D | syscall.c | 3788 uname = u64_to_user_ptr(info->perf_event.uprobe.file_name); in bpf_perf_link_fill_uprobe() 3789 ulen = info->perf_event.uprobe.name_len; in bpf_perf_link_fill_uprobe() 3799 info->perf_event.uprobe.name_len = ulen; in bpf_perf_link_fill_uprobe() 3800 info->perf_event.uprobe.offset = offset; in bpf_perf_link_fill_uprobe() 3801 info->perf_event.uprobe.cookie = event->bpf_cookie; in bpf_perf_link_fill_uprobe()
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 6715 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ member
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 6715 } uprobe; /* BPF_PERF_EVENT_UPROBE, BPF_PERF_EVENT_URETPROBE */ member
|
/linux/tools/lib/bpf/ |
H A D | libbpf.c | 10949 static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name, in perf_event_open_probe() argument 10961 type = uprobe ? determine_uprobe_perf_type() in perf_event_open_probe() 10965 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe() 10970 int bit = uprobe ? determine_uprobe_retprobe_bit() in perf_event_open_probe() 10975 uprobe ? "uprobe" : "kprobe", in perf_event_open_probe()
|