Searched refs:kprobe (Results 51 - 60 of 60) sorted by relevance
123
/linux-master/include/linux/ |
H A D | bpf_types.h | 39 BPF_PROG_TYPE(BPF_PROG_TYPE_KPROBE, kprobe,
|
/linux-master/arch/s390/lib/ |
H A D | test_unwind.c | 140 #define UWM_KPROBE_ON_FTRACE 0x80 /* Unwind from kprobe handler called via ftrace. */ 196 u->ret = -1; /* make sure kprobe is called */ 219 static int kprobe_pre_handler(struct kprobe *p, struct pt_regs *regs) 241 struct kprobe kp; 249 u->ret = -1; /* make sure kprobe is called */
|
/linux-master/tools/testing/selftests/bpf/benchs/ |
H A D | bench_trigger.c | 415 /* batched (staying mostly in kernel) kprobe/fentry benchmarks */ 428 BENCH_TRIG_KERNEL(kprobe, "kprobe"); 430 BENCH_TRIG_KERNEL(kprobe_multi, "kprobe-multi");
|
/linux-master/tools/power/pm-graph/ |
H A D | sleepgraph.py | 649 def kprobeText(self, kname, kprobe): 652 if 'name' in kprobe: 653 name = kprobe['name'] 654 if 'format' in kprobe: 655 fmt = kprobe['format'] 656 if 'func' in kprobe: 657 func = kprobe['func'] 658 if self.archargs in kprobe: 659 args = kprobe[self.archargs] 660 if 'args' in kprobe [all...] |
/linux-master/kernel/bpf/ |
H A D | syscall.c | 3655 uname = u64_to_user_ptr(info->perf_event.kprobe.func_name); 3656 ulen = info->perf_event.kprobe.name_len; 3666 info->perf_event.kprobe.offset = offset; 3667 info->perf_event.kprobe.missed = missed; 3670 info->perf_event.kprobe.addr = addr; 3671 info->perf_event.kprobe.cookie = event->bpf_cookie;
|
/linux-master/kernel/trace/ |
H A D | trace_kprobe.c | 34 disable_tracing_selftest("running kprobe events"); 60 struct kretprobe rp; /* Use rp.kp for kprobe use */ 246 static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs); 530 /* Cleanup kprobe for reuse and mark it unregistered */ 541 /* If other probes are on the event, just unregister kprobe */ 713 .priority = 1 /* Invoked after kprobe module callback */ 768 * - Add kprobe: 889 /* Defer the ENOENT case until register kprobe */ 912 * kprobe. 1037 * kprobe_event_cmd_init - Initialize a kprobe even [all...] |
H A D | bpf_trace.c | 102 * kprobe handlers execute BPF programs via this helper. 106 * kprobe handler as: 107 * 0 - return from kprobe (event is filtered out) 108 * 1 - store kprobe event into ring buffer 121 * and don't send kprobe event into ring-buffer, 1076 struct kprobe *kp; 1676 /* bpf+kprobe programs can access fields of 'struct pt_regs' */ 2512 /* kprobe/uprobe */
|
/linux-master/arch/arm/kernel/ |
H A D | entry-armv.S | 264 @ If a kprobe is about to simulate a "stmdb sp..." instruction,
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 556 * If the *pid* and *fd* are associated with a tracepoint, kprobe 559 * of type **bpf_task_fd_type**. If associated with a kprobe or 563 * the tracepoint, kprobe or uprobe. 1698 * symbol for kprobe 3088 * The first argument is the context *regs* on which the kprobe 4195 * SEC("kprobe/sys_open") 5258 * Get address of the traced function (for tracing and kprobe programs). 5260 * When called for kprobe program attached as uprobe it returns 5264 * Address of the traced function for kprobe. 5276 * - kprobe/uprob 6706 } kprobe; /* BPF_PERF_EVENT_KPROBE, BPF_PERF_EVENT_KRETPROBE */ member in union:bpf_link_info::__anon2958::__anon2974::__anon2975 [all...] |
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 556 * If the *pid* and *fd* are associated with a tracepoint, kprobe 559 * of type **bpf_task_fd_type**. If associated with a kprobe or 563 * the tracepoint, kprobe or uprobe. 1698 * symbol for kprobe 3088 * The first argument is the context *regs* on which the kprobe 4195 * SEC("kprobe/sys_open") 5258 * Get address of the traced function (for tracing and kprobe programs). 5260 * When called for kprobe program attached as uprobe it returns 5264 * Address of the traced function for kprobe. 5276 * - kprobe/uprob 6706 } kprobe; /* BPF_PERF_EVENT_KPROBE, BPF_PERF_EVENT_KRETPROBE */ member in union:bpf_link_info::__anon3568::__anon3584::__anon3585 [all...] |
Completed in 392 milliseconds
123