Searched refs:kprobe (Results 51 - 60 of 60) sorted by relevance

123

/linux-master/include/linux/
H A Dbpf_types.h39 BPF_PROG_TYPE(BPF_PROG_TYPE_KPROBE, kprobe,
/linux-master/arch/s390/lib/
H A Dtest_unwind.c140 #define UWM_KPROBE_ON_FTRACE 0x80 /* Unwind from kprobe handler called via ftrace. */
196 u->ret = -1; /* make sure kprobe is called */
219 static int kprobe_pre_handler(struct kprobe *p, struct pt_regs *regs)
241 struct kprobe kp;
249 u->ret = -1; /* make sure kprobe is called */
/linux-master/tools/testing/selftests/bpf/benchs/
H A Dbench_trigger.c415 /* batched (staying mostly in kernel) kprobe/fentry benchmarks */
428 BENCH_TRIG_KERNEL(kprobe, "kprobe");
430 BENCH_TRIG_KERNEL(kprobe_multi, "kprobe-multi");
/linux-master/tools/power/pm-graph/
H A Dsleepgraph.py649 def kprobeText(self, kname, kprobe):
652 if 'name' in kprobe:
653 name = kprobe['name']
654 if 'format' in kprobe:
655 fmt = kprobe['format']
656 if 'func' in kprobe:
657 func = kprobe['func']
658 if self.archargs in kprobe:
659 args = kprobe[self.archargs]
660 if 'args' in kprobe
[all...]
/linux-master/kernel/bpf/
H A Dsyscall.c3654 uname = u64_to_user_ptr(info->perf_event.kprobe.func_name);
3655 ulen = info->perf_event.kprobe.name_len;
3665 info->perf_event.kprobe.offset = offset;
3666 info->perf_event.kprobe.missed = missed;
3669 info->perf_event.kprobe.addr = addr;
3670 info->perf_event.kprobe.cookie = event->bpf_cookie;
/linux-master/kernel/trace/
H A Dtrace_kprobe.c34 disable_tracing_selftest("running kprobe events");
60 struct kretprobe rp; /* Use rp.kp for kprobe use */
246 static int kprobe_dispatcher(struct kprobe *kp, struct pt_regs *regs);
530 /* Cleanup kprobe for reuse and mark it unregistered */
541 /* If other probes are on the event, just unregister kprobe */
713 .priority = 1 /* Invoked after kprobe module callback */
768 * - Add kprobe:
889 /* Defer the ENOENT case until register kprobe */
912 * kprobe.
1037 * kprobe_event_cmd_init - Initialize a kprobe even
[all...]
H A Dbpf_trace.c102 * kprobe handlers execute BPF programs via this helper.
106 * kprobe handler as:
107 * 0 - return from kprobe (event is filtered out)
108 * 1 - store kprobe event into ring buffer
121 * and don't send kprobe event into ring-buffer,
1076 struct kprobe *kp;
1676 /* bpf+kprobe programs can access fields of 'struct pt_regs' */
2512 /* kprobe/uprobe */
/linux-master/arch/arm/kernel/
H A Dentry-armv.S264 @ If a kprobe is about to simulate a "stmdb sp..." instruction,
/linux-master/include/uapi/linux/
H A Dbpf.h556 * If the *pid* and *fd* are associated with a tracepoint, kprobe
559 * of type **bpf_task_fd_type**. If associated with a kprobe or
563 * the tracepoint, kprobe or uprobe.
1698 * symbol for kprobe
3088 * The first argument is the context *regs* on which the kprobe
4195 * SEC("kprobe/sys_open")
5258 * Get address of the traced function (for tracing and kprobe programs).
5260 * When called for kprobe program attached as uprobe it returns
5264 * Address of the traced function for kprobe.
5276 * - kprobe/uprob
6706 } kprobe; /* BPF_PERF_EVENT_KPROBE, BPF_PERF_EVENT_KRETPROBE */ member in union:bpf_link_info::__anon2958::__anon2974::__anon2975
[all...]
/linux-master/tools/include/uapi/linux/
H A Dbpf.h556 * If the *pid* and *fd* are associated with a tracepoint, kprobe
559 * of type **bpf_task_fd_type**. If associated with a kprobe or
563 * the tracepoint, kprobe or uprobe.
1698 * symbol for kprobe
3088 * The first argument is the context *regs* on which the kprobe
4195 * SEC("kprobe/sys_open")
5258 * Get address of the traced function (for tracing and kprobe programs).
5260 * When called for kprobe program attached as uprobe it returns
5264 * Address of the traced function for kprobe.
5276 * - kprobe/uprob
6706 } kprobe; /* BPF_PERF_EVENT_KPROBE, BPF_PERF_EVENT_KRETPROBE */ member in union:bpf_link_info::__anon3568::__anon3584::__anon3585
[all...]

Completed in 556 milliseconds

123