/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | attach_probe.c | 56 kprobe_opts.retprobe = false; 64 kprobe_opts.retprobe = true; 75 uprobe_opts.retprobe = false; 85 uprobe_opts.retprobe = true; 96 uprobe_opts.retprobe = false; 168 uprobe_opts.retprobe = false; 178 uprobe_opts.retprobe = true; 211 uprobe_opts.retprobe = false; 225 uprobe_opts.retprobe = true;
|
H A D | fill_link_info.c | 155 .retprobe = type == BPF_PERF_EVENT_KRETPROBE, 234 .retprobe = type == BPF_PERF_EVENT_URETPROBE, 253 static int verify_kmulti_link_info(int fd, bool retprobe, bool has_cookies) argument 272 if (!retprobe) 353 bool retprobe, bool cookies, 363 opts.retprobe = retprobe; 370 err = verify_kmulti_link_info(link_fd, retprobe, cookies); 403 verify_umulti_link_info(int fd, bool retprobe, __u64 *offsets, argument 443 retprobe, "inf 352 test_kprobe_multi_fill_link_info(struct test_fill_link_info *skel, bool retprobe, bool cookies, bool invalid) argument 511 test_uprobe_multi_fill_link_info(struct test_fill_link_info *skel, bool retprobe, bool invalid) argument [all...] |
H A D | bpf_cookie.c | 30 opts.retprobe = false; 37 opts.retprobe = false; 45 opts.retprobe = true; 52 opts.retprobe = true; 229 opts.retprobe = true; 304 opts.retprobe = true; 331 opts.retprobe = false; 338 opts.retprobe = false; 346 opts.retprobe = true; 353 opts.retprobe [all...] |
H A D | kprobe_multi_testmod_test.c | 36 opts->retprobe = true;
|
H A D | uprobe_multi_test.c | 163 opts->retprobe = false; 169 opts->retprobe = true; 175 opts->retprobe = false; 181 opts->retprobe = true; 187 opts->retprobe = false;
|
H A D | kprobe_multi_test.c | 153 opts->retprobe = true;
|
/linux-master/tools/perf/util/ |
H A D | probe-event.h | 37 bool retprobe; /* Return probe flag */ member in struct:probe_trace_point 70 bool retprobe; /* Return probe flag */ member in struct:perf_probe_point
|
H A D | probe-event.c | 434 result->retprobe = pp->retprobe; 694 pp->retprobe = tp->retprobe; 861 if (tevs[i].point.retprobe && !kretprobe_offset_is_supported()) 932 * same issue with kernel module. The retprobe doesn`t need debuginfo. 934 * for retprobe event. 936 if (pev->point.retprobe) 1614 pp->retprobe = 1; 1656 if ((pp->offset || pp->line || pp->lazy_line) && pp->retprobe) { [all...] |
H A D | probe-finder.c | 523 Dwarf_Addr paddr, bool retprobe, 559 if (retprobe) { 567 tp->retprobe = true; 889 if (!pp->function || pp->line || pp->retprobe || pp->lazy_line || 1268 pp->retprobe, pp->function, &tev->point); 1495 pp->retprobe, pp->function, &vl->point); 522 convert_to_trace_point(Dwarf_Die *sp_die, Dwfl_Module *mod, Dwarf_Addr paddr, bool retprobe, const char *function, struct probe_trace_point *tp) argument
|
/linux-master/tools/perf/arch/powerpc/util/ |
H A D | sym-handling.c | 98 if (!pev->uprobes && pev->point.retprobe) {
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf.h | 514 bool retprobe; member in struct:bpf_kprobe_opts 522 bpf_program__attach_kprobe(const struct bpf_program *prog, bool retprobe, 541 bool retprobe; member in struct:bpf_kprobe_multi_opts 545 #define bpf_kprobe_multi_opts__last_field retprobe 566 bool retprobe; member in struct:bpf_uprobe_multi_opts 570 #define bpf_uprobe_multi_opts__last_field retprobe 609 bool retprobe; member in struct:bpf_ksyscall_opts 612 #define bpf_ksyscall_opts__last_field retprobe 617 * to request to install retprobe that will be triggered at syscall exit. It's 659 bool retprobe; member in struct:bpf_uprobe_opts [all...] |
H A D | libbpf.c | 10562 static int remove_kprobe_event_legacy(const char *probe_name, bool retprobe); 10563 static int remove_uprobe_event_legacy(const char *probe_name, bool retprobe); 10727 const char *file = "/sys/bus/event_source/devices/kprobe/format/retprobe"; 10734 const char *file = "/sys/bus/event_source/devices/uprobe/format/retprobe"; 10742 static int perf_event_open_probe(bool uprobe, bool retprobe, const char *name, argument 10763 if (retprobe) { 10768 pr_warn("failed to determine %s retprobe bit: %s\n", 10869 static int add_kprobe_event_legacy(const char *probe_name, bool retprobe, argument 10873 retprobe ? 'r' : 'p', 10874 retprobe 10878 remove_kprobe_event_legacy(const char *probe_name, bool retprobe) argument 10884 determine_kprobe_perf_type_legacy(const char *probe_name, bool retprobe) argument 10894 perf_event_kprobe_open_legacy(const char *probe_name, bool retprobe, const char *kfunc_name, size_t offset, int pid) argument 11010 bool retprobe, legacy; local 11095 bpf_program__attach_kprobe(const struct bpf_program *prog, bool retprobe, const char *func_name) argument 11335 bool retprobe; local 11533 add_uprobe_event_legacy(const char *probe_name, bool retprobe, const char *binary_path, size_t offset) argument 11542 remove_uprobe_event_legacy(const char *probe_name, bool retprobe) argument 11548 determine_uprobe_perf_type_legacy(const char *probe_name, bool retprobe) argument 11558 perf_event_uprobe_open_legacy(const char *probe_name, bool retprobe, const char *binary_path, size_t offset, int pid) argument 11870 bool retprobe, legacy; local 12058 bpf_program__attach_uprobe(const struct bpf_program *prog, bool retprobe, pid_t pid, const char *binary_path, size_t func_offset) argument [all...] |
/linux-master/kernel/events/ |
H A D | core.c | 10284 PERF_PROBE_CONFIG_IS_RETPROBE = 1U << 0, /* [k,u]retprobe */ 10289 PMU_FORMAT_ATTR(retprobe, "config:0");
|