Home
last modified time | relevance | path

Searched refs:uprobe (Results 1 – 5 of 5) sorted by relevance

/linux-4.4.14/kernel/events/
Duprobes.c65 struct uprobe { struct
361 static struct uprobe *get_uprobe(struct uprobe *uprobe) in get_uprobe() argument
363 atomic_inc(&uprobe->ref); in get_uprobe()
364 return uprobe; in get_uprobe()
367 static void put_uprobe(struct uprobe *uprobe) in put_uprobe() argument
369 if (atomic_dec_and_test(&uprobe->ref)) in put_uprobe()
370 kfree(uprobe); in put_uprobe()
373 static int match_uprobe(struct uprobe *l, struct uprobe *r) in match_uprobe()
390 static struct uprobe *__find_uprobe(struct inode *inode, loff_t offset) in __find_uprobe()
392 struct uprobe u = { .inode = inode, .offset = offset }; in __find_uprobe()
[all …]
/linux-4.4.14/Documentation/trace/
Duprobetracer.txt17 However unlike kprobe-event tracer, the uprobe event interface expects the
22 p[:[GRP/]EVENT] PATH:OFFSET [FETCHARGS] : Set a uprobe
23 r[:[GRP/]EVENT] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe)
24 -:[GRP/]EVENT : Clear uprobe or uretprobe event
70 * Add a probe as a new uprobe event, write a new definition to uprobe_events
71 as below: (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash)
101 0x00400000. Hence the command to uprobe would be:
157 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
/linux-4.4.14/tools/perf/util/
Dprobe-file.c32 static void print_open_warning(int err, bool uprobe) in print_open_warning() argument
39 if (uprobe) in print_open_warning()
46 uprobe ? 'u' : 'k', config); in print_open_warning()
51 uprobe ? 'u' : 'k', in print_open_warning()
Dprobe-event.c618 bool uprobe) in post_process_probe_trace_events() argument
624 if (uprobe) in post_process_probe_trace_events()
/linux-4.4.14/include/linux/
Duprobes.h88 struct uprobe *active_uprobe;
96 struct uprobe *uprobe; member