Searched refs:uprobe (Results 1 – 5 of 5) sorted by relevance
65 struct uprobe { struct361 static struct uprobe *get_uprobe(struct uprobe *uprobe) in get_uprobe() argument363 atomic_inc(&uprobe->ref); in get_uprobe()364 return uprobe; in get_uprobe()367 static void put_uprobe(struct uprobe *uprobe) in put_uprobe() argument369 if (atomic_dec_and_test(&uprobe->ref)) in put_uprobe()370 kfree(uprobe); in put_uprobe()373 static int match_uprobe(struct uprobe *l, struct uprobe *r) in match_uprobe()390 static struct uprobe *__find_uprobe(struct inode *inode, loff_t offset) in __find_uprobe()392 struct uprobe u = { .inode = inode, .offset = offset }; in __find_uprobe()[all …]
17 However unlike kprobe-event tracer, the uprobe event interface expects the22 p[:[GRP/]EVENT] PATH:OFFSET [FETCHARGS] : Set a uprobe23 r[:[GRP/]EVENT] PATH:OFFSET [FETCHARGS] : Set a return uprobe (uretprobe)24 -:[GRP/]EVENT : Clear uprobe or uretprobe event70 * Add a probe as a new uprobe event, write a new definition to uprobe_events71 as below: (sets a uprobe at an offset of 0x4245c0 in the executable /bin/bash)101 0x00400000. Hence the command to uprobe would be:157 Output shows us uprobe was triggered for a pid 24842 with ip being 0x446420
32 static void print_open_warning(int err, bool uprobe) in print_open_warning() argument39 if (uprobe) in print_open_warning()46 uprobe ? 'u' : 'k', config); in print_open_warning()51 uprobe ? 'u' : 'k', in print_open_warning()
618 bool uprobe) in post_process_probe_trace_events() argument624 if (uprobe) in post_process_probe_trace_events()
88 struct uprobe *active_uprobe;96 struct uprobe *uprobe; member