/linux-6.14.4/tools/lib/bpf/ |
D | elf.c | 25 int elf_open(const char *binary_path, struct elf_fd *elf_fd) in elf_open() argument 34 pr_warn("elf: failed to init libelf for %s\n", binary_path); in elf_open() 37 fd = open(binary_path, O_RDONLY | O_CLOEXEC); in elf_open() 40 pr_warn("elf: failed to open %s: %s\n", binary_path, errstr(ret)); in elf_open() 45 pr_warn("elf: could not read elf from %s: %s\n", binary_path, elf_errmsg(-1)); in elf_open() 98 Elf *elf, const char *binary_path, in elf_sym_iter_new() argument 108 pr_warn("elf: failed to get ehdr from %s: %s\n", binary_path, elf_errmsg(-1)); in elf_sym_iter_new() 115 binary_path); in elf_sym_iter_new() 126 binary_path, elf_errmsg(-1)); in elf_sym_iter_new() 148 pr_warn("elf: failed to get verdef ELF section in '%s'\n", binary_path); in elf_sym_iter_new() [all …]
|
D | libbpf_internal.h | 710 long elf_find_func_offset(Elf *elf, const char *binary_path, const char *name); 711 long elf_find_func_offset_from_file(const char *binary_path, const char *name); 718 int elf_open(const char *binary_path, struct elf_fd *elf_fd); 721 int elf_resolve_syms_offsets(const char *binary_path, int cnt, 724 int elf_resolve_pattern_offsets(const char *binary_path, const char *pattern,
|
D | libbpf.h | 616 const char *binary_path, 709 pid_t pid, const char *binary_path, 728 const char *binary_path, size_t func_offset, 758 pid_t pid, const char *binary_path,
|
D | libbpf.c | 11767 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe_multi() local 11774 &probe_type, &binary_path, &func_name); in attach_uprobe_multi() 11784 *link = bpf_program__attach_uprobe_multi(prog, -1, binary_path, func_name, &opts); in attach_uprobe_multi() 11793 free(binary_path); in attach_uprobe_multi() 11799 const char *binary_path, uint64_t offset) in gen_uprobe_legacy_event_name() argument 11803 snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx", getpid(), binary_path, (size_t)offset); in gen_uprobe_legacy_event_name() 11813 const char *binary_path, size_t offset) in add_uprobe_event_legacy() argument 11818 probe_name, binary_path, offset); in add_uprobe_event_legacy() 11838 const char *binary_path, size_t offset, int pid) in perf_event_uprobe_open_legacy() argument 11844 err = add_uprobe_event_legacy(probe_name, retprobe, binary_path, offset); in perf_event_uprobe_open_legacy() [all …]
|
/linux-6.14.4/samples/bpf/ |
D | task_fd_query_user.c | 227 static int test_debug_fs_uprobe(char *binary_path, long offset, bool is_return) in test_debug_fs_uprobe() argument 248 binary_path, offset); in test_debug_fs_uprobe() 284 printf("FAIL: %s, binary_path %s\n", __func__, binary_path); in test_debug_fs_uprobe() 294 if (strcmp(binary_path, buf) != 0) { in test_debug_fs_uprobe()
|
/linux-6.14.4/tools/testing/selftests/exec/ |
D | check-exec.c | 111 static const char binary_path[] = "./false"; variable 186 fd_in = open(binary_path, O_CLOEXEC | O_RDONLY); in fill_exec_fd()
|
/linux-6.14.4/tools/perf/util/ |
D | srcline.c | 467 const char *binary_path) in addr2line_subprocess_init() argument 471 "-e", binary_path, in addr2line_subprocess_init() 493 addr2line_path, binary_path, start_command_status); in addr2line_subprocess_init()
|