Home
last modified time | relevance | path

Searched refs:binary_path (Results 1 – 7 of 7) sorted by relevance

/linux-6.14.4/tools/lib/bpf/
Delf.c25 int elf_open(const char *binary_path, struct elf_fd *elf_fd) in elf_open() argument
34 pr_warn("elf: failed to init libelf for %s\n", binary_path); in elf_open()
37 fd = open(binary_path, O_RDONLY | O_CLOEXEC); in elf_open()
40 pr_warn("elf: failed to open %s: %s\n", binary_path, errstr(ret)); in elf_open()
45 pr_warn("elf: could not read elf from %s: %s\n", binary_path, elf_errmsg(-1)); in elf_open()
98 Elf *elf, const char *binary_path, in elf_sym_iter_new() argument
108 pr_warn("elf: failed to get ehdr from %s: %s\n", binary_path, elf_errmsg(-1)); in elf_sym_iter_new()
115 binary_path); in elf_sym_iter_new()
126 binary_path, elf_errmsg(-1)); in elf_sym_iter_new()
148 pr_warn("elf: failed to get verdef ELF section in '%s'\n", binary_path); in elf_sym_iter_new()
[all …]
Dlibbpf_internal.h710 long elf_find_func_offset(Elf *elf, const char *binary_path, const char *name);
711 long elf_find_func_offset_from_file(const char *binary_path, const char *name);
718 int elf_open(const char *binary_path, struct elf_fd *elf_fd);
721 int elf_resolve_syms_offsets(const char *binary_path, int cnt,
724 int elf_resolve_pattern_offsets(const char *binary_path, const char *pattern,
Dlibbpf.h616 const char *binary_path,
709 pid_t pid, const char *binary_path,
728 const char *binary_path, size_t func_offset,
758 pid_t pid, const char *binary_path,
Dlibbpf.c11767 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe_multi() local
11774 &probe_type, &binary_path, &func_name); in attach_uprobe_multi()
11784 *link = bpf_program__attach_uprobe_multi(prog, -1, binary_path, func_name, &opts); in attach_uprobe_multi()
11793 free(binary_path); in attach_uprobe_multi()
11799 const char *binary_path, uint64_t offset) in gen_uprobe_legacy_event_name() argument
11803 snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx", getpid(), binary_path, (size_t)offset); in gen_uprobe_legacy_event_name()
11813 const char *binary_path, size_t offset) in add_uprobe_event_legacy() argument
11818 probe_name, binary_path, offset); in add_uprobe_event_legacy()
11838 const char *binary_path, size_t offset, int pid) in perf_event_uprobe_open_legacy() argument
11844 err = add_uprobe_event_legacy(probe_name, retprobe, binary_path, offset); in perf_event_uprobe_open_legacy()
[all …]
/linux-6.14.4/samples/bpf/
Dtask_fd_query_user.c227 static int test_debug_fs_uprobe(char *binary_path, long offset, bool is_return) in test_debug_fs_uprobe() argument
248 binary_path, offset); in test_debug_fs_uprobe()
284 printf("FAIL: %s, binary_path %s\n", __func__, binary_path); in test_debug_fs_uprobe()
294 if (strcmp(binary_path, buf) != 0) { in test_debug_fs_uprobe()
/linux-6.14.4/tools/testing/selftests/exec/
Dcheck-exec.c111 static const char binary_path[] = "./false"; variable
186 fd_in = open(binary_path, O_CLOEXEC | O_RDONLY); in fill_exec_fd()
/linux-6.14.4/tools/perf/util/
Dsrcline.c467 const char *binary_path) in addr2line_subprocess_init() argument
471 "-e", binary_path, in addr2line_subprocess_init()
493 addr2line_path, binary_path, start_command_status); in addr2line_subprocess_init()