Lines Matching refs:func_name
11306 const char *func_name, in bpf_program__attach_kprobe_opts() argument
11348 func_name, offset, in bpf_program__attach_kprobe_opts()
11354 func_name, offset); in bpf_program__attach_kprobe_opts()
11360 pfd = perf_event_kprobe_open_legacy(legacy_probe, retprobe, func_name, in bpf_program__attach_kprobe_opts()
11367 func_name, offset, in bpf_program__attach_kprobe_opts()
11377 func_name, offset, in bpf_program__attach_kprobe_opts()
11401 const char *func_name) in bpf_program__attach_kprobe() argument
11407 return bpf_program__attach_kprobe_opts(prog, func_name, &opts); in bpf_program__attach_kprobe()
11415 char func_name[128]; in bpf_program__attach_ksyscall() local
11426 snprintf(func_name, sizeof(func_name), "__%s_sys_%s", in bpf_program__attach_ksyscall()
11429 snprintf(func_name, sizeof(func_name), "__se_sys_%s", syscall_name); in bpf_program__attach_ksyscall()
11435 return bpf_program__attach_kprobe_opts(prog, func_name, &kprobe_opts); in bpf_program__attach_ksyscall()
11754 const char *func_name; in attach_kprobe() local
11766 func_name = prog->sec_name + sizeof("kretprobe/") - 1; in attach_kprobe()
11768 func_name = prog->sec_name + sizeof("kprobe/") - 1; in attach_kprobe()
11770 n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset); in attach_kprobe()
11772 pr_warn("kprobe name is invalid: %s\n", func_name); in attach_kprobe()
11867 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe_multi() local
11874 &probe_type, &binary_path, &func_name); in attach_uprobe_multi()
11884 *link = bpf_program__attach_uprobe_multi(prog, -1, binary_path, func_name, &opts); in attach_uprobe_multi()
11894 free(func_name); in attach_uprobe_multi()
11976 const char *func_name) in elf_find_func_offset_from_archive() argument
12014 ret = elf_find_func_offset(elf, file_name, func_name); in elf_find_func_offset_from_archive()
12017 func_name, file_name, archive_path, entry.data_offset, ret, in elf_find_func_offset_from_archive()
12250 const char *func_name; in bpf_program__attach_uprobe_opts() local
12280 func_name = OPTS_GET(opts, func_name, NULL); in bpf_program__attach_uprobe_opts()
12281 if (func_name) { in bpf_program__attach_uprobe_opts()
12286 func_name); in bpf_program__attach_uprobe_opts()
12289 sym_off = elf_find_func_offset_from_file(binary_path, func_name); in bpf_program__attach_uprobe_opts()
12386 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL, *func_off; in attach_uprobe() local
12393 &probe_type, &binary_path, &func_name); in attach_uprobe()
12407 func_off = strrchr(func_name, '+'); in attach_uprobe()
12422 opts.func_name = func_name; in attach_uprobe()
12433 free(func_name); in attach_uprobe()