Lines Matching defs:offset
433 /* this program's instruction offset (in number of instructions)
448 * if yes, at which instruction offset.
811 pr_warn("sec '%s': corrupted program '%s', offset %zu, size %zu\n",
895 pr_warn("sec '%s': failed to get symbol name for offset %zu\n",
901 pr_warn("sec '%s': program at offset %zu crosses section boundary\n",
911 pr_debug("sec '%s': found program '%s' at insn offset %zu (%zu bytes), code size %zu insns (%zu bytes)\n",
1170 kern_data_off = kern_data_member->offset / 8;
1185 moff = member->offset / 8;
1228 kern_moff = kern_member->offset / 8;
1407 map->sec_offset = vsi->offset;
1440 if (vsi->offset + type->size > data->d_size) {
1447 data->d_buf + vsi->offset,
1451 pr_debug("struct_ops init: struct %s(type_id=%u) %s found at offset %u\n",
1452 tname, type_id, var_name, vsi->offset);
1961 pr_debug("map '%s' (global data): at sec_idx %d, offset %zu, flags %x.\n",
2879 if ((__u64)vi->offset + vi->size > data->d_size) {
2916 map->sec_offset = vi->offset;
2918 pr_debug("map '%s': at sec_idx %d, offset %zu.\n",
3157 m->offset = v->offset * 8;
3213 m->offset = 0;
3318 return a->offset - b->offset;
3395 vsi->offset = sym->st_value;
3427 * is section size and global variable offset. We use
3631 pr_warn("elf: failed to get section name string at offset %zu from %s: %s\n",
3645 pr_warn("elf: failed to get section name string at offset %zu from %s: %s\n",
3992 /* sort BPF programs by section name and in-section instruction offset
4388 vs->offset = off;
4422 vs->offset = ext->kcfg.data_off;
4582 pr_warn("prog '%s': bad call relo against '%s' at offset %zu\n",
4600 /* global_func: sym->st_value = offset in the section, insn->imm = 0.
4601 * local_func: sym->st_value = 0, insn->imm = offset in the section.
4604 pr_warn("prog '%s': bad subprog addr relo against '%s' at offset %zu+%d\n",
4783 pr_warn("sec '%s': invalid offset 0x%zx for relo #%d\n",
6046 * relocated, so it's enough to just subtract in-section offset
6298 * into kernel offsets and adjust offset according to program
6499 * an offset of a symbol pointed to by relocation and
6506 * the byte offset in the corresponding section.
6524 * offset necessary, insns->imm is relative to
6569 pr_debug("prog '%s': insn #%zu relocated, imm %d points to subprog '%s' (now at %zu offset)\n",
6962 p->name_off = name_off; /* use remembered str offset */
7285 if (vi->offset <= rel->r_offset &&
7286 rel->r_offset + bpf_ptr_sz <= vi->offset + vi->size)
7344 if (rel->r_offset - vi->offset < moff)
7347 moff = rel->r_offset - vi->offset - moff;
8407 pr_warn("extern (func ksym) '%s': module BTF fd index %d too big to fit in bpf_insn offset\n",
9908 size_t offset)
9918 map->sec_offset <= offset &&
9919 offset - map->sec_offset < map->def.value_size)
9986 pr_warn("struct_ops reloc %s: invalid target program offset %llu\n",
10423 if (element_sz <= 0 || (size - var->offset) % element_sz != 0) {
10430 nr_elements = (size - var->offset) / element_sz;
10444 var->size = size - var->offset;
11124 uint64_t offset, int pid, size_t ref_ctr_off)
11159 attr.config2 = offset; /* kprobe_addr or probe_offset */
11234 const char *name, size_t offset)
11240 __sync_fetch_and_add(&index, 1), name, offset);
11250 const char *kfunc_name, size_t offset)
11255 probe_name, kfunc_name, offset);
11275 const char *kfunc_name, size_t offset, int pid)
11281 err = add_kprobe_event_legacy(probe_name, retprobe, kfunc_name, offset);
11284 kfunc_name, offset,
11292 kfunc_name, offset,
11387 size_t offset;
11396 offset = OPTS_GET(opts, offset, 0);
11422 func_name, offset,
11428 func_name, offset);
11435 offset, -1 /* pid */);
11441 func_name, offset,
11451 func_name, offset,
11827 unsigned long offset = 0;
11844 n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset);
11849 if (opts.retprobe && offset != 0) {
11851 pr_warn("kretprobes do not support offset specification\n");
11855 opts.offset = offset;
11973 const char *binary_path, size_t offset)
11978 probe_name, binary_path, offset);
11998 const char *binary_path, size_t offset, int pid)
12004 err = add_uprobe_event_legacy(probe_name, retprobe, binary_path, offset);
12007 binary_path, (size_t)offset, errstr(err));
12014 binary_path, offset, errstr(err));
12040 /* Find offset of function name in archive specified by path. Currently
12448 * u[ret]probe/binary:function[+offset]
12462 long offset = 0;
12474 pr_warn("prog '%s': section '%s' missing ':function[+offset]' specification\n",
12478 /* check if user specifies `+offset`, if yes, this should be
12483 n = sscanf(func_off, "+%li%n", &offset, &c);
12487 offset = 0;
12491 if (opts.retprobe && offset != 0) {
12492 pr_warn("prog '%s': uretprobes do not support offset specification\n",
12497 *link = bpf_program__attach_uprobe_opts(prog, -1, binary_path, offset, &opts);
14124 *var_skel->addr = map->mmaped + var->offset;