Lines Matching refs:func_name
11656 const char *func_name, in bpf_program__attach_kprobe_opts() argument
11698 func_name, offset, in bpf_program__attach_kprobe_opts()
11704 func_name, offset); in bpf_program__attach_kprobe_opts()
11710 pfd = perf_event_kprobe_open_legacy(legacy_probe, retprobe, func_name, in bpf_program__attach_kprobe_opts()
11717 func_name, offset, in bpf_program__attach_kprobe_opts()
11727 func_name, offset, in bpf_program__attach_kprobe_opts()
11751 const char *func_name) in bpf_program__attach_kprobe() argument
11757 return bpf_program__attach_kprobe_opts(prog, func_name, &opts); in bpf_program__attach_kprobe()
11765 char func_name[128]; in bpf_program__attach_ksyscall() local
11776 snprintf(func_name, sizeof(func_name), "__%s_sys_%s", in bpf_program__attach_ksyscall()
11779 snprintf(func_name, sizeof(func_name), "__se_sys_%s", syscall_name); in bpf_program__attach_ksyscall()
11785 return bpf_program__attach_kprobe_opts(prog, func_name, &kprobe_opts); in bpf_program__attach_ksyscall()
12105 const char *func_name; in attach_kprobe() local
12117 func_name = prog->sec_name + sizeof("kretprobe/") - 1; in attach_kprobe()
12119 func_name = prog->sec_name + sizeof("kprobe/") - 1; in attach_kprobe()
12121 n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset); in attach_kprobe()
12123 pr_warn("kprobe name is invalid: %s\n", func_name); in attach_kprobe()
12218 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe_multi() local
12225 &probe_type, &binary_path, &func_name); in attach_uprobe_multi()
12235 *link = bpf_program__attach_uprobe_multi(prog, -1, binary_path, func_name, &opts); in attach_uprobe_multi()
12245 free(func_name); in attach_uprobe_multi()
12327 const char *func_name) in elf_find_func_offset_from_archive() argument
12365 ret = elf_find_func_offset(elf, file_name, func_name); in elf_find_func_offset_from_archive()
12368 func_name, file_name, archive_path, entry.data_offset, ret, in elf_find_func_offset_from_archive()
12599 const char *func_name; in bpf_program__attach_uprobe_opts() local
12629 func_name = OPTS_GET(opts, func_name, NULL); in bpf_program__attach_uprobe_opts()
12630 if (func_name) { in bpf_program__attach_uprobe_opts()
12635 func_name); in bpf_program__attach_uprobe_opts()
12638 sym_off = elf_find_func_offset_from_file(binary_path, func_name); in bpf_program__attach_uprobe_opts()
12735 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL, *func_off; in attach_uprobe() local
12742 &probe_type, &binary_path, &func_name); in attach_uprobe()
12756 func_off = strrchr(func_name, '+'); in attach_uprobe()
12771 opts.func_name = func_name; in attach_uprobe()
12782 free(func_name); in attach_uprobe()