Lines Matching refs:func_name
10068 const char *func_name, in bpf_program__attach_kprobe_opts() argument
10089 func_name, offset, in bpf_program__attach_kprobe_opts()
10095 func_name, offset); in bpf_program__attach_kprobe_opts()
10101 pfd = perf_event_kprobe_open_legacy(legacy_probe, retprobe, func_name, in bpf_program__attach_kprobe_opts()
10108 func_name, offset, in bpf_program__attach_kprobe_opts()
10118 func_name, offset, in bpf_program__attach_kprobe_opts()
10142 const char *func_name) in bpf_program__attach_kprobe() argument
10148 return bpf_program__attach_kprobe_opts(prog, func_name, &opts); in bpf_program__attach_kprobe()
10156 char func_name[128]; in bpf_program__attach_ksyscall() local
10167 snprintf(func_name, sizeof(func_name), "__%s_sys_%s", in bpf_program__attach_ksyscall()
10170 snprintf(func_name, sizeof(func_name), "__se_sys_%s", syscall_name); in bpf_program__attach_ksyscall()
10176 return bpf_program__attach_kprobe_opts(prog, func_name, &kprobe_opts); in bpf_program__attach_ksyscall()
10316 const char *func_name; in attach_kprobe() local
10328 func_name = prog->sec_name + sizeof("kretprobe/") - 1; in attach_kprobe()
10330 func_name = prog->sec_name + sizeof("kprobe/") - 1; in attach_kprobe()
10332 n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset); in attach_kprobe()
10334 pr_warn("kprobe name is invalid: %s\n", func_name); in attach_kprobe()
10745 const char *func_name; in bpf_program__attach_uprobe_opts() local
10767 func_name = OPTS_GET(opts, func_name, NULL); in bpf_program__attach_uprobe_opts()
10768 if (func_name) { in bpf_program__attach_uprobe_opts()
10771 sym_off = elf_find_func_offset(binary_path, func_name); in bpf_program__attach_uprobe_opts()
10846 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe() local
10853 &probe_type, &binary_path, &func_name, &offset); in attach_uprobe()
10872 opts.func_name = func_name; in attach_uprobe()
10883 free(func_name); in attach_uprobe()