Lines Matching refs:func_name

10504 				const char *func_name,  in bpf_program__attach_kprobe_opts()  argument
10547 func_name, offset, in bpf_program__attach_kprobe_opts()
10553 func_name, offset); in bpf_program__attach_kprobe_opts()
10559 pfd = perf_event_kprobe_open_legacy(legacy_probe, retprobe, func_name, in bpf_program__attach_kprobe_opts()
10566 func_name, offset, in bpf_program__attach_kprobe_opts()
10576 func_name, offset, in bpf_program__attach_kprobe_opts()
10600 const char *func_name) in bpf_program__attach_kprobe() argument
10606 return bpf_program__attach_kprobe_opts(prog, func_name, &opts); in bpf_program__attach_kprobe()
10614 char func_name[128]; in bpf_program__attach_ksyscall() local
10625 snprintf(func_name, sizeof(func_name), "__%s_sys_%s", in bpf_program__attach_ksyscall()
10628 snprintf(func_name, sizeof(func_name), "__se_sys_%s", syscall_name); in bpf_program__attach_ksyscall()
10634 return bpf_program__attach_kprobe_opts(prog, func_name, &kprobe_opts); in bpf_program__attach_ksyscall()
10906 const char *func_name; in attach_kprobe() local
10918 func_name = prog->sec_name + sizeof("kretprobe/") - 1; in attach_kprobe()
10920 func_name = prog->sec_name + sizeof("kprobe/") - 1; in attach_kprobe()
10922 n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset); in attach_kprobe()
10924 pr_warn("kprobe name is invalid: %s\n", func_name); in attach_kprobe()
10993 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe_multi() local
11000 &probe_type, &binary_path, &func_name); in attach_uprobe_multi()
11008 *link = bpf_program__attach_uprobe_multi(prog, -1, binary_path, func_name, &opts); in attach_uprobe_multi()
11018 free(func_name); in attach_uprobe_multi()
11114 const char *func_name) in elf_find_func_offset_from_archive() argument
11152 ret = elf_find_func_offset(elf, file_name, func_name); in elf_find_func_offset_from_archive()
11155 func_name, file_name, archive_path, entry.data_offset, ret, in elf_find_func_offset_from_archive()
11374 const char *func_name; in bpf_program__attach_uprobe_opts() local
11404 func_name = OPTS_GET(opts, func_name, NULL); in bpf_program__attach_uprobe_opts()
11405 if (func_name) { in bpf_program__attach_uprobe_opts()
11410 func_name); in bpf_program__attach_uprobe_opts()
11413 sym_off = elf_find_func_offset_from_file(binary_path, func_name); in bpf_program__attach_uprobe_opts()
11509 char *probe_type = NULL, *binary_path = NULL, *func_name = NULL; in attach_uprobe() local
11516 &probe_type, &binary_path, &func_name, &offset); in attach_uprobe()
11535 opts.func_name = func_name; in attach_uprobe()
11546 free(func_name); in attach_uprobe()