Lines Matching defs:offset

407 	/* this program's instruction offset (in number of instructions)
422 * if yes, at which instruction offset.
795 pr_warn("sec '%s': corrupted program '%s', offset %zu, size %zu\n",
879 pr_warn("sec '%s': failed to get symbol name for offset %zu\n",
885 pr_warn("sec '%s': program at offset %zu crosses section boundary\n",
895 pr_debug("sec '%s': found program '%s' at insn offset %zu (%zu bytes), code size %zu insns (%zu bytes)\n",
1068 kern_data_off = kern_data_member->offset / 8;
1097 moff = member->offset / 8;
1098 kern_moff = kern_member->offset / 8;
1239 map->sec_offset = vsi->offset;
1261 if (vsi->offset + type->size > data->d_size) {
1268 data->d_buf + vsi->offset,
1274 pr_debug("struct_ops init: struct %s(type_id=%u) %s found at offset %u\n",
1275 tname, type_id, var_name, vsi->offset);
1758 pr_debug("map '%s' (global data): at sec_idx %d, offset %zu, flags %x.\n",
2635 if ((__u64)vi->offset + vi->size > data->d_size) {
2672 map->sec_offset = vi->offset;
2674 pr_debug("map '%s': at sec_idx %d, offset %zu.\n",
2862 m->offset = v->offset * 8;
2910 m->offset = 0;
3030 return a->offset - b->offset;
3107 vsi->offset = sym->st_value;
3139 * is section size and global variable offset. We use
3412 pr_warn("elf: failed to get section name string at offset %zu from %s: %s\n",
3430 pr_warn("elf: failed to get section name string at offset %zu from %s: %s\n",
3932 /* sort BPF programs by section name and in-section instruction offset
4335 vs->offset = off;
4369 vs->offset = ext->kcfg.data_off;
4495 pr_warn("prog '%s': bad call relo against '%s' at offset %zu\n",
4513 /* global_func: sym->st_value = offset in the section, insn->imm = 0.
4514 * local_func: sym->st_value = 0, insn->imm = offset in the section.
4517 pr_warn("prog '%s': bad subprog addr relo against '%s' at offset %zu+%d\n",
4690 pr_warn("sec '%s': invalid offset 0x%zx for relo #%d\n",
5253 unsigned long offset = 0;
5262 link_opts.uprobe_multi.offsets = &offset;
6259 * relocated, so it's enough to just subtract in-section offset
6511 * into kernel offsets and adjust offset according to program
6712 * an offset of a symbol pointed to by relocation and
6719 * the byte offset in the corresponding section.
6737 * offset necessary, insns->imm is relative to
6782 pr_debug("prog '%s': insn #%zu relocated, imm %d points to subprog '%s' (now at %zu offset)\n",
7086 if (vi->offset <= rel->r_offset &&
7087 rel->r_offset + bpf_ptr_sz <= vi->offset + vi->size)
7145 if (rel->r_offset - vi->offset < moff)
7148 moff = rel->r_offset - vi->offset - moff;
8163 pr_warn("extern (func ksym) '%s': module BTF fd index %d too big to fit in bpf_insn offset\n",
9562 size_t offset)
9572 map->sec_offset <= offset &&
9573 offset - map->sec_offset < map->def.value_size)
9637 pr_warn("struct_ops reloc %s: invalid target program offset %llu\n",
10063 if (element_sz <= 0 || (size - var->offset) % element_sz != 0) {
10070 nr_elements = (size - var->offset) / element_sz;
10084 var->size = size - var->offset;
10708 uint64_t offset, int pid, size_t ref_ctr_off)
10744 attr.config2 = offset; /* kprobe_addr or probe_offset */
10819 const char *kfunc_name, size_t offset)
10824 snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx_%d", getpid(), kfunc_name, offset,
10835 const char *kfunc_name, size_t offset)
10840 probe_name, kfunc_name, offset);
10860 const char *kfunc_name, size_t offset, int pid)
10867 err = add_kprobe_event_legacy(probe_name, retprobe, kfunc_name, offset);
10870 kfunc_name, offset,
10878 kfunc_name, offset,
10974 size_t offset;
10983 offset = OPTS_GET(opts, offset, 0);
11009 func_name, offset,
11015 func_name, offset);
11022 offset, -1 /* pid */);
11028 func_name, offset,
11038 func_name, offset,
11367 unsigned long offset = 0;
11384 n = sscanf(func_name, "%m[a-zA-Z0-9_.]+%li", &func, &offset);
11389 if (opts.retprobe && offset != 0) {
11391 pr_warn("kretprobes do not support offset specification\n");
11395 opts.offset = offset;
11485 const char *binary_path, uint64_t offset)
11489 snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx", getpid(), binary_path, (size_t)offset);
11499 const char *binary_path, size_t offset)
11504 probe_name, binary_path, offset);
11524 const char *binary_path, size_t offset, int pid)
11530 err = add_uprobe_event_legacy(probe_name, retprobe, binary_path, offset);
11533 binary_path, (size_t)offset, err);
11540 binary_path, offset, err);
11566 /* Find offset of function name in object specified by path. "name" matches
11969 * u[ret]probe/binary:function[+offset]
11983 long offset = 0;
11995 pr_warn("prog '%s': section '%s' missing ':function[+offset]' specification\n",
11999 /* check if user specifies `+offset`, if yes, this should be
12004 n = sscanf(func_off, "+%li%n", &offset, &c);
12008 offset = 0;
12012 if (opts.retprobe && offset != 0) {
12013 pr_warn("prog '%s': uretprobes do not support offset specification\n",
12018 *link = bpf_program__attach_uprobe_opts(prog, -1, binary_path, offset, &opts);
13606 *var_skel->addr = map->mmaped + var->offset;