Lines Matching refs:sec_name
393 char *sec_name;
718 zfree(&prog->sec_name);
749 const char *name, size_t sec_idx, const char *sec_name,
754 sec_name, name, sec_off, insn_data_sz);
774 if (sec_name[0] == '?') {
777 sec_name++;
787 prog->sec_name = strdup(sec_name);
788 if (!prog->sec_name)
802 pr_warn("sec '%s': failed to allocate memory for prog '%s'\n", sec_name, name);
809 const char *sec_name, int sec_idx)
837 sec_name, sec_off);
843 sec_name, sec_off);
848 pr_warn("sec '%s': program '%s' is static and not supported\n", sec_name, name);
853 sec_name, name, sec_off / BPF_INSN_SZ, sec_off, prog_sz / BPF_INSN_SZ, prog_sz);
863 sec_name, name);
870 err = bpf_object__init_prog(obj, prog, name, sec_idx, sec_name,
1141 static int init_struct_ops_maps(struct bpf_object *obj, const char *sec_name,
1157 datasec_id = btf__find_by_name_kind(btf, sec_name,
1161 sec_name);
1174 vsi->type, sec_name);
1218 var_name, sec_name);
1699 const char *sec_name;
1714 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1716 sec_name, sec_idx,
1722 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1724 sec_name, sec_idx,
1729 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1731 sec_name, sec_idx,
2865 const char *sec_name;
2884 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
2885 if (str_is_empty(sec_name))
2887 scn = elf_sec_by_name(obj, sec_name);
2915 const char *sec_name = btf__name_by_offset(btf, t->name_off);
2920 if (!sec_name) {
2931 if (strcmp(sec_name, KCONFIG_SEC) == 0 || strcmp(sec_name, KSYMS_SEC) == 0)
2943 err = find_elf_sec_sz(obj, sec_name, &size);
2946 sec_name, size, err);
2962 pr_debug("sec '%s': unexpected non-VAR type found\n", sec_name);
2973 sec_name, i);
2980 sec_name, var_name);
3246 const char *sec_name;
3249 sec_name = elf_sec_name(obj, scn);
3250 if (!sec_name)
3253 if (strcmp(sec_name, name) != 0)
3778 const char *ext_name, *sec_name;
3844 sec_name = btf__name_by_offset(obj->btf, sec->name_off);
3846 if (strcmp(sec_name, KCONFIG_SEC) == 0) {
3872 } else if (strcmp(sec_name, KSYMS_SEC) == 0) {
3878 pr_warn("unrecognized extern section '%s'\n", sec_name);
4238 const char *relo_sec_name, *sec_name;
4259 sec_name = elf_sec_name(obj, scn);
4260 if (!relo_sec_name || !sec_name)
4264 relo_sec_name, sec_idx, sec_name);
4313 relo_sec_name, i, sec_name, insn_idx);
5793 const char *sec_name;
5820 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
5821 if (str_is_empty(sec_name)) {
5826 pr_debug("sec '%s': found %d CO-RE relocations\n", sec_name, sec->num_info);
5843 sec_name, i, insn_idx);
6847 attach_name = strchr(prog->sec_name, '/');
6904 prog->name, prog->sec_name);
7341 static const struct bpf_sec_def *find_sec_def(const char *sec_name);
7349 prog->sec_def = find_sec_def(prog->sec_name);
7353 prog->name, prog->sec_name);
8582 return prog->sec_name;
8958 static bool sec_def_matches(const struct bpf_sec_def *sec_def, const char *sec_name)
8964 if (str_has_pfx(sec_name, sec_def->sec))
8975 if (strncmp(sec_name, sec_def->sec, len) != 0)
8978 if (sec_name[len] == '\0' || sec_name[len] == '/')
8983 return strcmp(sec_name, sec_def->sec) == 0;
8986 static const struct bpf_sec_def *find_sec_def(const char *sec_name)
8994 if (sec_def_matches(sec_def, sec_name))
9001 if (sec_def_matches(sec_def, sec_name))
9232 map->name, prog->name, prog->sec_name, prog->type,
10919 if (strcmp(prog->sec_name, "kprobe") == 0 || strcmp(prog->sec_name, "kretprobe") == 0)
10922 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/");
10924 func_name = prog->sec_name + sizeof("kretprobe/") - 1;
10926 func_name = prog->sec_name + sizeof("kprobe/") - 1;
10953 if (strcmp(prog->sec_name, "ksyscall") == 0 || strcmp(prog->sec_name, "kretsyscall") == 0)
10956 opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/");
10958 syscall_name = prog->sec_name + sizeof("kretsyscall/") - 1;
10960 syscall_name = prog->sec_name + sizeof("ksyscall/") - 1;
10976 if (strcmp(prog->sec_name, "kprobe.multi") == 0 ||
10977 strcmp(prog->sec_name, "kretprobe.multi") == 0)
10980 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/");
10982 spec = prog->sec_name + sizeof("kretprobe.multi/") - 1;
10984 spec = prog->sec_name + sizeof("kprobe.multi/") - 1;
11005 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%ms",
11019 prog->sec_name);
11521 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[a-zA-Z0-9_.]+%li",
11530 prog->name, prog->sec_name);
11547 prog->sec_name);
11623 const char *sec_name;
11626 sec_name = bpf_program__section_name(prog);
11627 if (strcmp(sec_name, "usdt") == 0) {
11633 n = sscanf(sec_name, "usdt/%m[^:]:%m[^:]:%m[^:]", &path, &provider, &name);
11636 sec_name);
11743 char *sec_name, *tp_cat, *tp_name;
11748 if (strcmp(prog->sec_name, "tp") == 0 || strcmp(prog->sec_name, "tracepoint") == 0)
11751 sec_name = strdup(prog->sec_name);
11752 if (!sec_name)
11756 if (str_has_pfx(prog->sec_name, "tp/"))
11757 tp_cat = sec_name + sizeof("tp/") - 1;
11759 tp_cat = sec_name + sizeof("tracepoint/") - 1;
11762 free(sec_name);
11769 free(sec_name);
11819 if (!str_has_pfx(prog->sec_name, prefixes[i]))
11824 if (prog->sec_name[pfx_len] == '\0')
11827 if (prog->sec_name[pfx_len] != '/')
11830 tp_name = prog->sec_name + pfx_len + 1;
11836 prog->name, prog->sec_name);