Lines Matching refs:sec_name
404 char *sec_name;
760 zfree(&prog->sec_name);
791 const char *name, size_t sec_idx, const char *sec_name,
796 sec_name, name, sec_off, insn_data_sz);
817 if (sec_name[0] == '?') {
820 sec_name++;
830 prog->sec_name = strdup(sec_name);
831 if (!prog->sec_name)
845 pr_warn("sec '%s': failed to allocate memory for prog '%s'\n", sec_name, name);
852 const char *sec_name, int sec_idx)
880 sec_name, sec_off);
886 sec_name, sec_off);
891 pr_warn("sec '%s': program '%s' is static and not supported\n", sec_name, name);
896 sec_name, name, sec_off / BPF_INSN_SZ, sec_off, prog_sz / BPF_INSN_SZ, prog_sz);
906 sec_name, name);
913 err = bpf_object__init_prog(obj, prog, name, sec_idx, sec_name,
1186 static int init_struct_ops_maps(struct bpf_object *obj, const char *sec_name,
1202 datasec_id = btf__find_by_name_kind(btf, sec_name,
1206 sec_name);
1219 vsi->type, sec_name);
1263 var_name, sec_name);
1784 const char *sec_name;
1800 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1802 sec_name = elf_sec_name_by_idx(obj, sec_idx);
1805 sec_name, sec_idx,
1812 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1814 sec_name = elf_sec_name_by_idx(obj, sec_idx);
1817 sec_name, sec_idx,
1823 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1825 sec_name = elf_sec_name_by_idx(obj, sec_idx);
1828 sec_name, sec_idx,
2973 const char *sec_name;
2996 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
2997 if (str_is_empty(sec_name))
3000 scn = elf_sec_by_name(obj, sec_name);
3005 sec_obj = elfio_get_section_by_name(elf, sec_name);
3037 const char *sec_name = btf__name_by_offset(btf, t->name_off);
3042 if (!sec_name) {
3053 if (strcmp(sec_name, KCONFIG_SEC) == 0 || strcmp(sec_name, KSYMS_SEC) == 0)
3065 err = find_elf_sec_sz(obj, sec_name, &size);
3068 sec_name, size, err);
3084 pr_debug("sec '%s': unexpected non-VAR type found\n", sec_name);
3095 sec_name, i);
3102 sec_name, var_name);
3456 const char *sec_name;
3459 sec_name = elf_sec_name(obj, scn);
3460 if (!sec_name)
3463 if (strcmp(sec_name, name) != 0)
4153 const char *ext_name, *sec_name;
4228 sec_name = btf__name_by_offset(obj->btf, sec->name_off);
4230 if (strcmp(sec_name, KCONFIG_SEC) == 0) {
4256 } else if (strcmp(sec_name, KSYMS_SEC) == 0) {
4262 pr_warn("unrecognized extern section '%s'\n", sec_name);
4629 const char *relo_sec_name, *sec_name;
4651 sec_name = elf_sec_name(obj, scn);
4652 if (!relo_sec_name || !sec_name)
4659 sec_name = elf_sec_name_by_idx(obj, sec_idx);
4660 if (!relo_sec_name || !sec_name)
4665 relo_sec_name, sec_idx, sec_name);
4718 relo_sec_name, i, sec_name, insn_idx);
6196 const char *sec_name;
6225 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
6226 if (str_is_empty(sec_name)) {
6231 pr_debug("sec '%s': found %d CO-RE relocations\n", sec_name, sec->num_info);
6248 sec_name, i, insn_idx);
7290 attach_name = strchr(prog->sec_name, '/');
7347 prog->name, prog->sec_name);
7784 static const struct bpf_sec_def *find_sec_def(const char *sec_name);
7792 prog->sec_def = find_sec_def(prog->sec_name);
7796 prog->name, prog->sec_name);
9027 return prog->sec_name;
9414 static bool sec_def_matches(const struct bpf_sec_def *sec_def, const char *sec_name)
9420 if (str_has_pfx(sec_name, sec_def->sec))
9431 if (strncmp(sec_name, sec_def->sec, len) != 0)
9434 if (sec_name[len] == '\0' || sec_name[len] == '/')
9439 return strcmp(sec_name, sec_def->sec) == 0;
9442 static const struct bpf_sec_def *find_sec_def(const char *sec_name)
9450 if (sec_def_matches(sec_def, sec_name))
9457 if (sec_def_matches(sec_def, sec_name))
9688 map->name, prog->name, prog->sec_name, prog->type,
11375 if (strcmp(prog->sec_name, "kprobe") == 0 || strcmp(prog->sec_name, "kretprobe") == 0)
11378 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/");
11380 func_name = prog->sec_name + sizeof("kretprobe/") - 1;
11382 func_name = prog->sec_name + sizeof("kprobe/") - 1;
11409 if (strcmp(prog->sec_name, "ksyscall") == 0 || strcmp(prog->sec_name, "kretsyscall") == 0)
11412 opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/");
11414 syscall_name = prog->sec_name + sizeof("kretsyscall/") - 1;
11416 syscall_name = prog->sec_name + sizeof("ksyscall/") - 1;
11432 if (strcmp(prog->sec_name, "kprobe.multi") == 0 ||
11433 strcmp(prog->sec_name, "kretprobe.multi") == 0)
11436 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/");
11438 spec = prog->sec_name + sizeof("kretprobe.multi/") - 1;
11440 spec = prog->sec_name + sizeof("kprobe.multi/") - 1;
11461 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[^\n]",
11475 prog->sec_name);
11987 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[^\n]",
11996 prog->name, prog->sec_name);
12023 prog->sec_name);
12102 const char *sec_name;
12105 sec_name = bpf_program__section_name(prog);
12106 if (strcmp(sec_name, "usdt") == 0) {
12112 n = sscanf(sec_name, "usdt/%m[^:]:%m[^:]:%m[^:]", &path, &provider, &name);
12115 sec_name);
12223 char *sec_name, *tp_cat, *tp_name;
12228 if (strcmp(prog->sec_name, "tp") == 0 || strcmp(prog->sec_name, "tracepoint") == 0)
12231 sec_name = strdup(prog->sec_name);
12232 if (!sec_name)
12236 if (str_has_pfx(prog->sec_name, "tp/"))
12237 tp_cat = sec_name + sizeof("tp/") - 1;
12239 tp_cat = sec_name + sizeof("tracepoint/") - 1;
12242 free(sec_name);
12249 free(sec_name);
12299 if (!str_has_pfx(prog->sec_name, prefixes[i]))
12304 if (prog->sec_name[pfx_len] == '\0')
12307 if (prog->sec_name[pfx_len] != '/')
12310 tp_name = prog->sec_name + pfx_len + 1;
12316 prog->name, prog->sec_name);