Lines Matching defs:sec_name
405 char *sec_name;
742 zfree(&prog->sec_name);
773 const char *name, size_t sec_idx, const char *sec_name,
778 sec_name, name, sec_off, insn_data_sz);
799 if (sec_name[0] == '?') {
802 sec_name++;
812 prog->sec_name = strdup(sec_name);
813 if (!prog->sec_name)
827 pr_warn("sec '%s': failed to allocate memory for prog '%s'\n", sec_name, name);
834 const char *sec_name, int sec_idx)
862 sec_name, sec_off);
868 sec_name, sec_off);
873 pr_warn("sec '%s': program '%s' is static and not supported\n", sec_name, name);
878 sec_name, name, sec_off / BPF_INSN_SZ, sec_off, prog_sz / BPF_INSN_SZ, prog_sz);
888 sec_name, name);
895 err = bpf_object__init_prog(obj, prog, name, sec_idx, sec_name,
1245 map->name, mname, prog->name, prog->sec_name, prog->type,
1251 map->name, mname, prog->name, prog->sec_name, prog->type,
1305 static int init_struct_ops_maps(struct bpf_object *obj, const char *sec_name,
1321 datasec_id = btf__find_by_name_kind(btf, sec_name,
1325 sec_name);
1338 vsi->type, sec_name);
1367 if (sec_name[0] == '?') {
1370 sec_name++;
1377 map->def.map_flags = strcmp(sec_name, STRUCT_OPS_LINK_SEC) == 0 ? BPF_F_LINK : 0;
1392 var_name, sec_name);
1412 const char *sec_name;
1421 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1422 if (!sec_name)
1425 err = init_struct_ops_maps(obj, sec_name, sec_idx, desc->data);
1931 const char *sec_name;
1946 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1948 sec_name, sec_idx,
1954 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1956 sec_name, sec_idx,
1961 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx));
1963 sec_name, sec_idx,
2890 const char *sec_name, int sec_idx,
2899 sec_name, mmap_sz, data_sz);
3206 const char *sec_name;
3225 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
3226 if (str_is_empty(sec_name))
3228 scn = elf_sec_by_name(obj, sec_name);
3256 const char *sec_name = btf__name_by_offset(btf, t->name_off);
3261 if (!sec_name) {
3272 if (strcmp(sec_name, KCONFIG_SEC) == 0 || strcmp(sec_name, KSYMS_SEC) == 0)
3284 err = find_elf_sec_sz(obj, sec_name, &size);
3287 sec_name, size, err);
3303 pr_debug("sec '%s': unexpected non-VAR type found\n", sec_name);
3314 sec_name, i);
3321 sec_name, var_name);
3598 const char *sec_name;
3601 sec_name = elf_sec_name(obj, scn);
3602 if (!sec_name)
3605 if (strcmp(sec_name, name) != 0)
4137 const char *ext_name, *sec_name;
4203 sec_name = btf__name_by_offset(obj->btf, sec->name_off);
4205 if (strcmp(sec_name, KCONFIG_SEC) == 0) {
4231 } else if (strcmp(sec_name, KSYMS_SEC) == 0) {
4237 pr_warn("unrecognized extern section '%s'\n", sec_name);
4606 const char *relo_sec_name, *sec_name;
4627 sec_name = elf_sec_name(obj, scn);
4628 if (!relo_sec_name || !sec_name)
4632 relo_sec_name, sec_idx, sec_name);
4681 relo_sec_name, i, sec_name, insn_idx);
5809 const char *sec_name;
5836 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off);
5837 if (str_is_empty(sec_name)) {
5842 pr_debug("sec '%s': found %d CO-RE relocations\n", sec_name, sec->num_info);
5859 sec_name, i, insn_idx);
7308 attach_name = strchr(prog->sec_name, '/');
7369 prog->name, prog->sec_name);
7818 static const struct bpf_sec_def *find_sec_def(const char *sec_name);
7826 prog->sec_def = find_sec_def(prog->sec_name);
7830 prog->name, prog->sec_name);
9094 return prog->sec_name;
9478 static bool sec_def_matches(const struct bpf_sec_def *sec_def, const char *sec_name)
9484 if (str_has_pfx(sec_name, sec_def->sec))
9495 if (strncmp(sec_name, sec_def->sec, len) != 0)
9498 if (sec_name[len] == '\0' || sec_name[len] == '/')
9503 return strcmp(sec_name, sec_def->sec) == 0;
9506 static const struct bpf_sec_def *find_sec_def(const char *sec_name)
9514 if (sec_def_matches(sec_def, sec_name))
9521 if (sec_def_matches(sec_def, sec_name))
11477 if (strcmp(prog->sec_name, "kprobe") == 0 || strcmp(prog->sec_name, "kretprobe") == 0)
11480 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/");
11482 func_name = prog->sec_name + sizeof("kretprobe/") - 1;
11484 func_name = prog->sec_name + sizeof("kprobe/") - 1;
11511 if (strcmp(prog->sec_name, "ksyscall") == 0 || strcmp(prog->sec_name, "kretsyscall") == 0)
11514 opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/");
11516 syscall_name = prog->sec_name + sizeof("kretsyscall/") - 1;
11518 syscall_name = prog->sec_name + sizeof("ksyscall/") - 1;
11534 if (strcmp(prog->sec_name, "kprobe.multi") == 0 ||
11535 strcmp(prog->sec_name, "kretprobe.multi") == 0)
11538 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/");
11540 spec = prog->sec_name + sizeof("kretprobe.multi/") - 1;
11542 spec = prog->sec_name + sizeof("kprobe.multi/") - 1;
11563 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[^\n]",
11577 prog->sec_name);
12085 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[^\n]",
12094 prog->name, prog->sec_name);
12121 prog->sec_name);
12197 const char *sec_name;
12200 sec_name = bpf_program__section_name(prog);
12201 if (strcmp(sec_name, "usdt") == 0) {
12207 n = sscanf(sec_name, "usdt/%m[^:]:%m[^:]:%m[^:]", &path, &provider, &name);
12210 sec_name);
12317 char *sec_name, *tp_cat, *tp_name;
12322 if (strcmp(prog->sec_name, "tp") == 0 || strcmp(prog->sec_name, "tracepoint") == 0)
12325 sec_name = strdup(prog->sec_name);
12326 if (!sec_name)
12330 if (str_has_pfx(prog->sec_name, "tp/"))
12331 tp_cat = sec_name + sizeof("tp/") - 1;
12333 tp_cat = sec_name + sizeof("tracepoint/") - 1;
12336 free(sec_name);
12343 free(sec_name);
12407 if (!str_has_pfx(prog->sec_name, prefixes[i]))
12412 if (prog->sec_name[pfx_len] == '\0')
12415 if (prog->sec_name[pfx_len] != '/')
12418 tp_name = prog->sec_name + pfx_len + 1;
12424 prog->name, prog->sec_name);