Lines Matching refs:sec_name
376 char *sec_name; member
697 zfree(&prog->sec_name); in bpf_program__exit()
728 const char *name, size_t sec_idx, const char *sec_name, in bpf_object__init_prog() argument
733 sec_name, name, sec_off, insn_data_sz); in bpf_object__init_prog()
753 if (sec_name[0] == '?') { in bpf_object__init_prog()
756 sec_name++; in bpf_object__init_prog()
766 prog->sec_name = strdup(sec_name); in bpf_object__init_prog()
767 if (!prog->sec_name) in bpf_object__init_prog()
781 pr_warn("sec '%s': failed to allocate memory for prog '%s'\n", sec_name, name); in bpf_object__init_prog()
788 const char *sec_name, int sec_idx) in bpf_object__add_programs() argument
817 sec_name, sec_off); in bpf_object__add_programs()
823 sec_name, sec_off); in bpf_object__add_programs()
828 pr_warn("sec '%s': program '%s' is static and not supported\n", sec_name, name); in bpf_object__add_programs()
833 sec_name, name, sec_off / BPF_INSN_SZ, sec_off, prog_sz / BPF_INSN_SZ, prog_sz); in bpf_object__add_programs()
843 sec_name, name); in bpf_object__add_programs()
850 err = bpf_object__init_prog(obj, prog, name, sec_idx, sec_name, in bpf_object__add_programs()
1640 const char *sec_name; in bpf_object__init_global_data_maps() local
1655 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx)); in bpf_object__init_global_data_maps()
1657 sec_name, sec_idx, in bpf_object__init_global_data_maps()
1663 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx)); in bpf_object__init_global_data_maps()
1665 sec_name, sec_idx, in bpf_object__init_global_data_maps()
1670 sec_name = elf_sec_name(obj, elf_sec_by_idx(obj, sec_idx)); in bpf_object__init_global_data_maps()
1672 sec_name, sec_idx, in bpf_object__init_global_data_maps()
2805 const char *sec_name; in bpf_object__init_btf() local
2824 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off); in bpf_object__init_btf()
2825 if (str_is_empty(sec_name)) in bpf_object__init_btf()
2827 scn = elf_sec_by_name(obj, sec_name); in bpf_object__init_btf()
2855 const char *sec_name = btf__name_by_offset(btf, t->name_off); in btf_fixup_datasec() local
2860 if (!sec_name) { in btf_fixup_datasec()
2871 if (strcmp(sec_name, KCONFIG_SEC) == 0 || strcmp(sec_name, KSYMS_SEC) == 0) in btf_fixup_datasec()
2883 err = find_elf_sec_sz(obj, sec_name, &size); in btf_fixup_datasec()
2886 sec_name, size, err); in btf_fixup_datasec()
2902 pr_debug("sec '%s': unexpected non-VAR type found\n", sec_name); in btf_fixup_datasec()
2913 sec_name, i); in btf_fixup_datasec()
2920 sec_name, var_name); in btf_fixup_datasec()
3186 const char *sec_name; in elf_sec_by_name() local
3189 sec_name = elf_sec_name(obj, scn); in elf_sec_by_name()
3190 if (!sec_name) in elf_sec_by_name()
3193 if (strcmp(sec_name, name) != 0) in elf_sec_by_name()
3714 const char *ext_name, *sec_name; in bpf_object__collect_externs() local
3771 sec_name = btf__name_by_offset(obj->btf, sec->name_off); in bpf_object__collect_externs()
3773 if (strcmp(sec_name, KCONFIG_SEC) == 0) { in bpf_object__collect_externs()
3799 } else if (strcmp(sec_name, KSYMS_SEC) == 0) { in bpf_object__collect_externs()
3805 pr_warn("unrecognized extern section '%s'\n", sec_name); in bpf_object__collect_externs()
4165 const char *relo_sec_name, *sec_name; in bpf_object__collect_prog_relos() local
4184 sec_name = elf_sec_name(obj, scn); in bpf_object__collect_prog_relos()
4185 if (!relo_sec_name || !sec_name) in bpf_object__collect_prog_relos()
4189 relo_sec_name, sec_idx, sec_name); in bpf_object__collect_prog_relos()
4238 relo_sec_name, i, sec_name, insn_idx); in bpf_object__collect_prog_relos()
5676 const char *sec_name; in bpf_object__relocate_core() local
5703 sec_name = btf__name_by_offset(obj->btf, sec->sec_name_off); in bpf_object__relocate_core()
5704 if (str_is_empty(sec_name)) { in bpf_object__relocate_core()
5709 pr_debug("sec '%s': found %d CO-RE relocations\n", sec_name, sec->num_info); in bpf_object__relocate_core()
5726 sec_name, i, insn_idx); in bpf_object__relocate_core()
6698 attach_name = strchr(prog->sec_name, '/'); in libbpf_prepare_prog_load()
6755 prog->name, prog->sec_name); in bpf_object_load_prog()
7144 static const struct bpf_sec_def *find_sec_def(const char *sec_name);
7152 prog->sec_def = find_sec_def(prog->sec_name); in bpf_object_init_progs()
7156 prog->name, prog->sec_name); in bpf_object_init_progs()
8319 return prog->sec_name; in bpf_program__section_name()
8667 static bool sec_def_matches(const struct bpf_sec_def *sec_def, const char *sec_name) in sec_def_matches() argument
8673 if (str_has_pfx(sec_name, sec_def->sec)) in sec_def_matches()
8684 if (strncmp(sec_name, sec_def->sec, len) != 0) in sec_def_matches()
8687 if (sec_name[len] == '\0' || sec_name[len] == '/') in sec_def_matches()
8692 return strcmp(sec_name, sec_def->sec) == 0; in sec_def_matches()
8695 static const struct bpf_sec_def *find_sec_def(const char *sec_name) in find_sec_def() argument
8703 if (sec_def_matches(sec_def, sec_name)) in find_sec_def()
8710 if (sec_def_matches(sec_def, sec_name)) in find_sec_def()
8938 map->name, prog->name, prog->sec_name, prog->type, in bpf_object__collect_st_ops_relos()
10360 if (strcmp(prog->sec_name, "kprobe") == 0 || strcmp(prog->sec_name, "kretprobe") == 0) in attach_kprobe()
10363 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/"); in attach_kprobe()
10365 func_name = prog->sec_name + sizeof("kretprobe/") - 1; in attach_kprobe()
10367 func_name = prog->sec_name + sizeof("kprobe/") - 1; in attach_kprobe()
10394 if (strcmp(prog->sec_name, "ksyscall") == 0 || strcmp(prog->sec_name, "kretsyscall") == 0) in attach_ksyscall()
10397 opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/"); in attach_ksyscall()
10399 syscall_name = prog->sec_name + sizeof("kretsyscall/") - 1; in attach_ksyscall()
10401 syscall_name = prog->sec_name + sizeof("ksyscall/") - 1; in attach_ksyscall()
10417 if (strcmp(prog->sec_name, "kprobe.multi") == 0 || in attach_kprobe_multi()
10418 strcmp(prog->sec_name, "kretprobe.multi") == 0) in attach_kprobe_multi()
10421 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/"); in attach_kprobe_multi()
10423 spec = prog->sec_name + sizeof("kretprobe.multi/") - 1; in attach_kprobe_multi()
10425 spec = prog->sec_name + sizeof("kprobe.multi/") - 1; in attach_kprobe_multi()
10889 n = sscanf(prog->sec_name, "%m[^/]/%m[^:]:%m[a-zA-Z0-9_.]+%li", in attach_uprobe()
10898 prog->name, prog->sec_name); in attach_uprobe()
10915 prog->sec_name); in attach_uprobe()
10991 const char *sec_name; in attach_usdt() local
10994 sec_name = bpf_program__section_name(prog); in attach_usdt()
10995 if (strcmp(sec_name, "usdt") == 0) { in attach_usdt()
11001 n = sscanf(sec_name, "usdt/%m[^:]:%m[^:]:%m[^:]", &path, &provider, &name); in attach_usdt()
11004 sec_name); in attach_usdt()
11111 char *sec_name, *tp_cat, *tp_name; in attach_tp() local
11116 if (strcmp(prog->sec_name, "tp") == 0 || strcmp(prog->sec_name, "tracepoint") == 0) in attach_tp()
11119 sec_name = strdup(prog->sec_name); in attach_tp()
11120 if (!sec_name) in attach_tp()
11124 if (str_has_pfx(prog->sec_name, "tp/")) in attach_tp()
11125 tp_cat = sec_name + sizeof("tp/") - 1; in attach_tp()
11127 tp_cat = sec_name + sizeof("tracepoint/") - 1; in attach_tp()
11130 free(sec_name); in attach_tp()
11137 free(sec_name); in attach_tp()
11187 if (!str_has_pfx(prog->sec_name, prefixes[i])) in attach_raw_tp()
11192 if (prog->sec_name[pfx_len] == '\0') in attach_raw_tp()
11195 if (prog->sec_name[pfx_len] != '/') in attach_raw_tp()
11198 tp_name = prog->sec_name + pfx_len + 1; in attach_raw_tp()
11204 prog->name, prog->sec_name); in attach_raw_tp()