Lines Matching refs:str_has_pfx
2189 if (!str_has_pfx(buf, "CONFIG_")) in bpf_object__process_kconfig_line()
3729 return str_has_pfx(name, ".debug_"); in is_sec_name_dwarf()
3751 if (str_has_pfx(name, ".rel")) { in ignore_elf_section()
3893 str_has_pfx(name, DATA_SEC ".")) { in bpf_object__elf_collect()
3898 str_has_pfx(name, RODATA_SEC ".")) { in bpf_object__elf_collect()
3941 str_has_pfx(name, BSS_SEC "."))) { in bpf_object__elf_collect()
7759 if (str_has_pfx(cur_line, "invalid func unknown#195896080\n")) { in fixup_verifier_log()
7768 } else if (str_has_pfx(cur_line, "invalid func unknown#"POISON_LDIMM64_MAP_PFX)) { in fixup_verifier_log()
7777 } else if (str_has_pfx(cur_line, "invalid func unknown#"POISON_CALL_KFUNC_PFX)) { in fixup_verifier_log()
8366 if (str_has_pfx(ext->name, "CONFIG_")) { in bpf_object__resolve_externs()
8382 } else if (!str_has_pfx(ext->name, "LINUX_") || !ext->is_weak) { in bpf_object__resolve_externs()
9557 if (str_has_pfx(sec_name, sec_def->sec)) in sec_def_matches()
11579 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/"); in attach_kprobe()
11613 opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/"); in attach_ksyscall()
11637 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/"); in attach_kprobe_multi()
11696 opts.retprobe = str_has_pfx(probe_type, "uretprobe.multi"); in attach_uprobe_multi()
12455 if (str_has_pfx(prog->sec_name, "tp/")) in attach_tp()
12532 if (!str_has_pfx(prog->sec_name, prefixes[i])) in attach_raw_tp()