Lines Matching refs:str_has_pfx
1916 if (!str_has_pfx(buf, "CONFIG_")) in bpf_object__process_kconfig_line()
3336 return str_has_pfx(name, ".debug_"); in is_sec_name_dwarf()
3358 if (str_has_pfx(name, ".rel")) { in ignore_elf_section()
3500 str_has_pfx(name, DATA_SEC ".")) { in bpf_object__elf_collect()
3505 str_has_pfx(name, RODATA_SEC ".")) { in bpf_object__elf_collect()
3541 str_has_pfx(name, BSS_SEC "."))) { in bpf_object__elf_collect()
7222 if (str_has_pfx(cur_line, "invalid func unknown#195896080\n")) { in fixup_verifier_log()
7231 } else if (str_has_pfx(cur_line, "invalid func unknown#"POISON_LDIMM64_MAP_PFX)) { in fixup_verifier_log()
7240 } else if (str_has_pfx(cur_line, "invalid func unknown#"POISON_CALL_KFUNC_PFX)) { in fixup_verifier_log()
7801 if (str_has_pfx(ext->name, "CONFIG_")) { in bpf_object__resolve_externs()
7817 } else if (!str_has_pfx(ext->name, "LINUX_") || !ext->is_weak) { in bpf_object__resolve_externs()
8958 if (str_has_pfx(sec_name, sec_def->sec)) in sec_def_matches()
10916 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe/"); in attach_kprobe()
10950 opts.retprobe = str_has_pfx(prog->sec_name, "kretsyscall/"); in attach_ksyscall()
10974 opts.retprobe = str_has_pfx(prog->sec_name, "kretprobe.multi/"); in attach_kprobe_multi()
11750 if (str_has_pfx(prog->sec_name, "tp/")) in attach_tp()
11813 if (!str_has_pfx(prog->sec_name, prefixes[i])) in attach_raw_tp()