Lines Matching defs:name

207 			if (!strcmp(func->name, global_noreturns[i]))
385 if (strcmp(sec->name, ".altinstr_replacement") &&
386 strcmp(sec->name, ".altinstr_aux") &&
387 strncmp(sec->name, ".discard.", 9))
390 if (!strcmp(sec->name, ".noinstr.text") ||
391 !strcmp(sec->name, ".entry.text") ||
392 !strcmp(sec->name, ".cpuidle.text") ||
393 !strncmp(sec->name, ".text..__x86.", 13))
402 if (!strcmp(sec->name, ".init.text") && !opts.module)
444 // printf("%s: last chunk used: %d\n", sec->name, (int)idx);
455 func->name);
464 func->name);
603 WARN("unexpected relocation symbol type in %s", rsec->name);
614 reloc->sym->sec->name, offset);
619 reloc->sym->sec->name, offset);
643 WARN("unexpected relocation symbol type in %s", rsec->name);
654 reloc->sym->sec->name, offset);
659 reloc->sym->sec->name, offset);
710 key_name = strdup(insn_call_dest(insn)->name);
717 WARN("static_call: trampoline name malformed: %s", key_name);
873 (!strcmp(sym->name, "init_module") ||
874 !strcmp(sym->name, "cleanup_module")))
875 WARN("%s(): not an indirect call target", sym->name);
906 if (strncmp(sym->name, "__cfi_", 6))
922 if (strncmp(sym->name, "__cfi_", 6))
1049 rsec->name, reloc->sym->type);
1246 const char **name;
1251 for (name = uaccess_safe_builtin; *name; name++) {
1252 func = find_symbol_by_name(file->elf, *name);
1278 WARN("unexpected relocation symbol type in %s", rsec->name);
1367 if (!strcmp(insn->sec->name, ".altinstr_replacement"))
1612 dest_sec->name, dest_off);
1653 if (!strstr(insn_func(insn)->name, ".cold") &&
1654 strstr(insn_func(jump_dest)->name, ".cold")) {
1725 reloc->sym->sec->name, dest_off);
2263 WARN("unexpected relocation symbol type in %s", sec->rsec->name);
2360 WARN("unexpected relocation symbol type in %s", rsec->name);
2396 WARN("unexpected relocation symbol type in %s", rsec->name);
2415 WARN("unexpected relocation symbol type in %s", rsec->name);
2443 WARN("unexpected relocation symbol type in %s", rsec->name);
2474 rsec->name);
2500 insn->sec->name, dest_off);
2509 * Return true if name matches an instrumentation function, where calls to that
2512 static bool is_profiling_func(const char *name)
2517 if (!strncmp(name, "__sanitizer_cov_", 16))
2526 if (!strncmp(name, "__tsan_func_", 12) ||
2527 !strcmp(name, "__tsan_atomic_signal_fence"))
2538 if (func->type == STT_NOTYPE && strstarts(func->name, ".L"))
2544 if (!strncmp(func->name, STATIC_CALL_TRAMP_PREFIX_STR,
2557 if (arch_ftrace_match(func->name))
2560 if (is_profiling_func(func->name))
2583 if (!strncmp(sec->name, ".rodata", 7) &&
2584 !strstr(sec->name, ".str1.")) {
3389 return insn_call_dest(insn)->name;
3392 if (reloc && !strcmp(reloc->sym->name, "pv_ops")) {
3408 if (!reloc || strcmp(reloc->sym->name, "pv_ops"))
3420 WARN("pv_ops[%d]: %s", idx, target->name);
3460 if (!strncmp(func->name, "__ubsan_handle_", 15))
3591 if (!strncmp(func->name, "__cfi_", 6) ||
3592 !strncmp(func->name, "__pfx_", 6))
3596 func->name, insn_func(insn)->name);
3811 WARN("%s: unexpected end of section", sec->name);
3930 insn_call_dest(insn)->name);
4028 !strcmp(insn_call_dest(insn)->name, "__asan_handle_no_return"));
4034 !strcmp(insn_call_dest(insn)->name,
4050 if (!strcmp(insn->sec->name, ".altinstr_replacement") ||
4051 !strcmp(insn->sec->name, ".altinstr_aux"))
4087 strstr(insn_func(insn->jump_dest)->name, ".cold")) {
4223 WARN("%s() is missing an ELF size annotation", sym->name);
4474 if ((!strncmp(sec->name, ".discard", 8) &&
4475 strcmp(sec->name, ".discard.ibt_endbr_noseal")) ||
4476 !strncmp(sec->name, ".debug", 6) ||
4477 !strcmp(sec->name, ".altinstructions") ||
4478 !strcmp(sec->name, ".ibt_endbr_seal") ||
4479 !strcmp(sec->name, ".orc_unwind_ip") ||
4480 !strcmp(sec->name, ".parainstructions") ||
4481 !strcmp(sec->name, ".retpoline_sites") ||
4482 !strcmp(sec->name, ".smp_locks") ||
4483 !strcmp(sec->name, ".static_call_sites") ||
4484 !strcmp(sec->name, "_error_injection_whitelist") ||
4485 !strcmp(sec->name, "_kprobe_blacklist") ||
4486 !strcmp(sec->name, "__bug_table") ||
4487 !strcmp(sec->name, "__ex_table") ||
4488 !strcmp(sec->name, "__jump_table") ||
4489 !strcmp(sec->name, "__mcount_loc") ||
4490 !strcmp(sec->name, ".kcfi_traps") ||
4491 strstr(sec->name, "__patchable_function_entries"))
4554 if (!strcmp(call_dest->name, "exc_double_fault")) {
4581 call_dest->name);
4652 funcs = malloc(strlen(sym->name) + 1);
4653 strcpy(funcs, sym->name);
4655 tmp = malloc(strlen(funcs) + strlen(sym->name) + 2);
4656 sprintf(tmp, "%s %s", funcs, sym->name);