Lines Matching refs:func_name

303 	const char *func_name;  member
3274 const char *func_name; in add_kfunc_call() local
3352 func_name = btf_name_by_offset(desc_btf, func->name_off); in add_kfunc_call()
3353 addr = kallsyms_lookup_name(func_name); in add_kfunc_call()
3356 func_name); in add_kfunc_call()
3367 func_proto, func_name, in add_kfunc_call()
8886 verbose(env, "expected an RCU CS when using %s\n", meta->func_name); in process_iter_arg()
12570 meta->func_name, argno, btf_type_str(ref_t), ref_tname); in get_kfunc_ptr_arg_type()
12663 meta->func_name, argno, btf_type_str(ref_t), ref_tname, argno + 1, in process_kf_arg_ptr_to_btf_id()
13159 const char *func_name = meta->func_name, *ref_tname; in check_kfunc_args() local
13169 verbose(env, "Function %s has %d > %d args\n", func_name, nargs, in check_kfunc_args()
13521 verbose(env, "%s can only take non-owning or refcounted bpf_rb_node pointer\n", func_name); in check_kfunc_args()
13525 verbose(env, "%s not allowed in rbtree cb\n", func_name); in check_kfunc_args()
13690 func_name); in check_kfunc_args()
13704 const char *func_name; in fetch_kfunc_meta() local
13719 func_name = btf_name_by_offset(desc_btf, func->name_off); in fetch_kfunc_meta()
13721 *kfunc_name = func_name; in fetch_kfunc_meta()
13734 meta->func_name = func_name; in fetch_kfunc_meta()
13927 const char *func_name, *ptr_type_name; in check_kfunc_call() local
13939 err = fetch_kfunc_meta(env, insn, &meta, &func_name); in check_kfunc_call()
13940 if (err == -EACCES && func_name) in check_kfunc_call()
13941 verbose(env, "calling kernel function %s is not allowed\n", func_name); in check_kfunc_call()
13986 verbose(env, "program must be sleepable to call sleepable kfunc %s\n", func_name); in check_kfunc_call()
14004 func_name, meta.func_id); in check_kfunc_call()
14019 func_name, meta.func_id); in check_kfunc_call()
14029 func_name, meta.func_id); in check_kfunc_call()
14048 verbose(env, "unmatched rcu read unlock (kernel function %s)\n", func_name); in check_kfunc_call()
14060 verbose(env, "kernel func %s is sleepable within rcu_read_lock region\n", func_name); in check_kfunc_call()
14075 verbose(env, "kernel func %s is sleepable within non-preemptible region\n", func_name); in check_kfunc_call()
14081 verbose(env, "unmatched attempt to enable preemption (kernel function %s)\n", func_name); in check_kfunc_call()
14086 verbose(env, "kernel func %s is sleepable within IRQ-disabled region\n", func_name); in check_kfunc_call()
14091 verbose(env, "kernel func %s requires RCU critical section protection\n", func_name); in check_kfunc_call()
14107 func_name, meta.func_id); in check_kfunc_call()
14122 func_name, meta.func_id); in check_kfunc_call()
14129 func_name, meta.func_id); in check_kfunc_call()
14137 func_name, meta.func_id); in check_kfunc_call()
14198 func_name, in check_kfunc_call()
24099 static int check_attach_modify_return(unsigned long addr, const char *func_name) in check_attach_modify_return() argument
24102 !strncmp(SECURITY_PREFIX, func_name, sizeof(SECURITY_PREFIX) - 1)) in check_attach_modify_return()