Home
last modified time | relevance | path

Searched refs:e (Results 1 – 19 of 19) sorted by relevance

/kernel/trace/
Dtrace_events_filter_test.h12 TP_PROTO(int a, int b, int c, int d, int e, int f, int g, int h),
14 TP_ARGS(a, b, c, d, e, f, g, h),
21 __field(int, e)
32 __entry->e = e;
40 __entry->e, __entry->f, __entry->g, __entry->h)
Dtrace_output.c665 struct trace_event *e; in trace_search_list() local
677 list_for_each_entry(e, &ftrace_event_list, list) { in trace_search_list()
678 if (e->type != last + 1) in trace_search_list()
687 *list = &e->list; in trace_search_list()
DKconfig304 ftrace interface, e.g.:
451 Tracing also is possible using the ftrace interface, e.g.:
672 However, it should be safe to use on e.g. unused portion of VRAM.
Dtrace_events_filter.c2108 .e = ve, .f = vf, .g = vg, .h = vh }, \
Dtrace.c3543 unsigned long t, e; in get_total_entries() local
3550 get_total_entries_cpu(buf, &t, &e, cpu); in get_total_entries()
3552 *entries += e; in get_total_entries()
/kernel/
Dauditfilter.c81 static inline void audit_free_rule(struct audit_entry *e) in audit_free_rule() argument
84 struct audit_krule *erule = &e->rule; in audit_free_rule()
94 kfree(e); in audit_free_rule()
99 struct audit_entry *e = container_of(head, struct audit_entry, rcu); in audit_free_rule_rcu() local
100 audit_free_rule(e); in audit_free_rule_rcu()
887 struct audit_entry *e, *found = NULL; in audit_find_rule() local
898 list_for_each_entry(e, list, list) in audit_find_rule()
899 if (!audit_compare_rule(&entry->rule, &e->rule)) { in audit_find_rule()
900 found = e; in audit_find_rule()
909 list_for_each_entry(e, list, list) in audit_find_rule()
[all …]
Dextable.c54 const struct exception_table_entry *e; in search_exception_tables() local
56 e = search_kernel_exception_table(addr); in search_exception_tables()
57 if (!e) in search_exception_tables()
58 e = search_module_extables(addr); in search_exception_tables()
59 return e; in search_exception_tables()
Daudit_watch.c327 struct audit_entry *e; in audit_remove_parent_watches() local
332 e = container_of(r, struct audit_entry, rule); in audit_remove_parent_watches()
334 if (e->rule.exe) in audit_remove_parent_watches()
335 audit_remove_mark(e->rule.exe); in audit_remove_parent_watches()
338 list_del_rcu(&e->list); in audit_remove_parent_watches()
339 call_rcu(&e->rcu, audit_free_rule_rcu); in audit_remove_parent_watches()
Dauditsc.c742 struct audit_entry *e; in audit_filter_task() local
746 list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TASK], list) { in audit_filter_task()
747 if (audit_filter_rules(tsk, &e->rule, NULL, NULL, in audit_filter_task()
750 *key = kstrdup(e->rule.filterkey, GFP_ATOMIC); in audit_filter_task()
784 struct audit_entry *e; in audit_filter_syscall() local
791 list_for_each_entry_rcu(e, list, list) { in audit_filter_syscall()
792 if (audit_in_mask(&e->rule, ctx->major) && in audit_filter_syscall()
793 audit_filter_rules(tsk, &e->rule, ctx, NULL, in audit_filter_syscall()
813 struct audit_entry *e; in audit_filter_inode_name() local
816 list_for_each_entry_rcu(e, list, list) { in audit_filter_inode_name()
[all …]
Duser_namespace.c223 static int cmp_map_id(const void *k, const void *e) in cmp_map_id() argument
227 const struct uid_gid_extent *el = e; in cmp_map_id()
976 struct uid_gid_extent *e; in map_write() local
980 e = &new_map.extent[idx]; in map_write()
982 e = &new_map.forward[idx]; in map_write()
985 e->lower_first, in map_write()
986 e->count); in map_write()
994 e->lower_first = lower_first; in map_write()
Dmodule.c4442 const struct exception_table_entry *e = NULL; in search_module_extables() local
4453 e = search_extable(mod->extable, in search_module_extables()
4463 return e; in search_module_extables()
/kernel/sched/
Ddebug.c315 struct ctl_table *e = cpu_entries; in register_sched_domain_sysctl() local
323 cpu_idx[i] = e; in register_sched_domain_sysctl()
324 e++; in register_sched_domain_sysctl()
340 struct ctl_table *e = cpu_idx[i]; in register_sched_domain_sysctl() local
342 if (e->child) in register_sched_domain_sysctl()
343 sd_free_ctl_entry(&e->child); in register_sched_domain_sysctl()
345 if (!e->procname) { in register_sched_domain_sysctl()
347 e->procname = kstrdup(buf, GFP_KERNEL); in register_sched_domain_sysctl()
349 e->mode = 0555; in register_sched_domain_sysctl()
350 e->child = sd_alloc_ctl_cpu_table(i); in register_sched_domain_sysctl()
Dcore.c7223 #define _POW10(exp) ((unsigned int)1e##exp)
/kernel/locking/
Dlockdep.c890 static bool in_list(struct list_head *e, struct list_head *h) in in_list() argument
895 if (e == f) in in_list()
906 static bool in_any_class_list(struct list_head *e) in in_any_class_list() argument
913 if (in_list(e, &class->locks_after) || in in_any_class_list()
914 in_list(e, &class->locks_before)) in in_any_class_list()
922 struct lock_list *e; in class_lock_list_valid() local
924 list_for_each_entry(e, h, entry) { in class_lock_list_valid()
925 if (e->links_to != c) { in class_lock_list_valid()
928 (unsigned long)(e - list_entries), in class_lock_list_valid()
929 e->links_to && e->links_to->name ? in class_lock_list_valid()
[all …]
/kernel/gcov/
DKconfig10 This option enables gcov-based code profiling (e.g. for code coverage
20 For a single file (e.g. main.o):
/kernel/printk/
Dprintk.c708 static void append_char(char **pp, char *e, char c) in append_char() argument
710 if (*pp < e) in append_char()
739 char *p = buf, *e = buf + size; in msg_print_ext_body() local
747 p += scnprintf(p, e - p, "\\x%02x", c); in msg_print_ext_body()
749 append_char(&p, e, c); in msg_print_ext_body()
751 append_char(&p, e, '\n'); in msg_print_ext_body()
760 append_char(&p, e, ' '); in msg_print_ext_body()
765 append_char(&p, e, '\n'); in msg_print_ext_body()
771 p += scnprintf(p, e - p, "\\x%02x", c); in msg_print_ext_body()
775 append_char(&p, e, c); in msg_print_ext_body()
[all …]
/kernel/debug/kdb/
Dkdb_main.c236 char *e = *ep++; in kdbgetenv() local
238 if (!e) in kdbgetenv()
241 if ((strncmp(match, e, matchlen) == 0) in kdbgetenv()
242 && ((e[matchlen] == '\0') in kdbgetenv()
243 || (e[matchlen] == '='))) { in kdbgetenv()
244 char *cp = strchr(e, '='); in kdbgetenv()
/kernel/power/
DKconfig9 suspend-to-RAM state (e.g. the ACPI S3 state).
256 notification of APM "events" (e.g. battery status change).
/kernel/bpf/
Dverifier.c6256 static int push_insn(int t, int w, int e, struct bpf_verifier_env *env, in push_insn() argument
6262 if (e == FALLTHROUGH && insn_state[t] >= (DISCOVERED | FALLTHROUGH)) in push_insn()
6265 if (e == BRANCH && insn_state[t] >= (DISCOVERED | BRANCH)) in push_insn()
6274 if (e == BRANCH) in push_insn()
6280 insn_state[t] = DISCOVERED | e; in push_insn()
6295 insn_state[t] = DISCOVERED | e; in push_insn()