/kernel/trace/ |
D | trace_events_filter_test.h | 12 TP_PROTO(int a, int b, int c, int d, int e, int f, int g, int h), 14 TP_ARGS(a, b, c, d, e, f, g, h), 21 __field(int, e) 32 __entry->e = e; 40 __entry->e, __entry->f, __entry->g, __entry->h)
|
D | trace_output.c | 665 struct trace_event *e; in trace_search_list() local 677 list_for_each_entry(e, &ftrace_event_list, list) { in trace_search_list() 678 if (e->type != last + 1) in trace_search_list() 687 *list = &e->list; in trace_search_list()
|
D | Kconfig | 304 ftrace interface, e.g.: 451 Tracing also is possible using the ftrace interface, e.g.: 672 However, it should be safe to use on e.g. unused portion of VRAM.
|
D | trace_events_filter.c | 2108 .e = ve, .f = vf, .g = vg, .h = vh }, \
|
D | trace.c | 3543 unsigned long t, e; in get_total_entries() local 3550 get_total_entries_cpu(buf, &t, &e, cpu); in get_total_entries() 3552 *entries += e; in get_total_entries()
|
/kernel/ |
D | auditfilter.c | 81 static inline void audit_free_rule(struct audit_entry *e) in audit_free_rule() argument 84 struct audit_krule *erule = &e->rule; in audit_free_rule() 94 kfree(e); in audit_free_rule() 99 struct audit_entry *e = container_of(head, struct audit_entry, rcu); in audit_free_rule_rcu() local 100 audit_free_rule(e); in audit_free_rule_rcu() 887 struct audit_entry *e, *found = NULL; in audit_find_rule() local 898 list_for_each_entry(e, list, list) in audit_find_rule() 899 if (!audit_compare_rule(&entry->rule, &e->rule)) { in audit_find_rule() 900 found = e; in audit_find_rule() 909 list_for_each_entry(e, list, list) in audit_find_rule() [all …]
|
D | extable.c | 54 const struct exception_table_entry *e; in search_exception_tables() local 56 e = search_kernel_exception_table(addr); in search_exception_tables() 57 if (!e) in search_exception_tables() 58 e = search_module_extables(addr); in search_exception_tables() 59 return e; in search_exception_tables()
|
D | audit_watch.c | 327 struct audit_entry *e; in audit_remove_parent_watches() local 332 e = container_of(r, struct audit_entry, rule); in audit_remove_parent_watches() 334 if (e->rule.exe) in audit_remove_parent_watches() 335 audit_remove_mark(e->rule.exe); in audit_remove_parent_watches() 338 list_del_rcu(&e->list); in audit_remove_parent_watches() 339 call_rcu(&e->rcu, audit_free_rule_rcu); in audit_remove_parent_watches()
|
D | auditsc.c | 742 struct audit_entry *e; in audit_filter_task() local 746 list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TASK], list) { in audit_filter_task() 747 if (audit_filter_rules(tsk, &e->rule, NULL, NULL, in audit_filter_task() 750 *key = kstrdup(e->rule.filterkey, GFP_ATOMIC); in audit_filter_task() 784 struct audit_entry *e; in audit_filter_syscall() local 791 list_for_each_entry_rcu(e, list, list) { in audit_filter_syscall() 792 if (audit_in_mask(&e->rule, ctx->major) && in audit_filter_syscall() 793 audit_filter_rules(tsk, &e->rule, ctx, NULL, in audit_filter_syscall() 813 struct audit_entry *e; in audit_filter_inode_name() local 816 list_for_each_entry_rcu(e, list, list) { in audit_filter_inode_name() [all …]
|
D | user_namespace.c | 223 static int cmp_map_id(const void *k, const void *e) in cmp_map_id() argument 227 const struct uid_gid_extent *el = e; in cmp_map_id() 976 struct uid_gid_extent *e; in map_write() local 980 e = &new_map.extent[idx]; in map_write() 982 e = &new_map.forward[idx]; in map_write() 985 e->lower_first, in map_write() 986 e->count); in map_write() 994 e->lower_first = lower_first; in map_write()
|
D | module.c | 4442 const struct exception_table_entry *e = NULL; in search_module_extables() local 4453 e = search_extable(mod->extable, in search_module_extables() 4463 return e; in search_module_extables()
|
/kernel/sched/ |
D | debug.c | 315 struct ctl_table *e = cpu_entries; in register_sched_domain_sysctl() local 323 cpu_idx[i] = e; in register_sched_domain_sysctl() 324 e++; in register_sched_domain_sysctl() 340 struct ctl_table *e = cpu_idx[i]; in register_sched_domain_sysctl() local 342 if (e->child) in register_sched_domain_sysctl() 343 sd_free_ctl_entry(&e->child); in register_sched_domain_sysctl() 345 if (!e->procname) { in register_sched_domain_sysctl() 347 e->procname = kstrdup(buf, GFP_KERNEL); in register_sched_domain_sysctl() 349 e->mode = 0555; in register_sched_domain_sysctl() 350 e->child = sd_alloc_ctl_cpu_table(i); in register_sched_domain_sysctl()
|
D | core.c | 7223 #define _POW10(exp) ((unsigned int)1e##exp)
|
/kernel/locking/ |
D | lockdep.c | 890 static bool in_list(struct list_head *e, struct list_head *h) in in_list() argument 895 if (e == f) in in_list() 906 static bool in_any_class_list(struct list_head *e) in in_any_class_list() argument 913 if (in_list(e, &class->locks_after) || in in_any_class_list() 914 in_list(e, &class->locks_before)) in in_any_class_list() 922 struct lock_list *e; in class_lock_list_valid() local 924 list_for_each_entry(e, h, entry) { in class_lock_list_valid() 925 if (e->links_to != c) { in class_lock_list_valid() 928 (unsigned long)(e - list_entries), in class_lock_list_valid() 929 e->links_to && e->links_to->name ? in class_lock_list_valid() [all …]
|
/kernel/gcov/ |
D | Kconfig | 10 This option enables gcov-based code profiling (e.g. for code coverage 20 For a single file (e.g. main.o):
|
/kernel/printk/ |
D | printk.c | 708 static void append_char(char **pp, char *e, char c) in append_char() argument 710 if (*pp < e) in append_char() 739 char *p = buf, *e = buf + size; in msg_print_ext_body() local 747 p += scnprintf(p, e - p, "\\x%02x", c); in msg_print_ext_body() 749 append_char(&p, e, c); in msg_print_ext_body() 751 append_char(&p, e, '\n'); in msg_print_ext_body() 760 append_char(&p, e, ' '); in msg_print_ext_body() 765 append_char(&p, e, '\n'); in msg_print_ext_body() 771 p += scnprintf(p, e - p, "\\x%02x", c); in msg_print_ext_body() 775 append_char(&p, e, c); in msg_print_ext_body() [all …]
|
/kernel/debug/kdb/ |
D | kdb_main.c | 236 char *e = *ep++; in kdbgetenv() local 238 if (!e) in kdbgetenv() 241 if ((strncmp(match, e, matchlen) == 0) in kdbgetenv() 242 && ((e[matchlen] == '\0') in kdbgetenv() 243 || (e[matchlen] == '='))) { in kdbgetenv() 244 char *cp = strchr(e, '='); in kdbgetenv()
|
/kernel/power/ |
D | Kconfig | 9 suspend-to-RAM state (e.g. the ACPI S3 state). 256 notification of APM "events" (e.g. battery status change).
|
/kernel/bpf/ |
D | verifier.c | 6256 static int push_insn(int t, int w, int e, struct bpf_verifier_env *env, in push_insn() argument 6262 if (e == FALLTHROUGH && insn_state[t] >= (DISCOVERED | FALLTHROUGH)) in push_insn() 6265 if (e == BRANCH && insn_state[t] >= (DISCOVERED | BRANCH)) in push_insn() 6274 if (e == BRANCH) in push_insn() 6280 insn_state[t] = DISCOVERED | e; in push_insn() 6295 insn_state[t] = DISCOVERED | e; in push_insn()
|