/kernel/ |
D | kallsyms.c | 57 static unsigned int kallsyms_expand_symbol(unsigned int off, in kallsyms_expand_symbol() argument 64 data = &kallsyms_names[off]; in kallsyms_expand_symbol() 72 off += len + 1; in kallsyms_expand_symbol() 101 return off; in kallsyms_expand_symbol() 108 static char kallsyms_get_symbol_type(unsigned int off) in kallsyms_get_symbol_type() argument 114 return kallsyms_token_table[kallsyms_token_index[kallsyms_names[off + 1]]]; in kallsyms_get_symbol_type() 167 unsigned int off; in kallsyms_lookup_name() local 169 for (i = 0, off = 0; i < kallsyms_num_syms; i++) { in kallsyms_lookup_name() 170 off = kallsyms_expand_symbol(off, namebuf, ARRAY_SIZE(namebuf)); in kallsyms_lookup_name() 185 unsigned int off; in kallsyms_on_each_symbol() local [all …]
|
D | kheaders.c | 35 char *buf, loff_t off, size_t len) in ikheaders_read() argument 37 memcpy(buf, &kernel_headers_data + off, len); in ikheaders_read()
|
D | kcov.c | 447 unsigned long size, off; in kcov_mmap() local 465 for (off = 0; off < size; off += PAGE_SIZE) { in kcov_mmap() 466 page = vmalloc_to_page(kcov->area + off); in kcov_mmap() 467 if (vm_insert_page(vma, vma->vm_start + off, page)) in kcov_mmap()
|
D | params.c | 455 int i, off, ret; in param_array_get() local 459 for (i = off = 0; i < (arr->num ? *arr->num : arr->max); i++) { in param_array_get() 462 buffer[off - 1] = ','; in param_array_get() 465 ret = arr->ops->get(buffer + off, &p); in param_array_get() 468 off += ret; in param_array_get() 470 buffer[off] = '\0'; in param_array_get() 471 return off; in param_array_get()
|
D | ksysfs.c | 194 char *buf, loff_t off, size_t count) in notes_read() argument 196 memcpy(buf, &__start_notes + off, count); in notes_read()
|
D | ptrace.c | 727 if (arg.off > ULONG_MAX) in ptrace_peek_siginfo() 737 unsigned long off = arg.off + i; in ptrace_peek_siginfo() local 742 if (!off--) { in ptrace_peek_siginfo()
|
/kernel/bpf/ |
D | core.c | 299 dst[i].off == 0) { in bpf_prog_calc_tag() 359 s32 off = insn->off; in bpf_adj_delta_to_off() local 361 if (curr < pos && curr + off + 1 >= end_old) in bpf_adj_delta_to_off() 362 off += delta; in bpf_adj_delta_to_off() 363 else if (curr >= end_new && curr + off + 1 < end_new) in bpf_adj_delta_to_off() 364 off -= delta; in bpf_adj_delta_to_off() 365 if (off < off_min || off > off_max) in bpf_adj_delta_to_off() 368 insn->off = off; in bpf_adj_delta_to_off() 412 static void bpf_adj_linfo(struct bpf_prog *prog, u32 off, u32 delta) in bpf_adj_linfo() argument 424 if (off < linfo[i].insn_off) in bpf_adj_linfo() [all …]
|
D | verifier.c | 455 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state() 461 verbose(env, ",off=%d", reg->off); in print_verifier_state() 524 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state() 921 reg->off == 0 && in reg_is_init_pkt_pointer() 1099 static int find_subprog(struct bpf_verifier_env *env, int off) in find_subprog() argument 1103 p = bsearch(&off, env->subprog_info, env->subprog_cnt, in find_subprog() 1111 static int add_subprog(struct bpf_verifier_env *env, int off) in add_subprog() argument 1116 if (off >= insn_cnt || off < 0) { in add_subprog() 1120 ret = find_subprog(env, off); in add_subprog() 1127 env->subprog_info[env->subprog_cnt++].start = off; in add_subprog() [all …]
|
D | cgroup.c | 819 static bool cgroup_dev_is_valid_access(int off, int size, in cgroup_dev_is_valid_access() argument 829 if (off < 0 || off + size > sizeof(struct bpf_cgroup_dev_ctx)) in cgroup_dev_is_valid_access() 832 if (off % size != 0) in cgroup_dev_is_valid_access() 835 switch (off) { in cgroup_dev_is_valid_access() 838 if (!bpf_ctx_narrow_access_ok(off, size, size_default)) in cgroup_dev_is_valid_access() 1311 static bool sysctl_is_valid_access(int off, int size, enum bpf_access_type type, in sysctl_is_valid_access() argument 1317 if (off < 0 || off + size > sizeof(struct bpf_sysctl) || off % size) in sysctl_is_valid_access() 1320 switch (off) { in sysctl_is_valid_access() 1325 return bpf_ctx_narrow_access_ok(off, size, size_default); in sysctl_is_valid_access() 1329 return bpf_ctx_narrow_access_ok(off, size, size_default); in sysctl_is_valid_access() [all …]
|
D | disasm.c | 155 insn->off, insn->src_reg); in print_bpf_insn() 160 insn->dst_reg, insn->off, in print_bpf_insn() 173 insn->off, insn->imm); in print_bpf_insn() 182 insn->src_reg, insn->off); in print_bpf_insn() 235 insn->code, insn->off); in print_bpf_insn() 245 insn->src_reg, insn->off); in print_bpf_insn() 252 insn->imm, insn->off); in print_bpf_insn()
|
D | arraymap.c | 155 u32 off) in array_map_direct_value_addr() argument 161 if (off >= map->value_size) in array_map_direct_value_addr() 169 u32 *off) in array_map_direct_value_meta() argument 180 *off = imm - base; in array_map_direct_value_meta() 231 int cpu, off = 0; in bpf_percpu_array_copy() local 245 bpf_long_memcpy(value + off, per_cpu_ptr(pptr, cpu), size); in bpf_percpu_array_copy() 246 off += size; in bpf_percpu_array_copy() 315 int cpu, off = 0; in bpf_percpu_array_update() local 340 bpf_long_memcpy(per_cpu_ptr(pptr, cpu), value + off, size); in bpf_percpu_array_update() 341 off += size; in bpf_percpu_array_update()
|
D | sysfs_btf.c | 18 char *buf, loff_t off, size_t len) in btf_vmlinux_read() argument 20 memcpy(buf, _binary__btf_vmlinux_bin_start + off, len); in btf_vmlinux_read()
|
D | local_storage.c | 176 int cpu, off = 0; in bpf_percpu_cgroup_storage_copy() local 192 bpf_long_memcpy(value + off, in bpf_percpu_cgroup_storage_copy() 194 off += size; in bpf_percpu_cgroup_storage_copy() 206 int cpu, off = 0; in bpf_percpu_cgroup_storage_update() local 228 value + off, size); in bpf_percpu_cgroup_storage_update() 229 off += size; in bpf_percpu_cgroup_storage_update()
|
D | offload.c | 178 bpf_prog_offload_replace_insn(struct bpf_verifier_env *env, u32 off, in bpf_prog_offload_replace_insn() argument 190 ret = ops->replace_insn(env, off, insn); in bpf_prog_offload_replace_insn() 197 bpf_prog_offload_remove_insns(struct bpf_verifier_env *env, u32 off, u32 cnt) in bpf_prog_offload_remove_insns() argument 206 ret = offload->offdev->ops->remove_insns(env, off, cnt); in bpf_prog_offload_remove_insns()
|
D | btf.c | 245 u32 off; member 2221 u32 i, off = -ENOENT; in btf_find_spin_lock() local 2236 if (off != -ENOENT) in btf_find_spin_lock() 2239 off = btf_member_bit_offset(t, member); in btf_find_spin_lock() 2240 if (off % 8) in btf_find_spin_lock() 2243 off /= 8; in btf_find_spin_lock() 2244 if (off % __alignof__(struct bpf_spin_lock)) in btf_find_spin_lock() 2248 return off; in btf_find_spin_lock() 3160 return (int)(x->off - y->off) ? : (int)(x->len - y->len); in btf_sec_info_cmp() 3186 if (expected_total < secs[i].off) { in btf_check_sec_info() [all …]
|
D | hashtab.c | 705 int off = 0, cpu; in pcpu_copy_value() local 709 value + off, size); in pcpu_copy_value() 710 off += size; in pcpu_copy_value() 1288 int cpu, off = 0; in bpf_percpu_hash_copy() local 1305 bpf_long_memcpy(value + off, in bpf_percpu_hash_copy() 1307 off += size; in bpf_percpu_hash_copy()
|
/kernel/trace/ |
D | bpf_trace.c | 763 static bool kprobe_prog_is_valid_access(int off, int size, enum bpf_access_type type, in kprobe_prog_is_valid_access() argument 767 if (off < 0 || off >= sizeof(struct pt_regs)) in kprobe_prog_is_valid_access() 771 if (off % size != 0) in kprobe_prog_is_valid_access() 777 if (off + size > sizeof(struct pt_regs)) in kprobe_prog_is_valid_access() 872 static bool tp_prog_is_valid_access(int off, int size, enum bpf_access_type type, in tp_prog_is_valid_access() argument 876 if (off < sizeof(void *) || off >= PERF_MAX_TRACE_SIZE) in tp_prog_is_valid_access() 880 if (off % size != 0) in tp_prog_is_valid_access() 1063 static bool raw_tp_prog_is_valid_access(int off, int size, in raw_tp_prog_is_valid_access() argument 1069 if (off < 0 || off >= sizeof(__u64) * 12) in raw_tp_prog_is_valid_access() 1073 if (off % size != 0) in raw_tp_prog_is_valid_access() [all …]
|
D | Kconfig | 188 bool "Interrupts-off Latency Tracer" 199 This option measures the time spent in irqs-off critical 209 enabled. This option and the preempt-off timing option can be 213 bool "Preemption-off Latency Tracer" 224 This option measures the time spent in preemption-off critical 234 enabled. This option and the irqs-off timing option can be 680 When the tracepoint is enabled, it kicks off a kernel thread that 727 kernel boot sequence, the test will start that kicks off
|
/kernel/power/ |
D | swap.c | 677 size_t off; in save_image_lzo() local 771 for (off = 0; off < LZO_UNC_SIZE; off += PAGE_SIZE) { in save_image_lzo() 779 memcpy(data[thr].unc + off, in save_image_lzo() 787 if (!off) in save_image_lzo() 790 data[thr].unc_len = off; in save_image_lzo() 833 for (off = 0; in save_image_lzo() 834 off < LZO_HEADER + data[thr].cmp_len; in save_image_lzo() 835 off += PAGE_SIZE) { in save_image_lzo() 836 memcpy(page, data[thr].cmp + off, PAGE_SIZE); in save_image_lzo() 1165 size_t off; in load_image_lzo() local [all …]
|
/kernel/dma/ |
D | coherent.c | 242 unsigned long off = vma->vm_pgoff; in __dma_mmap_from_coherent() local 248 if (off < count && user_count <= count - off) { in __dma_mmap_from_coherent() 249 unsigned long pfn = mem->pfn_base + start + off; in __dma_mmap_from_coherent()
|
D | mapping.c | 194 unsigned long off = vma->vm_pgoff; in dma_common_mmap() local 203 if (off >= count || user_count > count - off) in dma_common_mmap()
|
/kernel/gcov/ |
D | gcc_4_7.c | 393 static size_t store_gcov_u32(void *buffer, size_t off, u32 v) in store_gcov_u32() argument 398 data = buffer + off; in store_gcov_u32() 417 static size_t store_gcov_u64(void *buffer, size_t off, u64 v) in store_gcov_u64() argument 422 data = buffer + off; in store_gcov_u64()
|
D | clang.c | 406 static size_t store_gcov_u32(void *buffer, size_t off, u32 v) in store_gcov_u32() argument 411 data = buffer + off; in store_gcov_u32() 430 static size_t store_gcov_u64(void *buffer, size_t off, u64 v) in store_gcov_u64() argument 435 data = buffer + off; in store_gcov_u64()
|
/kernel/cgroup/ |
D | cgroup-v1.c | 491 char *buf, size_t nbytes, loff_t off, in __cgroup1_procs_write() argument 534 char *buf, size_t nbytes, loff_t off) in cgroup1_procs_write() argument 536 return __cgroup1_procs_write(of, buf, nbytes, off, true); in cgroup1_procs_write() 540 char *buf, size_t nbytes, loff_t off) in cgroup1_tasks_write() argument 542 return __cgroup1_procs_write(of, buf, nbytes, off, false); in cgroup1_tasks_write() 546 char *buf, size_t nbytes, loff_t off) in cgroup_release_agent_write() argument
|
/kernel/debug/kdb/ |
D | kdb_main.c | 499 unsigned long off = 0; in kdbgetaddrarg() local 612 diag = kdbgetularg(cp, &off); in kdbgetaddrarg() 617 off = -off; in kdbgetaddrarg() 620 *offset += off; in kdbgetaddrarg() 623 *value += off; in kdbgetaddrarg()
|