Home
last modified time | relevance | path

Searched refs:e (Results 1 – 22 of 22) sorted by relevance

/kernel/printk/
Dprintk_ringbuffer.c1351 bool prb_reserve_in_last(struct prb_reserved_entry *e, struct printk_ringbuffer *rb, in prb_reserve_in_last() argument
1360 local_irq_save(e->irqflags); in prb_reserve_in_last()
1365 local_irq_restore(e->irqflags); in prb_reserve_in_last()
1377 e->rb = rb; in prb_reserve_in_last()
1378 e->id = id; in prb_reserve_in_last()
1433 e->text_space = space_used(&rb->text_data_ring, &d->text_blk_lpos); in prb_reserve_in_last()
1437 prb_commit(e); in prb_reserve_in_last()
1486 bool prb_reserve(struct prb_reserved_entry *e, struct printk_ringbuffer *rb, in prb_reserve() argument
1504 local_irq_save(e->irqflags); in prb_reserve()
1509 local_irq_restore(e->irqflags); in prb_reserve()
[all …]
Dprintk_ringbuffer.h305 bool prb_reserve(struct prb_reserved_entry *e, struct printk_ringbuffer *rb,
307 bool prb_reserve_in_last(struct prb_reserved_entry *e, struct printk_ringbuffer *rb,
309 void prb_commit(struct prb_reserved_entry *e);
310 void prb_final_commit(struct prb_reserved_entry *e);
316 unsigned int prb_record_text_space(struct prb_reserved_entry *e);
Dprintk.c507 struct prb_reserved_entry e; in log_store() local
513 if (!prb_reserve(&e, prb, &r)) { in log_store()
518 if (!prb_reserve(&e, prb, &r)) in log_store()
540 prb_commit(&e); in log_store()
542 prb_final_commit(&e); in log_store()
592 static void append_char(char **pp, char *e, char c) in append_char() argument
594 if (*pp < e) in append_char()
623 char *p = buf, *e = buf + size; in msg_add_ext_text() local
631 p += scnprintf(p, e - p, "\\x%02x", c); in msg_add_ext_text()
633 append_char(&p, e, c); in msg_add_ext_text()
[all …]
/kernel/
Dextable.c55 const struct exception_table_entry *e; in search_exception_tables() local
57 e = search_kernel_exception_table(addr); in search_exception_tables()
58 if (!e) in search_exception_tables()
59 e = search_module_extables(addr); in search_exception_tables()
60 if (!e) in search_exception_tables()
61 e = search_bpf_extables(addr); in search_exception_tables()
62 return e; in search_exception_tables()
Dauditfilter.c81 static inline void audit_free_rule(struct audit_entry *e) in audit_free_rule() argument
84 struct audit_krule *erule = &e->rule; in audit_free_rule()
94 kfree(e); in audit_free_rule()
99 struct audit_entry *e = container_of(head, struct audit_entry, rcu); in audit_free_rule_rcu() local
100 audit_free_rule(e); in audit_free_rule_rcu()
894 struct audit_entry *e, *found = NULL; in audit_find_rule() local
905 list_for_each_entry(e, list, list) in audit_find_rule()
906 if (!audit_compare_rule(&entry->rule, &e->rule)) { in audit_find_rule()
907 found = e; in audit_find_rule()
916 list_for_each_entry(e, list, list) in audit_find_rule()
[all …]
Daudit_watch.c325 struct audit_entry *e; in audit_remove_parent_watches() local
330 e = container_of(r, struct audit_entry, rule); in audit_remove_parent_watches()
332 if (e->rule.exe) in audit_remove_parent_watches()
333 audit_remove_mark(e->rule.exe); in audit_remove_parent_watches()
336 list_del_rcu(&e->list); in audit_remove_parent_watches()
337 call_rcu(&e->rcu, audit_free_rule_rcu); in audit_remove_parent_watches()
Dauditsc.c771 struct audit_entry *e; in audit_filter_task() local
775 list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TASK], list) { in audit_filter_task()
776 if (audit_filter_rules(tsk, &e->rule, NULL, NULL, in audit_filter_task()
779 *key = kstrdup(e->rule.filterkey, GFP_ATOMIC); in audit_filter_task()
813 struct audit_entry *e; in audit_filter_syscall() local
820 list_for_each_entry_rcu(e, list, list) { in audit_filter_syscall()
821 if (audit_in_mask(&e->rule, ctx->major) && in audit_filter_syscall()
822 audit_filter_rules(tsk, &e->rule, ctx, NULL, in audit_filter_syscall()
842 struct audit_entry *e; in audit_filter_inode_name() local
845 list_for_each_entry_rcu(e, list, list) { in audit_filter_inode_name()
[all …]
Duser_namespace.c224 static int cmp_map_id(const void *k, const void *e) in cmp_map_id() argument
228 const struct uid_gid_extent *el = e; in cmp_map_id()
1031 struct uid_gid_extent *e; in map_write() local
1035 e = &new_map.extent[idx]; in map_write()
1037 e = &new_map.forward[idx]; in map_write()
1040 e->lower_first, in map_write()
1041 e->count); in map_write()
1049 e->lower_first = lower_first; in map_write()
Dmodule.c4686 const struct exception_table_entry *e = NULL; in search_module_extables() local
4697 e = search_extable(mod->extable, in search_module_extables()
4707 return e; in search_module_extables()
/kernel/trace/
Dtrace_events_filter_test.h12 TP_PROTO(int a, int b, int c, int d, int e, int f, int g, int h),
14 TP_ARGS(a, b, c, d, e, f, g, h),
21 __field(int, e)
32 __entry->e = e;
40 __entry->e, __entry->f, __entry->g, __entry->h)
Dtrace_output.c677 struct trace_event *e; in trace_search_list() local
689 list_for_each_entry(e, &ftrace_event_list, list) { in trace_search_list()
690 if (e->type != next) in trace_search_list()
699 *list = &e->list; in trace_search_list()
DKconfig400 ftrace interface, e.g.:
522 Tracing also is possible using the ftrace interface, e.g.:
848 However, it should be safe to use on e.g. unused portion of VRAM.
Dtrace_events_filter.c2201 .e = ve, .f = vf, .g = vg, .h = vh }, \
Dtrace.c3803 unsigned long t, e; in get_total_entries() local
3810 get_total_entries_cpu(buf, &t, &e, cpu); in get_total_entries()
3812 *entries += e; in get_total_entries()
/kernel/sched/
Ddebug.c369 struct ctl_table *e = cpu_entries; in register_sched_domain_sysctl() local
377 cpu_idx[i] = e; in register_sched_domain_sysctl()
378 e++; in register_sched_domain_sysctl()
394 struct ctl_table *e = cpu_idx[i]; in register_sched_domain_sysctl() local
396 if (e->child) in register_sched_domain_sysctl()
397 sd_free_ctl_entry(&e->child); in register_sched_domain_sysctl()
399 if (!e->procname) { in register_sched_domain_sysctl()
401 e->procname = kstrdup(buf, GFP_KERNEL); in register_sched_domain_sysctl()
403 e->mode = 0555; in register_sched_domain_sysctl()
404 e->child = sd_alloc_ctl_cpu_table(i); in register_sched_domain_sysctl()
Dcore.c8161 #define _POW10(exp) ((unsigned int)1e##exp)
/kernel/locking/
Dlockdep.c946 static bool in_list(struct list_head *e, struct list_head *h) in in_list() argument
951 if (e == f) in in_list()
962 static bool in_any_class_list(struct list_head *e) in in_any_class_list() argument
969 if (in_list(e, &class->locks_after) || in in_any_class_list()
970 in_list(e, &class->locks_before)) in in_any_class_list()
978 struct lock_list *e; in class_lock_list_valid() local
980 list_for_each_entry(e, h, entry) { in class_lock_list_valid()
981 if (e->links_to != c) { in class_lock_list_valid()
984 (unsigned long)(e - list_entries), in class_lock_list_valid()
985 e->links_to && e->links_to->name ? in class_lock_list_valid()
[all …]
/kernel/gcov/
DKconfig10 This option enables gcov-based code profiling (e.g. for code coverage
20 For a single file (e.g. main.o):
/kernel/debug/kdb/
Dkdb_main.c288 char *e = *ep++; in kdbgetenv() local
290 if (!e) in kdbgetenv()
293 if ((strncmp(match, e, matchlen) == 0) in kdbgetenv()
294 && ((e[matchlen] == '\0') in kdbgetenv()
295 || (e[matchlen] == '='))) { in kdbgetenv()
296 char *cp = strchr(e, '='); in kdbgetenv()
/kernel/power/
DKconfig9 suspend-to-RAM state (e.g. the ACPI S3 state).
268 notification of APM "events" (e.g. battery status change).
/kernel/bpf/
Dcore.c738 const struct exception_table_entry *e = NULL; in search_bpf_extables() local
748 e = search_extable(prog->aux->extable, prog->aux->num_exentries, addr); in search_bpf_extables()
751 return e; in search_bpf_extables()
Dverifier.c8714 static int push_insn(int t, int w, int e, struct bpf_verifier_env *env, in push_insn() argument
8720 if (e == FALLTHROUGH && insn_state[t] >= (DISCOVERED | FALLTHROUGH)) in push_insn()
8723 if (e == BRANCH && insn_state[t] >= (DISCOVERED | BRANCH)) in push_insn()
8732 if (e == BRANCH) in push_insn()
8738 insn_state[t] = DISCOVERED | e; in push_insn()
8753 insn_state[t] = DISCOVERED | e; in push_insn()