Searched refs:matches (Results 1 – 13 of 13) sorted by relevance
/tools/testing/selftests/bpf/prog_tests/ |
D | align.c | 22 struct bpf_reg_match matches[MAX_MATCHES]; member 41 .matches = { 69 .matches = { 98 .matches = { 120 .matches = { 163 .matches = { 196 .matches = { 236 .matches = { 297 .matches = { 395 .matches = { [all …]
|
/tools/memory-model/scripts/ |
D | cmplitmushist.sh | 67 echo Exact output matches: $perfect 1>&2
|
/tools/lib/traceevent/Documentation/ |
D | libtraceevent-filter.txt | 55 The _tep_filter_match()_ function tests if a _record_ matches given _filter_. 86 _pass:[TEP_ERRNO__FILTER_MATCH]_ - filter found for event, the record matches. 149 /* The filter matches the record */
|
/tools/bpf/ |
D | bpf_dbg.c | 185 static int matches(const char *cmd, const char *pattern) in matches() function 1072 if (matches(subcmd, "bpf") == 0) { in cmd_load() 1080 } else if (matches(subcmd, "pcap") == 0) { in cmd_load() 1161 else if (matches(subcmd, "reset") == 0) in cmd_breakpoint() 1300 char **matches = NULL; in shell_completion() local 1303 matches = rl_completion_matches(buf, shell_comp_gen); in shell_completion() 1305 return matches; in shell_completion()
|
/tools/perf/util/ |
D | callchain.c | 921 u64 matches; in append_chain() local 952 matches = cursor->pos - start; in append_chain() 955 if (matches < root->val_nr) { in append_chain() 956 if (split_add_child(root, cursor, cnode, start, matches, in append_chain() 964 if (matches == root->val_nr && cursor->pos == cursor->nr) { in append_chain()
|
/tools/perf/Documentation/ |
D | perf-c2c.txt | 121 where it creates incorrect call stacks from incorrect matches.
|
D | perf-top.txt | 340 where it creates incorrect call stacks from incorrect matches.
|
D | perf.data-file-format.txt | 450 describing events. This matches the format generated by the kernel.
|
D | perf-probe.txt | 232 'a=*' can matches 'a=b', 'a = b', 'a == b' and so on.
|
D | perf-script.txt | 491 where it creates incorrect call stacks from incorrect matches.
|
D | perf-report.txt | 510 where it creates incorrect call stacks from incorrect matches.
|
/tools/objtool/Documentation/ |
D | stack-validation.txt | 151 b) the jump matches sibling call semantics and the frame pointer has
|
/tools/perf/ |
D | builtin-trace.c | 1880 goto matches; in trace__validate_ev_qualifier() 1892 matches: in trace__validate_ev_qualifier()
|