| /tools/perf/util/ |
| A D | probe-finder.c | 467 &pf->sp_die, pf, pf->tvar); in convert_variable() 477 pf->pvar->field, &pf->tvar->ref, in convert_variable() 500 pf->tvar->name = strdup(pf->pvar->name); in find_variable() 599 if (!die_find_realfunc(&pf->cu_die, pf->addr, &pf->sp_die)) { in call_probe_finder() 600 if (die_find_tailfunc(&pf->cu_die, pf->addr, &pf->sp_die)) { in call_probe_finder() 631 ret = pf->callback(sc_die, pf); in call_probe_finder() 707 cu_walk_functions_at(&pf->cu_die, pf->addr, in find_best_scope() 1141 if (pf->cfi_eh || pf->cfi_dbg) in debuginfo__find_probes() 1182 struct probe_finder *pf = vf->pf; in copy_variables_cb() local 1191 vf->pf->fb_ops, &pf->sp_die, in copy_variables_cb() [all …]
|
| A D | probe-finder.h | 58 int (*callback)(Dwarf_Die *sc_die, struct probe_finder *pf); 83 struct probe_finder pf; member 91 struct probe_finder pf; member
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | netfilter_link_attach.c | 10 __u32 pf; member 21 { .pf = NFPROTO_NUMPROTO, .name = "invalid-pf", }, 22 { .pf = NFPROTO_IPV4, .hooknum = 42, .name = "invalid-hooknum", }, 23 { .pf = NFPROTO_IPV4, .priority = INT_MIN, .name = "invalid-priority-min", }, 24 { .pf = NFPROTO_IPV4, .priority = INT_MAX, .name = "invalid-priority-max", }, 25 { .pf = NFPROTO_IPV4, .flags = UINT_MAX, .name = "invalid-flags", }, 27 { .pf = NFPROTO_INET, .priority = 1, .name = "invalid-inet-not-supported", }, 30 .pf = NFPROTO_IPV4, 38 .pf = NFPROTO_IPV6, 60 ASSERT_EQ(info.netfilter.pf, nf_expected.pf, "info nf protocol family"); in verify_netfilter_link_info() [all …]
|
| A D | ip_check_defrag.c | 84 .pf = ipv6 ? NFPROTO_IPV6 : NFPROTO_IPV4, in attach()
|
| A D | flow_dissector_classification.c | 543 static int set_port_drop(int pf, bool multi_port) in set_port_drop() argument 553 "protocol", pf == PF_INET6 ? "ipv6" : "ip", in set_port_drop()
|
| /tools/testing/selftests/bpf/progs/ |
| A D | linked_list.c | 112 struct foo *f[200], *pf; in list_push_pop_multiple() local 146 pf = container_of(n, struct foo, node2); in list_push_pop_multiple() 147 if (pf->data != (ARRAY_SIZE(f) - i - 1)) { in list_push_pop_multiple() 148 bpf_obj_drop(pf); in list_push_pop_multiple() 152 bpf_list_push_back(head, &pf->node2); in list_push_pop_multiple() 165 pf = container_of(n, struct foo, node2); in list_push_pop_multiple() 166 if (pf->data != i) { in list_push_pop_multiple() 167 bpf_obj_drop(pf); in list_push_pop_multiple() 170 bpf_obj_drop(pf); in list_push_pop_multiple()
|
| A D | verifier_netfilter_ctx.c | 109 if (state->pf != 2) in with_valid_ctx_access_test6()
|
| /tools/testing/selftests/net/mptcp/ |
| A D | mptcp_inq.c | 39 static int pf = AF_INET; variable 107 hints.ai_family = pf; in sock_listen_mptcp() 113 hints.ai_family = pf; in sock_listen_mptcp() 153 hints.ai_family = pf; in sock_connect_mptcp() 195 pf = AF_INET6; in parse_opts() 481 switch (pf) { in server() 489 xerror("Unknown pf %d\n", pf); in server() 513 switch (pf) { in client() 521 xerror("Unknown pf %d\n", pf); in client()
|
| A D | mptcp_connect.c | 67 static int pf = AF_INET; variable 247 switch (pf) { in set_transparent() 313 hints.ai_family = pf; in sock_listen_mptcp() 319 hints.ai_family = pf; in sock_listen_mptcp() 336 set_mptfo(sock, pf); in sock_listen_mptcp() 379 hints.ai_family = pf; in sock_connect_mptcp() 1001 switch (pf) { in check_sockaddr() 1023 if (ss->ss_family != pf) in check_sockaddr() 1025 (int)ss->ss_family, pf); in check_sockaddr() 1468 pf = AF_INET6; in parse_opts() [all …]
|
| A D | mptcp_sockopt.c | 29 static int pf = AF_INET; variable 194 hints.ai_family = pf; in sock_listen_mptcp() 200 hints.ai_family = pf; in sock_listen_mptcp() 240 hints.ai_family = pf; in sock_connect_mptcp() 271 pf = AF_INET6; in parse_opts() 493 assert(addrs.addr[0].sa_family == pf); in do_getsockopt_subflow_addrs() 704 switch (pf) { in server() 712 xerror("Unknown pf %d\n", pf); in server() 771 switch (pf) { in client() 779 xerror("Unknown pf %d\n", pf); in client()
|
| /tools/testing/selftests/powerpc/eeh/ |
| A D | eeh-functions.sh | 208 log "Unable to enable VFs on $pf, skipping" 214 log "unable to find enabled vf on $pf"
|
| /tools/testing/selftests/alsa/ |
| A D | test-pcmtest-driver.c | 37 char pf[64]; in read_patterns() local 48 sprintf(pf, "/sys/kernel/debug/pcmtest/fill_pattern%d", i); in read_patterns() 49 fp = fopen(pf, "r"); in read_patterns()
|
| /tools/bpf/bpftool/ |
| A D | link.c | 226 info->netfilter.pf); in netfilter_dump_json() 682 unsigned int pf = info->netfilter.pf; in netfilter_dump_plain() local 684 if (pf < ARRAY_SIZE(pf2name)) in netfilter_dump_plain() 685 pfname = pf2name[pf]; in netfilter_dump_plain() 687 switch (pf) { in netfilter_dump_plain() 705 printf("\n\tpf: %u", pf); in netfilter_dump_plain()
|
| A D | net.c | 806 delta = nfa->netfilter.pf - nfb->netfilter.pf; in netfilter_link_compar()
|
| /tools/testing/selftests/net/netfilter/ |
| A D | nf_queue.c | 126 .pf = htons(AF_INET), in nfq_build_cfg_request()
|
| A D | nft_queue.sh | 539 timeout 10 ip netns exec "$ns2" socat UDP-LISTEN:12345,fork,pf=ipv4 OPEN:"$TMPFILE1",trunc & 542 timeout 10 ip netns exec "$ns3" socat UDP-LISTEN:12345,fork,pf=ipv4 OPEN:"$TMPFILE2",trunc &
|
| /tools/lib/bpf/ |
| A D | bpf.h | 426 __u32 pf; member
|
| A D | bpf.c | 801 attr.link_create.netfilter.pf = OPTS_GET(opts, netfilter.pf, 0); in bpf_link_create()
|
| A D | libbpf.h | 841 __u32 pf; member
|
| A D | libbpf.c | 13059 lopts.netfilter.pf = OPTS_GET(opts, pf, 0); in bpf_program__attach_netfilter()
|
| /tools/include/uapi/linux/ |
| A D | bpf.h | 1787 __u32 pf; member 6737 __u32 pf; member
|
| /tools/perf/Documentation/ |
| A D | perf-trace.txt | 167 --pf=[all|min|maj]::
|
| /tools/power/pm-graph/ |
| A D | sleepgraph.py | 5043 .pf {display:none;}\n\ 5044 ….pf:'+cgchk+' + label {background:url(\'data:image/svg+xml;utf,<?xml version="1.0" standalone="no"… 5045 ….pf:'+cgnchk+' ~ label {background:url(\'data:image/svg+xml;utf,<?xml version="1.0" standalone="no… 5046 .pf:'+cgchk+' ~ *:not(:nth-child(2)) {display:none;}\n\ 5563 pf = open(sv.powerfile, 'w') 5564 pf.write(mode) 5567 pf.flush() 5568 pf.close()
|