| /kernel/debug/kdb/ |
| A D | kdb_main.c | 397 argv[2] = argv[3]; in kdb_set() 421 argv[2]); in kdb_set() 434 return kdb_setenv(argv[1], argv[2]); in kdb_set() 778 argv[0]); in kdb_exec_defcmd() 786 argv = NULL; in kdb_exec_defcmd() 988 if (argv[0][0] == '-' && argv[0][1] && in kdb_parse() 989 (argv[0][1] < '0' || argv[0][1] > '9')) { in kdb_parse() 991 ++argv[0]; in kdb_parse() 1561 else if (argv[0][3] == 'c' && argv[0][4]) { in kdb_md() 1730 if (argv[0][2] && !isdigit(argv[0][2])) in kdb_mm() [all …]
|
| A D | kdb_bt.c | 127 kdb_bt(int argc, const char **argv) in kdb_bt() argument 138 if (strcmp(argv[0], "bta") == 0) { in kdb_bt() 141 const char *mask = argc ? argv[1] : kdbgetenv("PS"); in kdb_bt() 160 } else if (strcmp(argv[0], "btp") == 0) { in kdb_bt() 165 diag = kdbgetularg((char *)argv[1], &pid); in kdb_bt() 173 } else if (strcmp(argv[0], "btt") == 0) { in kdb_bt() 176 diag = kdbgetularg((char *)argv[1], &addr); in kdb_bt() 180 } else if (strcmp(argv[0], "btc") == 0) { in kdb_bt() 185 diag = kdbgetularg((char *)argv[1], &cpu); in kdb_bt() 196 argv = NULL; in kdb_bt() [all …]
|
| A D | kdb_bp.c | 55 if (strncasecmp(argv[nextarg], "datar", sizeof("datar")) == 0) in kdb_parsebp() 71 diag = kdbgetularg((char *)argv[nextarg], in kdb_parsebp() 277 static int kdb_bp(int argc, const char **argv) in kdb_bp() argument 329 if (strcmp(argv[0], "bph") == 0) { in kdb_bp() 331 diag = kdb_parsebp(argc, argv, &nextarg, &template); in kdb_bp() 386 static int kdb_bc(int argc, const char **argv) in kdb_bc() argument 401 if (strcmp(argv[0], "be") == 0) in kdb_bc() 403 else if (strcmp(argv[0], "bd") == 0) in kdb_bc() 411 if (strcmp(argv[1], "*") == 0) { in kdb_bc() 415 diag = kdbgetularg(argv[1], &addr); in kdb_bc() [all …]
|
| /kernel/module/ |
| A D | kmod.c | 67 kfree(info->argv[3]); /* check call_modprobe() */ in free_modprobe_argv() 68 kfree(info->argv); in free_modprobe_argv() 83 char **argv = kmalloc(sizeof(char *[5]), GFP_KERNEL); in call_modprobe() local 84 if (!argv) in call_modprobe() 91 argv[0] = modprobe_path; in call_modprobe() 92 argv[1] = "-q"; in call_modprobe() 93 argv[2] = "--"; in call_modprobe() 94 argv[3] = module_name; /* check free_modprobe_argv() */ in call_modprobe() 95 argv[4] = NULL; in call_modprobe() 97 info = call_usermodehelper_setup(modprobe_path, argv, envp, GFP_KERNEL, in call_modprobe() [all …]
|
| A D | kdb.c | 17 int kdb_lsmod(int argc, const char **argv) in kdb_lsmod() argument
|
| /kernel/trace/ |
| A D | trace_eprobe.c | 166 slash = strchr(argv[0], '/'); in eprobe_dyn_event_match() 168 slash = strchr(argv[0], '.'); in eprobe_dyn_event_match() 172 if (strncmp(ep->event_system, argv[0], slash - argv[0])) in eprobe_dyn_event_match() 178 argv++; in eprobe_dyn_event_match() 836 len += strlen(argv[i]) + 1; in trace_eprobe_parse_filter() 887 if (argc < 2 || argv[0][0] != 'e') in __trace_eprobe_create() 892 event = strchr(&argv[0][1], ':'); in __trace_eprobe_create() 899 event - argv[0]); in __trace_eprobe_create() 905 sys_event = argv[1]; in __trace_eprobe_create() 925 if (!strcmp(argv[i], "if")) { in __trace_eprobe_create() [all …]
|
| A D | trace_fprobe.c | 246 if (strcmp(buf, argv[0])) in trace_fprobe_match_command_head() 248 argc--; argv++; in trace_fprobe_match_command_head() 1162 int len = tmp - argv[1]; in parse_symbol_and_return() 1251 if ((argv[0][0] != 'f' && argv[0][0] != 't') || argc < 2) in trace_fprobe_create_internal() 1254 if (argv[0][0] == 't') { in trace_fprobe_create_internal() 1259 if (argv[0][1] != '\0') { in trace_fprobe_create_internal() 1260 if (argv[0][1] != ':') { in trace_fprobe_create_internal() 1265 event = &argv[0][2]; in trace_fprobe_create_internal() 1281 event - argv[0]); in trace_fprobe_create_internal() 1328 argc -= 2; argv += 2; in trace_fprobe_create_internal() [all …]
|
| A D | trace_dynevent.c | 77 char **argv __free(argv_free) = argv_split(GFP_KERNEL, raw_command, &argc); in dyn_event_release() 79 if (!argv) in dyn_event_release() 82 if (argv[0][0] == '-') { in dyn_event_release() 83 if (argv[0][1] != ':') in dyn_event_release() 85 event = &argv[0][2]; in dyn_event_release() 87 event = strchr(argv[0], ':'); in dyn_event_release() 107 argc - 1, (const char **)argv + 1, pos)) in dyn_event_release()
|
| A D | trace_probe.c | 165 trace_probe_log.argv = argv; in trace_probe_log_init() 190 if (!trace_probe_log.argv) in __trace_probe_log_err() 1480 len = strlen(argv); in traceprobe_parse_probe_arg_body() 1681 if (argv[i][4] != '*') { in argv_has_var_arg() 1791 new_argv[j++] = argv[i]; in traceprobe_expand_meta_args() 1829 arg_len = strlen(argv[i]); in traceprobe_expand_dentry_args() 1847 argv[i] = tmpbuf + used; in traceprobe_expand_dentry_args() 2230 if (strcmp(buf, argv[i])) in trace_probe_match_command_args() 2239 char **argv; in trace_probe_create() local 2242 if (!argv) in trace_probe_create() [all …]
|
| A D | trace_kprobe.c | 148 int argc, const char **argv) in trace_kprobe_match_command_head() argument 162 if (strcmp(buf, argv[0])) in trace_kprobe_match_command_head() 164 argc--; argv++; in trace_kprobe_match_command_head() 879 switch (argv[0][0]) { in trace_kprobe_create_internal() 895 if (isdigit(argv[0][1])) { in trace_kprobe_create_internal() 903 len = event - &argv[0][1] - 1; in trace_kprobe_create_internal() 905 len = strlen(&argv[0][1]); in trace_kprobe_create_internal() 931 if (strchr(argv[1], '/') && strchr(argv[1], ':')) in trace_kprobe_create_internal() 982 event - argv[0]); in trace_kprobe_create_internal() 1005 argc -= 2; argv += 2; in trace_kprobe_create_internal() [all …]
|
| A D | trace_uprobe.c | 282 int argc, const char **argv) in trace_uprobe_match_command_head() argument 291 if (strncmp(tu->filename, argv[0], len) || argv[0][len] != ':') in trace_uprobe_match_command_head() 301 if (strcmp(buf, &argv[0][len + 1])) in trace_uprobe_match_command_head() 304 argc--; argv++; in trace_uprobe_match_command_head() 555 switch (argv[0][0]) { in __trace_uprobe_create() 576 if (argv[0][1] == ':') in __trace_uprobe_create() 577 event = &argv[0][2]; in __trace_uprobe_create() 579 if (!strchr(argv[1], '/')) in __trace_uprobe_create() 582 filename = kstrdup(argv[1], GFP_KERNEL); in __trace_uprobe_create() 663 event - argv[0]); in __trace_uprobe_create() [all …]
|
| A D | trace_kdb.c | 93 static int kdb_ftdump(int argc, const char **argv) in kdb_ftdump() argument 103 if (argc && kstrtoint(argv[1], 0, &skip_entries)) in kdb_ftdump() 107 err = kstrtol(argv[2], 0, &cpu_file); in kdb_ftdump()
|
| A D | trace_events_synth.c | 113 int argc, const char **argv, struct dyn_event *ev) in synth_event_match() argument 694 field_type = argv[1]; in parse_synth_field() 695 field_name = argv[2]; in parse_synth_field() 698 field_name = argv[1]; in parse_synth_field() 1335 if (!argv) { in __create_synth_event() 1341 argv_free(argv); in __create_synth_event() 1351 argv + consumed, &consumed, in __create_synth_event() 1390 argv_free(argv); in __create_synth_event() 1424 argv_free(argv); in __create_synth_event() 1560 if (!argv) { in check_command() [all …]
|
| A D | trace_probe.h | 363 int argc, const char **argv); 428 const char *argv, 430 const char **traceprobe_expand_meta_args(int argc, const char *argv[], 433 extern int traceprobe_expand_dentry_args(int argc, const char *argv[], char **buf); 571 const char **argv; member 576 void trace_probe_log_init(const char *subsystem, int argc, const char **argv);
|
| A D | trace_events_user.c | 213 const char **argv); 1354 if (strchr(argv[i], ';')) { in user_dyn_field_set_string() 1541 if (user_fields_match(user, argc, argv)) in find_user_event() 1864 const char **argv, int *iout) in user_field_match() argument 1901 const char **argv) in user_fields_match() argument 1935 match = user_fields_match(user, argc, argv); in user_event_match() 2076 char **argv = NULL; in user_event_parse() local 2089 argv = user_event_argv_split(args, &argc); in user_event_parse() 2091 if (!argv) in user_event_parse() 2101 if (argv) in user_event_parse() [all …]
|
| A D | trace_dynevent.h | 47 int argc, const char **argv, struct dyn_event *ev);
|
| /kernel/ |
| A D | umh.c | 110 (const char *const *)sub_info->argv, in call_usermodehelper_exec_async() 355 struct subprocess_info *call_usermodehelper_setup(const char *path, char **argv, in call_usermodehelper_setup() argument 373 sub_info->argv = argv; in call_usermodehelper_setup() 482 int call_usermodehelper(const char *path, char **argv, char **envp, int wait) in call_usermodehelper() argument 487 info = call_usermodehelper_setup(path, argv, envp, gfp_mask, in call_usermodehelper()
|
| A D | reboot.c | 844 char **argv; in run_cmd() local 851 argv = argv_split(GFP_KERNEL, cmd, NULL); in run_cmd() 852 if (argv) { in run_cmd() 853 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC); in run_cmd() 854 argv_free(argv); in run_cmd()
|
| A D | auditsc.c | 183 return mask & ACC_MODE(ctx->argv[1]); in audit_match_perm() 185 return mask & ACC_MODE(ctx->argv[2]); in audit_match_perm() 1001 memset(ctx->argv, 0, sizeof(ctx->argv)); in audit_reset_context() 1700 context->argv[0], in audit_log_exit() 1701 context->argv[1], in audit_log_exit() 1702 context->argv[2], in audit_log_exit() 1703 context->argv[3], in audit_log_exit() 2036 context->argv[0] = a1; in __audit_syscall_entry() 2037 context->argv[1] = a2; in __audit_syscall_entry() 2038 context->argv[2] = a3; in __audit_syscall_entry() [all …]
|
| A D | audit.h | 115 unsigned long argv[4]; /* syscall arguments */ member
|
| /kernel/cgroup/ |
| A D | cgroup-v1.c | 805 char *argv[3], *envp[3]; in cgroup1_release_agent() local 828 argv[0] = agentbuf; in cgroup1_release_agent() 829 argv[1] = pathbuf; in cgroup1_release_agent() 830 argv[2] = NULL; in cgroup1_release_agent() 837 call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC); in cgroup1_release_agent()
|