/linux-master/kernel/trace/ |
H A D | ring_buffer.c | 852 int cpu, int full, ring_buffer_cond_fn cond, void *data) 857 if (cond(data)) 910 * @cond: condition function to break out of wait (NULL to run once) 911 * @data: the data to pass to @cond. 918 ring_buffer_cond_fn cond, void *data) 948 if (!cond) { 949 cond = rb_wait_once; 956 rb_wait_cond(rbwork, buffer, cpu, full, cond, data)); 1040 #define RB_WARN_ON(b, cond) \ 1042 int _____ret = unlikely(cond); \ 851 rb_wait_cond(struct rb_irq_work *rbwork, struct trace_buffer *buffer, int cpu, int full, ring_buffer_cond_fn cond, void *data) argument 917 ring_buffer_wait(struct trace_buffer *buffer, int cpu, int full, ring_buffer_cond_fn cond, void *data) argument [all...] |
/linux-master/lib/ |
H A D | overflow_kunit.c | 20 #define SKIP(cond, reason) do { \ 21 if (cond) { \
|
H A D | test_user_copy.c | 36 int cond = (condition); \ 37 if (cond) \ 39 cond; \
|
/linux-master/lib/zstd/common/ |
H A D | error_private.h | 101 #define RETURN_ERROR_IF(cond, err, ...) \ 102 if (cond) { \ 104 __FILE__, __LINE__, ERR_QUOTE(cond), ERR_QUOTE(ERROR(err))); \
|
/linux-master/mm/ |
H A D | internal.h | 42 #define WARN_ON_ONCE_GFP(cond, gfp) ({ \ 44 int __ret_warn_once = !!(cond); \
|
H A D | percpu.c | 2622 #define PCPU_SETUP_BUG_ON(cond) do { \ 2623 if (unlikely(cond)) { \ 2624 pr_emerg("failed to initialize, %s\n", #cond); \
|
/linux-master/mm/kfence/ |
H A D | core.c | 39 #define KFENCE_WARN_ON(cond) \ 41 const bool __cond = WARN_ON(cond); \
|
H A D | kfence_test.c | 35 #define KFENCE_TEST_REQUIRES(test, cond) do { \ 36 if (!(cond)) \ 37 kunit_skip((test), "Test requires: " #cond); \
|
/linux-master/mm/kmsan/ |
H A D | kmsan.h | 46 #define KMSAN_WARN_ON(cond) \ 48 const bool __cond = WARN_ON(cond); \
|
H A D | kmsan_test.c | 207 volatile int cond; local 210 USE(cond); 218 volatile int cond = 1; local 221 USE(cond);
|
/linux-master/net/dccp/ |
H A D | dccp.h | 27 #define DCCP_BUG_ON(cond) do { if (unlikely((cond) != 0)) \ 29 __stringify(cond)); \
|
/linux-master/net/ipv4/ |
H A D | inet_diag.c | 702 const struct inet_diag_hostcond *cond; local 705 cond = (const struct inet_diag_hostcond *)(op + 1); 706 if (cond->port != -1 && 707 cond->port != (op->code == INET_DIAG_BC_S_COND ? 718 if (cond->family != AF_UNSPEC && 719 cond->family != entry->family) { 721 cond->family == AF_INET) { 725 cond->addr, 726 cond->prefix_len)) 733 if (cond 750 struct inet_diag_markcond *cond; local 860 struct inet_diag_hostcond *cond; local [all...] |
/linux-master/net/netfilter/ |
H A D | nf_conntrack_h323_asn1.c | 24 #define IFTHEN(cond, act) if(cond){act;} 32 #define IFTHEN(cond, act)
|
H A D | xt_sctp.c | 20 #define SCCHECK(cond, option, flag, invflag) (!((flag) & (option)) \ 21 || (!!((invflag) & (option)) ^ (cond)))
|
/linux-master/net/tipc/ |
H A D | trace.h | 235 #define DEFINE_SK_EVENT_FILTER_COND(name, cond) \ 240 TP_CONDITION(tipc_sk_filtering(sk) && (cond))) 275 #define DEFINE_LINK_EVENT_COND(name, cond) \ 279 TP_CONDITION(cond))
|
/linux-master/net/wireless/ |
H A D | core.h | 536 #define CFG80211_DEV_WARN_ON(cond) WARN_ON(cond) 543 #define CFG80211_DEV_WARN_ON(cond) ({bool __r = (cond); __r; })
|
/linux-master/samples/bpf/ |
H A D | xdp_sample_user.c | 38 #define __sample_print(fmt, cond, ...) \ 40 if (cond) \
|
/linux-master/scripts/ |
H A D | asn1_compiler.c | 1442 const char *cond, *act; local 1458 cond = (e->flags & ELEMENT_CONDITIONAL || 1464 cond, act, skippable ? "_OR_SKIP" : ""); 1479 cond, 1492 cond, act,
|
H A D | checkpatch.pl | 4207 my ($stat, $cond, $line_nr_next, $remain_next, $off_next, 4212 ($stat, $cond, $line_nr_next, $remain_next, $off_next) = 4215 $cond =~ s/\n./\n /g; 4358 ($stat, $cond, $line_nr_next, $remain_next, $off_next) = 4361 my ($s, $c) = ($stat, $cond); 5659 ($stat, $cond, $line_nr_next, $remain_next, $off_next) = 5680 defined($stat) && defined($cond) && 5682 my ($s, $c) = ($stat, $cond); 6127 my ($cond, $block) = @{$chunk}; 6130 my ($whitespace) = ($cond [all...] |
H A D | sign-file.c | 112 #define ERR(cond, fmt, ...) \ 114 bool __cond = (cond); \
|
/linux-master/scripts/mod/ |
H A D | file2alias.c | 89 #define ADD(str, sep, cond, field) \ 92 if (cond) \
|
/linux-master/security/apparmor/ |
H A D | apparmorfs.c | 627 struct path_cond cond = { }; local 629 tmp = *(aa_lookup_fperms(rules->file, state, &cond)); 2357 #define PERMS32STR "allow deny subtree cond kill complain prompt audit quiet hide xindex tag label"
|
H A D | domain.c | 133 struct path_cond cond = { }; local 158 *perms = *(aa_lookup_fperms(rules->file, state, &cond)); 196 struct path_cond cond = { }; local 213 tmp = *(aa_lookup_fperms(rules->file, state, &cond)); 222 tmp = *(aa_lookup_fperms(rules->file, state, &cond)); 634 char *buffer, struct path_cond *cond, 675 state = aa_str_perms(rules->file, state, name, cond, &perms); 724 cond->uid, info, error); 736 char *buffer, struct path_cond *cond, 774 state = aa_str_perms(rules->file, state, xname, cond, 631 profile_transition(const struct cred *subj_cred, struct aa_profile *profile, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) argument 733 profile_onexec(const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) argument 809 handle_onexec(const struct cred *subj_cred, struct aa_label *label, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *unsafe) argument 885 struct path_cond cond = { local [all...] |
H A D | file.c | 163 const char **name, struct path_cond *cond, u32 request) 175 NULL, NULL, cond->uid, info, error)); 187 * @cond: conditions to consider (NOT NULL) 194 aa_state_t state, struct path_cond *cond) 201 if (uid_eq(current_fsuid(), cond->uid)) 212 * @cond: conditions to consider for permission set computation (NOT NULL) 218 const char *name, struct path_cond *cond, 223 *perms = *(aa_lookup_fperms(file_rules, state, cond)); 230 u32 request, struct path_cond *cond, int flags, 240 name, cond, perm 160 path_name(const char *op, const struct cred *subj_cred, struct aa_label *label, const struct path *path, int flags, char *buffer, const char **name, struct path_cond *cond, u32 request) argument 193 aa_lookup_fperms(struct aa_policydb *file_rules, aa_state_t state, struct path_cond *cond) argument 217 aa_str_perms(struct aa_policydb *file_rules, aa_state_t start, const char *name, struct path_cond *cond, struct aa_perms *perms) argument 228 __aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument 249 profile_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument 282 aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_label *label, const struct path *path, int flags, u32 request, struct path_cond *cond) argument 326 profile_path_link(const struct cred *subj_cred, struct aa_profile *profile, const struct path *link, char *buffer, const struct path *target, char *buffer2, struct path_cond *cond) argument 439 struct path_cond cond = { local 493 struct path_cond cond = { local [all...] |
/linux-master/security/apparmor/include/ |
H A D | file.h | 81 aa_state_t state, struct path_cond *cond); 83 const char *name, struct path_cond *cond, 88 int flags, u32 request, struct path_cond *cond);
|