Searched refs:modp (Results 1 – 7 of 7) sorted by relevance
/openbmc/linux/arch/x86/kernel/ |
H A D | nmi.c | 618 char *modp; in nmi_backtrace_stall_check() local 625 modp = ""; in nmi_backtrace_stall_check() 638 modp = ", but OK because ignore_nmis was set"; in nmi_backtrace_stall_check() 645 __func__, cpu, msgp, modp, msghp, j - READ_ONCE(nsp->recv_jiffies)); in nmi_backtrace_stall_check()
|
/openbmc/linux/arch/x86/kernel/cpu/sgx/ |
H A D | ioctl.c | 743 struct sgx_enclave_restrict_permissions *modp) in sgx_enclave_restrict_permissions() argument 753 secinfo.flags = modp->permissions & SGX_SECINFO_PERMISSION_MASK; in sgx_enclave_restrict_permissions() 755 for (c = 0 ; c < modp->length; c += PAGE_SIZE) { in sgx_enclave_restrict_permissions() 756 addr = encl->base + modp->offset + c; in sgx_enclave_restrict_permissions() 804 modp->result = ret; in sgx_enclave_restrict_permissions() 824 modp->count = c; in sgx_enclave_restrict_permissions()
|
/openbmc/linux/tools/perf/util/ |
H A D | trace-event.h | 28 unsigned long long *addrp, char **modp);
|
H A D | machine.h | 290 char *machine__resolve_kernel_addr(void *vmachine, unsigned long long *addrp, char **modp);
|
H A D | machine.c | 3378 char *machine__resolve_kernel_addr(void *vmachine, unsigned long long *addrp, char **modp) in machine__resolve_kernel_addr() argument 3387 *modp = __map__is_kmodule(map) ? (char *)map__dso(map)->short_name : NULL; in machine__resolve_kernel_addr()
|
/openbmc/linux/tools/perf/ |
H A D | builtin-kwork.c | 1040 char *modp = NULL; in workqueue_work_init() local 1048 machine__resolve_kernel_addr(machine, &function_addr, &modp); in workqueue_work_init()
|
H A D | builtin-trace.c | 1634 …c char *trace__machine__resolve_kernel_addr(void *vmachine, unsigned long long *addrp, char **modp) in trace__machine__resolve_kernel_addr() argument 1649 return machine__resolve_kernel_addr(vmachine, addrp, modp); in trace__machine__resolve_kernel_addr()
|