CallerName | Describe |
xa_node_free | |
__percpu_ref_switch_to_atomic | |
rhashtable_rehash_table | |
assoc_array_apply_edit | assoc_array_apply_edit - Apply an edit script to an associative array*@edit: The script to apply.* Apply an edit script to an associative array to effect an insertion,* deletion or clearance. As the edit script includes preallocated memory, |
put_task_struct_rcu_user | |
queue_rcu_work | queue_rcu_work - queue work after a RCU grace period*@wq: workqueue to use*@rwork: work to queue* Return: %false if @rwork was already pending, %true otherwise |
put_unbound_pool | put_unbound_pool - put a worker_pool*@pool: worker_pool to put* Put @pool |
pwq_unbound_release_workfn | Scheduled on system_wq by put_pwq() when an unbound pwq hits zero refcnt* and needs to be destroyed. |
destroy_workqueue | destroy_workqueue - safely terminate a workqueue*@wq: target workqueue* Safely destroy a workqueue. All work currently pending will be done first. |
free_pid | |
__put_cred | __put_cred - Destroy a set of credentials*@cred: The record to release* Destroy a set of credentials on which no references remain. |
rq_attach_root | |
sched_put_rd | |
destroy_sched_domains | |
call_rcu_zapped | Schedule an RCU callback if no RCU callback is pending. Must be called with* the graph lock held. |
rcu_sync_call | |
rcu_torture_deferred_free | |
rcu_torture_boost | |
release_posix_timer | |
destroy_pid_namespace | |
auditd_set | auditd_set - Set/Reset the auditd connection state*@pid: auditd PID*@portid: auditd netlink portid*@net: auditd network namespace pointer* Description:* This function will obtain and drop network namespace references as* necessary |
auditd_reset | auditd_reset - Disconnect the auditd connection*@ac: auditd connection state* Description:* Break the auditd/kauditd connection and move all the queued records into the* hold queue in case auditd reconnects |
audit_del_rule | Remove an existing rule from filterlist. |
update_lsm_rule | |
audit_update_watch | Update inode info in audit rules based on filesystem event. |
audit_remove_parent_watches | Remove all watches & rules associated with a parent that is going away. |
audit_mark_put_chunk | Drop reference to the chunk that was held by the mark. This is the reference* that gets dropped after we've removed the chunk from the hash table and we* use it to make sure chunk cannot be freed before RCU grace period expires. |
kill_rules | |
release_early_probes | |
release_probes | |
__bpf_prog_put_noref | |
free_htab_elem | |
bpf_event_entry_free_rcu | |
bpf_cgroup_storage_free | |
btf_put | |
dev_map_delete_elem | |
dev_map_hash_delete_elem | |
__dev_map_update_elem | |
__dev_map_hash_update_elem | |
dev_map_hash_remove_netdev | |
dev_map_notification | |
__cpu_map_entry_replace | After xchg pointer to bpf_cpu_map_entry, use the call_rcu() to* ensure any driver rcu critical sections have completed, but this* does not guarantee a flush has happened yet. Because driver side* rcu_read_lock/unlock only protects the running XDP program |
put_ctx | |
_free_event | |
ring_buffer_put | |
release_callchain_buffers | |
slab_destroy | slab_destroy - destroy and release all objects in a slab*@cachep: cache pointer being destroyed*@page: page pointer being destroyed* Destroy all the objs in a slab page, and release the mem back to the system. |
free_slab | |
memcg_expand_one_shrinker_map | |
put_object | Decrement the object use_count. Once the count is 0, free the object using* an RCU callback. Since put_object() may be called via the kmemleak_free() ->* delete_object() path, the delayed RCU freeing ensures that there is no |
newseg | wseg - Create a new shared memory segment*@ns: namespace*@params: ptr to the structure that contains key, size and shmflg* Called with shm_ids.rwsem held as a writer. |
ioc_destroy_icq | Release an icq. Called with ioc locked for blk-mq, and with both ioc* and queue locked for legacy. |
blk_stat_free_callback | |
blkg_release | A group is RCU protected, but having an rcu lock does not mean that one* can access all the fields of blkg and assume these are valid |
request_key_auth_destroy | Destroy an instantiation authorisation token key. |
user_update | pdate a user defined key* - the key's semaphore is write-locked |
user_revoke | dispose of the links from a revoked keyring* - called with the key sem write-locked |
trusted_update | rusted_update - reseal an existing key with new PCR values |
encrypted_update | rypted_update - update the master key description* Change the master key description for an existing encrypted key.* The next read will return an encrypted datablob using the new* master key description.* On success, return 0. Otherwise return errno. |
security_inode_free | |
avc_node_delete | |
avc_node_replace | |
aa_label_kref | |
release_ruleset | |
__put_super | Drop a superblock's refcount. The caller must hold sb_lock. |
fasync_remove_entry | Remove a fasync entry. If successfully removed, return* positive and clear the FASYNC flag. If no entry exists,* do nothing and return 0.* NOTE! It is very important that the FASYNC flag always* match the state "is the filp on a fasync list". |
dentry_free | |
destroy_inode | |
expand_fdtable | Expand the file descriptor table.* This function will allocate a new fdtable and both fd array and fdset, of* the given size.* Return <0 error code on error; 1 on successful completion. |
cleanup_mnt | |
ep_remove | Removes a "struct epitem" from the eventpoll RB tree and deallocates* all the associated resources. Must be called with "mtx" held. |
radix_tree_node_free | |