Caller| Name | Describe | 
|---|
| xa_node_free |  | 
| __percpu_ref_switch_to_atomic |  | 
| rhashtable_rehash_table |  | 
| assoc_array_apply_edit | assoc_array_apply_edit - Apply an edit script to an associative array*@edit: The script to apply.* Apply an edit script to an associative array to effect an insertion,* deletion or clearance. As the edit script includes preallocated memory, | 
| put_task_struct_rcu_user |  | 
| queue_rcu_work | queue_rcu_work - queue work after a RCU grace period*@wq: workqueue to use*@rwork: work to queue* Return: %false if @rwork was already pending, %true otherwise | 
| put_unbound_pool | put_unbound_pool - put a worker_pool*@pool: worker_pool to put* Put @pool | 
| pwq_unbound_release_workfn | Scheduled on system_wq by put_pwq() when an unbound pwq hits zero refcnt* and needs to be destroyed. | 
| destroy_workqueue | destroy_workqueue - safely terminate a workqueue*@wq: target workqueue* Safely destroy a workqueue. All work currently pending will be done first. | 
| free_pid |  | 
| __put_cred | __put_cred - Destroy a set of credentials*@cred: The record to release* Destroy a set of credentials on which no references remain. | 
| rq_attach_root |  | 
| sched_put_rd |  | 
| destroy_sched_domains |  | 
| call_rcu_zapped | Schedule an RCU callback if no RCU callback is pending. Must be called with* the graph lock held. | 
| rcu_sync_call |  | 
| rcu_torture_deferred_free |  | 
| rcu_torture_boost |  | 
| release_posix_timer |  | 
| destroy_pid_namespace |  | 
| auditd_set | auditd_set - Set/Reset the auditd connection state*@pid: auditd PID*@portid: auditd netlink portid*@net: auditd network namespace pointer* Description:* This function will obtain and drop network namespace references as* necessary | 
| auditd_reset | auditd_reset - Disconnect the auditd connection*@ac: auditd connection state* Description:* Break the auditd/kauditd connection and move all the queued records into the* hold queue in case auditd reconnects | 
| audit_del_rule | Remove an existing rule from filterlist. | 
| update_lsm_rule |  | 
| audit_update_watch | Update inode info in audit rules based on filesystem event. | 
| audit_remove_parent_watches | Remove all watches & rules associated with a parent that is going away. | 
| audit_mark_put_chunk | Drop reference to the chunk that was held by the mark. This is the reference* that gets dropped after we've removed the chunk from the hash table and we* use it to make sure chunk cannot be freed before RCU grace period expires. | 
| kill_rules |  | 
| release_early_probes |  | 
| release_probes |  | 
| __bpf_prog_put_noref |  | 
| free_htab_elem |  | 
| bpf_event_entry_free_rcu |  | 
| bpf_cgroup_storage_free |  | 
| btf_put |  | 
| dev_map_delete_elem |  | 
| dev_map_hash_delete_elem |  | 
| __dev_map_update_elem |  | 
| __dev_map_hash_update_elem |  | 
| dev_map_hash_remove_netdev |  | 
| dev_map_notification |  | 
| __cpu_map_entry_replace | After xchg pointer to bpf_cpu_map_entry, use the call_rcu() to* ensure any driver rcu critical sections have completed, but this* does not guarantee a flush has happened yet. Because driver side* rcu_read_lock/unlock only protects the running XDP program | 
| put_ctx |  | 
| _free_event |  | 
| ring_buffer_put |  | 
| release_callchain_buffers |  | 
| slab_destroy | slab_destroy - destroy and release all objects in a slab*@cachep: cache pointer being destroyed*@page: page pointer being destroyed* Destroy all the objs in a slab page, and release the mem back to the system. | 
| free_slab |  | 
| memcg_expand_one_shrinker_map |  | 
| put_object | Decrement the object use_count. Once the count is 0, free the object using* an RCU callback. Since put_object() may be called via the kmemleak_free() ->* delete_object() path, the delayed RCU freeing ensures that there is no | 
| newseg | wseg - Create a new shared memory segment*@ns: namespace*@params: ptr to the structure that contains key, size and shmflg* Called with shm_ids.rwsem held as a writer. | 
| ioc_destroy_icq | Release an icq. Called with ioc locked for blk-mq, and with both ioc* and queue locked for legacy. | 
| blk_stat_free_callback |  | 
| blkg_release | A group is RCU protected, but having an rcu lock does not mean that one* can access all the fields of blkg and assume these are valid | 
| request_key_auth_destroy | Destroy an instantiation authorisation token key. | 
| user_update | pdate a user defined key* - the key's semaphore is write-locked | 
| user_revoke | dispose of the links from a revoked keyring* - called with the key sem write-locked | 
| trusted_update | rusted_update - reseal an existing key with new PCR values | 
| encrypted_update | rypted_update - update the master key description* Change the master key description for an existing encrypted key.* The next read will return an encrypted datablob using the new* master key description.* On success, return 0. Otherwise return errno. | 
| security_inode_free |  | 
| avc_node_delete |  | 
| avc_node_replace |  | 
| aa_label_kref |  | 
| release_ruleset |  | 
| __put_super | Drop a superblock's refcount. The caller must hold sb_lock. | 
| fasync_remove_entry | Remove a fasync entry. If successfully removed, return* positive and clear the FASYNC flag. If no entry exists,* do nothing and return 0.* NOTE! It is very important that the FASYNC flag always* match the state "is the filp on a fasync list". | 
| dentry_free |  | 
| destroy_inode |  | 
| expand_fdtable | Expand the file descriptor table.* This function will allocate a new fdtable and both fd array and fdset, of* the given size.* Return <0 error code on error; 1 on successful completion. | 
| cleanup_mnt |  | 
| ep_remove | Removes a "struct epitem" from the eventpoll RB tree and deallocates* all the associated resources. Must be called with "mtx" held. | 
| radix_tree_node_free |  |