/kernel/trace/ |
D | trace_events_filter_test.h | 11 TP_PROTO(int a, int b, int c, int d, int e, int f, int g, int h), 13 TP_ARGS(a, b, c, d, e, f, g, h), 20 __field(int, e) 31 __entry->e = e; 39 __entry->e, __entry->f, __entry->g, __entry->h)
|
D | trace_output.c | 814 struct trace_event *e; local 826 list_for_each_entry(e, &ftrace_event_list, list) { 827 if (e->type != last + 1) 836 *list = &e->list;
|
D | Kconfig | 254 ftrace interface, e.g.: 400 Tracing also is possible using the ftrace interface, e.g.: 536 However, it should be safe to use on e.g. unused portion of VRAM.
|
D | trace_events_filter.c | 2133 .e = ve, .f = vf, .g = vg, .h = vh }, \
|
/kernel/ |
D | tracepoint.c | 200 struct tracepoint_entry *e; in get_tracepoint() local 204 hlist_for_each_entry(e, head, hlist) { in get_tracepoint() 205 if (!strcmp(name, e->name)) in get_tracepoint() 206 return e; in get_tracepoint() 218 struct tracepoint_entry *e; in add_tracepoint() local 223 hlist_for_each_entry(e, head, hlist) { in add_tracepoint() 224 if (!strcmp(name, e->name)) { in add_tracepoint() 234 e = kmalloc(sizeof(struct tracepoint_entry) + name_len, GFP_KERNEL); in add_tracepoint() 235 if (!e) in add_tracepoint() 237 memcpy(&e->name[0], name, name_len); in add_tracepoint() [all …]
|
D | auditfilter.c | 70 static inline void audit_free_rule(struct audit_entry *e) in audit_free_rule() argument 73 struct audit_krule *erule = &e->rule; in audit_free_rule() 86 kfree(e); in audit_free_rule() 91 struct audit_entry *e = container_of(head, struct audit_entry, rcu); in audit_free_rule_rcu() local 92 audit_free_rule(e); in audit_free_rule_rcu() 800 struct audit_entry *e, *found = NULL; in audit_find_rule() local 811 list_for_each_entry(e, list, list) in audit_find_rule() 812 if (!audit_compare_rule(&entry->rule, &e->rule)) { in audit_find_rule() 813 found = e; in audit_find_rule() 822 list_for_each_entry(e, list, list) in audit_find_rule() [all …]
|
D | extable.c | 53 const struct exception_table_entry *e; in search_exception_tables() local 55 e = search_extable(__start___ex_table, __stop___ex_table-1, addr); in search_exception_tables() 56 if (!e) in search_exception_tables() 57 e = search_module_extables(addr); in search_exception_tables() 58 return e; in search_exception_tables()
|
D | audit_watch.c | 339 struct audit_entry *e; in audit_remove_parent_watches() local 344 e = container_of(r, struct audit_entry, rule); in audit_remove_parent_watches() 348 list_del_rcu(&e->list); in audit_remove_parent_watches() 349 call_rcu(&e->rcu, audit_free_rule_rcu); in audit_remove_parent_watches()
|
D | auditsc.c | 721 struct audit_entry *e; in audit_filter_task() local 725 list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TASK], list) { in audit_filter_task() 726 if (audit_filter_rules(tsk, &e->rule, NULL, NULL, in audit_filter_task() 729 *key = kstrdup(e->rule.filterkey, GFP_ATOMIC); in audit_filter_task() 747 struct audit_entry *e; in audit_filter_syscall() local 758 list_for_each_entry_rcu(e, list, list) { in audit_filter_syscall() 759 if ((e->rule.mask[word] & bit) == bit && in audit_filter_syscall() 760 audit_filter_rules(tsk, &e->rule, ctx, NULL, in audit_filter_syscall() 782 struct audit_entry *e; in audit_filter_inode_name() local 791 list_for_each_entry_rcu(e, list, list) { in audit_filter_inode_name() [all …]
|
D | module.c | 3709 const struct exception_table_entry *e = NULL; in search_module_extables() local 3719 e = search_extable(mod->extable, in search_module_extables() 3722 if (e) in search_module_extables() 3729 return e; in search_module_extables()
|
/kernel/gcov/ |
D | Kconfig | 9 This option enables gcov-based code profiling (e.g. for code coverage 19 For a single file (e.g. main.o):
|
/kernel/debug/kdb/ |
D | kdb_main.c | 206 char *e = *ep++; in kdbgetenv() local 208 if (!e) in kdbgetenv() 211 if ((strncmp(match, e, matchlen) == 0) in kdbgetenv() 212 && ((e[matchlen] == '\0') in kdbgetenv() 213 || (e[matchlen] == '='))) { in kdbgetenv() 214 char *cp = strchr(e, '='); in kdbgetenv()
|
/kernel/power/ |
D | Kconfig | 8 suspend-to-RAM state (e.g. the ACPI S3 state). 232 notification of APM "events" (e.g. battery status change).
|