Home
last modified time | relevance | path

Searched refs:e (Results 1 – 13 of 13) sorted by relevance

/kernel/trace/
Dtrace_events_filter_test.h11 TP_PROTO(int a, int b, int c, int d, int e, int f, int g, int h),
13 TP_ARGS(a, b, c, d, e, f, g, h),
20 __field(int, e)
31 __entry->e = e;
39 __entry->e, __entry->f, __entry->g, __entry->h)
Dtrace_output.c814 struct trace_event *e; local
826 list_for_each_entry(e, &ftrace_event_list, list) {
827 if (e->type != last + 1)
836 *list = &e->list;
DKconfig254 ftrace interface, e.g.:
400 Tracing also is possible using the ftrace interface, e.g.:
536 However, it should be safe to use on e.g. unused portion of VRAM.
Dtrace_events_filter.c2133 .e = ve, .f = vf, .g = vg, .h = vh }, \
/kernel/
Dtracepoint.c200 struct tracepoint_entry *e; in get_tracepoint() local
204 hlist_for_each_entry(e, head, hlist) { in get_tracepoint()
205 if (!strcmp(name, e->name)) in get_tracepoint()
206 return e; in get_tracepoint()
218 struct tracepoint_entry *e; in add_tracepoint() local
223 hlist_for_each_entry(e, head, hlist) { in add_tracepoint()
224 if (!strcmp(name, e->name)) { in add_tracepoint()
234 e = kmalloc(sizeof(struct tracepoint_entry) + name_len, GFP_KERNEL); in add_tracepoint()
235 if (!e) in add_tracepoint()
237 memcpy(&e->name[0], name, name_len); in add_tracepoint()
[all …]
Dauditfilter.c70 static inline void audit_free_rule(struct audit_entry *e) in audit_free_rule() argument
73 struct audit_krule *erule = &e->rule; in audit_free_rule()
86 kfree(e); in audit_free_rule()
91 struct audit_entry *e = container_of(head, struct audit_entry, rcu); in audit_free_rule_rcu() local
92 audit_free_rule(e); in audit_free_rule_rcu()
800 struct audit_entry *e, *found = NULL; in audit_find_rule() local
811 list_for_each_entry(e, list, list) in audit_find_rule()
812 if (!audit_compare_rule(&entry->rule, &e->rule)) { in audit_find_rule()
813 found = e; in audit_find_rule()
822 list_for_each_entry(e, list, list) in audit_find_rule()
[all …]
Dextable.c53 const struct exception_table_entry *e; in search_exception_tables() local
55 e = search_extable(__start___ex_table, __stop___ex_table-1, addr); in search_exception_tables()
56 if (!e) in search_exception_tables()
57 e = search_module_extables(addr); in search_exception_tables()
58 return e; in search_exception_tables()
Daudit_watch.c339 struct audit_entry *e; in audit_remove_parent_watches() local
344 e = container_of(r, struct audit_entry, rule); in audit_remove_parent_watches()
348 list_del_rcu(&e->list); in audit_remove_parent_watches()
349 call_rcu(&e->rcu, audit_free_rule_rcu); in audit_remove_parent_watches()
Dauditsc.c721 struct audit_entry *e; in audit_filter_task() local
725 list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TASK], list) { in audit_filter_task()
726 if (audit_filter_rules(tsk, &e->rule, NULL, NULL, in audit_filter_task()
729 *key = kstrdup(e->rule.filterkey, GFP_ATOMIC); in audit_filter_task()
747 struct audit_entry *e; in audit_filter_syscall() local
758 list_for_each_entry_rcu(e, list, list) { in audit_filter_syscall()
759 if ((e->rule.mask[word] & bit) == bit && in audit_filter_syscall()
760 audit_filter_rules(tsk, &e->rule, ctx, NULL, in audit_filter_syscall()
782 struct audit_entry *e; in audit_filter_inode_name() local
791 list_for_each_entry_rcu(e, list, list) { in audit_filter_inode_name()
[all …]
Dmodule.c3709 const struct exception_table_entry *e = NULL; in search_module_extables() local
3719 e = search_extable(mod->extable, in search_module_extables()
3722 if (e) in search_module_extables()
3729 return e; in search_module_extables()
/kernel/gcov/
DKconfig9 This option enables gcov-based code profiling (e.g. for code coverage
19 For a single file (e.g. main.o):
/kernel/debug/kdb/
Dkdb_main.c206 char *e = *ep++; in kdbgetenv() local
208 if (!e) in kdbgetenv()
211 if ((strncmp(match, e, matchlen) == 0) in kdbgetenv()
212 && ((e[matchlen] == '\0') in kdbgetenv()
213 || (e[matchlen] == '='))) { in kdbgetenv()
214 char *cp = strchr(e, '='); in kdbgetenv()
/kernel/power/
DKconfig8 suspend-to-RAM state (e.g. the ACPI S3 state).
232 notification of APM "events" (e.g. battery status change).