forked from Qortal/Brooklyn
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
61 lines
1.1 KiB
C
61 lines
1.1 KiB
C
#undef TRACE_SYSTEM
|
|
#define TRACE_SYSTEM gpio
|
|
|
|
#ifndef CONFIG_TRACING_EVENTS_GPIO
|
|
#define NOTRACE
|
|
#endif
|
|
|
|
#if !defined(_TRACE_GPIO_H) || defined(TRACE_HEADER_MULTI_READ)
|
|
#define _TRACE_GPIO_H
|
|
|
|
#include <linux/tracepoint.h>
|
|
|
|
TRACE_EVENT(gpio_direction,
|
|
|
|
TP_PROTO(unsigned gpio, int in, int err),
|
|
|
|
TP_ARGS(gpio, in, err),
|
|
|
|
TP_STRUCT__entry(
|
|
__field(unsigned, gpio)
|
|
__field(int, in)
|
|
__field(int, err)
|
|
),
|
|
|
|
TP_fast_assign(
|
|
__entry->gpio = gpio;
|
|
__entry->in = in;
|
|
__entry->err = err;
|
|
),
|
|
|
|
TP_printk("%u %3s (%d)", __entry->gpio,
|
|
__entry->in ? "in" : "out", __entry->err)
|
|
);
|
|
|
|
TRACE_EVENT(gpio_value,
|
|
|
|
TP_PROTO(unsigned gpio, int get, int value),
|
|
|
|
TP_ARGS(gpio, get, value),
|
|
|
|
TP_STRUCT__entry(
|
|
__field(unsigned, gpio)
|
|
__field(int, get)
|
|
__field(int, value)
|
|
),
|
|
|
|
TP_fast_assign(
|
|
__entry->gpio = gpio;
|
|
__entry->get = get;
|
|
__entry->value = value;
|
|
),
|
|
|
|
TP_printk("%u %3s %d", __entry->gpio,
|
|
__entry->get ? "get" : "set", __entry->value)
|
|
);
|
|
|
|
#endif /* if !defined(_TRACE_GPIO_H) || defined(TRACE_HEADER_MULTI_READ) */
|
|
|
|
/* This part must be outside protection */
|
|
#include <trace/define_trace.h>
|