/lib/ |
D | iomap_copy.c | 19 void __attribute__((weak)) __iowrite32_copy(void __iomem *to, in __iowrite32_copy() argument 23 u32 __iomem *dst = to; in __iowrite32_copy() 42 void __ioread32_copy(void *to, const void __iomem *from, size_t count) in __ioread32_copy() argument 44 u32 *dst = to; in __ioread32_copy() 63 void __attribute__((weak)) __iowrite64_copy(void __iomem *to, in __iowrite64_copy() argument 68 u64 __iomem *dst = to; in __iowrite64_copy() 75 __iowrite32_copy(to, from, count * 2); in __iowrite64_copy()
|
D | Kconfig.debug | 11 messages to be added to the output of the syslog() system 15 to /dev/kmsg. This flag just specifies if the timestamp should 25 Selecting this option causes printk() to add a caller "thread id" (if 27 to every message. 30 concurrently call printk() for many times, for it is difficult to 32 line which was divided into multiple lines due to race) came from. 35 no option to enable/disable at the kernel command line parameter or 43 Default loglevel to determine what will be printed on the console. 45 Setting a default here is equivalent to passing in loglevel=<x> in 46 the kernel bootargs. loglevel=<x> continues to override whatever [all …]
|
D | usercopy.c | 8 unsigned long _copy_from_user(void *to, const void __user *from, unsigned long n) in _copy_from_user() argument 13 kasan_check_write(to, n); in _copy_from_user() 14 res = raw_copy_from_user(to, from, n); in _copy_from_user() 17 memset(to + (n - res), 0, res); in _copy_from_user() 24 unsigned long _copy_to_user(void __user *to, const void *from, unsigned long n) in _copy_to_user() argument 27 if (likely(access_ok(to, n))) { in _copy_to_user() 29 n = raw_copy_to_user(to, from, n); in _copy_to_user()
|
D | Kconfig.kgdb | 11 If you say Y here, it will be possible to remotely debug the 14 CONFIG_FRAME_POINTER to aid in producing more reliable stack 30 to break in initially. 36 This is a kgdb I/O module specifically designed to test 38 intended to for the development of new kgdb stubs 41 the tests. The most basic of this I/O module is to boot 50 to pass in a kernel parameter 53 string "KGDB: which internal kgdb tests to run" 57 This is the command string to send the kgdb test suite on 67 This will add an extra call back to kgdb for the breakpoint [all …]
|
D | parser.c | 65 args[argc].to = s + len; in match_one() 69 simple_strtol(s, &args[argc].to, 0); in match_one() 72 simple_strtoul(s, &args[argc].to, 0); in match_one() 75 simple_strtoul(s, &args[argc].to, 8); in match_one() 78 simple_strtoul(s, &args[argc].to, 16); in match_one() 80 if (args[argc].to == args[argc].from) in match_one() 86 s = args[argc].to; in match_one() 301 size_t ret = src->to - src->from; in match_strlcpy() 322 return kmemdup_nul(s->from, s->to - s->from, GFP_KERNEL); in match_strdup()
|
D | string_helpers.c | 316 unsigned char to; in escape_space() local 320 to = 'n'; in escape_space() 323 to = 'r'; in escape_space() 326 to = 't'; in escape_space() 329 to = 'v'; in escape_space() 332 to = 'f'; in escape_space() 342 *out = to; in escape_space() 352 unsigned char to; in escape_special() local 356 to = '\\'; in escape_special() 359 to = 'a'; in escape_special() [all …]
|
D | iov_iter.c | 138 static int copyout(void __user *to, const void *from, size_t n) in copyout() argument 140 if (access_ok(to, n)) { in copyout() 142 n = raw_copy_to_user(to, from, n); in copyout() 147 static int copyin(void *to, const void __user *from, size_t n) in copyin() argument 150 kasan_check_write(to, n); in copyin() 151 n = raw_copy_from_user(to, from, n); in copyin() 246 void *kaddr, *to; in copy_page_from_iter_iovec() local 263 to = kaddr + offset; in copy_page_from_iter_iovec() 266 left = copyin(to, buf, copy); in copy_page_from_iter_iovec() 269 to += copy; in copy_page_from_iter_iovec() [all …]
|
D | Kconfig.ubsan | 9 Compile-time instrumentation is used to detect various undefined 19 # We build with -Wno-maybe-uninitilzed, but we still want to 21 # So dependsy bellow used to disable this option in allmodconfig 26 If you don't enable this option, you have to explicitly specify 27 UBSAN_SANITIZE := y for the files/directories you want to check for UB.
|
D | Kconfig.kasan | 2 # This config refers to the generic KASAN mode. 22 designed to find out-of-bounds accesses and use-after-free bugs. 30 KASAN has two modes: generic KASAN (similar to userspace ASan, 33 tagging, arm64 only, similar to userspace HWASan, enabled with 73 This mode may potentially introduce problems relating to pointer 114 Disabling asan-stack makes it safe to run kernels build 118 to avoid cluttering the output in stack overflow warnings, 120 CONFIG_COMPILE_TEST. On gcc it is assumed to always be safe 121 to use and enabled by default. 134 to 3TB of RAM with KASan enabled). This options allows to force
|
D | Kconfig | 34 Drivers may use these helpers to match the bit indices as described 121 kernel tree needs to calculate CRC checks for use with the 146 This option enables the CRC32 library functions to perform a 156 This option allows a kernel builder to override the default choice 165 Most modern processors have enough cache to hold this table without 169 you have a good reason not to. 237 when they need to do cyclic redundancy check according CRC8 260 This option enables the 32 bit PRNG library functions to perform a 365 Drivers may select this option to force specific constant 371 improving encoding and decoding performance up to 2x for [all …]
|
D | kfifo.c | 236 static unsigned long kfifo_copy_to_user(struct __kfifo *fifo, void __user *to, in kfifo_copy_to_user() argument 252 ret = copy_to_user(to, fifo->data + off, l); in kfifo_copy_to_user() 256 ret = copy_to_user(to + l, fifo->data, len - l); in kfifo_copy_to_user() 270 int __kfifo_to_user(struct __kfifo *fifo, void __user *to, in __kfifo_to_user() argument 284 ret = kfifo_copy_to_user(fifo, to, len, fifo->out, copied); in __kfifo_to_user() 523 int __kfifo_to_user_r(struct __kfifo *fifo, void __user *to, in __kfifo_to_user_r() argument 538 ret = kfifo_copy_to_user(fifo, to, len, fifo->out + recsize, copied); in __kfifo_to_user_r()
|
D | assoc_array.c | 465 edit->set[0].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_in_empty_tree() 613 edit->set[0].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_into_terminal_node() 750 edit->set[0].to = assoc_array_shortcut_to_ptr(new_s0); in assoc_array_insert_into_terminal_node() 857 edit->set[0].to = assoc_array_shortcut_to_ptr(new_s0); in assoc_array_insert_mid_shortcut() 874 edit->set[0].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_mid_shortcut() 919 edit->set[1].to = assoc_array_shortcut_to_ptr(new_s1); in assoc_array_insert_mid_shortcut() 930 edit->set_parent_slot[0].to = sc_slot; in assoc_array_insert_mid_shortcut() 932 edit->set[1].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_mid_shortcut() 1133 edit->set[0].to = NULL; in assoc_array_delete() 1141 edit->set[1].to = NULL; in assoc_array_delete() [all …]
|
/lib/vdso/ |
D | Kconfig | 12 Each architecture that enables this feature has to 19 This config option helps to avoid possible performance issues
|
/lib/xz/ |
D | Kconfig | 53 This allows passing .xz files to the in-kernel XZ decoder via 55 data and writes diagnostics to the system log.
|
/lib/fonts/ |
D | Kconfig | 15 Say Y here if you would like to use fonts other than the default 18 Note that the answer to this question won't directly affect the 19 kernel: saying N will just cause the configurator to skip all 88 embedded devices with a 320x240 screen, to get a reasonable number
|
/lib/raid6/ |
D | altivec.uc | 36 * This is the C data type to use. We use a vector of 68 /* This is noinline to make damned sure that gcc doesn't move any of the
|
D | vpermxor.uc | 16 * vpermxor$#.c makes use of the vpermxor instruction to optimise the RAID6 Q
|
D | int.uc | 24 * This is the C data type to use
|