/lib/ |
D | Kconfig.kgdb | 7 # function to enable gdb stub to address XML packet sent from GDB. 16 If you say Y here, it will be possible to remotely debug the 19 CONFIG_FRAME_POINTER to aid in producing more reliable stack 28 bool "KGDB: use kprobe blocklist to prohibit unsafe breakpoints" 34 If set to Y the debug core will use the kprobe blocklist to 35 identify symbols where it is unsafe to set breakpoints. 38 difficult to inadvertently provoke recursive trap handling. 50 to break in initially. 56 This is a kgdb I/O module specifically designed to test 58 intended to for the development of new kgdb stubs [all …]
|
D | usercopy.c | 11 unsigned long _copy_from_user(void *to, const void __user *from, unsigned long n) in _copy_from_user() argument 22 instrument_copy_from_user(to, from, n); in _copy_from_user() 23 res = raw_copy_from_user(to, from, n); in _copy_from_user() 26 memset(to + (n - res), 0, res); in _copy_from_user() 33 unsigned long _copy_to_user(void __user *to, const void *from, unsigned long n) in _copy_to_user() argument 38 if (likely(access_ok(to, n))) { in _copy_to_user() 39 instrument_copy_to_user(to, from, n); in _copy_to_user() 40 n = raw_copy_to_user(to, from, n); in _copy_to_user()
|
D | iomap_copy.c | 19 void __attribute__((weak)) __iowrite32_copy(void __iomem *to, in __iowrite32_copy() argument 23 u32 __iomem *dst = to; in __iowrite32_copy() 42 void __ioread32_copy(void *to, const void __iomem *from, size_t count) in __ioread32_copy() argument 44 u32 *dst = to; in __ioread32_copy() 63 void __attribute__((weak)) __iowrite64_copy(void __iomem *to, in __iowrite64_copy() argument 68 u64 __iomem *dst = to; in __iowrite64_copy() 75 __iowrite32_copy(to, from, count * 2); in __iowrite64_copy()
|
D | Kconfig.kcsan | 32 KCSAN uses a watchpoint-based sampling approach to detect races. 34 While KCSAN's primary purpose is to detect data races, it 35 also provides assertions to check data access constraints. 48 differently (++, --, +=, -=, |=, &=, etc.), which allows KCSAN to 62 generated from any one of them, system stability may suffer due to 69 Run KCSAN selftests on boot. On test failure, causes the kernel to 70 panic. Recommended to be enabled, ensuring critical functionality 80 various race scenarios, and verifies the reports generated to 84 Each test case may run at least up to KCSAN_REPORT_ONCE_IN_MS 86 kernel and KCSAN test with KCSAN_REPORT_ONCE_IN_MS set to a lower [all …]
|
D | Kconfig.kfence | 14 to have negligible cost to permit enabling it in production 22 afford to use KASAN, continue using KASAN, for example in test 24 enable KASAN due to its cost, consider using KFENCE. 36 Set this to 0 to disable KFENCE by default, in which case only 37 setting "kfence.sample_interval" to a non-zero value enables KFENCE. 49 bool "Use static keys to set up allocations" if EXPERT 52 Use static keys (static branches) to set up KFENCE allocations. This 56 Using static keys comes with trade-offs that need to be carefully 59 and impact of which is much harder to predict than a dynamic branch. 67 The inverse probability with which to randomly protect KFENCE object [all …]
|
D | Kconfig.debug | 11 messages to be added to the output of the syslog() system 15 to /dev/kmsg. This flag just specifies if the timestamp should 25 Selecting this option causes printk() to add a caller "thread id" (if 27 to every message. 30 concurrently call printk() for many times, for it is difficult to 32 line which was divided into multiple lines due to race) came from. 35 no option to enable/disable at the kernel command line parameter or 54 Default loglevel to determine what will be printed on the console. 56 Setting a default here is equivalent to passing in loglevel=<x> in 57 the kernel bootargs. loglevel=<x> continues to override whatever [all …]
|
D | parser.c | 66 args[argc].to = s + len; in match_one() 70 simple_strtol(s, &args[argc].to, 0); in match_one() 73 simple_strtoul(s, &args[argc].to, 0); in match_one() 76 simple_strtoul(s, &args[argc].to, 8); in match_one() 79 simple_strtoul(s, &args[argc].to, 16); in match_one() 81 if (args[argc].to == args[argc].from) in match_one() 87 s = args[argc].to; in match_one() 336 size_t ret = src->to - src->from; in match_strlcpy() 360 return kmemdup_nul(s->from, s->to - s->from, GFP_KERNEL); in match_strdup()
|
D | string_helpers.c | 316 unsigned char to; in escape_space() local 320 to = 'n'; in escape_space() 323 to = 'r'; in escape_space() 326 to = 't'; in escape_space() 329 to = 'v'; in escape_space() 332 to = 'f'; in escape_space() 342 *out = to; in escape_space() 352 unsigned char to; in escape_special() local 356 to = '\\'; in escape_special() 359 to = 'a'; in escape_special() [all …]
|
D | Kconfig.kasan | 3 # This config refers to the generic KASAN mode. 44 error detector designed to find out-of-bounds and use-after-free bugs. 59 CONFIG_KASAN_GENERIC, similar to userspace ASan), 61 tagging, enabled with CONFIG_KASAN_SW_TAGS, similar to userspace 101 May potentially introduce problems related to pointer casting and 120 May potentially introduce problems related to pointer casting and 153 Disables stack instrumentation and thus KASAN's ability to detect 160 This option is always disabled when compile-testing with Clang to 163 With GCC, enabling stack instrumentation is assumed to be safe. 171 bool "Check accesses to vmalloc allocations" [all …]
|
D | Kconfig | 37 Drivers may use these helpers to match the bit indices as described 113 This is selected by other options/architectures to provide the 120 If INDIRECT_IOMEM is selected, this enables falling back to plain 151 kernel tree needs to calculate CRC checks for use with the 176 This option enables the CRC32 library functions to perform a 186 This option allows a kernel builder to override the default choice 195 Most modern processors have enough cache to hold this table without 199 you have a good reason not to. 267 when they need to do cyclic redundancy check according CRC8 290 This option enables the 32 bit PRNG library functions to perform a [all …]
|
D | Kconfig.ubsan | 9 Compile-time instrumentation is used to detect various undefined 20 Building kernels with Sanitizer features enabled tends to grow 21 the kernel size by around 5%, due to adding all the debugging 55 to the {str,mem}*cpy() family of functions (that is addressed 82 Enabling this option detects errors due to accesses through a 93 operations that overflow to the left or go switch to negative 113 flow reaching an expected-to-be-unreachable position. 147 If you don't enable this option, you have to explicitly specify 148 UBSAN_SANITIZE := y for the files/directories you want to check for UB.
|
D | iov_iter.c | 151 static int copyout(void __user *to, const void *from, size_t n) in copyout() argument 155 if (access_ok(to, n)) { in copyout() 156 instrument_copy_to_user(to, from, n); in copyout() 157 n = raw_copy_to_user(to, from, n); in copyout() 162 static int copyin(void *to, const void __user *from, size_t n) in copyin() argument 167 instrument_copy_from_user(to, from, n); in copyin() 168 n = raw_copy_from_user(to, from, n); in copyin() 263 void *kaddr, *to; in copy_page_from_iter_iovec() local 280 to = kaddr + offset; in copy_page_from_iter_iovec() 283 left = copyin(to, buf, copy); in copy_page_from_iter_iovec() [all …]
|
D | kfifo.c | 236 static unsigned long kfifo_copy_to_user(struct __kfifo *fifo, void __user *to, in kfifo_copy_to_user() argument 252 ret = copy_to_user(to, fifo->data + off, l); in kfifo_copy_to_user() 256 ret = copy_to_user(to + l, fifo->data, len - l); in kfifo_copy_to_user() 270 int __kfifo_to_user(struct __kfifo *fifo, void __user *to, in __kfifo_to_user() argument 284 ret = kfifo_copy_to_user(fifo, to, len, fifo->out, copied); in __kfifo_to_user() 523 int __kfifo_to_user_r(struct __kfifo *fifo, void __user *to, in __kfifo_to_user_r() argument 538 ret = kfifo_copy_to_user(fifo, to, len, fifo->out + recsize, copied); in __kfifo_to_user_r()
|
D | assoc_array.c | 465 edit->set[0].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_in_empty_tree() 613 edit->set[0].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_into_terminal_node() 750 edit->set[0].to = assoc_array_shortcut_to_ptr(new_s0); in assoc_array_insert_into_terminal_node() 857 edit->set[0].to = assoc_array_shortcut_to_ptr(new_s0); in assoc_array_insert_mid_shortcut() 874 edit->set[0].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_mid_shortcut() 919 edit->set[1].to = assoc_array_shortcut_to_ptr(new_s1); in assoc_array_insert_mid_shortcut() 930 edit->set_parent_slot[0].to = sc_slot; in assoc_array_insert_mid_shortcut() 932 edit->set[1].to = assoc_array_node_to_ptr(new_n0); in assoc_array_insert_mid_shortcut() 1133 edit->set[0].to = NULL; in assoc_array_delete() 1141 edit->set[1].to = NULL; in assoc_array_delete() [all …]
|
/lib/kunit/ |
D | Kconfig | 11 able to be run locally on a developer's workstation without a VM or 24 test suite, which allow users to see results of the last test suite 42 features of KUnit. This test only exists to help new users understand 43 what KUnit is and how it is used. Please refer to the example test 45 is intended for curious hackers who would like to understand how to 52 KUnit tests run during boot and output the results to the debug log 58 to the KUnit documentation in Documentation/dev-tools/kunit/.
|
/lib/vdso/ |
D | Kconfig | 12 Each architecture that enables this feature has to 19 This config option helps to avoid possible performance issues
|
/lib/xz/ |
D | Kconfig | 49 properties byte. MicroLZMA was created to be used in EROFS 66 This allows passing .xz files to the in-kernel XZ decoder via 68 data and writes diagnostics to the system log.
|
/lib/fonts/ |
D | Kconfig | 15 Say Y here if you would like to use fonts other than the default 18 Note that the answer to this question won't directly affect the 19 kernel: saying N will just cause the configurator to skip all 88 embedded devices with a 320x240 screen, to get a reasonable number
|
/lib/raid6/ |
D | altivec.uc | 36 * This is the C data type to use. We use a vector of 68 /* This is noinline to make damned sure that gcc doesn't move any of the
|
D | vpermxor.uc | 16 * vpermxor$#.c makes use of the vpermxor instruction to optimise the RAID6 Q
|
D | int.uc | 24 * This is the C data type to use
|