Searched full:instrumentation (Results 1 – 25 of 183) sorted by relevance
12345678
/linux-6.12.1/include/linux/ |
D | instrumented.h | 4 * This header provides generic wrappers for memory access instrumentation that 21 * Instrument a regular read access. The instrumentation should be inserted 35 * Instrument a regular write access. The instrumentation should be inserted 49 * Instrument a regular write access. The instrumentation should be inserted 63 * Instrument an atomic read access. The instrumentation should be inserted 77 * Instrument an atomic write access. The instrumentation should be inserted 91 * Instrument an atomic read-write access. The instrumentation should be 107 * variants). The instrumentation must be inserted before the accesses. 118 * instrument_copy_from_user_before - add instrumentation before copy_from_user 124 * variants). The instrumentation should be inserted before the accesses. [all …]
|
D | kcsan-checks.h | 18 #define KCSAN_ACCESS_COMPOUND (1 << 1) /* Compounded read-write instrumentation. */ 20 /* The following are special, and never due to compiler instrumentation. */ 50 * __kcsan_mb - full memory barrier instrumentation 55 * __kcsan_wmb - write memory barrier instrumentation 60 * __kcsan_rmb - read memory barrier instrumentation 65 * __kcsan_release - release barrier instrumentation 218 * instrumentation enabled. May be used in header files. 237 * Normal barrier instrumentation is not done via explicit calls, but by mapping 240 * like any other compile-time instrumentation, barrier instrumentation can be
|
D | kasan-checks.h | 9 * KASAN modes that rely on compiler instrumentation, and will be optimized 34 * instrumentation enabled. May be used in header files.
|
D | compiler_types.h | 130 * Note: This may conflict with instrumentation inserted on function entry which 271 * to __no_sanitize_* in compilation units where instrumentation is enabled 273 * instrumentation (__SANITIZE_*__ undefined). 290 * Clang still emits instrumentation for __tsan_func_{entry,exit}() and builtin 293 * want any instrumentation with __no_kcsan. 296 * disable all instrumentation. See Kconfig.kcsan where this is mandatory. 358 * 2) supressing instrumentation around where cpuidle disables RCU; where the
|
D | instrumentation.h | 9 /* Begin/end of an instrumentation safe region */ 21 * When the value is greater than 0, we consider instrumentation allowed.
|
/linux-6.12.1/lib/ |
D | Kconfig.kasan | 19 Disables both inline and stack instrumentation. Selected by 20 architectures that do not support these instrumentation types. 130 prompt "Instrumentation type" 135 bool "Outline instrumentation" 142 bool "Inline instrumentation" 152 bool "Stack instrumentation (unsafe)" if CC_IS_CLANG && !COMPILE_TEST 157 Disables stack instrumentation and thus KASAN's ability to detect 160 With Clang, stack instrumentation has a problem that causes excessive 167 With GCC, enabling stack instrumentation is assumed to be safe. 169 If the architecture disables inline instrumentation via [all …]
|
D | Kconfig.ubsan | 10 Compile-time instrumentation is used to detect various undefined 22 text on failure paths. To avoid this, Sanitizer instrumentation 112 # seeing UBSan instrumentation located in unreachable places. 129 This currently performs nearly no instrumentation due to the
|
D | Kconfig.kcsan | 21 data-race detector that relies on compile-time instrumentation. 189 # atomics instrumentation in .noinstr.text, or use a compiler that can 190 # implement __no_kcsan to really remove all instrumentation. 203 Weak memory modeling relies on additional instrumentation and may
|
D | Kconfig.kmsan | 21 instrumentation provided by Clang and thus requires Clang to build. 47 is a more relaxed mode, but it generates more instrumentation code and
|
/linux-6.12.1/Documentation/trace/rv/ |
D | da_monitor_instrumentation.rst | 1 Deterministic Automata Instrumentation 5 includes a section dedicated to instrumentation. 10 * This is the instrumentation part of the monitor. 47 instrumentation section translates *kernel events* into the *model's 123 They should be used to *attach* and *detach* the instrumentation to the running 135 Instrumentation helpers 138 To complete the instrumentation, the *handler functions* need to be attached to a
|
D | da_monitor_synthesis.rst | 10 *monitor* connects to the system via an *instrumentation* that converts 26 | (instrumentation) | | (verification) | | (specification) | 64 the system instrumentation. 137 dot2k, the developer's work should be limited to the instrumentation
|
/linux-6.12.1/Documentation/dev-tools/ |
D | kasan.rst | 53 Software KASAN modes use compile-time instrumentation to insert validity checks 93 ``CONFIG_KASAN_INLINE``. Outline and inline are compiler instrumentation types. 308 safe to access and use compile-time instrumentation to insert shadow memory 326 Compile-time instrumentation is used to insert memory access checks. Compiler 331 With inline instrumentation, instead of making function calls, the compiler 354 Software Tag-Based KASAN uses compile-time instrumentation to insert checks 360 Software Tag-Based KASAN also has two instrumentation modes (outline, which 362 memory checks inline). With outline instrumentation mode, a bug report is 364 instrumentation, a ``brk`` instruction is emitted by the compiler, and a 375 hardware memory tagging support instead of compiler instrumentation and [all …]
|
D | kmsan.rst | 9 values. It is based on compiler instrumentation, and is quite similar to the 81 Disabling the instrumentation 118 ways to disable instrumentation, where possible. 124 the only compiler that has KMSAN support. The kernel instrumentation pass is 142 instrumentation code inserted by the compiler (unless it is a stack variable 146 Compiler instrumentation also tracks the shadow values as they are used along 147 the code. When needed, instrumentation code invokes the runtime library in 227 Clang instrumentation API 230 Clang instrumentation pass inserts calls to functions defined in 289 Clang's MemorySanitizer instrumentation has an option, [all …]
|
/linux-6.12.1/Documentation/arch/powerpc/ |
D | kasan.txt | 11 Instrumentation of the vmalloc area is optional, unless built with modules, 23 - It would be good to support inline instrumentation so as to be able to catch 26 - Inline instrumentation requires a fixed offset. 38 One approach is just to give up on inline instrumentation. This way boot-time
|
/linux-6.12.1/drivers/gpu/drm/i915/gt/shaders/clear_kernel/ |
D | hsw.asm | 23 * DW 1.3 - Enable Instrumentation (only for debug) 32 * BTI 1: Wait/Instrumentation Buffer 58 …align1 1N }; /* g3.2 now points to EU row number (Y-pixel = V address ) in instrumentation surf */ 70 /* Media block read to fetch current value at specified location in instrumentation buffer */ 76 /* Media block write for updated value at specified location in instrumentation buffer */
|
D | ivb.asm | 23 * DW 1.3 - Enable Instrumentation (only for debug) 32 * BTI 1: Wait/Instrumentation Buffer 58 …align1 1N }; /* g3.2 now points to EU row number (Y-pixel = V address ) in instrumentation surf */ 70 /* Media block read to fetch current value at specified location in instrumentation buffer */ 75 /* Media block write for updated value at specified location in instrumentation buffer */
|
/linux-6.12.1/mm/kmsan/ |
D | Makefile | 6 obj-y := core.o instrumentation.o init.o hooks.o report.o shadow.o 12 # Disable instrumentation of KMSAN runtime with other tools.
|
/linux-6.12.1/Documentation/devicetree/bindings/iio/amplifiers/ |
D | adi,ada4250.yaml | 7 title: ADA4250 Programmable Gain Instrumentation Amplifier 13 Precision Low Power, 110kHz, 26uA, Programmable Gain Instrumentation Amplifier.
|
/linux-6.12.1/tools/verification/dot2/dot2k_templates/ |
D | main_per_cpu.c | 8 #include <rv/instrumentation.h> 34 * This is the instrumentation part of the monitor.
|
D | main_per_task.c | 8 #include <rv/instrumentation.h> 34 * This is the instrumentation part of the monitor.
|
D | main_global.c | 8 #include <rv/instrumentation.h> 34 * This is the instrumentation part of the monitor.
|
/linux-6.12.1/kernel/bpf/ |
D | Kconfig | 93 bool "Enable BPF LSM Instrumentation" 99 Enables instrumentation of the security hooks with BPF programs for
|
/linux-6.12.1/Documentation/devicetree/bindings/arm/ |
D | arm,coresight-stm.yaml | 24 primarily for high-bandwidth trace of instrumentation embedded into software. 25 This instrumentation is made up of memory-mapped writes to the STM Advanced
|
/linux-6.12.1/kernel/kcsan/ |
D | core.c | 445 * all be inlinable by the instrumentation functions. 451 * since they do not access any user memory, but instrumentation is still 726 * for constant sized instrumentation (__tsan_{read,write}N). in check_access() 979 * KCSAN uses the same instrumentation that is emitted by supported compilers 982 * When enabled, the compiler emits instrumentation calls (the functions 1126 * instrumentation is inserted before the real access, a data in __tsan_func_exit() 1147 * Instrumentation for atomic builtins (__atomic_*, __sync_*). 1155 * etc.), implementing the ARCH_ATOMIC interface (to get instrumentation via 1158 * TSAN instrumentation replaces atomic accesses with calls to any of the below 1286 * In instrumented files, we emit instrumentation for barriers by mapping the [all …]
|
/linux-6.12.1/arch/powerpc/platforms/pseries/ |
D | hvCall_inst.c | 5 * Hypervisor Call Instrumentation 19 /* For hcall instrumentation. One structure per-hcall, per-CPU */
|
12345678