/openbmc/linux/arch/x86/realmode/rm/ |
H A D | trampoline_64.S | 1 /* SPDX-License-Identifier: GPL-2.0 */ 10 * in real mode with no stack, but the rest of the 11 * trampoline page to make our stack and everything else 15 * with 16-bit addressing and 16-bit data. CS has some value 24 * --full-contents --reloc to make sure there are no relocation 33 #include <asm/processor-flags.h> 42 * Make sure only one CPU fiddles with the realmode stack 54 # Setup stack 60 cli # We should be safe anyway 89 # Enable protected mode [all …]
|
/openbmc/phosphor-host-ipmid/ |
H A D | meson.options | 4 'boot-flag-safe-mode-support', 6 description: 'Add option to enable/disable safe mode in boot flags', 9 'i2c-whitelist-check', 11 description: 'Add option to enable/disable i2c master write read command white list checking', 17 'softoff-busname', 23 'softoff-objpath', 29 'ipmi-sms-atn-ack-timeout-secs', 35 'ipmi-host-shutdown-complete-timeout-secs', 40 # Indicates an in-band power off or reboot request from the host 44 'host-inband-request-dir', [all …]
|
/openbmc/linux/security/ |
H A D | Kconfig.hardening | 1 # SPDX-License-Identifier: GPL-2.0-only 8 stack variable initializations, this warning is silenced for 12 flaws, this plugin is available to identify and zero-initialize 23 def_bool $(cc-option,-ftrivial-auto-var-init=pattern) 26 def_bool $(cc-option,-ftrivial-auto-var-init=zero) 29 # Clang 16 and later warn about using the -enable flag, but it 31 …def_bool $(cc-option,-ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-wi… 38 prompt "Initialize kernel stack variables at function entry" 44 This option enables initialization of stack variables at 56 bool "no automatic stack variable initialization (weakest)" [all …]
|
/openbmc/linux/drivers/of/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 11 compile-coverage. 28 WARNING messages to print on the console. The tests will cause stack 38 If unsure, say N here. This option is not safe to enable. 48 If unsure, say N here, but this option is safe to enable. 67 # Hardly any platforms need this. It is safe to select, but only do so if you 75 can enable it manually to improve device tree unit test coverage. 100 enable it manually to improve device tree unit test coverage.
|
/openbmc/linux/Documentation/livepatch/ |
H A D | livepatch.rst | 30 - The kernel probes are the most generic. The code can be redirected by 33 - The function tracer calls the code from a predefined location that is 35 compiler using the '-pg' gcc option. 37 - Livepatching typically needs to redirect the code at the very beginning 38 of the function entry before the function parameters or the stack 70 when it is safe to do so, e.g. when the affected locks are released 73 The theory about how to apply functions a safe way is rather complex. 74 The aim is to define a so-called consistency model. It attempts to define 79 kpatch: it uses kGraft's per-task consistency and syscall barrier 80 switching combined with kpatch's stack trace switching. There are also [all …]
|
/openbmc/linux/arch/x86/boot/compressed/ |
H A D | head_64.S | 1 /* SPDX-License-Identifier: GPL-2.0 */ 9 * head.S contains the 32-bit startup code. 14 * kernel it will end up at 0x1000 + 1Mb I hope so as I assume this. - AC] 16 * Page 0 is deliberately kept safe, since System Management Mode code in 33 #include <asm/processor-flags.h> 34 #include <asm/asm-offsets.h> 59 * from startup_32. This is the same as the link-time virtual address of X, 61 * assembler/linker that we do not want the actual run-time address of X. This 62 * prevents the linker from trying to create unwanted run-time relocation 65 * A reference X(%reg) will result in the link-time VA of X being stored with [all …]
|
/openbmc/linux/net/mac80211/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 tristate "Generic IEEE 802.11 Networking Stack (mac80211)" 14 networking stack. 61 bool "Enable mac80211 mesh networking support" 64 Select this option to enable 802.11 mesh operation in mac80211 66 over (possibly multi-hop) wireless links to form a single logical 70 bool "Enable LED triggers" 116 of function calls in the code, but is otherwise safe to 117 enable. 138 debugging messages for the managed-mode MLME. It [all …]
|
/openbmc/linux/arch/powerpc/ |
H A D | Kconfig.debug | 1 # SPDX-License-Identifier: GPL-2.0 4 bool "Don't build arch/powerpc code with -Werror" 7 arch/powerpc with the -Werror flag (which means warnings 10 Only enable this if you are hitting a build failure in the 20 int "Stack depth to print" if DEBUG_KERNEL 23 This option allows you to set the stack depth that the kernel 24 prints in stack traces. This can be useful if your display is 25 too small and stack traces cause important information to 47 emulated by the in-kernel emulator. Counters for the various classes 51 powerpc/emulated_instructions/do_warn in debugfs), rate-limited [all …]
|
/openbmc/qemu/scripts/ |
H A D | meson-buildoptions.sh | 1 # This file is generated by meson-buildoptions.py, do not edit! 3 printf "%s\n" ' --audio-drv-list=CHOICES Set audio driver list [default] (choices: alsa/co' 6 printf "%s\n" ' --bindir=VALUE Executable directory [bin]' 7 printf "%s\n" ' --block-drv-ro-whitelist=VALUE' 8 printf "%s\n" ' set block driver read-only whitelist (by default' 9 printf "%s\n" ' affects only QEMU, not tools like qemu-img)' 10 printf "%s\n" ' --block-drv-rw-whitelist=VALUE' 11 printf "%s\n" ' set block driver read-write whitelist (by default' 12 printf "%s\n" ' affects only QEMU, not tools like qemu-img)' 13 printf "%s\n" ' --datadir=VALUE Data file directory [share]' [all …]
|
/openbmc/linux/lib/ |
H A D | Kconfig.kasan | 1 # SPDX-License-Identifier: GPL-2.0-only 19 Disables both inline and stack instrumentation. Selected by 23 def_bool $(cc-option, -fsanitize=kernel-address) 26 def_bool $(cc-option, -fsanitize=kernel-hwaddress) 43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety 44 error detector designed to find out-of-bounds and use-after-free bugs. 46 See Documentation/dev-tools/kasan.rst for details. 48 For better error reports, also enable CONFIG_STACKTRACE. 53 …def_bool (CC_IS_CLANG && $(cc-option,-fsanitize=kernel-address -mllvm -asan-kernel-mem-intrinsic-p… 54 (CC_IS_GCC && $(cc-option,-fsanitize=kernel-address --param asan-kernel-mem-intrinsic-prefix=1)) [all …]
|
/openbmc/linux/arch/x86/kernel/ |
H A D | traps.c | 50 #include <asm/text-patching.h> 65 #include <asm/insn-eval.h> 73 #include <asm/processor-flags.h> 152 tsk->thread.error_code = error_code; in do_trap_no_signal() 153 tsk->thread.trap_nr = trapnr; in do_trap_no_signal() 169 tsk->thread.error_code = error_code; in do_trap_no_signal() 170 tsk->thread.trap_nr = trapnr; in do_trap_no_signal() 172 return -1; in do_trap_no_signal() 182 tsk->comm, task_pid_nr(tsk), type, desc, in show_signal() 183 regs->ip, regs->sp, error_code); in show_signal() [all …]
|
/openbmc/linux/arch/um/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 3 menu "UML-specific options" 122 Add /lib (and /lib64 for 64-bit) to the linux binary's rpath 133 While the User-Mode Linux port uses its own root file system for 139 mount none /tmp/fromhost -t hostfs -o /tmp/umlshare 146 <http://user-mode-linux.sourceforge.net/hostfs.html>. 156 The user mode linux management console is a low-level interface to 158 a full-blown operating system running under every user mode linux 164 2.4.5-9um and later (path /tools/mconsole), and is also in the 167 It is safe to say 'Y' here. [all …]
|
/openbmc/linux/arch/um/os-Linux/ |
H A D | signal.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Copyright (C) 2015 Anton Ivanov (aivanov@{brocade.com,kot-begemot.co.uk}) 6 * Copyright (C) 2004 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com) 16 #include <as-layout.h> 46 /* enable signals if sig isn't IRQ signal */ in sig_handler_common() 57 * be able to profile all of UML, not just the non-critical sections. If 58 * profiling is not thread-safe, then that is not my problem. We can disable 91 * In TT_MODE_EXTERNAL, need to still call time-travel in sig_handler() 94 * Note we won't get here if signals are hard-blocked in sig_handler() 95 * (which is handled above), in that case the hard- in sig_handler() [all …]
|
/openbmc/linux/arch/arc/kernel/ |
H A D | process.c | 1 // SPDX-License-Identifier: GPL-2.0-only 3 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com) 27 task_thread_info(current)->thr_ptr = (unsigned int)user_tls_data_ptr; in SYSCALL_DEFINE1() 32 * We return the user space TLS data ptr as sys-call return code 34 * However we can cheat by the fact that some sys-calls do return 37 * it won't be considered a sys-call error 38 * and it will be loads better than copy-to-user, which is a definite 39 * D-TLB Miss 43 return task_thread_info(current)->thr_ptr; in SYSCALL_DEFINE0() 54 * can't possibly be SMP. Thus doesn't need to be SMP safe. in SYSCALL_DEFINE3() [all …]
|
/openbmc/linux/arch/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 20 menu "General architecture-dependent options" 25 Select if the architecture can check permissions at sub-page 71 for kernel debugging, non-intrusive instrumentation and testing. 80 makes certain almost-always-true or almost-always-false branch 83 Certain performance-sensitive kernel code, such as trace points, 97 ( On 32-bit x86, the necessary options added to the compiler 104 Boot time self-test of the branch patching code. 110 Boot time self-test of the call patching code. 130 Uprobes is the user-space counterpart to kprobes: they [all …]
|
/openbmc/linux/arch/x86/entry/ |
H A D | entry_64.S | 1 /* SPDX-License-Identifier: GPL-2.0 */ 9 * entry.S contains the system-call and fault low-level handling routines. 14 * - iret frame: Architecture defined interrupt frame from SS to RIP 15 * at the top of the kernel process stack. 18 * - SYM_FUNC_START/END:Define functions in the symbol table. 19 * - idtentry: Define exception entry points. 25 #include <asm/asm-offsets.h> 40 #include <asm/nospec-branch.h> 50 * 64-bit SYSCALL instruction entry. Up to 6 arguments in registers. 52 * This is the only entry point used for 64-bit system calls. The [all …]
|
/openbmc/linux/Documentation/networking/ |
H A D | msg_zerocopy.rst | 14 ----------------------- 27 the buffer between process and network stack. Unlike with copying, the 33 The kernel returns a notification when it is safe to modify data. 39 --------- 42 netdev 2.1. For more in-depth information see that paper and talk, 52 [PATCH net-next v4 0/9] socket sendmsg MSG_ZEROCOPY 53 https://lore.kernel.org/netdev/20170803202945.70750-1-willemdebruijn.kernel@gmail.com 59 Passing the MSG_ZEROCOPY flag is the most obvious step to enable copy 63 ------------ 76 ------------ [all …]
|
/openbmc/u-boot/include/configs/ |
H A D | ti_armv7_common.h | 1 /* SPDX-License-Identifier: GPL-2.0+ */ 5 * Copyright (C) 2013 Texas Instruments Incorporated - http://www.ti.com/ 9 * board or even SoC common file, we define a common file to be re-used 25 * Our DDR memory always starts at 0x80000000 and U-Boot shall have 34 * also be safe elsewhere. We have the default load at 32MB into DDR (for 64 * initial stack pointer in our SRAM. Otherwise, we can define 70 #define CONFIG_SYS_INIT_SP_ADDR (NON_SECURE_SRAM_END - \ 77 /* If DM_I2C, enable non-DM I2C support */ 84 * The following are general good-enough settings for U-Boot. We set a 86 * function over binary size in the main portion of U-Boot as this is [all …]
|
/openbmc/linux/drivers/net/wireless/broadcom/b43/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 tristate "Broadcom 43xx wireless support (mac80211 stack)" 23 It is safe to include both b43 and b43legacy as the underlying glue 27 b43-fwcutter. 61 # Auto-select SSB PCI-HOST support, if possible 69 # Auto-select SSB PCICORE driver, if possible 81 Broadcom 43xx device support for Soft-MAC SDIO devices. 83 With this config option you can drive Soft-MAC b43 cards with a 87 Note that this does not support Broadcom 43xx Full-MAC devices. 89 It's safe to select Y here, even if you don't have a B43 SDIO device. [all …]
|
/openbmc/linux/arch/powerpc/kernel/ |
H A D | setup_64.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 37 #include <asm/asm-prototypes.h> 63 #include <asm/code-patching.h> 68 #include <asm/feature-fixups.h> 101 * If we boot via kdump on a non-primary thread, in setup_tlb_core_data() 108 paca_ptrs[cpu]->tcd_ptr = &paca_ptrs[first]->tcd; in setup_tlb_core_data() 127 /* Look for ibm,smt-enabled OF option */ 154 smt_option = of_get_property(dn, "ibm,smt-enabled", in check_smt_enabled() 169 /* Look for smt-enabled= cmdline option */ 175 early_param("smt-enabled", early_smt_enabled); [all …]
|
/openbmc/linux/Documentation/infiniband/ |
H A D | ipoib.rst | 43 fabric with a 2K MTU, the IPoIB MTU will be 2048 - 4 = 2044 bytes. 55 networking stack to use the smaller UD MTU for these neighbours. 62 network stack. 91 mount -t debugfs none /sys/kernel/debug 97 is safe to enable this option with debug_level set to 0 for normal
|
/openbmc/qemu/.gitlab-ci.d/ |
H A D | buildtest.yml | 2 - local: '/.gitlab-ci.d/buildtest-template.yml' 4 build-system-alpine: 6 - .native_build_job_template 7 - .native_build_artifact_template 9 - job: amd64-alpine-container 12 TARGETS: avr-softmmu loongarch64-softmmu mips64-softmmu mipsel-softmmu 13 MAKE_CHECK_ARGS: check-build 14 CONFIGURE_ARGS: --enable-docs --enable-trace-backends=log,simple,syslog 16 check-system-alpine: 19 - job: build-system-alpine [all …]
|
/openbmc/linux/arch/arc/include/asm/ |
H A D | entry-compact.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 3 * Copyright (C) 2014-15 Synopsys, Inc. (www.synopsys.com) 4 * Copyright (C) 2004, 2007-2010, 2011-2012 Synopsys, Inc. (www.synopsys.com) 7 * Stack switching code can no longer reliably rely on the fact that 8 * if we are NOT in user mode, stack is switched to kernel mode. 10 * it's prologue including stack switching from user mode 13 * -Zero Overhead Loop Context shd be cleared when entering IRQ/EXcp/Trap 20 * -Modified CALLEE_REG save/restore macros to handle the fact that 22 * - Defined Stack Switching Macro to be reused in all intr/excp hdlrs 23 * - Shaved off 11 instructions from RESTORE_ALL_INT1 by using the [all …]
|
/openbmc/linux/arch/xtensa/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 58 Xtensa processors are 32-bit RISC machines designed by Tensilica 63 a home page at <http://www.linux-xtensa.org/>. 102 def_bool $(success,test "$(shell,echo __XTENSA_EB__ | $(CC) -E -P -)" = 1) 108 …def_bool $(success,test "$(shell,echo __XTENSA_CALL0_ABI__ | $(CC) -mabi=call0 -E -P - 2>/dev/null… 117 bool "fsf - default (not generic) configuration" 121 bool "dc232b - Diamond 232L Standard Core Rev.B (LE)" 128 bool "dc233c - Diamond 233L Standard Core Rev.C (LE)" 164 ie: it supports a TLB with auto-loading, page protection. 171 Enable if core variant has Performance Monitor Module with [all …]
|
/openbmc/linux/arch/s390/ |
H A D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 306 depends on $(cc-option,-march=z10) 308 Select this to enable optimizations for IBM System z10 (2097 and 2098 314 depends on $(cc-option,-march=z196) 316 Select this to enable optimizations for IBM zEnterprise 114 and 196 323 depends on $(cc-option,-march=zEC12) 325 Select this to enable optimizations for IBM zBC12 and zEC12 (2828 and 332 depends on $(cc-option,-march=z13) 334 Select this to enable optimizations for IBM z13s and z13 (2965 and 341 depends on $(cc-option,-march=z14) [all …]
|