Searched refs:kcov (Results 1 – 8 of 8) sorted by relevance
41 struct kcov { struct229 static void kcov_get(struct kcov *kcov) in kcov_get() argument231 atomic_inc(&kcov->refcount); in kcov_get()234 static void kcov_put(struct kcov *kcov) in kcov_put() argument236 if (atomic_dec_and_test(&kcov->refcount)) { in kcov_put()237 vfree(kcov->area); in kcov_put()238 kfree(kcov); in kcov_put()248 t->kcov = NULL; in kcov_task_init()253 struct kcov *kcov; in kcov_task_exit() local255 kcov = t->kcov; in kcov_task_exit()[all …]
83 obj-$(CONFIG_KCOV) += kcov.o
3 kcov-flags-$(CONFIG_CC_HAS_SANCOV_TRACE_PC) += -fsanitize-coverage=trace-pc4 kcov-flags-$(CONFIG_KCOV_ENABLE_COMPARISONS) += -fsanitize-coverage=trace-cmp5 kcov-flags-$(CONFIG_GCC_PLUGIN_SANCOV) += -fplugin=$(objtree)/scripts/gcc-plugins/sancov_plugin.so7 export CFLAGS_KCOV := $(kcov-flags-y)
1 kcov: code coverage for fuzzing4 kcov exposes kernel code coverage information in a form suitable for coverage-6 exported via the "kcov" debugfs file. Coverage collection is enabled on a task9 Note that kcov does not aim to collect as much coverage as possible. It aims15 kcov is also able to collect comparison operands from the instrumented code38 program using kcov:69 fd = open("/sys/kernel/debug/kcov", O_RDWR);122 it needs to open /sys/kernel/debug/kcov in each thread separately.125 That is, a parent process opens /sys/kernel/debug/kcov, enables trace mode,157 fd = open("/sys/kernel/debug/kcov", O_RDWR);[all …]
19 kcov
1147 struct kcov *kcov; member
677 include scripts/Makefile.kcov
761 For more details, see Documentation/dev-tools/kcov.rst.