forked from Qortal/Brooklyn
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
36 lines
728 B
C
36 lines
728 B
C
#ifndef PM_TRACE_H
|
|
#define PM_TRACE_H
|
|
|
|
#ifdef CONFIG_PM_TRACE
|
|
#include <asm/pm-trace.h>
|
|
#include <linux/types.h>
|
|
|
|
extern int pm_trace_enabled;
|
|
|
|
static inline int pm_trace_is_enabled(void)
|
|
{
|
|
return pm_trace_enabled;
|
|
}
|
|
|
|
struct device;
|
|
extern void set_trace_device(struct device *);
|
|
extern void generate_pm_trace(const void *tracedata, unsigned int user);
|
|
extern int show_trace_dev_match(char *buf, size_t size);
|
|
|
|
#define TRACE_DEVICE(dev) do { \
|
|
if (pm_trace_enabled) \
|
|
set_trace_device(dev); \
|
|
} while(0)
|
|
|
|
#else
|
|
|
|
static inline int pm_trace_is_enabled(void) { return 0; }
|
|
|
|
#define TRACE_DEVICE(dev) do { } while (0)
|
|
#define TRACE_RESUME(dev) do { } while (0)
|
|
#define TRACE_SUSPEND(dev) do { } while (0)
|
|
|
|
#endif
|
|
|
|
#endif
|