Home
last modified time | relevance | path

Searched refs:checker (Results 1 – 25 of 26) sorted by relevance

12

/Linux-v6.6/arch/arm/probes/kprobes/
Dcheckers-arm.c87 [PROBES_LDRSTRD] = {.checker = arm_check_stack},
88 [PROBES_STORE_EXTRA] = {.checker = arm_check_stack},
89 [PROBES_STORE] = {.checker = arm_check_stack},
90 [PROBES_LDMSTM] = {.checker = arm_check_stack},
160 [PROBES_MRS] = {.checker = arm_check_regs_normal},
161 [PROBES_SATURATING_ARITHMETIC] = {.checker = arm_check_regs_normal},
162 [PROBES_MUL1] = {.checker = arm_check_regs_normal},
163 [PROBES_MUL2] = {.checker = arm_check_regs_normal},
164 [PROBES_MUL_ADD_LONG] = {.checker = arm_check_regs_normal},
165 [PROBES_MUL_ADD] = {.checker = arm_check_regs_normal},
[all …]
Dcheckers-thumb.c79 [PROBES_T32_LDMSTM] = {.checker = t32_check_stack},
80 [PROBES_T32_LDRDSTRD] = {.checker = t32_check_stack},
81 [PROBES_T32_LDRSTR] = {.checker = t32_check_stack},
101 [PROBES_T16_PUSH] = {.checker = t16_check_stack},
/Linux-v6.6/lib/
Dfortify_kunit.c146 #define TEST_kmalloc(checker, expected_size, alloc_size) do { \ argument
151 checker(expected_size, kmalloc(alloc_size, gfp), \
153 checker(expected_size, \
156 checker(expected_size, kzalloc(alloc_size, gfp), \
158 checker(expected_size, \
161 checker(expected_size, kcalloc(1, alloc_size, gfp), \
163 checker(expected_size, kcalloc(alloc_size, 1, gfp), \
165 checker(expected_size, \
168 checker(expected_size, \
171 checker(expected_size, kmalloc_array(1, alloc_size, gfp), \
[all …]
DKconfig.ubsan6 bool "Undefined behaviour sanity checker"
8 This option enables the Undefined Behaviour sanity checker.
DKconfig.debug2444 no compiler warnings from C=1 sparse checker or -Wextra
/Linux-v6.6/drivers/net/wireguard/
Dcookie.c19 void wg_cookie_checker_init(struct cookie_checker *checker, in wg_cookie_checker_init() argument
22 init_rwsem(&checker->secret_lock); in wg_cookie_checker_init()
23 checker->secret_birthdate = ktime_get_coarse_boottime_ns(); in wg_cookie_checker_init()
24 get_random_bytes(checker->secret, NOISE_HASH_LEN); in wg_cookie_checker_init()
25 checker->device = wg; in wg_cookie_checker_init()
45 void wg_cookie_checker_precompute_device_keys(struct cookie_checker *checker) in wg_cookie_checker_precompute_device_keys() argument
47 if (likely(checker->device->static_identity.has_identity)) { in wg_cookie_checker_precompute_device_keys()
48 precompute_key(checker->cookie_encryption_key, in wg_cookie_checker_precompute_device_keys()
49 checker->device->static_identity.static_public, in wg_cookie_checker_precompute_device_keys()
51 precompute_key(checker->message_mac1_key, in wg_cookie_checker_precompute_device_keys()
[all …]
Dcookie.h41 void wg_cookie_checker_init(struct cookie_checker *checker,
43 void wg_cookie_checker_precompute_device_keys(struct cookie_checker *checker);
47 enum cookie_mac_state wg_cookie_validate_packet(struct cookie_checker *checker,
55 struct cookie_checker *checker);
/Linux-v6.6/drivers/firmware/psci/
DKconfig6 bool "ARM PSCI checker"
9 Run the PSCI checker during startup. This checks that hotplug and
12 The torture tests may interfere with the PSCI checker by turning CPUs
13 on and off through hotplug, so for now torture tests and PSCI checker
/Linux-v6.6/Documentation/features/debug/KASAN/
Darch-support.txt4 # description: arch supports the KASAN runtime memory checker
/Linux-v6.6/tools/testing/kunit/test_data/
Dtest_interrupted_tap_output.log13 [ 0.060000] Btrfs loaded, crc32c=crc32c-generic, debug=on, assert=on, integrity-checker=on, ref-…
/Linux-v6.6/fs/affs/
DChanges16 - The partition checker (drivers/block/genhd.c)
100 - Changed partition checker to allow devices
103 - The partition checker now also ignores the
338 - Partition checker for genhd.c
/Linux-v6.6/arch/arm/probes/
Ddecode.h291 probes_check_t *checker; member
Ddecode.c355 probes_check_t *checker_func = (*p)[action].checker; in run_checkers()
/Linux-v6.6/fs/btrfs/
DMakefile33 uuid-tree.o props.o free-space-tree.o tree-checker.o space-info.o \
/Linux-v6.6/Documentation/dev-tools/
Dubsan.rst4 UBSAN is a runtime undefined behaviour checker.
Dsparse.rst8 Sparse is a semantic checker for C programs; it can be used to find a
/Linux-v6.6/Documentation/translations/zh_CN/kernel-hacking/
Dhacking.rst676 * At least we *know* we can't spell, and use a spell-checker.
685 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
/Linux-v6.6/Documentation/process/
Dsubmit-checklist.rst39 Check for trivial violations with the patch style checker prior to
Dsubmitting-patches.rst217 Check your patches with the patch style checker prior to submission
218 (scripts/checkpatch.pl). Note, though, that the style checker should be
222 The checker reports at three levels:
D4.Coding.rst273 One of the heavier debugging tools is the locking checker, or "lockdep."
/Linux-v6.6/Documentation/kernel-hacking/
Dhacking.rst798 * At least we *know* we can't spell, and use a spell-checker.
807 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
/Linux-v6.6/Documentation/translations/it_IT/kernel-hacking/
Dhacking.rst837 * At least we *know* we can't spell, and use a spell-checker.
846 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
/Linux-v6.6/Documentation/driver-api/
Ddevice-io.rst157 readl()/writel() functions. The 'sparse' semantic code checker can be used to
/Linux-v6.6/Documentation/translations/it_IT/process/
D4.Coding.rst289 Uno degli strumenti di debugging più tosti è il *locking checker*, o
/Linux-v6.6/Documentation/bpf/
Dverifier.rst10 (though classic BPF checker allows them)

12