/Linux-v5.15/Documentation/virt/kvm/ |
D | cpuid.rst | 65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit 69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit 77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit 85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit 89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit 95 KVM_FEATURE_MSI_EXT_DEST_ID 15 guest checks this feature bit 99 KVM_FEATURE_HC_MAP_GPA_RANGE 16 guest checks this feature bit before 103 KVM_FEATURE_MIGRATION_CONTROL 17 guest checks this feature bit before 120 KVM_HINTS_REALTIME 0 guest checks this feature bit to
|
/Linux-v5.15/scripts/clang-tools/ |
D | run-clang-tools.py | 48 # Disable all checks, then re-enable the ones we want 49 checks = "-checks=-*," 51 checks += "linuxkernel-*" 53 checks += "clang-analyzer-*" 54 p = subprocess.run(["clang-tidy", "-p", args.path, checks, entry["file"]],
|
/Linux-v5.15/fs/ubifs/ |
D | debug.h | 52 * @chk_gen: if general extra checks are enabled 53 * @chk_index: if index xtra checks are enabled 54 * @chk_orph: if orphans extra checks are enabled 55 * @chk_lprops: if lprops extra checks are enabled 56 * @chk_fs: if UBIFS contents extra checks are enabled 64 * @dfs_chk_gen: debugfs knob to enable UBIFS general extra checks 65 * @dfs_chk_index: debugfs knob to enable UBIFS index extra checks 66 * @dfs_chk_orph: debugfs knob to enable UBIFS orphans extra checks 67 * @dfs_chk_lprops: debugfs knob to enable UBIFS LEP properties extra checks 68 * @dfs_chk_fs: debugfs knob to enable UBIFS contents extra checks [all …]
|
/Linux-v5.15/tools/testing/selftests/bpf/verifier/ |
D | bounds_mix_sign_unsign.c | 2 "bounds checks mixing signed and unsigned, positive bounds", 25 "bounds checks mixing signed and unsigned", 48 "bounds checks mixing signed and unsigned, variant 2", 73 "bounds checks mixing signed and unsigned, variant 3", 97 "bounds checks mixing signed and unsigned, variant 4", 119 "bounds checks mixing signed and unsigned, variant 5", 143 "bounds checks mixing signed and unsigned, variant 6", 164 "bounds checks mixing signed and unsigned, variant 7", 186 "bounds checks mixing signed and unsigned, variant 8", 211 "bounds checks mixing signed and unsigned, variant 9", [all …]
|
/Linux-v5.15/security/landlock/ |
D | syscalls.c | 50 /* Checks buffer inconsistencies. */ in copy_min_struct_from_user() 55 /* Checks size ranges. */ in copy_min_struct_from_user() 79 * For each user space ABI structures, first checks that there is no in build_check_abi() 80 * hole in them, then checks that all architectures have the same in build_check_abi() 164 /* Build-time checks. */ in SYSCALL_DEFINE3() 184 /* Checks content (and 32-bits cast). */ in SYSCALL_DEFINE3() 189 /* Checks arguments and transforms to kernel struct. */ in SYSCALL_DEFINE3() 216 /* Checks FD type and access right. */ in get_ruleset_from_fd() 329 /* Gets and checks the ruleset. */ in SYSCALL_DEFINE4() 343 * Checks that allowed_access matches the @ruleset constraints in SYSCALL_DEFINE4() [all …]
|
/Linux-v5.15/lib/ |
D | Kconfig.ubsan | 92 This option enables -fsanitize=shift which checks for bit-shift 100 This option enables -fsanitize=integer-divide-by-zero which checks 112 This option enables -fsanitize=unreachable which checks for control 123 This option enables -fsanitize=object-size which checks for accesses 133 This option enables -fsanitize=bool which checks for boolean values being 141 This option enables -fsanitize=enum which checks for values being loaded
|
D | Kconfig.debug | 211 menu "Compile-time checks and compiler options" 383 as uapi header sanity checks. 389 The section mismatch analysis checks if there are illegal 449 Add compile-time checks to validate stack metadata, including frame 623 This enables checks whether a k/v free operation frees an area 783 This option checks for a stack overrun on calls to schedule(). 800 Enable this to turn on extended checks in the virtual-memory system 854 Enable some costly sanity checks in virtual to page code. This can 870 Enable this for additional checks during memory initialisation. 871 The sanity checks verify aspects of the VM such as the memory model [all …]
|
/Linux-v5.15/tools/usb/usbip/ |
D | configure.ac | 23 # Checks for programs. 28 # Checks for header files. 34 # Checks for typedefs, structures, and compiler characteristics. 42 # Checks for library functions. 53 # Checks for libwrap library.
|
/Linux-v5.15/drivers/net/ethernet/intel/i40e/ |
D | i40e_ddp.c | 9 * i40e_ddp_profiles_eq - checks if DDP profiles are the equivalent 13 * checks if DDP profiles are the equivalent. 25 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already 29 * checks if DDP profile loaded already. 56 * i40e_ddp_profiles_overlap - checks if DDP profiles overlap. 60 * checks if DDP profiles overlap. 80 * i40e_ddp_does_profile_overlap - checks if DDP overlaps with existing one. 84 * checks if DDP profile overlaps with existing one. 192 * i40e_ddp_is_pkg_hdr_valid - performs basic pkg header integrity checks 197 * Checks correctness of pkg header: Version, size too big/small, and [all …]
|
/Linux-v5.15/tools/testing/selftests/landlock/ |
D | fs_test.c | 344 /* Checks unhandled allowed_access. */ in TEST_F_FORK() 535 * Checks that it is not possible to add nsfs-like filesystem in TEST_F_FORK() 605 /* Checks effective read and write actions. */ in TEST_F_FORK() 614 /* Just in case, double-checks effective actions. */ in TEST_F_FORK() 671 /* Checks s1d1 hierarchy. */ in TEST_F_FORK() 677 /* Checks s1d2 hierarchy. */ in TEST_F_FORK() 683 /* Checks s1d3 hierarchy. */ in TEST_F_FORK() 733 /* Checks file removing. */ in TEST_F_FORK() 742 * Checks overly restrictive rules: in TEST_F_FORK() 838 /* Checks that read access is granted for file1_s1d3 with layer 1. */ in TEST_F_FORK() [all …]
|
/Linux-v5.15/drivers/gpu/drm/i915/ |
D | Kconfig.debug | 30 select DRM_VGEM # used by igt/prime_vgem (dmabuf interop checks) 53 bool "Always insert extra checks around mmio access by default" 56 By default, always enables the extra sanity checks (extra register 66 bool "Insert extra checks into the GEM internals" 70 Enable extra sanity checks (including BUGs) along the GEM driver
|
D | intel_runtime_pm.h | 131 * disable_rpm_wakeref_asserts - disable the RPM assert checks 135 * reference, while keeping the device-not-suspended checks still enabled. 156 * enable_rpm_wakeref_asserts - re-enable the RPM assert checks 159 * This function re-enables the RPM assert checks after disabling them with
|
/Linux-v5.15/include/asm-generic/ |
D | sections.h | 98 * memory_contains - checks if an object is contained within a memory region 115 * memory_intersects - checks if the region occupied by an object intersects 134 * init_section_contains - checks if an object is contained within the init 148 * init_section_intersects - checks if the region occupied by an object 162 * is_kernel_rodata - checks if the pointer address is located in the
|
/Linux-v5.15/include/linux/ |
D | kcsan.h | 4 * data structures to set up runtime. See kcsan-checks.h for explicit checks and 13 #include <linux/kcsan-checks.h>
|
D | crash_dump.h | 44 * Architecture code can redefine this if there are any special checks 57 * is_kdump_kernel() checks whether this kernel is booting after a panic of 71 /* is_vmcore_usable() checks if the kernel is booting after a panic and
|
/Linux-v5.15/drivers/net/can/spi/mcp251xfd/ |
D | Kconfig | 13 bool "Additional Sanity Checks" 15 This option enables additional sanity checks in the driver,
|
/Linux-v5.15/Documentation/vm/damon/ |
D | design.rst | 75 basic access checks. It finds the relevant PTE Accessed bit from the address 78 checks whether the bit set again after one sampling period. This could disturb 99 ``sampling interval`` and ``aggregation interval``. In detail, DAMON checks 129 ``sampling interval``, checks whether the page is accessed meanwhile, and 164 As the changes could be quite frequent in some cases, DAMON checks the dynamic
|
/Linux-v5.15/Documentation/dev-tools/ |
D | kasan.rst | 22 validity checks before every memory access and, therefore, require a compiler 31 The hardware KASAN mode (#3) relies on hardware to perform the checks but 203 register for arm64). The kernel periodically checks the hardware and 204 only reports tag faults during these checks. 217 checks before each memory access. 234 Compile-time instrumentation is used to insert memory access checks. Compiler 262 Software tag-based KASAN uses compile-time instrumentation to insert checks 263 before each memory access. These checks make sure that the tag of the memory 270 memory checks inline). With outline instrumentation mode, a bug report is 382 Software KASAN modes use compiler instrumentation to insert validity checks.
|
/Linux-v5.15/arch/s390/ |
D | Kconfig.debug | 10 This option enables sanity checks in s390 low-level entry code. 11 Some of these sanity checks may slow down kernel entries and
|
/Linux-v5.15/drivers/net/wireless/marvell/mwifiex/ |
D | 11n.h | 80 /* This function checks whether AMPDU is allowed or not for a particular TID. */ 99 * This function checks whether AMSDU is allowed or not for a particular TID. 110 * This function checks whether a space is available for new BA stream or not. 168 * This function checks whether associated station is 11n enabled
|
/Linux-v5.15/tools/perf/arch/x86/tests/ |
D | bp-modify.c | 57 * change it and checks it was properly changed. 77 * - waits for the breakpoint to hit and checks in bp_modify1() 133 * change it to bogus value and checks the original 154 * - waits for the breakpoint to hit and checks in bp_modify2()
|
/Linux-v5.15/Documentation/filesystems/ |
D | xfs-self-describing-metadata.rst | 50 not detected by automated verification checks) but are not correct. Finding and 88 fast. So while CRC32c is not the strongest of possible integrity checks that 177 further checks are made against the location information, followed by extensive 178 object specific metadata validation. If any of these checks fail, then the 266 /* object specific verification checks here */ 291 /* object specific verification checks here */ 338 verification checks are done when each inode is read from or written back to the 341 The structure of the verifiers and the identifiers checks is very similar to the
|
/Linux-v5.15/drivers/net/ethernet/intel/ixgbe/ |
D | ixgbe_mbx.c | 55 * ixgbe_check_for_msg - checks to see if someone sent us mail 72 * ixgbe_check_for_ack - checks to see if someone sent us ACK 89 * ixgbe_check_for_rst - checks to see if other side has reset 224 * ixgbe_check_for_msg_pf - checks to see if the VF has sent mail 245 * ixgbe_check_for_ack_pf - checks to see if the VF has ACKed 266 * ixgbe_check_for_rst_pf - checks to see if the VF has reset
|
/Linux-v5.15/tools/testing/selftests/cgroup/ |
D | test_kmem.c | 48 * Then it checks that "slab" in memory.stat is larger than 1M. 49 * Then it sets memory.high to 1M and checks that at least 1/2 159 * threads. Then it checks the sanity of numbers on the parent level: 277 * The test spawns a process, which spawns 1000 threads. Then it checks 305 * kernel memory in each of them, and deletes them. Then it checks 351 * Then it checks that the memory.current on the parent level
|
/Linux-v5.15/drivers/net/ethernet/intel/igb/ |
D | e1000_mbx.c | 56 * igb_check_for_msg - checks to see if someone sent us mail 74 * igb_check_for_ack - checks to see if someone sent us ACK 92 * igb_check_for_rst - checks to see if other side has reset 256 * igb_check_for_msg_pf - checks to see if the VF has sent mail 275 * igb_check_for_ack_pf - checks to see if the VF has ACKed 294 * igb_check_for_rst_pf - checks to see if the VF has reset
|