Home
last modified time | relevance | path

Searched refs:sentinel (Results 1 – 10 of 10) sorted by relevance

/Zephyr-Core-3.5.0/subsys/usb/device/class/netusb/
Dfunction_eem.c19 static uint8_t sentinel[] = { 0xde, 0xad, 0xbe, 0xef }; variable
21 #define EEM_FRAME_SIZE (NET_ETH_MAX_FRAME_SIZE + sizeof(sentinel) + \
108 len = net_pkt_get_len(pkt) + sizeof(sentinel); in eem_send()
123 b_idx += len - sizeof(sentinel); in eem_send()
126 memcpy(&tx_buf[b_idx], sentinel, sizeof(sentinel)); in eem_send()
127 b_idx += sizeof(sentinel); in eem_send()
179 eem_size - sizeof(sentinel), in eem_read_cb()
187 if (net_pkt_write(pkt, ptr, eem_size - sizeof(sentinel))) { in eem_read_cb()
/Zephyr-Core-3.5.0/tests/kernel/common/src/
Dirq_offload.c20 volatile uint32_t sentinel; variable
33 sentinel = x; in offload_function()
63 zassert_equal(sentinel, SENTINEL_VALUE, in ZTEST()
/Zephyr-Core-3.5.0/doc/security/
Dhardening-tool.rst15 #. Enabling optional features that can lead to improve security (ex. stack sentinel, hardware stack
/Zephyr-Core-3.5.0/doc/releases/
Drelease-notes-1.9.rst76 * Stack sentinel: This places a sentinel value at the lowest 4 bytes of a stack
80 * ARC: Added initial MPU support, including stack sentinel checking for ARC
Drelease-notes-1.11.rst303 * :github:`4709` - tests/kernel/fatal/testcase.yaml#stack-sentinel : Kernel Panic
376 * :github:`5539` - tests/kernel/fatal/stack-sentinel fails when asserts are enabled
Drelease-notes-2.4.rst1606 * :github:`24910` - kernel: stack sentinel crashes
Drelease-notes-2.5.rst1250 * :github:`30554` - tests/kernel/fatal/exception/sentinel test is failing for various nrf platforms
/Zephyr-Core-3.5.0/doc/kernel/services/other/
Dfatal.rst214 feature which periodically checks if a sentinel value at the end of the stack
/Zephyr-Core-3.5.0/subsys/debug/
DKconfig178 bool "Stack sentinel"
/Zephyr-Core-3.5.0/doc/hardware/arch/
Darm_cortex_m.rst166 sentinel-based stack limit checking is enabled (see :kconfig:option:`CONFIG_STACK_SENTINEL`).