Home
last modified time | relevance | path

Searched refs:bounds (Results 1 – 25 of 42) sorted by relevance

12

/Zephyr-latest/kernel/paging/
Dstatistics.c148 memcpy(z_paging_histogram_eviction.bounds, in z_paging_histogram_init()
150 sizeof(z_paging_histogram_eviction.bounds)); in z_paging_histogram_init()
154 memcpy(z_paging_histogram_backing_store_page_in.bounds, in z_paging_histogram_init()
156 sizeof(z_paging_histogram_backing_store_page_in.bounds)); in z_paging_histogram_init()
160 memcpy(z_paging_histogram_backing_store_page_out.bounds, in z_paging_histogram_init()
162 sizeof(z_paging_histogram_backing_store_page_out.bounds)); in z_paging_histogram_init()
179 if (cycles <= hist->bounds[idx]) { in z_paging_histogram_inc()
/Zephyr-latest/kernel/
Dmempool.c97 size_t bounds; in k_calloc() local
101 if (size_mul_overflow(nmemb, size, &bounds)) { in k_calloc()
107 ret = k_malloc(bounds); in k_calloc()
109 (void)memset(ret, 0, bounds); in k_calloc()
Dkheap.c124 size_t bounds = 0U; in k_heap_calloc() local
126 if (!size_mul_overflow(num, size, &bounds)) { in k_heap_calloc()
127 ret = k_heap_alloc(heap, bounds, timeout); in k_heap_calloc()
130 (void)memset(ret, 0, bounds); in k_heap_calloc()
Dpoll.c362 uint32_t bounds; in z_vrfy_k_poll() local
373 &bounds), in z_vrfy_k_poll()
378 events_copy = z_thread_malloc(bounds); in z_vrfy_k_poll()
385 if (K_SYSCALL_MEMORY_WRITE(events, bounds)) { in z_vrfy_k_poll()
389 (void)memcpy(events_copy, events, bounds); in z_vrfy_k_poll()
428 (void)memcpy((void *)events, events_copy, bounds); in z_vrfy_k_poll()
DKconfig.vm34 2. The underlying architecture may impose constraints on the bounds of
81 RAM size larger than the defined bounds of the virtual address space.
204 the upper bounds for each bin. See kernel/statistics.c for
/Zephyr-latest/doc/releases/
Drelease-notes-2.6.rst1097 * :github:`35631` - [Coverity CID: 205610] Out-of-bounds read in /zephyr/include/generated/syscalls…
1098 * :github:`35630` - [Coverity CID: 205657] Out-of-bounds read in /zephyr/include/generated/syscalls…
1099 * :github:`35629` - [Coverity CID: 207968] Out-of-bounds read in /zephyr/include/generated/syscalls…
1100 * :github:`35628` - [Coverity CID: 207976] Out-of-bounds read in /zephyr/include/generated/syscalls…
1101 * :github:`35627` - [Coverity CID: 208195] Out-of-bounds read in /zephyr/include/generated/syscalls…
1102 * :github:`35626` - [Coverity CID: 210588] Out-of-bounds read in /zephyr/include/generated/syscalls…
1103 * :github:`35625` - [Coverity CID: 211042] Out-of-bounds read in /zephyr/include/generated/syscalls…
1104 * :github:`35624` - [Coverity CID: 214226] Out-of-bounds read in /zephyr/include/generated/syscalls…
1105 * :github:`35623` - [Coverity CID: 215223] Out-of-bounds read in /zephyr/include/generated/syscalls…
1106 * :github:`35622` - [Coverity CID: 215238] Out-of-bounds read in /zephyr/include/generated/syscalls…
[all …]
Drelease-notes-2.4.rst788 * Fixed out-of-bounds access and add flash_img_init return value check.
898 * :github:`28659` - [Coverity CID :214346] Out-of-bounds access in subsys/net/ip/tcp2.c
934 * :github:`28397` - gcc 10.x compile warning/error for array subscript is outside the bounds in cms…
940 * :github:`28375` - gcc 10.x compile warning/error for array subscript 0 is outside the bounds in t…
941 * :github:`28371` - gcc 10.x compile warning/error for array subscript 0 is outside the bounds in s…
1005 * :github:`28165` - [Coverity CID :214215] Out-of-bounds access in subsys/mgmt/mcumgr/smp_shell.c
1083 * :github:`27837` - [Coverity CID :212956] Out-of-bounds access in tests/kernel/mem_protect/mem_map…
1087 * :github:`27833` - [Coverity CID :212958] Out-of-bounds access in arch/x86/core/x86_mmu.c
1088 * :github:`27832` - [Coverity CID :212957] Out-of-bounds access in arch/x86/core/x86_mmu.c
1120 * :github:`27639` - [Coverity CID :212425] Out-of-bounds access in drivers/ethernet/eth_mcux.c
[all …]
Drelease-notes-3.0.rst299 * Fixed out-of-bounds error when large number of IRQs are enabled and ignore
1075 * :github:`41017` - USB string descriptors can be re-ordered causing corruption and out-of-bounds-w…
1208 * :github:`39852` - [Coverity CID: 240241] Out-of-bounds access in subsys/bluetooth/host/adv.c
1212 * :github:`39843` - [Coverity CID: 240659] Out-of-bounds read in /zephyr/include/generated/syscalls…
1215 * :github:`39839` - [Coverity CID: 240663] Out-of-bounds access in tests/benchmarks/mbedtls/src/ben…
1217 * :github:`39833` - [Coverity CID: 240670] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1218 * :github:`39832` - [Coverity CID: 240671] Out-of-bounds access in drivers/flash/flash_mcux_flexspi…
1219 * :github:`39830` - [Coverity CID: 240673] Out-of-bounds read in /zephyr/include/generated/syscalls…
1220 * :github:`39827` - [Coverity CID: 240676] Out-of-bounds access in drivers/ieee802154/ieee802154_dw…
1222 * :github:`39824` - [Coverity CID: 240679] Out-of-bounds access in samples/subsys/usb/cdc_acm_compo…
[all …]
Drelease-notes-2.5.rst613 * Fixed bounds checking in timeout.
1049 * :github:`31677` - [Coverity CID :216792] Out-of-bounds access in tests/net/lib/dns_addremove/src/…
1058 * :github:`31667` - [Coverity CID :215395] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1059 * :github:`31666` - [Coverity CID :215394] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1062 * :github:`31663` - [Coverity CID :215389] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1064 * :github:`31661` - [Coverity CID :215387] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1065 * :github:`31660` - [Coverity CID :215385] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1066 * :github:`31659` - [Coverity CID :215384] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1069 * :github:`31656` - [Coverity CID :215380] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1071 * :github:`31654` - [Coverity CID :215377] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
[all …]
Drelease-notes-2.7.rst1227 * :github:`38138` - [Coverity CID: 239554] Out-of-bounds read in /zephyr/include/generated/syscalls…
1229 * :github:`38136` - [Coverity CID: 239557] Out-of-bounds read in /zephyr/include/generated/syscalls…
1230 * :github:`38135` - [Coverity CID: 239560] Out-of-bounds access in subsys/modbus/modbus_core.c
1234 * :github:`38131` - [Coverity CID: 239568] Out-of-bounds access in subsys/modbus/modbus_core.c
1235 * :github:`38130` - [Coverity CID: 239569] Out-of-bounds access in subsys/bluetooth/host/id.c
1236 * :github:`38129` - [Coverity CID: 239572] Out-of-bounds read in /zephyr/include/generated/syscalls…
1238 * :github:`38126` - [Coverity CID: 239581] Out-of-bounds access in subsys/modbus/modbus_core.c
1251 * :github:`38113` - [Coverity CID: 239609] Out-of-bounds access in subsys/random/rand32_ctr_drbg.c
1252 * :github:`38112` - [Coverity CID: 239612] Out-of-bounds read in /zephyr/include/generated/syscalls…
1253 * :github:`38111` - [Coverity CID: 239615] Out-of-bounds access in subsys/net/lib/sockets/sockets_t…
[all …]
Drelease-notes-2.2.rst802 * :github:`22656` - [Coverity CID :208192] Out-of-bounds access in tests/subsys/canbus/isotp/implem…
805 * :github:`22653` - [Coverity CID :208196] Out-of-bounds access in drivers/eeprom/eeprom_simulator.c
810 * :github:`22648` - [Coverity CID :208201] Out-of-bounds write in soc/xtensa/intel_apl_adsp/soc.c
853 * :github:`22440` - [Coverity CID :207970] Out-of-bounds access in samples/net/sockets/websocket_cl…
855 * :github:`22438` - [Coverity CID :207973] Out-of-bounds access in tests/net/socket/websocket/src/m…
856 * :github:`22437` - [Coverity CID :207974] Out-of-bounds read in tests/net/socket/websocket/src/mai…
951 * :github:`21702` - [Coverity CID :206599] Out-of-bounds access in tests/bluetooth/uuid/src/main.c
952 * :github:`21700` - [Coverity CID :206606] Out-of-bounds access in tests/bluetooth/uuid/src/main.c
1049 * :github:`21095` - [Coverity CID :206086] Out-of-bounds access in drivers/timer/cortex_m_systick.c
Drelease-notes-1.9.rst81 configurations not featuring hardware stack bounds checking
350 * ``ZEP-2488`` - Build warnings [-Wpointer-sign] and [-Warray-bounds] with LLVM/icx (samples/net/ir…
/Zephyr-latest/subsys/net/pkt_filter/
Dbase.c265 struct npf_test_size_bounds *bounds = in npf_size_inbounds() local
269 return pkt_size >= bounds->min && pkt_size <= bounds->max; in npf_size_inbounds()
/Zephyr-latest/modules/liblc3/
DCMakeLists.txt4 -O3 -std=c11 -ffast-math -Wno-array-bounds -Wall -Wextra -Wdouble-promotion -Wvla -pedantic
/Zephyr-latest/include/zephyr/kernel/mm/
Ddemand_paging.h76 unsigned long bounds[CONFIG_DEMAND_PAGING_TIMING_HISTOGRAM_NUM_BINS]; member
/Zephyr-latest/tests/kernel/mem_protect/demand_paging/mem_map/src/
Dmain.c416 time_ns = timing_cycles_to_ns(hist->bounds[idx]); in print_histogram()
418 time_ns = k_cyc_to_ns_ceil64(hist->bounds[idx]); in print_histogram()
421 hist->bounds[idx], hist->counts[idx]); in print_histogram()
/Zephyr-latest/modules/hal_infineon/
DCMakeLists.txt7 zephyr_library_compile_options(-Wno-array-bounds)
/Zephyr-latest/tests/drivers/disk/disk_access/
DREADME.txt26 writes that would be outside the bounds of the disk), then performs multiple
/Zephyr-latest/cmake/compiler/gcc/
Dcompiler_flags.cmake191 # _FORTIFY_SOURCE=1 : Loose checking (use wide bounds checks)
192 # _FORTIFY_SOURCE=2 : Tight checking (use narrow bounds checks)
193 # GCC always does compile-time bounds checking for string/mem functions, so
/Zephyr-latest/arch/x86/core/
DKconfig.intel6482 bounds of the current process stack are overflowed. This is done
DKconfig.ia3273 bounds of the current process stack are overflowed. This is done
/Zephyr-latest/lib/heap/
DKconfig38 The sys_heap allocator bounds the number of tries from the
/Zephyr-latest/doc/kernel/usermode/
Doverview.rst75 - Using parameters outside of proper bounds or with nonsensical values.
163 the object, check the validity of other parameters through bounds checking or
Dmemory_domain.rst79 page table entries will be programmed with the bounds of the stack buffer.
262 /* The global variable var1 will be inside the bounds of my_partition
267 /* The global variable var2 will be inside the bounds of my_partition
/Zephyr-latest/arch/arm64/core/
DKconfig197 the bounds of the current process stack are overflowed. This is done

12