Home
last modified time | relevance | path

Searched refs:bounds (Results 1 – 25 of 47) sorted by relevance

12

/Zephyr-latest/kernel/paging/
Dstatistics.c148 memcpy(z_paging_histogram_eviction.bounds, in z_paging_histogram_init()
150 sizeof(z_paging_histogram_eviction.bounds)); in z_paging_histogram_init()
154 memcpy(z_paging_histogram_backing_store_page_in.bounds, in z_paging_histogram_init()
156 sizeof(z_paging_histogram_backing_store_page_in.bounds)); in z_paging_histogram_init()
160 memcpy(z_paging_histogram_backing_store_page_out.bounds, in z_paging_histogram_init()
162 sizeof(z_paging_histogram_backing_store_page_out.bounds)); in z_paging_histogram_init()
179 if (cycles <= hist->bounds[idx]) { in z_paging_histogram_inc()
/Zephyr-latest/kernel/
Dmempool.c97 size_t bounds; in k_calloc() local
101 if (size_mul_overflow(nmemb, size, &bounds)) { in k_calloc()
107 ret = k_malloc(bounds); in k_calloc()
109 (void)memset(ret, 0, bounds); in k_calloc()
Dkheap.c125 size_t bounds = 0U; in k_heap_calloc() local
127 if (!size_mul_overflow(num, size, &bounds)) { in k_heap_calloc()
128 ret = k_heap_alloc(heap, bounds, timeout); in k_heap_calloc()
131 (void)memset(ret, 0, bounds); in k_heap_calloc()
Dpoll.c354 uint32_t bounds; in z_vrfy_k_poll() local
365 &bounds), in z_vrfy_k_poll()
370 events_copy = z_thread_malloc(bounds); in z_vrfy_k_poll()
377 if (K_SYSCALL_MEMORY_WRITE(events, bounds)) { in z_vrfy_k_poll()
381 (void)memcpy(events_copy, events, bounds); in z_vrfy_k_poll()
418 (void)memcpy((void *)events, events_copy, bounds); in z_vrfy_k_poll()
DKconfig.vm34 2. The underlying architecture may impose constraints on the bounds of
81 RAM size larger than the defined bounds of the virtual address space.
206 the upper bounds for each bin. See kernel/statistics.c for
/Zephyr-latest/doc/releases/
Drelease-notes-2.6.rst1097 * :github:`35631` - [Coverity CID: 205610] Out-of-bounds read in /zephyr/include/generated/syscalls…
1098 * :github:`35630` - [Coverity CID: 205657] Out-of-bounds read in /zephyr/include/generated/syscalls…
1099 * :github:`35629` - [Coverity CID: 207968] Out-of-bounds read in /zephyr/include/generated/syscalls…
1100 * :github:`35628` - [Coverity CID: 207976] Out-of-bounds read in /zephyr/include/generated/syscalls…
1101 * :github:`35627` - [Coverity CID: 208195] Out-of-bounds read in /zephyr/include/generated/syscalls…
1102 * :github:`35626` - [Coverity CID: 210588] Out-of-bounds read in /zephyr/include/generated/syscalls…
1103 * :github:`35625` - [Coverity CID: 211042] Out-of-bounds read in /zephyr/include/generated/syscalls…
1104 * :github:`35624` - [Coverity CID: 214226] Out-of-bounds read in /zephyr/include/generated/syscalls…
1105 * :github:`35623` - [Coverity CID: 215223] Out-of-bounds read in /zephyr/include/generated/syscalls…
1106 * :github:`35622` - [Coverity CID: 215238] Out-of-bounds read in /zephyr/include/generated/syscalls…
[all …]
Drelease-notes-2.4.rst788 * Fixed out-of-bounds access and add flash_img_init return value check.
898 * :github:`28659` - [Coverity CID :214346] Out-of-bounds access in subsys/net/ip/tcp2.c
934 * :github:`28397` - gcc 10.x compile warning/error for array subscript is outside the bounds in cms…
940 * :github:`28375` - gcc 10.x compile warning/error for array subscript 0 is outside the bounds in t…
941 * :github:`28371` - gcc 10.x compile warning/error for array subscript 0 is outside the bounds in s…
1005 * :github:`28165` - [Coverity CID :214215] Out-of-bounds access in subsys/mgmt/mcumgr/smp_shell.c
1083 * :github:`27837` - [Coverity CID :212956] Out-of-bounds access in tests/kernel/mem_protect/mem_map…
1087 * :github:`27833` - [Coverity CID :212958] Out-of-bounds access in arch/x86/core/x86_mmu.c
1088 * :github:`27832` - [Coverity CID :212957] Out-of-bounds access in arch/x86/core/x86_mmu.c
1120 * :github:`27639` - [Coverity CID :212425] Out-of-bounds access in drivers/ethernet/eth_mcux.c
[all …]
Drelease-notes-3.0.rst299 * Fixed out-of-bounds error when large number of IRQs are enabled and ignore
1075 * :github:`41017` - USB string descriptors can be re-ordered causing corruption and out-of-bounds-w…
1208 * :github:`39852` - [Coverity CID: 240241] Out-of-bounds access in subsys/bluetooth/host/adv.c
1212 * :github:`39843` - [Coverity CID: 240659] Out-of-bounds read in /zephyr/include/generated/syscalls…
1215 * :github:`39839` - [Coverity CID: 240663] Out-of-bounds access in tests/benchmarks/mbedtls/src/ben…
1217 * :github:`39833` - [Coverity CID: 240670] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1218 * :github:`39832` - [Coverity CID: 240671] Out-of-bounds access in drivers/flash/flash_mcux_flexspi…
1219 * :github:`39830` - [Coverity CID: 240673] Out-of-bounds read in /zephyr/include/generated/syscalls…
1220 * :github:`39827` - [Coverity CID: 240676] Out-of-bounds access in drivers/ieee802154/ieee802154_dw…
1222 * :github:`39824` - [Coverity CID: 240679] Out-of-bounds access in samples/subsys/usb/cdc_acm_compo…
[all …]
Drelease-notes-2.5.rst613 * Fixed bounds checking in timeout.
1049 * :github:`31677` - [Coverity CID :216792] Out-of-bounds access in tests/net/lib/dns_addremove/src/…
1058 * :github:`31667` - [Coverity CID :215395] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1059 * :github:`31666` - [Coverity CID :215394] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1062 * :github:`31663` - [Coverity CID :215389] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1064 * :github:`31661` - [Coverity CID :215387] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1065 * :github:`31660` - [Coverity CID :215385] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1066 * :github:`31659` - [Coverity CID :215384] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1069 * :github:`31656` - [Coverity CID :215380] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
1071 * :github:`31654` - [Coverity CID :215377] Out-of-bounds access in tests/net/lib/dns_sd/src/main.c
[all …]
/Zephyr-latest/subsys/net/pkt_filter/
Dbase.c265 struct npf_test_size_bounds *bounds = in npf_size_inbounds() local
269 return pkt_size >= bounds->min && pkt_size <= bounds->max; in npf_size_inbounds()
/Zephyr-latest/modules/nrf_wifi/os/
Dshim.c59 size_t bounds; in zep_shim_mem_zalloc() local
63 if (size_mul_overflow(size_aligned, sizeof(char), &bounds)) { in zep_shim_mem_zalloc()
67 ret = zep_shim_mem_alloc(bounds); in zep_shim_mem_zalloc()
69 (void)memset(ret, 0, bounds); in zep_shim_mem_zalloc()
78 size_t bounds; in zep_shim_data_mem_zalloc() local
82 if (size_mul_overflow(size_aligned, sizeof(char), &bounds)) { in zep_shim_data_mem_zalloc()
86 ret = zep_shim_data_mem_alloc(bounds); in zep_shim_data_mem_zalloc()
88 (void)memset(ret, 0, bounds); in zep_shim_data_mem_zalloc()
/Zephyr-latest/modules/liblc3/
DCMakeLists.txt4 -O3 -std=c11 -ffast-math -Wno-array-bounds -Wall -Wextra -Wdouble-promotion -Wvla -pedantic
/Zephyr-latest/include/zephyr/kernel/mm/
Ddemand_paging.h76 unsigned long bounds[CONFIG_DEMAND_PAGING_TIMING_HISTOGRAM_NUM_BINS]; member
/Zephyr-latest/tests/kernel/mem_protect/demand_paging/mem_map/src/
Dmain.c416 time_ns = timing_cycles_to_ns(hist->bounds[idx]); in print_histogram()
418 time_ns = k_cyc_to_ns_ceil64(hist->bounds[idx]); in print_histogram()
421 hist->bounds[idx], hist->counts[idx]); in print_histogram()
/Zephyr-latest/cmake/compiler/gcc/
Dcompiler_flags.cmake192 # _FORTIFY_SOURCE=1 : Loose checking (use wide bounds checks)
193 # _FORTIFY_SOURCE=2 : Tight checking (use narrow bounds checks)
194 # GCC always does compile-time bounds checking for string/mem functions, so
253 set_compiler_property(PROPERTY warning_no_array_bounds -Wno-array-bounds)
/Zephyr-latest/tests/drivers/disk/disk_access/
DREADME.txt26 writes that would be outside the bounds of the disk), then performs multiple
/Zephyr-latest/arch/x86/core/
DKconfig.intel6482 bounds of the current process stack are overflowed. This is done
DKconfig.ia3273 bounds of the current process stack are overflowed. This is done
/Zephyr-latest/doc/develop/sca/
Dpolyspace.rst11 the absence of run-time errors like array out of bounds access, overflows,
/Zephyr-latest/samples/sensor/veml6031/
DREADME.rst17 returned to indicate the out of bounds situation to the user program.
/Zephyr-latest/doc/security/
Dvulnerabilities.rst112 Out-of-bounds write in USB Mass Storage with unaligned sizes
114 Out-of-bounds Write in the USB Mass Storage memoryWrite handler with
554 In the Zephyr Project MQTT code, improper bounds checking can result
668 Possible read out of bounds in dns read
1497 Out of bounds issue in remove_rx_filter in multiple can drivers.
1812 outside of the bounds of the buffer.
1844 Out of bounds read when calling crc16_ansi and strlen in dns_validate_msg
1846 A malicious or malformed DNS packet without a payload can cause an out-of-bounds
1866 Out of bounds read when unpacking DNS answers
1868 A lack of input validation allows for out of bounds reads caused by malicious or
[all …]
/Zephyr-latest/cmake/compiler/
Dcompiler_flags_template.cmake146 # Compiler flag for disabling warning about array bounds
/Zephyr-latest/doc/kernel/usermode/
Doverview.rst75 - Using parameters outside of proper bounds or with nonsensical values.
163 the object, check the validity of other parameters through bounds checking or
/Zephyr-latest/lib/heap/
DKconfig38 The sys_heap allocator bounds the number of tries from the
/Zephyr-latest/cmake/compiler/arcmwdt/
Dcompiler_flags.cmake212 # Update after testing that -Wshadow and -Wno-array-bounds works

12