Home
last modified time | relevance | path

Searched full:checks (Results 1 – 25 of 2580) sorted by relevance

12345678910>>...104

/linux-6.12.1/scripts/clang-tools/
Drun-clang-tools.py36 checks_help = "Checks to pass to the analysis"
37 parser.add_argument("-checks", type=str, default=None, help=checks_help)
52 # Disable all checks, then re-enable the ones we want
54 checks = None
55 if args.checks:
56 checks = args.checks.split(',')
58 checks = ["-*"]
60 checks.append("linuxkernel-*")
62 checks.append("clang-analyzer-*")
63 checks.append("-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling")
[all …]
/linux-6.12.1/tools/testing/selftests/landlock/
Dbase_test.c33 /* Checks copy_from_user(). */ in TEST()
53 /* Checks minimal valid attribute size. */ in TEST()
63 /* Checks non-zero value. */ in TEST()
101 /* Tests ordering of syscall argument checks. */
111 /* Checks priority for invalid flags. */ in TEST()
127 /* Checks too big ruleset_attr size. */ in TEST()
131 /* Checks too small ruleset_attr size. */ in TEST()
137 /* Checks valid call. */ in TEST()
144 /* Tests ordering of syscall argument checks. */
159 /* Checks invalid flags. */ in TEST()
[all …]
Dfs_test.c510 /* Checks unhandled allowed_access. */ in TEST_F_FORK()
811 * Checks that it is not possible to add nsfs-like filesystem in TEST_F_FORK()
888 /* Checks effective read and write actions. */ in TEST_F_FORK()
897 /* Just in case, double-checks effective actions. */ in TEST_F_FORK()
954 /* Checks s1d1 hierarchy. */ in TEST_F_FORK()
960 /* Checks s1d2 hierarchy. */ in TEST_F_FORK()
966 /* Checks s1d3 hierarchy. */ in TEST_F_FORK()
1010 /* Checks s1d1 hierarchy with layer1. */ in TEST_F_FORK()
1016 /* Checks s1d2 hierarchy with layer1. */ in TEST_F_FORK()
1022 /* Checks s1d3 hierarchy with layer1. */ in TEST_F_FORK()
[all …]
/linux-6.12.1/Documentation/virt/kvm/x86/
Dcpuid.rst65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit
69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit
77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit
85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit
89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit
95 KVM_FEATURE_MSI_EXT_DEST_ID 15 guest checks this feature bit
99 KVM_FEATURE_HC_MAP_GPA_RANGE 16 guest checks this feature bit before
103 KVM_FEATURE_MIGRATION_CONTROL 17 guest checks this feature bit before
120 KVM_HINTS_REALTIME 0 guest checks this feature bit to
/linux-6.12.1/fs/ubifs/
Ddebug.h53 * @chk_gen: if general extra checks are enabled
54 * @chk_index: if index xtra checks are enabled
55 * @chk_orph: if orphans extra checks are enabled
56 * @chk_lprops: if lprops extra checks are enabled
57 * @chk_fs: if UBIFS contents extra checks are enabled
65 * @dfs_chk_gen: debugfs knob to enable UBIFS general extra checks
66 * @dfs_chk_index: debugfs knob to enable UBIFS index extra checks
67 * @dfs_chk_orph: debugfs knob to enable UBIFS orphans extra checks
68 * @dfs_chk_lprops: debugfs knob to enable UBIFS LEP properties extra checks
69 * @dfs_chk_fs: debugfs knob to enable UBIFS contents extra checks
[all …]
/linux-6.12.1/security/landlock/
Dsyscalls.c64 /* Checks buffer inconsistencies. */ in copy_min_struct_from_user()
69 /* Checks size ranges. */ in copy_min_struct_from_user()
94 * For each user space ABI structures, first checks that there is no in build_check_abi()
95 * hole in them, then checks that all architectures have the same in build_check_abi()
187 /* Build-time checks. */ in SYSCALL_DEFINE3()
208 /* Checks content (and 32-bits cast). */ in SYSCALL_DEFINE3()
213 /* Checks network content (and 32-bits cast). */ in SYSCALL_DEFINE3()
218 /* Checks IPC scoping content (and 32-bits cast). */ in SYSCALL_DEFINE3()
222 /* Checks arguments and transforms to kernel struct. */ in SYSCALL_DEFINE3()
251 /* Checks FD type and access right. */ in get_ruleset_from_fd()
[all …]
Dfs.c433 * Checks if the destination restrictions are a in no_more_access()
449 * Checks inverted restrictions for RENAME_EXCHANGE: in no_more_access()
489 /* Checks without restriction. */ in test_no_more_access()
495 * Checks that we can only refer a file if no more access could be in test_no_more_access()
503 /* Checks allowed referring with different nested domains. */ in test_no_more_access()
512 /* Checks that file access rights are also enforced for a directory. */ in test_no_more_access()
515 /* Checks that directory access rights don't impact file referring... */ in test_no_more_access()
520 /* Checks directory exchange. */ in test_no_more_access()
527 /* Checks file exchange with directory access rights... */ in test_no_more_access()
559 /* Checks the same case of exclusive domains with a file... */ in test_no_more_access()
[all …]
Dnet.c66 /* Checks if it's a (potential) TCP socket. */ in current_check_access_socket()
70 /* Checks for minimal header length to safely read sa_family. */ in current_check_access_socket()
118 * checks, but it is safer to return a proper error and test in current_check_access_socket()
134 * Checks sa_family consistency to not wrongfully return in current_check_access_socket()
/linux-6.12.1/tools/testing/selftests/bpf/progs/
Dverifier_bounds_mix_sign_unsign.c16 __description("bounds checks mixing signed and unsigned, positive bounds")
48 __description("bounds checks mixing signed and unsigned")
80 __description("bounds checks mixing signed and unsigned, variant 2")
114 __description("bounds checks mixing signed and unsigned, variant 3")
147 __description("bounds checks mixing signed and unsigned, variant 4")
178 __description("bounds checks mixing signed and unsigned, variant 5")
211 __description("bounds checks mixing signed and unsigned, variant 6")
242 __description("bounds checks mixing signed and unsigned, variant 7")
274 __description("bounds checks mixing signed and unsigned, variant 8")
308 __description("bounds checks mixing signed and unsigned, variant 9")
[all …]
/linux-6.12.1/include/asm-generic/
Dsections.h81 * memory_contains - checks if an object is contained within a memory region
98 * memory_intersects - checks if the region occupied by an object intersects
120 * init_section_contains - checks if an object is contained within the init
134 * init_section_intersects - checks if the region occupied by an object
148 * is_kernel_core_data - checks if the pointer address is located in the
170 * is_kernel_rodata - checks if the pointer address is located in the
189 * is_kernel_inittext - checks if the pointer address is located in the
203 * __is_kernel_text - checks if the pointer address is located in the
218 * __is_kernel - checks if the pointer address is located in the kernel range
/linux-6.12.1/tools/usb/usbip/
Dconfigure.ac23 # Checks for programs.
28 # Checks for header files.
34 # Checks for typedefs, structures, and compiler characteristics.
42 # Checks for library functions.
53 # Checks for libwrap library.
/linux-6.12.1/lib/
DKconfig.ubsan93 This option enables -fsanitize=shift which checks for bit-shift
104 This option enables -fsanitize=integer-divide-by-zero which checks
116 This option enables -fsanitize=unreachable which checks for control
127 This option enables -fsanitize=signed-integer-overflow which checks
140 This option enables -fsanitize=bool which checks for boolean values being
148 This option enables -fsanitize=enum which checks for values being loaded
/linux-6.12.1/drivers/net/ethernet/intel/i40e/
Di40e_ddp.c27 * i40e_ddp_profiles_eq - checks if DDP profiles are the equivalent
31 * checks if DDP profiles are the equivalent.
43 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already
47 * checks if DDP profile loaded already.
74 * i40e_ddp_profiles_overlap - checks if DDP profiles overlap.
78 * checks if DDP profiles overlap.
98 * i40e_ddp_does_profile_overlap - checks if DDP overlaps with existing one.
102 * checks if DDP profile overlaps with existing one.
210 * i40e_ddp_is_pkg_hdr_valid - performs basic pkg header integrity checks
215 * Checks correctness of pkg header: Version, size too big/small, and
[all …]
/linux-6.12.1/Documentation/netlink/specs/
Dnetdev.yaml90 checks:
104 checks:
124 checks:
135 checks:
142 checks:
235 checks:
264 checks:
299 checks:
483 checks:
499 checks:
/linux-6.12.1/drivers/gpu/drm/i915/
DKconfig.debug50 select DRM_VGEM # used by igt/prime_vgem (dmabuf interop checks)
74 bool "Always insert extra checks around mmio access by default"
77 By default, always enables the extra sanity checks (extra register
87 bool "Insert extra checks into the GEM internals"
91 Enable extra sanity checks (including BUGs) along the GEM driver
Di915_reg_defs.h16 * Local wrapper for BIT() to force u32, with compile time checks.
29 * Local wrapper for BIT() to force u8, with compile time checks.
43 * Local wrapper for GENMASK() to force u32, with compile time checks.
58 * Local wrapper for GENMASK_ULL() to force u64, with compile time checks.
73 * Local wrapper for GENMASK() to force u8, with compile time checks.
151 * checks.
166 * checks.
/linux-6.12.1/
DKbuild61 atomic-checks += $(addprefix $(obj)/.checked-, \
66 targets += $(atomic-checks)
67 $(atomic-checks): $(obj)/.checked-%: include/linux/atomic/% FORCE
73 prepare: $(offsets-file) missing-syscalls $(atomic-checks)
/linux-6.12.1/Documentation/dev-tools/
Dtesting-overview.rst134 Smatch extends Sparse and provides additional checks for programming logic
144 available include API tests, tests for correct usage of kernel iterators, checks
164 It's generally easier to write checks in Smatch than it is to write checks in
165 Sparse. Nevertheless, there are some overlaps between Sparse and Smatch checks.
170 Coccinelle is probably the easiest for writing checks. It works before the
Dkasan.rst53 Software KASAN modes use compile-time instrumentation to insert validity checks
56 these checks but still requires a compiler version that supports the memory
141 register for arm64). The kernel periodically checks the hardware and
142 only reports tag faults during these checks.
155 Note that enabling this parameter makes Hardware Tag-Based KASAN skip checks
309 checks before each memory access.
326 Compile-time instrumentation is used to insert memory access checks. Compiler
354 Software Tag-Based KASAN uses compile-time instrumentation to insert checks
355 before each memory access. These checks make sure that the tag of the memory
362 memory checks inline). With outline instrumentation mode, a bug report is
[all …]
/linux-6.12.1/include/linux/
Dkcsan.h4 * data structures to set up runtime. See kcsan-checks.h for explicit checks and
13 #include <linux/kcsan-checks.h>
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dtailcalls.c11 /* test_tailcall_1 checks basic functionality by patching multiple locations
13 * and jmp->jmp rewrites. Also checks for nop->nop.
147 /* test_tailcall_2 checks that patching multiple programs for a single
391 /* test_tailcall_3 checks that the count value of the tail call limit
399 /* test_tailcall_6 checks that the count value of the tail call limit
407 /* test_tailcall_4 checks that the kernel properly selects indirect jump
671 /* test_tailcall_bpf2bpf_2 checks that the count value of the tail call limit
751 /* test_tailcall_bpf2bpf_3 checks that non-trivial amount of stack (up to
832 /* test_tailcall_bpf2bpf_4 checks that tailcall counter is correctly preserved
981 /* test_tailcall_bpf2bpf_fentry checks that the count value of the tail call
[all …]
/linux-6.12.1/tools/testing/memblock/
DREADME16 consist of a series of checks that exercise both the basic operations and
18 memory allocator is initialized at the build time, so the checks here reuse its
57 The project has one target, main, which calls a group of checks for basic and
95 (...allocation checks...)
/linux-6.12.1/drivers/net/wireless/marvell/mwifiex/
D11n.h68 /* This function checks whether AMPDU is allowed or not for a particular TID. */
87 * This function checks whether AMSDU is allowed or not for a particular TID.
98 * This function checks whether a space is available for new BA stream or not.
154 * This function checks whether associated station is 11n enabled
/linux-6.12.1/fs/xfs/
DKconfig199 It converts ASSERT checks to WARN, so will log any out-of-bounds
212 including ASSERT checks, function wrappers around macros,
221 bool "XFS expensive debugging checks"
224 Say Y here to get an XFS build with expensive debugging checks
225 enabled. These checks may affect performance significantly.
/linux-6.12.1/drivers/net/can/spi/mcp251xfd/
DKconfig14 bool "Additional Sanity Checks"
16 This option enables additional sanity checks in the driver,

12345678910>>...104