| /lib/tests/ |
| A D | stackinit_kunit.c | 99 zero.two = 0; \ 118 .two = 0, \ 122 #define __dynamic_partial { .two = arg->two, } 124 .two = arg->two, \ 306 unsigned long two; member 314 char two; member 323 u8 two; member 331 char *two; member 340 unsigned long two; member 348 unsigned long two; member [all …]
|
| A D | memcpy_kunit.c | 23 u16 two; member 40 #define compare(name, one, two) do { \ argument 41 BUILD_BUG_ON(sizeof(one) != sizeof(two)); \ 43 KUNIT_EXPECT_EQ_MSG(test, one.data[i], two.data[i], \ 45 __LINE__, #one, i, one.data[i], #two, i, two.data[i]); \
|
| A D | fortify_kunit.c | 655 char two[] = "BC"; in fortify_test_strcat() local 698 KUNIT_ASSERT_TRUE(test, strcat(pad.buf, two) == pad.buf); in fortify_test_strcat() 1005 char two[] = "My mind is going ... I can feel it."; in fortify_test_memcmp() local 1007 volatile size_t two_len = sizeof(two) - 1; in fortify_test_memcmp() 1013 KUNIT_ASSERT_EQ(test, memcmp(one, two, one_len), 0); in fortify_test_memcmp() 1016 KUNIT_ASSERT_LT(test, memcmp(one, two, one_len + 1), 0); in fortify_test_memcmp() 1020 KUNIT_ASSERT_EQ(test, memcmp(one, two, one_len + 2), INT_MIN); in fortify_test_memcmp() 1023 KUNIT_ASSERT_EQ(test, memcmp(two, one, two_len + 2), INT_MIN); in fortify_test_memcmp()
|
| A D | overflow_kunit.c | 1188 DEFINE_RAW_FLEX(struct bar, two, array, 2); in DEFINE_FLEX_test() 1195 KUNIT_EXPECT_EQ(test, sizeof(*two), sizeof(struct bar)); in DEFINE_FLEX_test() 1196 KUNIT_EXPECT_EQ(test, __struct_size(two), sizeof(struct bar) + 2 * sizeof(s16)); in DEFINE_FLEX_test() 1197 KUNIT_EXPECT_EQ(test, __member_size(two), sizeof(struct bar) + 2 * sizeof(s16)); in DEFINE_FLEX_test() 1198 KUNIT_EXPECT_EQ(test, __struct_size(two->array), 2 * sizeof(s16)); in DEFINE_FLEX_test() 1199 KUNIT_EXPECT_EQ(test, __member_size(two->array), 2 * sizeof(s16)); in DEFINE_FLEX_test() 1213 KUNIT_EXPECT_EQ(test, STACK_FLEX_ARRAY_SIZE(two, array), 2); in DEFINE_FLEX_test()
|
| /lib/crypto/x86/ |
| A D | sha512-ssse3-asm.S | 12 # This software is available to you under a choice of one of two 157 # The two new schedule QWORDS are stored at [W_t(%%t)] and [W_t(%%t+1)]. 167 # by two tabs.
|
| A D | chacha-avx512vl-x86_64.S | 34 # This function encrypts two ChaCha blocks by loading the state 201 # operations on four words in two matrices in parallel, sequentially 202 # to the operations on the four words of the other two matrices. The 204 # arithmetic on two matrix-pairs without much slowdown.
|
| A D | chacha-avx2-x86_64.S | 44 # This function encrypts two ChaCha blocks by loading the state 238 # operations on four words in two matrices in parallel, sequentially 239 # to the operations on the four words of the other two matrices. The 241 # arithmetic on two matrix-pairs without much slowdown.
|
| A D | sha512-avx-asm.S | 12 # This software is available to you under a choice of one of two 162 # The two new schedule QWORDS are stored at [W_t(t)] and [W_t(t+1)].
|
| A D | sha256-avx-asm.S | 11 # This software is available to you under a choice of one of two 154 ## compute s0 four at a time and s1 two at a time
|
| A D | sha256-ssse3-asm.S | 11 # This software is available to you under a choice of one of two 148 ## compute s0 four at a time and s1 two at a time
|
| A D | sha256-avx2-asm.S | 11 # This software is available to you under a choice of one of two 561 ## Load first 16 dwords from two blocks
|
| A D | sha512-avx2-asm.S | 12 # This software is available to you under a choice of one of two
|
| /lib/ |
| A D | Kconfig.kfence | 45 pages are required; with one containing the object and two adjacent
|
| A D | Kconfig.kcsan | 226 notice that data races between two conflicting plain aligned writes 244 due to two conflicting plain writes will be reported (aligned and
|
| A D | Kconfig.kgdb | 162 crash and try to drop into kgdb somewhere between these two
|
| A D | Kconfig.ubsan | 50 of two more specific options, -fsanitize=array-bounds and
|
| A D | Kconfig.debug | 607 puts the following two restrictions on percpu variable 1142 # two exceptions. The hardlockup detector is never enabled on: 1263 A timeout of 0 disables the check. The default is two minutes. 2435 recovery of all the possible two disk failure scenarios for a 3019 We stress test find_symbol() through two means: 3140 Test the memcat_p() helper for correctly merging two 3223 The test consists of two parts: saving kernel data before kexec and 3285 provides two functions to compute the integer logarithm in base 2 and 3296 which computes the greatest common divisor of two numbers.
|
| /lib/crypto/arm/ |
| A D | sha1-armv4-large.S | 34 @ with recurring code in two private functions; 44 @ diverse as ARM ones: e.g., there are only two arithmetic
|