/linux-6.3-rc2/arch/arm/probes/kprobes/ |
A D | checkers-arm.c | 87 [PROBES_LDRSTRD] = {.checker = arm_check_stack}, 88 [PROBES_STORE_EXTRA] = {.checker = arm_check_stack}, 89 [PROBES_STORE] = {.checker = arm_check_stack}, 90 [PROBES_LDMSTM] = {.checker = arm_check_stack}, 160 [PROBES_MRS] = {.checker = arm_check_regs_normal}, 162 [PROBES_MUL1] = {.checker = arm_check_regs_normal}, 163 [PROBES_MUL2] = {.checker = arm_check_regs_normal}, 172 [PROBES_SEV] = {.checker = arm_check_regs_nouse}, 173 [PROBES_WFE] = {.checker = arm_check_regs_nouse}, 175 [PROBES_REV] = {.checker = arm_check_regs_normal}, [all …]
|
A D | checkers-thumb.c | 79 [PROBES_T32_LDMSTM] = {.checker = t32_check_stack}, 80 [PROBES_T32_LDRDSTRD] = {.checker = t32_check_stack}, 81 [PROBES_T32_LDRSTR] = {.checker = t32_check_stack}, 101 [PROBES_T16_PUSH] = {.checker = t16_check_stack},
|
/linux-6.3-rc2/lib/ |
A D | fortify_kunit.c | 153 checker(expected_size, \ 158 checker(expected_size, \ 165 checker(expected_size, \ 168 checker(expected_size, \ 175 checker(expected_size, \ 178 checker(expected_size, \ 183 checker(expected_size, \ 280 checker(expected_size, \ 283 checker(expected_size, \ 286 checker(expected_size, \ [all …]
|
A D | Kconfig.ubsan | 6 bool "Undefined behaviour sanity checker" 8 This option enables the Undefined Behaviour sanity checker.
|
/linux-6.3-rc2/drivers/net/wireguard/ |
A D | cookie.c | 22 init_rwsem(&checker->secret_lock); in wg_cookie_checker_init() 25 checker->device = wg; in wg_cookie_checker_init() 92 struct cookie_checker *checker) in make_cookie() argument 98 down_write(&checker->secret_lock); in make_cookie() 101 up_write(&checker->secret_lock); in make_cookie() 104 down_read(&checker->secret_lock); in make_cookie() 116 up_read(&checker->secret_lock); in make_cookie() 131 checker->message_mac1_key); in wg_cookie_validate_packet() 140 make_cookie(cookie, skb, checker); in wg_cookie_validate_packet() 192 make_cookie(cookie, skb, checker); in wg_cookie_message_create() [all …]
|
A D | cookie.h | 41 void wg_cookie_checker_init(struct cookie_checker *checker, 43 void wg_cookie_checker_precompute_device_keys(struct cookie_checker *checker); 47 enum cookie_mac_state wg_cookie_validate_packet(struct cookie_checker *checker, 55 struct cookie_checker *checker);
|
/linux-6.3-rc2/drivers/firmware/psci/ |
A D | Kconfig | 6 bool "ARM PSCI checker" 9 Run the PSCI checker during startup. This checks that hotplug and 12 The torture tests may interfere with the PSCI checker by turning CPUs 13 on and off through hotplug, so for now torture tests and PSCI checker
|
/linux-6.3-rc2/Documentation/features/debug/KASAN/ |
A D | arch-support.txt | 4 # description: arch supports the KASAN runtime memory checker
|
/linux-6.3-rc2/tools/testing/kunit/test_data/ |
A D | test_interrupted_tap_output.log | 13 [ 0.060000] Btrfs loaded, crc32c=crc32c-generic, debug=on, assert=on, integrity-checker=on, ref-…
|
/linux-6.3-rc2/fs/affs/ |
A D | Changes | 16 - The partition checker (drivers/block/genhd.c) 100 - Changed partition checker to allow devices 103 - The partition checker now also ignores the 338 - Partition checker for genhd.c
|
/linux-6.3-rc2/fs/btrfs/ |
A D | Makefile | 33 uuid-tree.o props.o free-space-tree.o tree-checker.o space-info.o \
|
/linux-6.3-rc2/arch/arm/probes/ |
A D | decode.h | 291 probes_check_t *checker; member
|
A D | decode.c | 355 probes_check_t *checker_func = (*p)[action].checker; in run_checkers()
|
/linux-6.3-rc2/Documentation/devicetree/bindings/phy/ |
A D | microchip,sparx5-serdes.yaml | 26 * Prbs generator and checker
|
/linux-6.3-rc2/Documentation/dev-tools/ |
A D | ubsan.rst | 4 UBSAN is a runtime undefined behaviour checker.
|
A D | sparse.rst | 8 Sparse is a semantic checker for C programs; it can be used to find a
|
/linux-6.3-rc2/Documentation/translations/zh_CN/kernel-hacking/ |
A D | hacking.rst | 676 * At least we *know* we can't spell, and use a spell-checker. 685 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
|
/linux-6.3-rc2/Documentation/process/ |
A D | submit-checklist.rst | 39 Check for trivial violations with the patch style checker prior to
|
A D | submitting-patches.rst | 209 Check your patches with the patch style checker prior to submission 210 (scripts/checkpatch.pl). Note, though, that the style checker should be 214 The checker reports at three levels:
|
A D | 4.Coding.rst | 273 One of the heavier debugging tools is the locking checker, or "lockdep."
|
/linux-6.3-rc2/Documentation/translations/it_IT/kernel-hacking/ |
A D | hacking.rst | 837 * At least we *know* we can't spell, and use a spell-checker. 846 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
|
/linux-6.3-rc2/Documentation/kernel-hacking/ |
A D | hacking.rst | 798 * At least we *know* we can't spell, and use a spell-checker. 807 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */
|
/linux-6.3-rc2/Documentation/driver-api/ |
A D | device-io.rst | 157 readl()/writel() functions. The 'sparse' semantic code checker can be used to
|
/linux-6.3-rc2/Documentation/translations/it_IT/process/ |
A D | 4.Coding.rst | 289 Uno degli strumenti di debugging più tosti è il *locking checker*, o
|
/linux-6.3-rc2/Documentation/bpf/ |
A D | verifier.rst | 10 (though classic BPF checker allows them)
|