/linux/scripts/clang-tools/ |
H A D | run-clang-tools.py | 36 checks_help = "Checks to pass to the analysis" 37 parser.add_argument("-checks", type=str, default=None, help=checks_help) 52 # Disable all checks, then re-enable the ones we want 54 checks = None 55 if args.checks: 56 checks = args.checks.split(',') 58 checks = ["-*"] 60 checks.append("linuxkernel-*") 62 checks.append("clang-analyzer-*") 63 checks.append("-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling") [all …]
|
/linux/tools/testing/selftests/landlock/ |
H A D | base_test.c | 33 /* Checks copy_from_user(). */ in TEST() 53 /* Checks minimal valid attribute size. */ in TEST() 63 /* Checks non-zero value. */ in TEST() 101 /* Tests ordering of syscall argument checks. */ 111 /* Checks priority for invalid flags. */ in TEST() 127 /* Checks too big ruleset_attr size. */ in TEST() 131 /* Checks too small ruleset_attr size. */ in TEST() 137 /* Checks valid call. */ in TEST() 144 /* Tests ordering of syscall argument checks. */ 159 /* Checks invalid flags. */ in TEST() [all …]
|
/linux/Documentation/virt/kvm/x86/ |
H A D | cpuid.rst | 65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit 69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit 77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit 85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit 89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit 95 KVM_FEATURE_MSI_EXT_DEST_ID 15 guest checks this feature bit 99 KVM_FEATURE_HC_MAP_GPA_RANGE 16 guest checks this feature bit before 103 KVM_FEATURE_MIGRATION_CONTROL 17 guest checks this feature bit before 120 KVM_HINTS_REALTIME 0 guest checks this feature bit to
|
/linux/fs/ubifs/ |
H A D | debug.h | 53 * @chk_gen: if general extra checks are enabled 54 * @chk_index: if index xtra checks are enabled 55 * @chk_orph: if orphans extra checks are enabled 56 * @chk_lprops: if lprops extra checks are enabled 57 * @chk_fs: if UBIFS contents extra checks are enabled 65 * @dfs_chk_gen: debugfs knob to enable UBIFS general extra checks 66 * @dfs_chk_index: debugfs knob to enable UBIFS index extra checks 67 * @dfs_chk_orph: debugfs knob to enable UBIFS orphans extra checks 68 * @dfs_chk_lprops: debugfs knob to enable UBIFS LEP properties extra checks 69 * @dfs_chk_fs: debugfs knob to enable UBIFS contents extra checks [all …]
|
/linux/security/landlock/ |
H A D | syscalls.c | 65 /* Checks buffer inconsistencies. */ in copy_min_struct_from_user() 70 /* Checks size ranges. */ in copy_min_struct_from_user() 95 * For each user space ABI structures, first checks that there is no in build_check_abi() 96 * hole in them, then checks that all architectures have the same in build_check_abi() 188 /* Build-time checks. */ in SYSCALL_DEFINE3() 209 /* Checks content (and 32-bits cast). */ in SYSCALL_DEFINE3() 214 /* Checks network content (and 32-bits cast). */ in SYSCALL_DEFINE3() 219 /* Checks IPC scoping content (and 32-bits cast). */ in SYSCALL_DEFINE3() 223 /* Checks arguments and transforms to kernel struct. */ in SYSCALL_DEFINE3() 251 /* Checks FD type and access right. */ in get_ruleset_from_fd() [all …]
|
H A D | fs.c | 426 * Checks if the destination restrictions are a in no_more_access() 442 * Checks inverted restrictions for RENAME_EXCHANGE: in no_more_access() 482 /* Checks without restriction. */ in test_no_more_access() 488 * Checks that we can only refer a file if no more access could be in test_no_more_access() 496 /* Checks allowed referring with different nested domains. */ in test_no_more_access() 505 /* Checks that file access rights are also enforced for a directory. */ in test_no_more_access() 508 /* Checks that directory access rights don't impact file referring... */ in test_no_more_access() 513 /* Checks directory exchange. */ in test_no_more_access() 520 /* Checks file exchange with directory access rights... */ in test_no_more_access() 552 /* Checks the same case of exclusive domains with a file... */ in test_no_more_access() [all …]
|
H A D | task.c | 27 * domain_scope_le - Checks domain ordering for scoped ptrace 32 * Checks if the @parent domain is less or equal to (i.e. an ancestor, which 115 * domain_is_scoped - Checks if the client domain is scoped in the same 149 * as the server's domain, and checks that none of these client's in domain_is_scoped() 240 * Checks if this datagram socket was already allowed to be connected in hook_unix_may_send()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_bounds_mix_sign_unsign.c | 16 __description("bounds checks mixing signed and unsigned, positive bounds") 48 __description("bounds checks mixing signed and unsigned") 80 __description("bounds checks mixing signed and unsigned, variant 2") 114 __description("bounds checks mixing signed and unsigned, variant 3") 147 __description("bounds checks mixing signed and unsigned, variant 4") 178 __description("bounds checks mixing signed and unsigned, variant 5") 211 __description("bounds checks mixing signed and unsigned, variant 6") 242 __description("bounds checks mixing signed and unsigned, variant 7") 274 __description("bounds checks mixing signed and unsigned, variant 8") 308 __description("bounds checks mixing signed and unsigned, variant 9") [all …]
|
/linux/include/asm-generic/ |
H A D | sections.h | 81 * memory_contains - checks if an object is contained within a memory region 98 * memory_intersects - checks if the region occupied by an object intersects 120 * init_section_contains - checks if an object is contained within the init 134 * init_section_intersects - checks if the region occupied by an object 148 * is_kernel_core_data - checks if the pointer address is located in the 170 * is_kernel_rodata - checks if the pointer address is located in the 189 * is_kernel_inittext - checks if the pointer address is located in the 203 * __is_kernel_text - checks if the pointer address is located in the 218 * __is_kernel - checks if the pointer address is located in the kernel range
|
/linux/tools/usb/usbip/ |
H A D | configure.ac | 23 # Checks for programs. 28 # Checks for header files. 34 # Checks for typedefs, structures, and compiler characteristics. 42 # Checks for library functions. 53 # Checks for libwrap library.
|
/linux/lib/ |
H A D | Kconfig.ubsan | 93 This option enables -fsanitize=shift which checks for bit-shift 104 This option enables -fsanitize=integer-divide-by-zero which checks 116 This option enables -fsanitize=unreachable which checks for control 127 This option enables -fsanitize=signed-integer-overflow which checks 140 This option enables -fsanitize=bool which checks for boolean values being 148 This option enables -fsanitize=enum which checks for values being loaded
|
/linux/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_ddp.c | 27 * i40e_ddp_profiles_eq - checks if DDP profiles are the equivalent 31 * checks if DDP profiles are the equivalent. 43 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already 47 * checks if DDP profile loaded already. 74 * i40e_ddp_profiles_overlap - checks if DDP profiles overlap. 78 * checks if DDP profiles overlap. 98 * i40e_ddp_does_profile_overlap - checks if DDP overlaps with existing one. 102 * checks if DDP profile overlaps with existing one. 210 * i40e_ddp_is_pkg_hdr_valid - performs basic pkg header integrity checks 215 * Checks correctness of pkg header: Version, size too big/small, and [all …]
|
/linux/Documentation/netlink/specs/ |
H A D | netdev.yaml | 90 checks: 104 checks: 124 checks: 135 checks: 142 checks: 235 checks: 256 checks: 284 checks: 319 checks: 503 checks: [all …]
|
/linux/drivers/gpu/drm/i915/ |
H A D | Kconfig.debug | 50 select DRM_VGEM # used by igt/prime_vgem (dmabuf interop checks) 74 bool "Always insert extra checks around mmio access by default" 77 By default, always enables the extra sanity checks (extra register 87 bool "Insert extra checks into the GEM internals" 91 Enable extra sanity checks (including BUGs) along the GEM driver
|
/linux/ |
H A D | Kbuild | 61 atomic-checks += $(addprefix $(obj)/.checked-, \ 66 targets += $(atomic-checks) 67 $(atomic-checks): $(obj)/.checked-%: include/linux/atomic/% FORCE 73 prepare: $(offsets-file) missing-syscalls $(atomic-checks)
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | tailcalls.c | 12 /* test_tailcall_1 checks basic functionality by patching multiple locations 14 * and jmp->jmp rewrites. Also checks for nop->nop. 148 /* test_tailcall_2 checks that patching multiple programs for a single 392 /* test_tailcall_3 checks that the count value of the tail call limit 400 /* test_tailcall_6 checks that the count value of the tail call limit 408 /* test_tailcall_4 checks that the kernel properly selects indirect jump 672 /* test_tailcall_bpf2bpf_2 checks that the count value of the tail call limit 752 /* test_tailcall_bpf2bpf_3 checks that non-trivial amount of stack (up to 833 /* test_tailcall_bpf2bpf_4 checks that tailcall counter is correctly preserved 982 /* test_tailcall_bpf2bpf_fentry checks that the count value of the tail call [all …]
|
/linux/Documentation/dev-tools/ |
H A D | testing-overview.rst | 134 Smatch extends Sparse and provides additional checks for programming logic 144 available include API tests, tests for correct usage of kernel iterators, checks 164 It's generally easier to write checks in Smatch than it is to write checks in 165 Sparse. Nevertheless, there are some overlaps between Sparse and Smatch checks. 170 Coccinelle is probably the easiest for writing checks. It works before the
|
/linux/include/linux/ |
H A D | kcsan.h | 4 * data structures to set up runtime. See kcsan-checks.h for explicit checks and 13 #include <linux/kcsan-checks.h>
|
/linux/fs/xfs/ |
H A D | Kconfig | 199 It converts ASSERT checks to WARN, so will log any out-of-bounds 212 including ASSERT checks, function wrappers around macros, 221 bool "XFS expensive debugging checks" 224 Say Y here to get an XFS build with expensive debugging checks 225 enabled. These checks may affect performance significantly.
|
/linux/tools/testing/memblock/ |
H A D | README | 16 consist of a series of checks that exercise both the basic operations and 18 memory allocator is initialized at the build time, so the checks here reuse its 57 The project has one target, main, which calls a group of checks for basic and 95 (...allocation checks...)
|
/linux/drivers/net/wireless/marvell/mwifiex/ |
H A D | 11n.h | 68 /* This function checks whether AMPDU is allowed or not for a particular TID. */ 87 * This function checks whether AMSDU is allowed or not for a particular TID. 98 * This function checks whether a space is available for new BA stream or not. 154 * This function checks whether associated station is 11n enabled
|
/linux/drivers/net/dsa/microchip/ |
H A D | ksz9477_tc_flower.c | 22 * the corresponding ACL entries. It checks for unsupported offloads and 104 * This function checks if the used keys in the flow rule are supported by 150 * This function checks if the actions in the flow rule are supported by 209 * ksz_device. It checks if the ACL offloading is supported and parses the flow 263 * ksz_device. It checks if the ACL is initialized, and if not, returns an
|
/linux/Documentation/filesystems/xfs/ |
H A D | xfs-self-describing-metadata.rst | 51 not detected by automated verification checks) but are not correct. Finding and 89 fast. So while CRC32c is not the strongest of possible integrity checks that 178 further checks are made against the location information, followed by extensive 179 object specific metadata validation. If any of these checks fail, then the 267 /* object specific verification checks here */ 292 /* object specific verification checks here */ 339 verification checks are done when each inode is read from or written back to the 342 The structure of the verifiers and the identifiers checks is very similar to the
|
/linux/arch/s390/kernel/ |
H A D | nmi.c | 158 * and machine checks enabled. 166 * Disable machine checks and get the current state of accumulated in s390_handle_mcck() 167 * machine checks. Afterwards delete the old state and enable machine in s390_handle_mcck() 168 * checks again. in s390_handle_mcck() 322 * Reinject the instruction processing damages' machine checks in s390_do_machine_check() 393 * Reinject storage related machine checks into the guest if they in s390_do_machine_check() 420 * machine checks, they will not be reinjected into the guest in s390_do_machine_check()
|
/linux/tools/perf/arch/x86/tests/ |
H A D | bp-modify.c | 57 * change it and checks it was properly changed. 77 * - waits for the breakpoint to hit and checks in bp_modify1() 133 * change it to bogus value and checks the original 154 * - waits for the breakpoint to hit and checks in bp_modify2()
|