Home
last modified time | relevance | path

Searched refs:check (Results 1 – 10 of 10) sorted by relevance

/lib/
Dtest_user_copy.c222 #define test_legit(size, check) \ in test_user_copy_init() argument
224 val_##size = check; \ in test_user_copy_init()
230 ret |= test(val_##size != check, \ in test_user_copy_init()
232 if (val_##size != check) { \ in test_user_copy_init()
235 (unsigned long long)check); \ in test_user_copy_init()
287 #define test_illegal(size, check) \ in test_user_copy_init() argument
289 val_##size = (check); \ in test_user_copy_init()
Dtest_list_sort.c32 static int __init check(struct debug_el *ela, struct debug_el *elb) in check() function
66 check(ela, elb); in cmp()
123 if (check(el, el1)) { in list_sort_test()
DKconfig.ubsan27 UBSAN_SANITIZE := y for the files/directories you want to check for UB.
36 This option disables the check of unaligned memory accesses.
Drbtree_test.c191 static void check(int nr_nodes) in check() function
222 check(nr_nodes); in check_augmented()
336 check(j); in rbtree_test_init()
340 check(nnodes - j); in rbtree_test_init()
343 check(0); in rbtree_test_init()
Dtest_blackhole_dev.c54 uh->check = 0; in test_blackholedev_init()
DKconfig.kasan91 __asan_load*/__asan_store*. These functions performs check
DKconfig237 when they need to do cyclic redundancy check according CRC8
DKconfig.debug743 Say Y here if you want to check for overflows of kernel, IRQ
936 A timeout of 0 disables the check. The default is two minutes.
1195 This feature will check whether any held lock (spinlock, rwlock,
1388 This is a relatively cheap check but if you care about maximum
/lib/zlib_inflate/
Dinflate.c163 #define UPDATE(check, buf, len) zlib_adler32(check, buf, len) argument
376 strm->adler = state->check = zlib_adler32(0L, NULL, 0); in zlib_inflate()
382 strm->adler = state->check = REVERSE(hold); in zlib_inflate()
391 strm->adler = state->check = zlib_adler32(0L, NULL, 0); in zlib_inflate()
696 strm->adler = state->check = in zlib_inflate()
697 UPDATE(state->check, put - out, out); in zlib_inflate()
700 REVERSE(hold)) != state->check) { in zlib_inflate()
738 strm->adler = state->check = in zlib_inflate()
739 UPDATE(state->check, strm->next_out - out, out); in zlib_inflate()
788 z->adler = state->check = in zlib_inflateIncomp()
[all …]
Dinflate.h79 unsigned long check; /* protected copy of check value */ member