Searched refs:sizes (Results 1 – 8 of 8) sorted by relevance
/tools/testing/selftests/arm64/mte/ |
D | check_buffer_fill.c | 16 static int sizes[] = { variable 35 item = sizeof(sizes)/sizeof(int); in check_buffer_by_byte() 38 ptr = (char *)mte_allocate_memory(sizes[i], mem_type, 0, true); in check_buffer_by_byte() 39 if (check_allocated_memory(ptr, sizes[i], mem_type, true) != KSFT_PASS) in check_buffer_by_byte() 41 mte_initialize_current_context(mode, (uintptr_t)ptr, sizes[i]); in check_buffer_by_byte() 43 for (j = 0; j < sizes[i]; j++) in check_buffer_by_byte() 48 for (j = 0; j < sizes[i] && !err; j++) { in check_buffer_by_byte() 52 mte_free_memory((void *)ptr, sizes[i], mem_type, true); in check_buffer_by_byte() 72 item = sizeof(sizes)/sizeof(int); in check_buffer_underflow_by_byte() 74 ptr = (char *)mte_allocate_memory_tag_range(sizes[i], mem_type, 0, in check_buffer_underflow_by_byte() [all …]
|
D | check_mmap_options.c | 28 static int sizes[] = { variable 64 int item = sizeof(sizes)/sizeof(int); in check_anonymous_memory_mapping() 66 item = sizeof(sizes)/sizeof(int); in check_anonymous_memory_mapping() 69 map_size = sizes[run] + OVERFLOW + UNDERFLOW; in check_anonymous_memory_mapping() 75 mte_initialize_current_context(mode, (uintptr_t)ptr, sizes[run]); in check_anonymous_memory_mapping() 77 ptr = mte_insert_tags((void *)ptr, sizes[run]); in check_anonymous_memory_mapping() 83 result = check_mte_memory(ptr, sizes[run], mode, tag_check); in check_anonymous_memory_mapping() 84 mte_clear_tags((void *)ptr, sizes[run]); in check_anonymous_memory_mapping() 96 int total = sizeof(sizes)/sizeof(int); in check_file_memory_mapping() 105 map_size = sizes[run] + UNDERFLOW + OVERFLOW; in check_file_memory_mapping() [all …]
|
D | check_child_memory.c | 24 static int sizes[] = { variable 88 int item = sizeof(sizes)/sizeof(int); in check_child_memory_mapping() 90 item = sizeof(sizes)/sizeof(int); in check_child_memory_mapping() 93 ptr = (char *)mte_allocate_memory_tag_range(sizes[run], mem_type, mapping, in check_child_memory_mapping() 95 if (check_allocated_memory_range(ptr, sizes[run], mem_type, in check_child_memory_mapping() 98 result = check_child_tag_inheritance(ptr, sizes[run], mode); in check_child_memory_mapping() 99 mte_free_memory_tag_range((void *)ptr, sizes[run], mem_type, UNDERFLOW, OVERFLOW); in check_child_memory_mapping() 110 int total = sizeof(sizes)/sizeof(int); in check_child_file_mapping() 118 map_size = sizes[run] + OVERFLOW + UNDERFLOW; in check_child_file_mapping() 125 mte_initialize_current_context(mode, (uintptr_t)ptr, sizes[run]); in check_child_file_mapping() [all …]
|
/tools/perf/Documentation/ |
D | jitdump-specification.txt | 132 The debug_entry entries are saved in sequence but given that they have variable sizes due to the fi…
|
D | perf-record.txt | 562 buffers (-m). It is generally more precise for higher sizes 563 (like >5M), for lower values expect different sizes.
|
D | perf-intel-pt.txt | 666 buffer sizes are limited to powers of 2 up to 4MiB (MAX_ORDER). In order to 667 provide other sizes, and in particular an arbitrarily large size, multiple 757 have memory limits imposed upon them. That affects what buffer sizes they can
|
/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 3734 struct seccomp_notif_sizes sizes; in TEST() local 3736 ASSERT_EQ(seccomp(SECCOMP_GET_NOTIF_SIZES, 0, &sizes), 0); in TEST() 3737 EXPECT_EQ(sizes.seccomp_notif, sizeof(struct seccomp_notif)); in TEST() 3738 EXPECT_EQ(sizes.seccomp_notif_resp, sizeof(struct seccomp_notif_resp)); in TEST()
|
/tools/memory-model/Documentation/ |
D | litmus-tests.txt | 966 2. Multiple access sizes for a single variable are not supported,
|