Home
last modified time | relevance | path

Searched refs:check (Results 1 – 15 of 15) sorted by relevance

/lib/
Dtest_user_copy.c222 #define test_legit(size, check) \ in test_user_copy_init() argument
224 val_##size = check; \ in test_user_copy_init()
230 ret |= test(val_##size != check, \ in test_user_copy_init()
232 if (val_##size != check) { \ in test_user_copy_init()
235 (unsigned long long)check); \ in test_user_copy_init()
287 #define test_illegal(size, check) \ in test_user_copy_init() argument
289 val_##size = (check); \ in test_user_copy_init()
Dtest_list_sort.c29 static void check(struct kunit *test, struct debug_el *ela, struct debug_el *elb) in check() function
54 check(priv, ela, elb); in cmp()
101 check(test, el, el1); in list_sort_test()
Dmemcpy_kunit.c31 #define check(instance, v) do { \ macro
80 check(control, 0x20); in memcpy_test()
81 check(zero, 0); in memcpy_test()
154 check(control, 0x99); in memmove_test()
155 check(zero, 0); in memmove_test()
257 check(control, 0x30); in memset_test()
258 check(dest, 0); in memset_test()
Drbtree_test.c191 static void check(int nr_nodes) in check() function
222 check(nr_nodes); in check_augmented()
336 check(j); in rbtree_test_init()
340 check(nnodes - j); in rbtree_test_init()
343 check(0); in rbtree_test_init()
Dtest_blackhole_dev.c53 uh->check = 0; in test_blackholedev_init()
DKconfig.ubsan52 CONFIG_LOCAL_BOUNDS.) Explicitly check for -fsanitize=array-bounds
141 This option enables the check of unaligned memory accesses.
152 UBSAN_SANITIZE := y for the files/directories you want to check for UB.
DKconfig.kmsan42 eagerly check every function parameter passed by value and every
DKconfig.kasan142 Makes the compiler insert function calls that check whether the memory
183 Makes KASAN check the validity of accesses to vmalloc allocations.
DKconfig279 when they need to do cyclic redundancy check according CRC8
693 # memory-read error like x86 machine-check or ARM data-abort, and
DKconfig.kcsan25 also provides assertions to check data access constraints.
DKconfig.debug952 Say Y here if you want to check for overflows of kernel, IRQ
1103 to check that the next CPU is processing hrtimer interrupts by
1187 A timeout of 0 disables the check. The default is two minutes.
1368 check permanently enabled once the main issues have been fixed.
1451 This feature will check whether any held lock (spinlock, rwlock,
1735 This is a relatively cheap check but if you care about maximum
3023 and let the check be carried at runtime (with `panic!` being called if
3024 the check fails).
/lib/zlib_inflate/
Dinflate.c182 #define UPDATE(check, buf, len) zlib_adler32(check, buf, len) argument
390 strm->adler = state->check = zlib_adler32(0L, NULL, 0); in zlib_inflate()
396 strm->adler = state->check = REVERSE(hold); in zlib_inflate()
405 strm->adler = state->check = zlib_adler32(0L, NULL, 0); in zlib_inflate()
711 strm->adler = state->check = in zlib_inflate()
712 UPDATE(state->check, put - out, out); in zlib_inflate()
715 REVERSE(hold)) != state->check) { in zlib_inflate()
754 strm->adler = state->check = in zlib_inflate()
755 UPDATE(state->check, strm->next_out - out, out); in zlib_inflate()
804 z->adler = state->check = in zlib_inflateIncomp()
[all …]
Dinflate.h81 unsigned long check; /* protected copy of check value */ member
/lib/zlib_dfltcc/
Ddfltcc_inflate.c132 param->cv = state->check; in dfltcc_inflate()
143 state->check = param->cv; in dfltcc_inflate()
/lib/zstd/compress/
Dhist.c69 HIST_checkInput_e check, in HIST_count_parallel_wksp() argument
128 if (check && maxSymbolValue > *maxSymbolValuePtr) return ERROR(maxSymbolValue_tooSmall); in HIST_count_parallel_wksp()