Searched refs:check (Results 1 – 15 of 15) sorted by relevance
/lib/ |
D | test_user_copy.c | 222 #define test_legit(size, check) \ in test_user_copy_init() argument 224 val_##size = check; \ in test_user_copy_init() 230 ret |= test(val_##size != check, \ in test_user_copy_init() 232 if (val_##size != check) { \ in test_user_copy_init() 235 (unsigned long long)check); \ in test_user_copy_init() 287 #define test_illegal(size, check) \ in test_user_copy_init() argument 289 val_##size = (check); \ in test_user_copy_init()
|
D | test_list_sort.c | 29 static void check(struct kunit *test, struct debug_el *ela, struct debug_el *elb) in check() function 54 check(priv, ela, elb); in cmp() 101 check(test, el, el1); in list_sort_test()
|
D | memcpy_kunit.c | 31 #define check(instance, v) do { \ macro 80 check(control, 0x20); in memcpy_test() 81 check(zero, 0); in memcpy_test() 154 check(control, 0x99); in memmove_test() 155 check(zero, 0); in memmove_test() 257 check(control, 0x30); in memset_test() 258 check(dest, 0); in memset_test()
|
D | rbtree_test.c | 191 static void check(int nr_nodes) in check() function 222 check(nr_nodes); in check_augmented() 336 check(j); in rbtree_test_init() 340 check(nnodes - j); in rbtree_test_init() 343 check(0); in rbtree_test_init()
|
D | test_blackhole_dev.c | 53 uh->check = 0; in test_blackholedev_init()
|
D | Kconfig.ubsan | 52 CONFIG_LOCAL_BOUNDS.) Explicitly check for -fsanitize=array-bounds 141 This option enables the check of unaligned memory accesses. 152 UBSAN_SANITIZE := y for the files/directories you want to check for UB.
|
D | Kconfig.kmsan | 42 eagerly check every function parameter passed by value and every
|
D | Kconfig.kasan | 142 Makes the compiler insert function calls that check whether the memory 183 Makes KASAN check the validity of accesses to vmalloc allocations.
|
D | Kconfig | 279 when they need to do cyclic redundancy check according CRC8 693 # memory-read error like x86 machine-check or ARM data-abort, and
|
D | Kconfig.kcsan | 25 also provides assertions to check data access constraints.
|
D | Kconfig.debug | 952 Say Y here if you want to check for overflows of kernel, IRQ 1103 to check that the next CPU is processing hrtimer interrupts by 1187 A timeout of 0 disables the check. The default is two minutes. 1368 check permanently enabled once the main issues have been fixed. 1451 This feature will check whether any held lock (spinlock, rwlock, 1735 This is a relatively cheap check but if you care about maximum 3023 and let the check be carried at runtime (with `panic!` being called if 3024 the check fails).
|
/lib/zlib_inflate/ |
D | inflate.c | 182 #define UPDATE(check, buf, len) zlib_adler32(check, buf, len) argument 390 strm->adler = state->check = zlib_adler32(0L, NULL, 0); in zlib_inflate() 396 strm->adler = state->check = REVERSE(hold); in zlib_inflate() 405 strm->adler = state->check = zlib_adler32(0L, NULL, 0); in zlib_inflate() 711 strm->adler = state->check = in zlib_inflate() 712 UPDATE(state->check, put - out, out); in zlib_inflate() 715 REVERSE(hold)) != state->check) { in zlib_inflate() 754 strm->adler = state->check = in zlib_inflate() 755 UPDATE(state->check, strm->next_out - out, out); in zlib_inflate() 804 z->adler = state->check = in zlib_inflateIncomp() [all …]
|
D | inflate.h | 81 unsigned long check; /* protected copy of check value */ member
|
/lib/zlib_dfltcc/ |
D | dfltcc_inflate.c | 132 param->cv = state->check; in dfltcc_inflate() 143 state->check = param->cv; in dfltcc_inflate()
|
/lib/zstd/compress/ |
D | hist.c | 69 HIST_checkInput_e check, in HIST_count_parallel_wksp() argument 128 if (check && maxSymbolValue > *maxSymbolValuePtr) return ERROR(maxSymbolValue_tooSmall); in HIST_count_parallel_wksp()
|