/openbmc/linux/tools/testing/selftests/landlock/ |
H A D | base_test.c | 33 /* Checks copy_from_user(). */ in TEST() 53 /* Checks minimal valid attribute size. */ in TEST() 63 /* Checks non-zero value. */ in TEST() 101 /* Tests ordering of syscall argument checks. */ 111 /* Checks priority for invalid flags. */ in TEST() 127 /* Checks too big ruleset_attr size. */ in TEST() 131 /* Checks too small ruleset_attr size. */ in TEST() 137 /* Checks valid call. */ in TEST() 144 /* Tests ordering of syscall argument checks. */ 159 /* Checks invalid flags. */ in TEST() [all …]
|
H A D | fs_test.c | 482 /* Checks unhandled allowed_access. */ in TEST_F_FORK() 728 * Checks that it is not possible to add nsfs-like filesystem in TEST_F_FORK() 805 /* Checks effective read and write actions. */ in TEST_F_FORK() 814 /* Just in case, double-checks effective actions. */ in TEST_F_FORK() 871 /* Checks s1d1 hierarchy. */ in TEST_F_FORK() 877 /* Checks s1d2 hierarchy. */ in TEST_F_FORK() 883 /* Checks s1d3 hierarchy. */ in TEST_F_FORK() 927 /* Checks s1d1 hierarchy with layer1. */ in TEST_F_FORK() 933 /* Checks s1d2 hierarchy with layer1. */ in TEST_F_FORK() 939 /* Checks s1d3 hierarchy with layer1. */ in TEST_F_FORK() [all …]
|
/openbmc/linux/scripts/clang-tools/ |
H A D | run-clang-tools.py | 47 # Disable all checks, then re-enable the ones we want 48 checks = [] 49 checks.append("-checks=-*") 51 checks.append("linuxkernel-*") 53 checks.append("clang-analyzer-*") 54 checks.append("-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling") 55 p = subprocess.run(["clang-tidy", "-p", args.path, ",".join(checks), entry["file"]],
|
/openbmc/u-boot/tools/patman/ |
H A D | checkpatch.py | 52 checks: Number of checks 56 fields = ['ok', 'problems', 'errors', 'warnings', 'checks', 'lines', 60 result.errors, result.warning, result.checks = 0, 0, 0 72 # total: 0 errors, 2 warnings, 7 checks, 473 lines checked 75 ' checks, (\d+)') 98 result.checks = int(match.group(3)) 152 check_count += result.checks 153 print('%d errors, %d warnings, %d checks for %s:' % (result.errors, 154 result.warnings, result.checks, col.Color(col.BLUE, fname))) 156 result.checks): [all …]
|
/openbmc/linux/Documentation/virt/kvm/x86/ |
H A D | cpuid.rst | 65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit 69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit 77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit 85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit 89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit 95 KVM_FEATURE_MSI_EXT_DEST_ID 15 guest checks this feature bit 99 KVM_FEATURE_HC_MAP_GPA_RANGE 16 guest checks this feature bit before 103 KVM_FEATURE_MIGRATION_CONTROL 17 guest checks this feature bit before 120 KVM_HINTS_REALTIME 0 guest checks this feature bit to
|
/openbmc/u-boot/post/ |
H A D | tests.c | 52 "This test checks on chip memory (OCM).", 79 "This test checks the watchdog timer.", 116 "This test checks RAM.", 194 "This test checks SPR contents.", 218 "This test checks any connected DSP(s).", 230 "This test checks any connected codec(s).", 242 "This test checks the ECC facility of memory.", 269 "This test checks communication with coprocessors.", 293 "This test checks regularly placed regions of the RAM.",
|
/openbmc/linux/fs/ubifs/ |
H A D | debug.h | 52 * @chk_gen: if general extra checks are enabled 53 * @chk_index: if index xtra checks are enabled 54 * @chk_orph: if orphans extra checks are enabled 55 * @chk_lprops: if lprops extra checks are enabled 56 * @chk_fs: if UBIFS contents extra checks are enabled 64 * @dfs_chk_gen: debugfs knob to enable UBIFS general extra checks 65 * @dfs_chk_index: debugfs knob to enable UBIFS index extra checks 66 * @dfs_chk_orph: debugfs knob to enable UBIFS orphans extra checks 67 * @dfs_chk_lprops: debugfs knob to enable UBIFS LEP properties extra checks 68 * @dfs_chk_fs: debugfs knob to enable UBIFS contents extra checks [all …]
|
/openbmc/inarp/ |
H A D | configure.ac | 8 # Checks for programs. 14 # Checks for libraries. 16 # Checks for header files. 18 # Checks for typedefs, structures, and compiler characteristics. 21 # Checks for library functions.
|
/openbmc/u-boot/fs/ubifs/ |
H A D | debug.h | 52 * @chk_gen: if general extra checks are enabled 53 * @chk_index: if index xtra checks are enabled 54 * @chk_orph: if orphans extra checks are enabled 55 * @chk_lprops: if lprops extra checks are enabled 56 * @chk_fs: if UBIFS contents extra checks are enabled 64 * @dfs_chk_gen: debugfs knob to enable UBIFS general extra checks 65 * @dfs_chk_index: debugfs knob to enable UBIFS index extra checks 66 * @dfs_chk_orph: debugfs knob to enable UBIFS orphans extra checks 67 * @dfs_chk_lprops: debugfs knob to enable UBIFS LEP properties extra checks 68 * @dfs_chk_fs: debugfs knob to enable UBIFS contents extra checks [all …]
|
/openbmc/phosphor-event/ |
H A D | configure.ac | 9 # Checks for programs. 16 # Checks for libraries. 19 # Checks for header files. 22 # Checks for typedefs, structures, and compiler characteristics. 27 # Checks for library functions.
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_bounds_mix_sign_unsign.c | 16 __description("bounds checks mixing signed and unsigned, positive bounds") 48 __description("bounds checks mixing signed and unsigned") 80 __description("bounds checks mixing signed and unsigned, variant 2") 114 __description("bounds checks mixing signed and unsigned, variant 3") 147 __description("bounds checks mixing signed and unsigned, variant 4") 178 __description("bounds checks mixing signed and unsigned, variant 5") 211 __description("bounds checks mixing signed and unsigned, variant 6") 242 __description("bounds checks mixing signed and unsigned, variant 7") 274 __description("bounds checks mixing signed and unsigned, variant 8") 308 __description("bounds checks mixing signed and unsigned, variant 9") [all …]
|
/openbmc/linux/include/asm-generic/ |
H A D | sections.h | 81 * memory_contains - checks if an object is contained within a memory region 98 * memory_intersects - checks if the region occupied by an object intersects 120 * init_section_contains - checks if an object is contained within the init 134 * init_section_intersects - checks if the region occupied by an object 148 * is_kernel_core_data - checks if the pointer address is located in the 170 * is_kernel_rodata - checks if the pointer address is located in the 184 * is_kernel_inittext - checks if the pointer address is located in the 198 * __is_kernel_text - checks if the pointer address is located in the 213 * __is_kernel - checks if the pointer address is located in the kernel range
|
/openbmc/btbridge/ |
H A D | configure.ac | 8 # Checks for programs. 14 # Checks for libraries. 17 # Checks for header files. 25 # Checks for typedefs, structures, and compiler characteristics. 28 # Checks for library functions.
|
/openbmc/phosphor-fan-presence/monitor/ |
H A D | conditions.hpp | 33 * @brief A condition that checks all properties match the given values 34 * @details Checks each property entry against its given value where all 40 * A Condition function that checks all properties match 55 * The propertiesMatch condition function that checks all properties match
|
/openbmc/linux/security/landlock/ |
H A D | syscalls.c | 63 /* Checks buffer inconsistencies. */ in copy_min_struct_from_user() 68 /* Checks size ranges. */ in copy_min_struct_from_user() 92 * For each user space ABI structures, first checks that there is no in build_check_abi() 93 * hole in them, then checks that all architectures have the same in build_check_abi() 177 /* Build-time checks. */ in SYSCALL_DEFINE3() 198 /* Checks content (and 32-bits cast). */ in SYSCALL_DEFINE3() 203 /* Checks arguments and transforms to kernel struct. */ in SYSCALL_DEFINE3() 230 /* Checks FD type and access right. */ in get_ruleset_from_fd() 333 /* Gets and checks the ruleset. */ in SYSCALL_DEFINE4() 360 * Checks that allowed_access matches the @ruleset constraints in SYSCALL_DEFINE4() [all …]
|
/openbmc/openbmc/meta-security/recipes-scanners/buck-security/ |
H A D | buck-security_0.7.bb | 2 …urity scanner for Debian and Ubuntu Linux. It runs a couple of important checks and helps you to h… 22 …sed -i 's!use lib "checks"!use lib File::Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)), "bu… 23 …sed -i 's!use lib "checks/lib"!use lib File::Spec->catfile(dirname(File::Spec->rel2abs(__FILE__)),…
|
/openbmc/ibm-dbus-interfaces/ |
H A D | configure.ac | 9 # Checks for programs. 29 # Checks for libraries. 38 # Checks for header files. 44 # Checks for library functions.
|
/openbmc/linux/tools/usb/usbip/ |
H A D | configure.ac | 23 # Checks for programs. 28 # Checks for header files. 34 # Checks for typedefs, structures, and compiler characteristics. 42 # Checks for library functions. 53 # Checks for libwrap library.
|
/openbmc/openpower-host-ipmi-oem/ |
H A D | configure.ac | 9 # Checks for programs. 15 # Checks for libraries. 18 # Checks for header files. 28 # Checks for typedefs, structures, and compiler characteristics. 32 # Checks for library functions.
|
/openbmc/linux/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_ddp.c | 9 * i40e_ddp_profiles_eq - checks if DDP profiles are the equivalent 13 * checks if DDP profiles are the equivalent. 25 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already 29 * checks if DDP profile loaded already. 56 * i40e_ddp_profiles_overlap - checks if DDP profiles overlap. 60 * checks if DDP profiles overlap. 80 * i40e_ddp_does_profile_overlap - checks if DDP overlaps with existing one. 84 * checks if DDP profile overlaps with existing one. 192 * i40e_ddp_is_pkg_hdr_valid - performs basic pkg header integrity checks 197 * Checks correctness of pkg header: Version, size too big/small, and [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0003-check-for-libexecinfo-providing-backtrace-APIs.patch | 22 # Checks for libraries. 29 # Checks for header files. 34 # Checks for typedefs, structures, and compiler characteristics.
|
/openbmc/linux/lib/ |
H A D | Kconfig.ubsan | 93 This option enables -fsanitize=shift which checks for bit-shift 104 This option enables -fsanitize=integer-divide-by-zero which checks 116 This option enables -fsanitize=unreachable which checks for control 124 This option enables -fsanitize=bool which checks for boolean values being 132 This option enables -fsanitize=enum which checks for values being loaded
|
/openbmc/linux/drivers/gpu/drm/i915/ |
H A D | Kconfig.debug | 30 select DRM_VGEM # used by igt/prime_vgem (dmabuf interop checks) 53 bool "Always insert extra checks around mmio access by default" 56 By default, always enables the extra sanity checks (extra register 66 bool "Insert extra checks into the GEM internals" 70 Enable extra sanity checks (including BUGs) along the GEM driver
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/mcpp/files/ |
H A D | 0001-configure-Fix-checks-for-system-headers.patch | 4 Subject: [PATCH] configure: Fix checks for system headers 22 dnl Checks for header files. 27 dnl Checks for typedefs, and compiler characteristics.
|
/openbmc/openbmc/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot/corstone1000/ |
H A D | 0041-scatter-gather-flag-workaround.patch | 6 This workaround passes 1 as scatter_gather_list value to pass the NULL checks 8 (which is introduced lately to align with UEFI specs). Since these flag checks 31 + * the NULL flag checks. This should will be fixed with
|