/linux-6.8/Documentation/trace/rv/ |
D | runtime-verification.rst | 2 Runtime Verification 5 Runtime Verification (RV) is a lightweight (yet rigorous) method that 6 complements classical exhaustive verification techniques (such as *model 19 *online* verification of a system, enabling the *reaction* for unexpected 26 A monitor is the central part of the runtime verification of a system. The 30 In Linux terms, the runtime verification monitors are encapsulated inside the 41 | (instrumentation) | | (verification) | | (specification) | 54 In addition to the verification and monitoring of the system, a monitor can 64 For further information about the principles of runtime verification and 67 Bartocci, Ezio, et al. *Introduction to runtime verification.* In: Lectures on [all …]
|
D | index.rst | 2 Runtime Verification 9 runtime-verification.rst
|
/linux-6.8/kernel/trace/rv/ |
D | Kconfig | 15 bool "Runtime Verification" 18 Enable the kernel runtime verification infrastructure. RV is a 20 exhaustive verification techniques (such as model checking and 26 Documentation/trace/rv/runtime-verification.rst 54 bool "Runtime verification reactors" 58 Enables the online runtime verification reactors. A runtime
|
D | rv.c | 5 * This is the online Runtime Verification (RV) interface. 8 * exhaustive verification techniques (such as model checking and 22 * Silva. Efficient formal verification for the Linux kernel. In: 29 * and verification of the real-time Linux kernel. PhD Thesis, 2020. 33 * A monitor is the central part of the runtime verification of a system. 38 * In Linux terms, the runtime verification monitors are encapsulated 51 * | (instrumentation) | | (verification) | | (specification) | 65 * to control the verification session. 70 * a verification session. For instance, when a given monitor is enabled, 73 * when disabling the verification session. [all …]
|
/linux-6.8/Documentation/filesystems/xfs/ |
D | xfs-self-describing-metadata.rst | 12 scalability, but of verification of the filesystem structure. Scalabilty of the 15 is this very scalability that causes the verification problem. 50 verification of metadata values, looking for values that are in range (and hence 51 not detected by automated verification checks) but are not correct. Finding and 76 self identifying and we can do much more expansive automated verification of the 84 contain, a large amount of the manual verification work can be skipped. 129 present that the run-time verification is not detecting. 156 The verification is completely stateless - it is done independently of the 166 For read verification, the caller needs to specify the expected type of metadata 168 object matches what was expected. If the verification process fails, then it [all …]
|
/linux-6.8/tools/verification/rv/ |
D | README.txt | 1 RV: Runtime Verification 3 Runtime Verification (RV) is a lightweight (yet rigorous) method that 4 complements classical exhaustive verification techniques (such as model 37 Runtime Verification: 38 Documentation/trace/rv/runtime-verification.rst
|
/linux-6.8/tools/memory-model/scripts/ |
D | judgelitmus.sh | 16 # "HW" is the --hw argument. In addition, non-Sometimes verification 19 # in that file will be used to judge the assembly-language verification. 109 echo ' !!! Verification error' $litmus 112 echo ' !!! Verification error' >> $LKMM_DESTDIR/$litmusout 2>&1 122 echo " !!! Unexpected non-$outcome verification" $litmus 125 echo " !!! Unexpected non-$outcome verification" >> $LKMM_DESTDIR/$litmusout 2>&1 149 echo " $flag non-$outcome verification" $litmus 152 echo " $flag non-$outcome verification" >> $LKMM_DESTDIR/$litmusout 2>&1
|
D | checkalllitmus.sh | 6 # litmus test. If the verification result does not match that specified 8 # "^^^". It also outputs verification results to a file whose name is 61 echo " ^^^ VERIFICATION MISMATCHES" 1>&2
|
/linux-6.8/tools/testing/selftests/net/forwarding/ |
D | ethtool_mm.sh | 53 # to verification frame) should be taken into consideration while the 56 # the link partner's verification frames. 60 # Wait for verification to finish 65 check_err "$?" "Verification did not succeed" 76 log_test "Manual configuration with verification: $tx to $rx" 100 check_err "$?" "Verification is not disabled" 110 log_test "Manual configuration without verification: $tx to $rx" 133 # Wait for verification to time out 138 check_fail "$?" "Verification succeeded when it shouldn't have" 149 log_test "Manual configuration with failed verification: $tx to $rx"
|
/linux-6.8/crypto/asymmetric_keys/ |
D | Kconfig | 9 verification. 21 If signature generation and/or verification are to be used, 68 bool "Support for PE file signature verification" 79 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification" 82 verification code, using some built in data. This is required
|
/linux-6.8/kernel/ |
D | Kconfig.kexec | 59 verification for the corresponding kernel image type being 67 This option makes kernel signature verification mandatory for 71 bool "Enable Image signature verification support (ARM)" 77 Enable Image signature verification support. 80 bool "Enable bzImage signature verification support" 86 Enable bzImage signature verification support.
|
/linux-6.8/security/integrity/ |
D | Kconfig | 10 Measurement Architecture (IMA), Extended Verification Module 11 (EVM), IMA-appraisal extension, digital signature verification 20 bool "Digital signature verification using multiple keyrings" 25 This option enables digital signature verification support 42 This option enables digital signature verification using
|
/linux-6.8/Documentation/security/ |
D | digsig.rst | 2 Digital Signature Verification API 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key
|
/linux-6.8/Documentation/tools/rv/ |
D | rv.rst | 7 Runtime Verification 20 Runtime Verification (**RV**) is a lightweight (yet rigorous) method argument 21 for formal verification with a practical approach for complex systems. 28 verification (rv) monitors.
|
D | index.rst | 4 Runtime verification (rv) tool 7 **rv** tool provides the interface for a collection of runtime verification
|
/linux-6.8/arch/x86/kernel/ |
D | verify_cpu.S | 4 * verify_cpu.S - Code for cpu long mode and SSE verification. This 13 * This is a common code for verification whether CPU supports 18 * arch/x86/boot/compressed/head_64.S: Boot cpu verification 19 * arch/x86/kernel/trampoline_64.S: secondary processor verification
|
/linux-6.8/fs/verity/ |
D | signature.c | 3 * Verification of builtin signatures 9 * This file implements verification of fs-verity builtin signatures. Please 12 * verification, and IMA appraisal) can be much better. For details about the 21 #include <linux/verification.h>
|
D | Kconfig | 27 hash), or (b) authenticity verification (comparing the hash 42 This option adds support for in-kernel verification of 47 alternatives (such as userspace signature verification, and
|
/linux-6.8/net/sctp/ |
D | sm_statefuns.c | 210 * Verification Tag: 8.5.1(C), sctpimpguide 2.41. 214 * if the Verification Tag field of the packet matches its own tag and 303 * Verification Tag field to Tag_A, and also provide its own 304 * Verification Tag (Tag_Z) in the Initiate Tag field. 306 * Verification Tag: Must be 0. 357 /* 3.1 A packet containing an INIT chunk MUST have a zero Verification in sctp_sf_do_5_1B_init() 503 * Verification Tag: 3.3.3 682 * Verification Tag: 8.5.1 Exceptions in Verification Tag Rules 727 * chunk header. More detailed verification is done in sctp_sf_do_5_1D_ce() 910 * Verification Tag: [all …]
|
/linux-6.8/Documentation/crypto/ |
D | asymmetric-keys.rst | 12 - Signature verification. 112 1) Signature verification. 115 required for verification, but not currently supported, and others 119 Signature Verification 122 An operation is provided to perform cryptographic signature verification, using 225 Optional. This is the entry point for signature verification. The 346 for signature verification. 357 verification. 372 This allows for verification of certificate chains by adding each
|
/linux-6.8/Documentation/filesystems/ |
D | fsverity.rst | 90 verification`_. This approach should be used only with great care. 137 if the `Built-in signature verification`_ feature is being used. It 243 fs-verity compatible verification of the file. This only makes sense 277 signature verification`_. 291 implement fs-verity compatible verification anyway (though absent a 348 would circumvent the data verification. 355 opening the file will fail. See `Built-in signature verification`_. 437 Built-in signature verification 441 verification of fs-verity builtin signatures. 445 alternatives (such as userspace signature verification, and IMA [all …]
|
/linux-6.8/arch/s390/purgatory/ |
D | head.S | 100 * checksum verification only (%r2 = 0 -> verification only). 104 * 1 -> checksum verification only 111 cghi %r2,0 /* checksum verification only */ 118 cghi %r10,1 /* checksum verification only */
|
/linux-6.8/drivers/s390/crypto/ |
D | zcrypt_ep11misc.h | 36 u8 wkvp[16]; /* wrapping key verification pattern */ 54 * For valid ep11 keyblobs, returns a reference to the wrappingkey verification 99 u8 cur_wkvp[32]; /* current wrapping key verification pattern */ 100 u8 new_wkvp[32]; /* new wrapping key verification pattern */
|
D | zcrypt_ccamisc.h | 49 u64 mkvp; /* master key verification pattern */ 65 u8 kvpt; /* key verification pattern type, should be 0x01 */ 66 u64 mkvp0; /* master key verification pattern, lo part */ 67 u64 mkvp1; /* master key verification pattern, hi part (unused) */ 115 u64 mkvp; /* master key verification pattern */ 211 * Verification Pattern provided inside a secure key.
|
/linux-6.8/drivers/s390/cio/ |
D | device_fsm.c | 396 * timeout (or if sense pgid during path verification detects the device in ccw_device_recognition() 496 /* Repeat path verification? */ in ccw_device_verify_done() 559 /* Start initial path verification. */ in ccw_device_online() 637 * Handle path verification event in offline state. 648 * Handle path verification event. 675 * to the device driver. Can't do path verification now, in ccw_device_online_verify() 681 /* Device is idle, we can do the path verification. */ in ccw_device_online_verify() 687 * Handle path verification event in boxed state. 782 /* Start delayed path verification. */ in ccw_device_irq() 860 /* Start delayed path verification. */ in ccw_device_w4sense() [all …]
|