| /linux/scripts/clang-tools/ |
| H A D | run-clang-tools.py | 54 checks = None 55 if args.checks: 56 checks = args.checks.split(',') 58 checks = ["-*"] 60 checks.append("linuxkernel-*") 62 checks.append("clang-analyzer-*") 63 checks.append("-clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling") 69 pargs = ["clang-tidy", "-p", args.path, "-checks=" + ",".join(checks)]
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | cpuid.rst | 65 KVM_FEATURE_PV_UNHALT 7 guest checks this feature bit 69 KVM_FEATURE_PV_TLB_FLUSH 9 guest checks this feature bit 77 KVM_FEATURE_PV_SEND_IPI 11 guest checks this feature bit 85 KVM_FEATURE_PV_SCHED_YIELD 13 guest checks this feature bit 89 KVM_FEATURE_ASYNC_PF_INT 14 guest checks this feature bit 95 KVM_FEATURE_MSI_EXT_DEST_ID 15 guest checks this feature bit 99 KVM_FEATURE_HC_MAP_GPA_RANGE 16 guest checks this feature bit before 103 KVM_FEATURE_MIGRATION_CONTROL 17 guest checks this feature bit before 120 KVM_HINTS_REALTIME 0 guest checks this feature bit to
|
| /linux/tools/perf/tests/shell/lib/ |
| H A D | perf_json_output_lint.py | 50 checks = { 91 if key not in checks: 95 if not checks[key](value):
|
| /linux/arch/parisc/ |
| H A D | Kconfig.debug | 4 bool "Enable lightweight spinlock checks" 8 Add checks with low performance impact to the spinlock functions
|
| /linux/tools/net/ynl/pyynl/ |
| H A D | ynl_gen_c.py | 67 self.checks = attr.get('checks', {}) 121 value = self.checks.get(limit, default) 131 value = self.checks.get(limit, default) 153 if self.checks != self._get_real_attr().checks: 413 self.checks['sparse'] = True 415 if 'min' not in self.checks: 417 self.checks['min'] = low 418 if 'max' not in self.checks: 419 self.checks['max'] = high 421 if 'min' in self.checks and 'max' in self.checks: [all …]
|
| /linux/arch/s390/ |
| H A D | Kconfig.debug | 10 This option enables sanity checks in s390 low-level entry code. 11 Some of these sanity checks may slow down kernel entries and
|
| /linux/tools/testing/memblock/ |
| H A D | README | 16 consist of a series of checks that exercise both the basic operations and 18 memory allocator is initialized at the build time, so the checks here reuse its 57 The project has one target, main, which calls a group of checks for basic and 95 (...allocation checks...)
|
| /linux/Documentation/arch/x86/x86_64/ |
| H A D | machinecheck.rst | 7 Machine checks report internal hardware error conditions detected 11 Machine checks are organized in banks (normally associated with
|
| /linux/scripts/atomic/ |
| H A D | gen-atomic-instrumented.sh | 70 local checks="$(gen_params_checks "${meta}" "${order}" "$@")" 80 ${checks}
|
| /linux/lib/ |
| H A D | Kconfig.ubsan | 93 This option enables -fsanitize=shift which checks for bit-shift 104 This option enables -fsanitize=integer-divide-by-zero which checks 116 This option enables -fsanitize=unreachable which checks for control 142 This option enables -fsanitize=bool which checks for boolean values being 150 This option enables -fsanitize=enum which checks for values being loaded
|
| /linux/fs/btrfs/ |
| H A D | Kconfig | 67 Additional potentially expensive checks, debugging functionality or 68 sysfs exported information is enabled, like leak checks of internal 78 Enable run-time assertion checking. Additional safety checks are
|
| /linux/Documentation/dev-tools/ |
| H A D | testing-overview.rst | 134 Smatch extends Sparse and provides additional checks for programming logic 144 available include API tests, tests for correct usage of kernel iterators, checks 164 It's generally easier to write checks in Smatch than it is to write checks in 165 Sparse. Nevertheless, there are some overlaps between Sparse and Smatch checks. 170 Coccinelle is probably the easiest for writing checks. It works before the
|
| H A D | kasan.rst | 53 Software KASAN modes use compile-time instrumentation to insert validity checks 56 these checks but still requires a compiler version that supports the memory 141 register for arm64). The kernel periodically checks the hardware and 142 only reports tag faults during these checks. 147 checks the write (store) accesses only or all accesses (default: ``off``). 158 Note that enabling this parameter makes Hardware Tag-Based KASAN skip checks 312 checks before each memory access. 329 Compile-time instrumentation is used to insert memory access checks. Compiler 357 Software Tag-Based KASAN uses compile-time instrumentation to insert checks 358 before each memory access. These checks make sure that the tag of the memory [all …]
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | Kconfig.debug | 50 select DRM_VGEM # used by igt/prime_vgem (dmabuf interop checks) 74 bool "Always insert extra checks around mmio access by default" 77 By default, always enables the extra sanity checks (extra register 87 bool "Insert extra checks into the GEM internals" 91 Enable extra sanity checks (including BUGs) along the GEM driver
|
| /linux/kernel/rcu/ |
| H A D | Kconfig.debug | 64 and bh-disabled checks are to take effect, and that PREEMPT_RCU 65 must be enabled for the RCU-nesting checks to take effect. 66 These checks add overhead, and this Kconfig options is therefore 194 This option provides consistency checks in RCU's handling of 195 NO_HZ. These checks have proven quite helpful in detecting
|
| /linux/lib/kunit/ |
| H A D | assert_test.c | 123 va_list checks; in validate_assert() local 127 va_start(checks, num_checks); in validate_assert() 132 cur_substr_exp = va_arg(checks, char *); in validate_assert()
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | index.rst | 6 various security checks to be hooked by new kernel extensions. The name 28 order in which checks are made. The capability module will always
|
| /linux/Documentation/filesystems/ext4/ |
| H A D | mmp.rst | 9 etc.), the MMP code running on the node (call it node A) checks a 16 code passes all of those checks, a new MMP sequence number is generated
|
| /linux/fs/ocfs2/ |
| H A D | Kconfig | 73 bool "OCFS2 expensive checks" 77 This option will enable expensive consistency checks. Enable
|
| /linux/fs/quota/ |
| H A D | Kconfig | 39 bool "Additional quota sanity checks" 44 sanity checks of quota internal structures. If unsure, say N.
|
| /linux/fs/xfs/ |
| H A D | Kconfig | 199 It converts ASSERT checks to WARN, so will log any out-of-bounds 212 including ASSERT checks, function wrappers around macros, 221 bool "XFS expensive debugging checks" 224 Say Y here to get an XFS build with expensive debugging checks 225 enabled. These checks may affect performance significantly.
|
| /linux/drivers/gpu/drm/nouveau/ |
| H A D | Kconfig | 60 The paranoia and spam levels will add a lot of extra checks which 84 and sanity checks.
|
| /linux/Documentation/staging/ |
| H A D | speculation.rst | 21 checks to be ignored by code which is speculatively executed. Consider the 69 The kernel provides a generic API to ensure that bounds checks are
|
| /linux/drivers/iommu/generic_pt/ |
| H A D | Kconfig | 13 bool "Extra debugging checks for GENERIC_PT" 15 Enable extra run time debugging checks for GENERIC_PT code. This
|
| /linux/kernel/liveupdate/ |
| H A D | Kconfig | 21 bool "Enable Kexec Handover debug checks" 24 This option enables extra sanity checks for the Kexec Handover
|