Home
last modified time | relevance | path

Searched refs:of (Results 1 – 16 of 16) sorted by relevance

/lib/
DKconfig.kasan22 designed to find out-of-bounds accesses and use-after-free bugs.
47 or later for basic support and version 5.0 or later for detection of
48 out-of-bounds accesses for stack and global variables and for inline
50 version 3.7.0 or later and it doesn't support detection of
51 out-of-bounds accesses for global variables yet.
52 This mode consumes about 1/8th of available memory at kernel start
53 and introduces an overhead of ~x1.5 for the rest of the allocations.
71 This mode consumes about 1/16th of available memory at kernel start
72 and introduces an overhead of ~20% for the rest of the allocations.
74 casting and comparison, as it embeds tags into the top byte of each
[all …]
DKconfig.debug10 Selecting this option causes time stamps of the printk()
11 messages to be added to the output of the syslog() system
49 Note: This does not affect the log level of un-prefixed printk()
62 equivalent of passing "loglevel=<CONSOLE_LOGLEVEL_QUIET>"
106 enabled/disabled based on various levels of scope - per source file,
120 filesystem must first be mounted before making use of this feature.
122 file contains a list of the debug statements that can be enabled. The
123 format for each line of the file is:
127 filename : source file of the debug statement
128 lineno : line number of the debug statement
[all …]
DKconfig.ubsan10 behaviours in runtime. Various types of checks may be enabled
32 bool "Disable checking of pointers alignment"
36 This option disables the check of unaligned memory accesses.
39 accesses may produce a lot of false positives.
DKconfig28 memory representation that can have any combination of these quirks:
32 - The most significant bit of a byte is at its right (bit 0 of a
35 in the data sheets of the peripherals they are in control of.
47 This option enables the use of hardware bit-reversal instructions on
149 and computes the total elapsed time and number of bytes processed.
157 of CRC32 algorithm. Choose the default ("slice by 8") unless you
158 know that you need one of the others.
383 number of data bits to protect, 'm' should be chosen such
416 Simple, embeddable, interval-tree. Can find the start of an
472 Use dynamic allocation for cpumask_var_t, instead of putting
[all …]
DKconfig.kgdb15 backtraces in the external debugger. Documentation of
38 intended to for the development of new kgdb stubs
41 the tests. The most basic of this I/O module is to boot
60 default of V1F100.
94 0x0080 - enable signalling of processes
114 This integer controls the behaviour of kdb when the kernel gets a
Dtest_overflow.c218 #define check_one_op(t, fmt, op, sym, a, b, r, of) do { \ argument
223 if (_of != of) { \
226 a, b, of ? "" : " not", #t); \
296 #define TEST_ONE_SHIFT(a, s, t, expect, of) ({ \ in test_overflow_shift() argument
303 if (__of != of) { \ in test_overflow_shift()
305 #t, #a, #s, of ? "" : " not"); \ in test_overflow_shift()
318 of ? "overflow" : #expect); \ in test_overflow_shift()
DMakefile176 of-reconfig-notifier-error-inject.o
/lib/raid6/
Dvpermxor.uc5 * modify it under the terms of the GNU General Public License
7 * 2 of the License, or (at your option) any later version.
11 * Based on H. Peter Anvin's paper - The mathematics of RAID-6
16 * vpermxor$#.c makes use of the vpermxor instruction to optimise the RAID6 Q
Daltivec.uc6 * it under the terms of the GNU General Public License as published by
8 * Boston MA 02111-1307, USA; either version 2 of the License, or
36 * This is the C data type to use. We use a vector of
68 /* This is noinline to make damned sure that gcc doesn't move any of the
Dint.uc6 * it under the terms of the GNU General Public License as published by
8 * Boston MA 02111-1307, USA; either version 2 of the License, or
45 * IA-64 wants insane amounts of unrolling. On other architectures that
46 * is just a waste of space.
Ds390vx.uc28 * The SHLBYTE() operation shifts each of the 16 bytes in
38 * For each of the 16 bytes in the vector register y the MASK()
39 * operation returns 0xFF if the high bit of the byte is 1,
Dneon.uc12 * it under the terms of the GNU General Public License as published by
14 * Boston MA 02111-1307, USA; either version 2 of the License, or
/lib/math/
DKconfig5 This option provides an implementation of the CORDIC algorithm;
/lib/vdso/
DKconfig11 This is a generic implementation of gettimeofday vdso.
/lib/xz/
DKconfig54 a character special file. It calculates CRC32 of the decompressed
/lib/fonts/
DKconfig89 of characters (53x24) that are still at a readable size.