Home
last modified time | relevance | path

Searched refs:of (Results 1 – 20 of 20) sorted by relevance

/lib/
DKconfig.kasan44 designed to find out-of-bounds accesses and use-after-free bugs.
77 but detection of out-of-bounds accesses for global variables is
80 This mode consumes about 1/8th of available memory at kernel start
81 and introduces an overhead of ~x1.5 for the rest of the allocations.
96 This mode require software memory tagging support in the form of
102 This mode consumes about 1/16th of available memory at kernel start
103 and introduces an overhead of ~20% for the rest of the allocations.
105 casting and comparison, as it embeds tags into the top byte of each
136 of shadow memory. This is slower than inline instrumentation,
137 however it doesn't bloat size of kernel's .text section so
[all …]
DKconfig.kfence12 KFENCE is a low-overhead sampling-based detector of heap out-of-bounds
20 such as KASAN. KFENCE can detect a subset of bugs that KASAN can
40 int "Number of guarded objects available"
44 The number of guarded objects available. For each KFENCE object, 2
59 and impact of which is much harder to predict than a dynamic branch.
64 int "Stress testing of fault handling and error reporting" if EXPERT
68 pages, resulting in spurious use-after-frees. The main purpose of
70 and allocations/frees. A value of 0 disables stress testing logic.
DKconfig.kcsan10 For the list of compilers that support KCSAN, please see
18 Some versions of clang support either KCSAN and KCOV but not the
19 combination of the two.
62 generated from any one of them, system stability may suffer due to
79 KCSAN test focusing on behaviour of the integrated runtime. Tests
81 console. Makes use of KUnit for test organization, and the Torture
101 int "Number of available watchpoints"
104 Total number of available watchpoints. An address range maps into a
106 Although larger number of watchpoints may not be usable due to
107 limited number of CPUs, a larger value helps to improve performance
[all …]
DKconfig.ubsan26 (regardless of context, locks held, etc), which may destabilize
35 Some versions of clang support either UBSAN or KCOV but not the
36 combination of the two.
52 This option enables detection of directly indexed out of bounds
55 to the {str,mem}*cpy() family of functions (that is addressed
83 pointer that is derived from an object of a statically-known size,
85 out-of-bounds.
124 bool "Perform checking for out of bounds enum values"
129 into an enum that are outside the range of given values for the given enum.
137 This option enables the check of unaligned memory accesses.
[all …]
DKconfig.debug10 Selecting this option causes time stamps of the printk()
11 messages to be added to the output of the syslog() system
46 accessible but can be downloaded given the build ID of the vmlinux or
60 Note: This does not affect the log level of un-prefixed printk()
73 equivalent of passing "loglevel=<CONSOLE_LOGLEVEL_QUIET>"
118 enabled/disabled based on various levels of scope - per source file,
133 making use of this feature.
135 file contains a list of the debug statements that can be enabled. The
136 format for each line of the file is:
140 filename : source file of the debug statement
[all …]
DKconfig31 memory representation that can have any combination of these quirks:
35 - The most significant bit of a byte is at its right (bit 0 of a
38 in the data sheets of the peripherals they are in control of.
49 This option enables the use of hardware bit-reversal instructions on
186 and computes the total elapsed time and number of bytes processed.
194 of CRC32 algorithm. Choose the default ("slice by 8") unless you
195 know that you need one of the others.
431 number of data bits to protect, 'm' should be chosen such
464 Simple, embeddable, interval-tree. Can find the start of an
520 Use dynamic allocation for cpumask_var_t, instead of putting
[all …]
DKconfig.kgdb20 backtraces in the external debugger. Documentation of
36 In particular this disallows instrumentation of functions
58 intended to for the development of new kgdb stubs
61 the tests. The most basic of this I/O module is to boot
80 default of V1F100.
114 0x0080 - enable signalling of processes
134 This integer controls the behaviour of kdb when the kernel gets a
Dtest_overflow.c218 #define check_one_op(t, fmt, op, sym, a, b, r, of) do { \ argument
223 if (_of != of) { \
226 a, b, of ? "" : " not", #t); \
296 #define TEST_ONE_SHIFT(a, s, t, expect, of) ({ \ in test_overflow_shift() argument
303 if (__of != of) { \ in test_overflow_shift()
305 #t, #a, #s, of ? "" : " not"); \ in test_overflow_shift()
318 of ? "overflow" : #expect); \ in test_overflow_shift()
DMakefile222 of-reconfig-notifier-error-inject.o
/lib/crypto/
DKconfig15 accelerated implementation of the Blake2s library interface,
21 This symbol can be depended upon by arch implementations of the
25 of CRYPTO_LIB_BLAKE2S.
31 accelerated implementation of the ChaCha library interface,
37 This symbol can be depended upon by arch implementations of the
41 of CRYPTO_LIB_CHACHA.
57 accelerated implementation of the Curve25519 library interface,
63 This symbol can be depended upon by arch implementations of the
67 of CRYPTO_LIB_CURVE25519.
93 accelerated implementation of the Poly1305 library interface,
[all …]
/lib/xz/
DKconfig47 of a raw LZMA stream (without the end of stream marker) has
48 been replaced with a bitwise-negation of the lc/lp/pb
51 amount of space for headers is important.
67 a character special file. It calculates CRC32 of the decompressed
/lib/raid6/
Dvpermxor.uc5 * modify it under the terms of the GNU General Public License
7 * 2 of the License, or (at your option) any later version.
11 * Based on H. Peter Anvin's paper - The mathematics of RAID-6
16 * vpermxor$#.c makes use of the vpermxor instruction to optimise the RAID6 Q
Daltivec.uc6 * it under the terms of the GNU General Public License as published by
8 * Boston MA 02111-1307, USA; either version 2 of the License, or
36 * This is the C data type to use. We use a vector of
68 /* This is noinline to make damned sure that gcc doesn't move any of the
Dint.uc6 * it under the terms of the GNU General Public License as published by
8 * Boston MA 02111-1307, USA; either version 2 of the License, or
45 * IA-64 wants insane amounts of unrolling. On other architectures that
46 * is just a waste of space.
Ds390vx.uc28 * The SHLBYTE() operation shifts each of the 16 bytes in
38 * For each of the 16 bytes in the vector register y the MASK()
39 * operation returns 0xFF if the high bit of the byte is 1,
Dneon.uc12 * it under the terms of the GNU General Public License as published by
14 * Boston MA 02111-1307, USA; either version 2 of the License, or
/lib/kunit/
DKconfig23 of /sys/kernel/debug/kunit/<test_suite>/results files for each
24 test suite, which allow users to see results of the last test suite
41 Enables an example unit test that illustrates some of the basic
42 features of KUnit. This test only exists to help new users understand
/lib/math/
DKconfig5 This option provides an implementation of the CORDIC algorithm;
/lib/vdso/
DKconfig11 This is a generic implementation of gettimeofday vdso.
/lib/fonts/
DKconfig89 of characters (53x24) that are still at a readable size.