Home
last modified time | relevance | path

Searched refs:only (Results 1 – 25 of 34) sorted by relevance

12

/lib/
A DKconfig.kasan1 # SPDX-License-Identifier: GPL-2.0-only
28 # This option is only required for software KASAN modes.
69 2. Software Tag-Based KASAN (arm64 only, based on software memory
72 3. Hardware Tag-Based KASAN (arm64 only, based on hardware memory
103 Supported only on arm64 CPUs and relies on Top Byte Ignore.
119 Supported only on arm64 CPUs starting from ARMv8.5 and relies on
183 With Hardware Tag-Based KASAN, only non-executable VM_ALLOC mappings
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
A DKconfig.kfence1 # SPDX-License-Identifier: GPL-2.0-only
36 Set this to 0 to disable KFENCE by default, in which case only
65 option is only recommended when using very large sample intervals, or
A DKconfig.ubsan1 # SPDX-License-Identifier: GPL-2.0-only
41 The -fsanitize=bounds-strict option is only available on GCC,
52 only be used when trap mode is enabled. (See also the help for
87 trap-only, it depends on CONFIG_UBSAN_TRAP.
134 This is currently limited only to the size_t type while testing and
A DKconfig.kmsan1 # SPDX-License-Identifier: GPL-2.0-only
32 # -fsanitize-memory-param-retval is supported only by Clang >= 14.
A DKconfig.kcsan1 # SPDX-License-Identifier: GPL-2.0-only
155 int "Duration in milliseconds, in which any given race is only reported once"
158 Any given race is only reported once in the defined time window.
172 If KCSAN should report races where only one access is known, and the
174 reported if it was only possible to infer a race due to a data value
223 races due to conflicts where the only plain accesses are aligned
A Dstring_helpers.c578 unsigned int flags, const char *only) in string_escape_mem() argument
582 bool is_dict = only && *only; in string_escape_mem()
587 bool in_dict = is_dict && strchr(only, c); in string_escape_mem()
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
292 only a single (m,t) configuration. This is mainly useful
442 It only adds a little bit of code and slows kernel boot (or
484 Digital signature verification. Currently only RSA is supported.
496 # libfdt files, only selected if needed.
/lib/test_fortify/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/mips/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/x86/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crc/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/s390/
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/arm64/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/arm/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/raid6/
A D.gitignore1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/riscv/
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/crypto/powerpc/
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/math/
A DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
/lib/vdso/
A DKconfig20 in 32 bit only architectures.
/lib/kunit/
A DKconfig44 KUnit and test KUnit. This option should only be enabled for testing
53 features of KUnit. This test only exists to help new users understand

Completed in 24 milliseconds

12