Lines Matching +full:armv8 +full:- +full:based
1 # SPDX-License-Identifier: GPL-2.0-only
16 def_bool $(cc-option, -fsanitize=kernel-address)
19 def_bool $(cc-option, -fsanitize=kernel-hwaddress)
36 Enables KASAN (KernelAddressSANitizer) - runtime memory debugger,
37 designed to find out-of-bounds accesses and use-after-free bugs.
38 See Documentation/dev-tools/kasan.rst for details.
49 2. software tag-based KASAN (arm64 only, based on software
52 3. hardware tag-based KASAN (arm64 only, based on hardware
70 but detection of out-of-bounds accesses for global variables is
81 bool "Software tag-based mode"
87 Enables software tag-based KASAN mode.
90 HWASan-like compiler instrumentation.
105 bool "Hardware tag-based mode"
109 Enables hardware tag-based KASAN mode.
115 ARMv8.5 and relies on Memory Tagging Extension and Top Byte Ignore.
151 Disabling asan-stack makes it safe to run kernels build
152 with clang-8 with KASAN enabled, though it loses some of
154 This feature is always disabled when compile-testing with clang
161 bool "KASan: use 4-level paging"
164 Compiling the kernel with KASan disables automatic 3-level vs
165 4-level paging selection. 3-level paging is used by default (up
167 4-level paging instead.
173 This option enables best-effort identification of bug type
174 (use-after-free or out-of-bounds) at the cost of increased
181 By default, the shadow region for vmalloc space is the read-only
191 tristate "KUnit-compatible tests of KASAN bug detection capabilities" if !KUNIT_ALL_TESTS
200 to the KUnit documentation in Documentation/dev-tools/kunit.
203 tristate "KUnit-incompatible tests of KASAN bug detection capabilities"