Lines Matching full:an

141 	  This symbol should be selected by an architecture if 64 bit
157 This symbol should be selected by an architecture if it can
242 # An arch should select this if it provides all these things:
268 An architecture should select this when it can successfully
288 # either provide an uncached segment alias for a DMA allocation, or
296 # to undo an in-place page table remap for uncached access.
316 An architecture should select this to provide hardened usercopy
334 An architecture should select this if the noinstr macro is being used on
355 This symbol should be selected by an architecture if it provides
362 This symbol should be selected by an architecture if it supports
371 This symbol should be selected by an architecture if it
372 supports an implementation of restartable sequences.
377 This symbol should be selected by an architecture if it
383 This symbol should be selected by an architecture if it supports
408 System hardware can generate an NMI using the perf event
483 # This can be disabled if the architecture ensures no CPUs are using an mm as a
488 # To implement this, an arch *must*:
496 # This option allows MMU_LAZY_TLB_REFCOUNT=n. It ensures no CPUs are using an
503 # To implement this, an arch *must*:
546 An arch should select this symbol to support seccomp mode 1 (the fixed
547 syscall policy), and must provide an overrides for __NR_seccomp_sigreturn,
558 An arch should select this symbol if it provides all of these things:
610 an adversary may be able to infer the seccomp filter logic.
617 An architecture should select this if it has the code which
624 An arch should select this symbol if:
642 have an 8-byte or larger character array on the stack.
647 On an x86 "defconfig" build, this feature adds canary checks to
660 - local variable's address used as part of the right hand side of an
662 - local variable is an array (or union containing an array),
669 On an x86 "defconfig" build, this feature adds canary checks to
676 An architecture should select this if it supports the compiler's
687 being overwritten by an attacker. More information can be found
695 of shadow stacks in memory, which means an attacker capable of
720 An architecture should select this option if it supports:
728 An architecture should select this option if it can support Clang's
798 An architecture should select this option if it can support Clang's
813 makes it more difficult for an attacker to exploit bugs that allow
832 An architecture should select this if it can walk the kernel stack
833 frames to determine if an object is part of either the arguments
835 and similar) by implementing an inline arch_within_stack_frames(),
956 relocations will give an error.
962 relocations will give an error.
976 in the end of an hardirq.
1003 An architecture supports choosing randomized locations for
1011 An arch should select this symbol if it supports setting a variable
1020 An architecture implements exit_thread.
1049 An arch should select this symbol if it supports running applications
1144 If this is set, the architecture provides an <asm/hash.h>
1220 An arch should select this symbol if it can support kernel stacks
1255 An arch should select this symbol if it can support kernel stack
1260 closely examined, as the artificial stack bump looks like an array
1323 # select if the architecture provides an asm/dma-direct.h header
1330 An architecture can select this if it provides an
1338 May be selected by an architecture if it supports place-relative
1380 An architecture should select this if its syscall numbering is sparse
1404 An architecture should select this if it can handle the preemption
1407 Where an architecture selects HAVE_STATIC_CALL_INLINE, any call to a
1410 Where an architecture does not select HAVE_STATIC_CALL_INLINE, any
1422 An architecture should select this if it can handle the preemption
1425 Each preemption function will be given an early return based on a
1437 An arch should select this symbol once all linker sections are explicitly