Lines Matching +full:boot +full:- +full:pages
1 # SPDX-License-Identifier: GPL-2.0-only
17 Unmap pages from the kernel linear mapping after free_pages().
22 pages are being allocated and freed, as unexpected state changes
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
29 fill the pages with poison patterns after free_pages() and verify
33 pages are not saved to the suspend image.
36 allowing the kernel mapping to be backed by large pages on some
65 Boot with debugging on by default. SLUB boots by default with
67 equivalent to specifying the "slab_debug" parameter on boot.
71 "slab_debug=-".
86 detect use-after-free accesses in such caches.
116 "page_owner=on" to boot parameter in order to enable it. Eats
118 for user-space helper.
129 permissions. Check that anonymous and file pages are not being
148 bool "Poison pages after freeing"
150 Fill the pages with poison patterns after free_pages() and verify
154 "page_poison=1" kernel boot option.
159 If you are only interested in sanitization of freed pages without
160 checking the poison pattern on alloc, you can boot the kernel with
178 bool "Testcase for the marking rodata read-only"
181 This option enables a testcase for the setting rodata read-only.
187 bool "Warn on W+X mappings at boot"
192 Generate a warning if any W+X mappings are found at boot.
199 <arch>/mm: Checked W+X mappings: passed, no W+X pages found.
203 <arch>/mm: Checked W+X mappings: failed, <N> W+X pages found.
211 once the kernel has booted up - it's a one time check.
255 allocations. See Documentation/dev-tools/kmemleak.rst for more
285 bool "Enable kmemleak auto scan thread on boot up"
291 kmemleak scan at boot up.
300 bool "Statistics for per-vma locks"
304 faults handled under protection of per-vma locks. When enabled, the
306 kernel developers to evaluate effectiveness of per-vma locks and to