Linux Audio

Check our new training course

Loading...
v5.14.15
 1# SPDX-License-Identifier: GPL-2.0
 2
 3config TRACE_IRQFLAGS_SUPPORT
 4	def_bool y
 5
 6config EARLY_PRINTK
 
 
 7	def_bool y
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 8
 9config DEBUG_ENTRY
10	bool "Debug low-level entry code"
11	depends on DEBUG_KERNEL
12	help
13	  This option enables sanity checks in s390 low-level entry code.
14	  Some of these sanity checks may slow down kernel entries and
15	  exits or otherwise impact performance.
16
17	  If unsure, say N.
18
19config CIO_INJECT
20       bool "CIO Inject interfaces"
21       depends on DEBUG_KERNEL && DEBUG_FS
22       help
23	This option provides a debugging facility to inject certain artificial events
24	and instruction responses to the CIO layer of Linux kernel. The newly created
25	debugfs user-interfaces will be at /sys/kernel/debug/s390/cio/*
v3.1
 1menu "Kernel hacking"
 2
 3config TRACE_IRQFLAGS_SUPPORT
 4	def_bool y
 5
 6source "lib/Kconfig.debug"
 7
 8config STRICT_DEVMEM
 9	def_bool y
10	prompt "Filter access to /dev/mem"
11	---help---
12	  This option restricts access to /dev/mem.  If this option is
13	  disabled, you allow userspace access to all memory, including
14	  kernel and userspace memory. Accidental memory access is likely
15	  to be disastrous.
16	  Memory access is required for experts who want to debug the kernel.
17
18	  If you are unsure, say Y.
19
20config DEBUG_STRICT_USER_COPY_CHECKS
21	def_bool n
22	prompt "Strict user copy size checks"
23	---help---
24	  Enabling this option turns a certain set of sanity checks for user
25	  copy operations into compile time warnings.
26
27	  The copy_from_user() etc checks are there to help test if there
28	  are sufficient security checks on the length argument of
29	  the copy operation, by having gcc prove that the argument is
30	  within bounds.
31
32	  If unsure, or if you run an older (pre 4.4) gcc, say N.
33
34config DEBUG_SET_MODULE_RONX
35	def_bool y
36	depends on MODULES
37endmenu