Kconfig.debug 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. menu "Kernel hacking"
  2. source "lib/Kconfig.debug"
  3. config INIT_DEBUG
  4. bool "Debug __init statements"
  5. depends on DEBUG_KERNEL
  6. help
  7. Fill __init and __initdata at the end of boot. This helps debugging
  8. illegal uses of __init and __initdata after initialization.
  9. config DEBUG_RODATA
  10. bool "Write protect kernel read-only data structures"
  11. depends on DEBUG_KERNEL
  12. help
  13. Mark the kernel read-only data as write-protected in the pagetables,
  14. in order to catch accidental (and incorrect) writes to such const data.
  15. This option may have a slight performance impact because a portion
  16. of the kernel code won't be covered by a 2MB TLB anymore.
  17. If in doubt, say "N".
  18. config IOMMU_DEBUG
  19. depends on GART_IOMMU && DEBUG_KERNEL
  20. bool "Enable IOMMU debugging"
  21. help
  22. Force the IOMMU to on even when you have less than 4GB of
  23. memory and add debugging code. On overflow always panic. And
  24. allow to enable IOMMU leak tracing. Can be disabled at boot
  25. time with iommu=noforce. This will also enable scatter gather
  26. list merging. Currently not recommended for production
  27. code. When you use it make sure you have a big enough
  28. IOMMU/AGP aperture. Most of the options enabled by this can
  29. be set more finegrained using the iommu= command line
  30. options. See Documentation/x86_64/boot-options.txt for more
  31. details.
  32. config IOMMU_LEAK
  33. bool "IOMMU leak tracing"
  34. depends on DEBUG_KERNEL
  35. depends on IOMMU_DEBUG
  36. help
  37. Add a simple leak tracer to the IOMMU code. This is useful when you
  38. are debugging a buggy device driver that leaks IOMMU mappings.
  39. #config X86_REMOTE_DEBUG
  40. # bool "kgdb debugging stub"
  41. endmenu