Kconfig.debug 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288
  1. menu "Kernel hacking"
  2. config TRACE_IRQFLAGS_SUPPORT
  3. def_bool y
  4. source "lib/Kconfig.debug"
  5. config STRICT_DEVMEM
  6. bool "Filter access to /dev/mem"
  7. ---help---
  8. If this option is disabled, you allow userspace (root) access to all
  9. of memory, including kernel and userspace memory. Accidental
  10. access to this is obviously disastrous, but specific access can
  11. be used by people debugging the kernel. Note that with PAT support
  12. enabled, even in this case there are restrictions on /dev/mem
  13. use due to the cache aliasing requirements.
  14. If this option is switched on, the /dev/mem file only allows
  15. userspace access to PCI space and the BIOS code and data regions.
  16. This is sufficient for dosemu and X and all common users of
  17. /dev/mem.
  18. If in doubt, say Y.
  19. config X86_VERBOSE_BOOTUP
  20. bool "Enable verbose x86 bootup info messages"
  21. default y
  22. ---help---
  23. Enables the informational output from the decompression stage
  24. (e.g. bzImage) of the boot. If you disable this you will still
  25. see errors. Disable this if you want silent bootup.
  26. config EARLY_PRINTK
  27. bool "Early printk" if EXPERT
  28. default y
  29. ---help---
  30. Write kernel log output directly into the VGA buffer or to a serial
  31. port.
  32. This is useful for kernel debugging when your machine crashes very
  33. early before the console code is initialized. For normal operation
  34. it is not recommended because it looks ugly and doesn't cooperate
  35. with klogd/syslogd or the X server. You should normally N here,
  36. unless you want to debug such a crash.
  37. config EARLY_PRINTK_MRST
  38. bool "Early printk for MRST platform support"
  39. depends on EARLY_PRINTK && X86_MRST
  40. config EARLY_PRINTK_DBGP
  41. bool "Early printk via EHCI debug port"
  42. depends on EARLY_PRINTK && PCI
  43. ---help---
  44. Write kernel log output directly into the EHCI debug port.
  45. This is useful for kernel debugging when your machine crashes very
  46. early before the console code is initialized. For normal operation
  47. it is not recommended because it looks ugly and doesn't cooperate
  48. with klogd/syslogd or the X server. You should normally N here,
  49. unless you want to debug such a crash. You need usb debug device.
  50. config DEBUG_STACKOVERFLOW
  51. bool "Check for stack overflows"
  52. depends on DEBUG_KERNEL
  53. ---help---
  54. This option will cause messages to be printed if free stack space
  55. drops below a certain limit.
  56. config X86_PTDUMP
  57. bool "Export kernel pagetable layout to userspace via debugfs"
  58. depends on DEBUG_KERNEL
  59. select DEBUG_FS
  60. ---help---
  61. Say Y here if you want to show the kernel pagetable layout in a
  62. debugfs file. This information is only useful for kernel developers
  63. who are working in architecture specific areas of the kernel.
  64. It is probably not a good idea to enable this feature in a production
  65. kernel.
  66. If in doubt, say "N"
  67. config DEBUG_RODATA
  68. bool "Write protect kernel read-only data structures"
  69. default y
  70. depends on DEBUG_KERNEL
  71. ---help---
  72. Mark the kernel read-only data as write-protected in the pagetables,
  73. in order to catch accidental (and incorrect) writes to such const
  74. data. This is recommended so that we can catch kernel bugs sooner.
  75. If in doubt, say "Y".
  76. config DEBUG_RODATA_TEST
  77. bool "Testcase for the DEBUG_RODATA feature"
  78. depends on DEBUG_RODATA
  79. default y
  80. ---help---
  81. This option enables a testcase for the DEBUG_RODATA
  82. feature as well as for the change_page_attr() infrastructure.
  83. If in doubt, say "N"
  84. config DEBUG_SET_MODULE_RONX
  85. bool "Set loadable kernel module data as NX and text as RO"
  86. depends on MODULES
  87. ---help---
  88. This option helps catch unintended modifications to loadable
  89. kernel module's text and read-only data. It also prevents execution
  90. of module data. Such protection may interfere with run-time code
  91. patching and dynamic kernel tracing - and they might also protect
  92. against certain classes of kernel exploits.
  93. If in doubt, say "N".
  94. config DEBUG_NX_TEST
  95. tristate "Testcase for the NX non-executable stack feature"
  96. depends on DEBUG_KERNEL && m
  97. ---help---
  98. This option enables a testcase for the CPU NX capability
  99. and the software setup of this feature.
  100. If in doubt, say "N"
  101. config DOUBLEFAULT
  102. default y
  103. bool "Enable doublefault exception handler" if EXPERT
  104. depends on X86_32
  105. ---help---
  106. This option allows trapping of rare doublefault exceptions that
  107. would otherwise cause a system to silently reboot. Disabling this
  108. option saves about 4k and might cause you much additional grey
  109. hair.
  110. config IOMMU_DEBUG
  111. bool "Enable IOMMU debugging"
  112. depends on GART_IOMMU && DEBUG_KERNEL
  113. depends on X86_64
  114. ---help---
  115. Force the IOMMU to on even when you have less than 4GB of
  116. memory and add debugging code. On overflow always panic. And
  117. allow to enable IOMMU leak tracing. Can be disabled at boot
  118. time with iommu=noforce. This will also enable scatter gather
  119. list merging. Currently not recommended for production
  120. code. When you use it make sure you have a big enough
  121. IOMMU/AGP aperture. Most of the options enabled by this can
  122. be set more finegrained using the iommu= command line
  123. options. See Documentation/x86_64/boot-options.txt for more
  124. details.
  125. config IOMMU_STRESS
  126. bool "Enable IOMMU stress-test mode"
  127. ---help---
  128. This option disables various optimizations in IOMMU related
  129. code to do real stress testing of the IOMMU code. This option
  130. will cause a performance drop and should only be enabled for
  131. testing.
  132. config IOMMU_LEAK
  133. bool "IOMMU leak tracing"
  134. depends on IOMMU_DEBUG && DMA_API_DEBUG
  135. ---help---
  136. Add a simple leak tracer to the IOMMU code. This is useful when you
  137. are debugging a buggy device driver that leaks IOMMU mappings.
  138. config HAVE_MMIOTRACE_SUPPORT
  139. def_bool y
  140. config X86_DECODER_SELFTEST
  141. bool "x86 instruction decoder selftest"
  142. depends on DEBUG_KERNEL && KPROBES
  143. ---help---
  144. Perform x86 instruction decoder selftests at build time.
  145. This option is useful for checking the sanity of x86 instruction
  146. decoder code.
  147. If unsure, say "N".
  148. #
  149. # IO delay types:
  150. #
  151. config IO_DELAY_TYPE_0X80
  152. int
  153. default "0"
  154. config IO_DELAY_TYPE_0XED
  155. int
  156. default "1"
  157. config IO_DELAY_TYPE_UDELAY
  158. int
  159. default "2"
  160. config IO_DELAY_TYPE_NONE
  161. int
  162. default "3"
  163. choice
  164. prompt "IO delay type"
  165. default IO_DELAY_0X80
  166. config IO_DELAY_0X80
  167. bool "port 0x80 based port-IO delay [recommended]"
  168. ---help---
  169. This is the traditional Linux IO delay used for in/out_p.
  170. It is the most tested hence safest selection here.
  171. config IO_DELAY_0XED
  172. bool "port 0xed based port-IO delay"
  173. ---help---
  174. Use port 0xed as the IO delay. This frees up port 0x80 which is
  175. often used as a hardware-debug port.
  176. config IO_DELAY_UDELAY
  177. bool "udelay based port-IO delay"
  178. ---help---
  179. Use udelay(2) as the IO delay method. This provides the delay
  180. while not having any side-effect on the IO port space.
  181. config IO_DELAY_NONE
  182. bool "no port-IO delay"
  183. ---help---
  184. No port-IO delay. Will break on old boxes that require port-IO
  185. delay for certain operations. Should work on most new machines.
  186. endchoice
  187. if IO_DELAY_0X80
  188. config DEFAULT_IO_DELAY_TYPE
  189. int
  190. default IO_DELAY_TYPE_0X80
  191. endif
  192. if IO_DELAY_0XED
  193. config DEFAULT_IO_DELAY_TYPE
  194. int
  195. default IO_DELAY_TYPE_0XED
  196. endif
  197. if IO_DELAY_UDELAY
  198. config DEFAULT_IO_DELAY_TYPE
  199. int
  200. default IO_DELAY_TYPE_UDELAY
  201. endif
  202. if IO_DELAY_NONE
  203. config DEFAULT_IO_DELAY_TYPE
  204. int
  205. default IO_DELAY_TYPE_NONE
  206. endif
  207. config DEBUG_BOOT_PARAMS
  208. bool "Debug boot parameters"
  209. depends on DEBUG_KERNEL
  210. depends on DEBUG_FS
  211. ---help---
  212. This option will cause struct boot_params to be exported via debugfs.
  213. config CPA_DEBUG
  214. bool "CPA self-test code"
  215. depends on DEBUG_KERNEL
  216. ---help---
  217. Do change_page_attr() self-tests every 30 seconds.
  218. config OPTIMIZE_INLINING
  219. bool "Allow gcc to uninline functions marked 'inline'"
  220. ---help---
  221. This option determines if the kernel forces gcc to inline the functions
  222. developers have marked 'inline'. Doing so takes away freedom from gcc to
  223. do what it thinks is best, which is desirable for the gcc 3.x series of
  224. compilers. The gcc 4.x series have a rewritten inlining algorithm and
  225. enabling this option will generate a smaller kernel there. Hopefully
  226. this algorithm is so good that allowing gcc 4.x and above to make the
  227. decision will become the default in the future. Until then this option
  228. is there to test gcc for this.
  229. If unsure, say N.
  230. config DEBUG_STRICT_USER_COPY_CHECKS
  231. bool "Strict copy size checks"
  232. depends on DEBUG_KERNEL && !TRACE_BRANCH_PROFILING
  233. ---help---
  234. Enabling this option turns a certain set of sanity checks for user
  235. copy operations into compile time failures.
  236. The copy_from_user() etc checks are there to help test if there
  237. are sufficient security checks on the length argument of
  238. the copy operation, by having gcc prove that the argument is
  239. within bounds.
  240. If unsure, or if you run an older (pre 4.4) gcc, say N.
  241. endmenu