1# SPDX-License-Identifier: GPL-2.0-only 2menu "Kernel hacking" 3 4menu "printk and dmesg options" 5 6config PRINTK_TIME 7 bool "Show timing information on printks" 8 depends on PRINTK 9 help 10 Selecting this option causes time stamps of the printk() 11 messages to be added to the output of the syslog() system 12 call and at the console. 13 14 The timestamp is always recorded internally, and exported 15 to /dev/kmsg. This flag just specifies if the timestamp should 16 be included, not that the timestamp is recorded. 17 18 The behavior is also controlled by the kernel command line 19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst 20 21config PRINTK_CALLER 22 bool "Show caller information on printks" 23 depends on PRINTK 24 help 25 Selecting this option causes printk() to add a caller "thread id" (if 26 in task context) or a caller "processor id" (if not in task context) 27 to every message. 28 29 This option is intended for environments where multiple threads 30 concurrently call printk() for many times, for it is difficult to 31 interpret without knowing where these lines (or sometimes individual 32 line which was divided into multiple lines due to race) came from. 33 34 Since toggling after boot makes the code racy, currently there is 35 no option to enable/disable at the kernel command line parameter or 36 sysfs interface. 37 38config STACKTRACE_BUILD_ID 39 bool "Show build ID information in stacktraces" 40 depends on PRINTK 41 help 42 Selecting this option adds build ID information for symbols in 43 stacktraces printed with the printk format '%p[SR]b'. 44 45 This option is intended for distros where debuginfo is not easily 46 accessible but can be downloaded given the build ID of the vmlinux or 47 kernel module where the function is located. 48 49config CONSOLE_LOGLEVEL_DEFAULT 50 int "Default console loglevel (1-15)" 51 range 1 15 52 default "7" 53 help 54 Default loglevel to determine what will be printed on the console. 55 56 Setting a default here is equivalent to passing in loglevel=<x> in 57 the kernel bootargs. loglevel=<x> continues to override whatever 58 value is specified here as well. 59 60 Note: This does not affect the log level of un-prefixed printk() 61 usage in the kernel. That is controlled by the MESSAGE_LOGLEVEL_DEFAULT 62 option. 63 64config CONSOLE_LOGLEVEL_QUIET 65 int "quiet console loglevel (1-15)" 66 range 1 15 67 default "4" 68 help 69 loglevel to use when "quiet" is passed on the kernel commandline. 70 71 When "quiet" is passed on the kernel commandline this loglevel 72 will be used as the loglevel. IOW passing "quiet" will be the 73 equivalent of passing "loglevel=<CONSOLE_LOGLEVEL_QUIET>" 74 75config MESSAGE_LOGLEVEL_DEFAULT 76 int "Default message log level (1-7)" 77 range 1 7 78 default "4" 79 help 80 Default log level for printk statements with no specified priority. 81 82 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks 83 that are auditing their logs closely may want to set it to a lower 84 priority. 85 86 Note: This does not affect what message level gets printed on the console 87 by default. To change that, use loglevel=<x> in the kernel bootargs, 88 or pick a different CONSOLE_LOGLEVEL_DEFAULT configuration value. 89 90config BOOT_PRINTK_DELAY 91 bool "Delay each boot printk message by N milliseconds" 92 depends on DEBUG_KERNEL && PRINTK && GENERIC_CALIBRATE_DELAY 93 help 94 This build option allows you to read kernel boot messages 95 by inserting a short delay after each one. The delay is 96 specified in milliseconds on the kernel command line, 97 using "boot_delay=N". 98 99 It is likely that you would also need to use "lpj=M" to preset 100 the "loops per jiffie" value. 101 See a previous boot log for the "lpj" value to use for your 102 system, and then set "lpj=M" before setting "boot_delay=N". 103 NOTE: Using this option may adversely affect SMP systems. 104 I.e., processors other than the first one may not boot up. 105 BOOT_PRINTK_DELAY also may cause LOCKUP_DETECTOR to detect 106 what it believes to be lockup conditions. 107 108config DYNAMIC_DEBUG 109 bool "Enable dynamic printk() support" 110 default n 111 depends on PRINTK 112 depends on (DEBUG_FS || PROC_FS) 113 select DYNAMIC_DEBUG_CORE 114 help 115 116 Compiles debug level messages into the kernel, which would not 117 otherwise be available at runtime. These messages can then be 118 enabled/disabled based on various levels of scope - per source file, 119 function, module, format string, and line number. This mechanism 120 implicitly compiles in all pr_debug() and dev_dbg() calls, which 121 enlarges the kernel text size by about 2%. 122 123 If a source file is compiled with DEBUG flag set, any 124 pr_debug() calls in it are enabled by default, but can be 125 disabled at runtime as below. Note that DEBUG flag is 126 turned on by many CONFIG_*DEBUG* options. 127 128 Usage: 129 130 Dynamic debugging is controlled via the 'dynamic_debug/control' file, 131 which is contained in the 'debugfs' filesystem or procfs. 132 Thus, the debugfs or procfs filesystem must first be mounted before 133 making use of this feature. 134 We refer the control file as: <debugfs>/dynamic_debug/control. This 135 file contains a list of the debug statements that can be enabled. The 136 format for each line of the file is: 137 138 filename:lineno [module]function flags format 139 140 filename : source file of the debug statement 141 lineno : line number of the debug statement 142 module : module that contains the debug statement 143 function : function that contains the debug statement 144 flags : '=p' means the line is turned 'on' for printing 145 format : the format used for the debug statement 146 147 From a live system: 148 149 nullarbor:~ # cat <debugfs>/dynamic_debug/control 150 # filename:lineno [module]function flags format 151 fs/aio.c:222 [aio]__put_ioctx =_ "__put_ioctx:\040freeing\040%p\012" 152 fs/aio.c:248 [aio]ioctx_alloc =_ "ENOMEM:\040nr_events\040too\040high\012" 153 fs/aio.c:1770 [aio]sys_io_cancel =_ "calling\040cancel\012" 154 155 Example usage: 156 157 // enable the message at line 1603 of file svcsock.c 158 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' > 159 <debugfs>/dynamic_debug/control 160 161 // enable all the messages in file svcsock.c 162 nullarbor:~ # echo -n 'file svcsock.c +p' > 163 <debugfs>/dynamic_debug/control 164 165 // enable all the messages in the NFS server module 166 nullarbor:~ # echo -n 'module nfsd +p' > 167 <debugfs>/dynamic_debug/control 168 169 // enable all 12 messages in the function svc_process() 170 nullarbor:~ # echo -n 'func svc_process +p' > 171 <debugfs>/dynamic_debug/control 172 173 // disable all 12 messages in the function svc_process() 174 nullarbor:~ # echo -n 'func svc_process -p' > 175 <debugfs>/dynamic_debug/control 176 177 See Documentation/admin-guide/dynamic-debug-howto.rst for additional 178 information. 179 180config DYNAMIC_DEBUG_CORE 181 bool "Enable core function of dynamic debug support" 182 depends on PRINTK 183 depends on (DEBUG_FS || PROC_FS) 184 help 185 Enable core functional support of dynamic debug. It is useful 186 when you want to tie dynamic debug to your kernel modules with 187 DYNAMIC_DEBUG_MODULE defined for each of them, especially for 188 the case of embedded system where the kernel image size is 189 sensitive for people. 190 191config SYMBOLIC_ERRNAME 192 bool "Support symbolic error names in printf" 193 default y if PRINTK 194 help 195 If you say Y here, the kernel's printf implementation will 196 be able to print symbolic error names such as ENOSPC instead 197 of the number 28. It makes the kernel image slightly larger 198 (about 3KB), but can make the kernel logs easier to read. 199 200config DEBUG_BUGVERBOSE 201 bool "Verbose BUG() reporting (adds 70K)" if DEBUG_KERNEL && EXPERT 202 depends on BUG && (GENERIC_BUG || HAVE_DEBUG_BUGVERBOSE) 203 default y 204 help 205 Say Y here to make BUG() panics output the file name and line number 206 of the BUG call as well as the EIP and oops trace. This aids 207 debugging but costs about 70-100K of memory. 208 209endmenu # "printk and dmesg options" 210 211config DEBUG_KERNEL 212 bool "Kernel debugging" 213 help 214 Say Y here if you are developing drivers or trying to debug and 215 identify kernel problems. 216 217config DEBUG_MISC 218 bool "Miscellaneous debug code" 219 default DEBUG_KERNEL 220 depends on DEBUG_KERNEL 221 help 222 Say Y here if you need to enable miscellaneous debug code that should 223 be under a more specific debug option but isn't. 224 225menu "Compile-time checks and compiler options" 226 227config DEBUG_INFO 228 bool 229 help 230 A kernel debug info option other than "None" has been selected 231 in the "Debug information" choice below, indicating that debug 232 information will be generated for build targets. 233 234choice 235 prompt "Debug information" 236 depends on DEBUG_KERNEL 237 help 238 Selecting something other than "None" results in a kernel image 239 that will include debugging info resulting in a larger kernel image. 240 This adds debug symbols to the kernel and modules (gcc -g), and 241 is needed if you intend to use kernel crashdump or binary object 242 tools like crash, kgdb, LKCD, gdb, etc on the kernel. 243 244 Choose which version of DWARF debug info to emit. If unsure, 245 select "Toolchain default". 246 247config DEBUG_INFO_NONE 248 bool "Disable debug information" 249 help 250 Do not build the kernel with debugging information, which will 251 result in a faster and smaller build. 252 253config DEBUG_INFO_DWARF_TOOLCHAIN_DEFAULT 254 bool "Rely on the toolchain's implicit default DWARF version" 255 select DEBUG_INFO 256 help 257 The implicit default version of DWARF debug info produced by a 258 toolchain changes over time. 259 260 This can break consumers of the debug info that haven't upgraded to 261 support newer revisions, and prevent testing newer versions, but 262 those should be less common scenarios. 263 264config DEBUG_INFO_DWARF4 265 bool "Generate DWARF Version 4 debuginfo" 266 select DEBUG_INFO 267 help 268 Generate DWARF v4 debug info. This requires gcc 4.5+ and gdb 7.0+. 269 270 If you have consumers of DWARF debug info that are not ready for 271 newer revisions of DWARF, you may wish to choose this or have your 272 config select this. 273 274config DEBUG_INFO_DWARF5 275 bool "Generate DWARF Version 5 debuginfo" 276 select DEBUG_INFO 277 depends on !CC_IS_CLANG || (CC_IS_CLANG && (AS_IS_LLVM || (AS_IS_GNU && AS_VERSION >= 23502))) 278 help 279 Generate DWARF v5 debug info. Requires binutils 2.35.2, gcc 5.0+ (gcc 280 5.0+ accepts the -gdwarf-5 flag but only had partial support for some 281 draft features until 7.0), and gdb 8.0+. 282 283 Changes to the structure of debug info in Version 5 allow for around 284 15-18% savings in resulting image and debug info section sizes as 285 compared to DWARF Version 4. DWARF Version 5 standardizes previous 286 extensions such as accelerators for symbol indexing and the format 287 for fission (.dwo/.dwp) files. Users may not want to select this 288 config if they rely on tooling that has not yet been updated to 289 support DWARF Version 5. 290 291endchoice # "Debug information" 292 293if DEBUG_INFO 294 295config DEBUG_INFO_REDUCED 296 bool "Reduce debugging information" 297 help 298 If you say Y here gcc is instructed to generate less debugging 299 information for structure types. This means that tools that 300 need full debugging information (like kgdb or systemtap) won't 301 be happy. But if you merely need debugging information to 302 resolve line numbers there is no loss. Advantage is that 303 build directory object sizes shrink dramatically over a full 304 DEBUG_INFO build and compile times are reduced too. 305 Only works with newer gcc versions. 306 307config DEBUG_INFO_COMPRESSED 308 bool "Compressed debugging information" 309 depends on $(cc-option,-gz=zlib) 310 depends on $(ld-option,--compress-debug-sections=zlib) 311 help 312 Compress the debug information using zlib. Requires GCC 5.0+ or Clang 313 5.0+, binutils 2.26+, and zlib. 314 315 Users of dpkg-deb via scripts/package/builddeb may find an increase in 316 size of their debug .deb packages with this config set, due to the 317 debug info being compressed with zlib, then the object files being 318 recompressed with a different compression scheme. But this is still 319 preferable to setting $KDEB_COMPRESS to "none" which would be even 320 larger. 321 322config DEBUG_INFO_SPLIT 323 bool "Produce split debuginfo in .dwo files" 324 depends on $(cc-option,-gsplit-dwarf) 325 help 326 Generate debug info into separate .dwo files. This significantly 327 reduces the build directory size for builds with DEBUG_INFO, 328 because it stores the information only once on disk in .dwo 329 files instead of multiple times in object files and executables. 330 In addition the debug information is also compressed. 331 332 Requires recent gcc (4.7+) and recent gdb/binutils. 333 Any tool that packages or reads debug information would need 334 to know about the .dwo files and include them. 335 Incompatible with older versions of ccache. 336 337config DEBUG_INFO_BTF 338 bool "Generate BTF typeinfo" 339 depends on !DEBUG_INFO_SPLIT && !DEBUG_INFO_REDUCED 340 depends on !GCC_PLUGIN_RANDSTRUCT || COMPILE_TEST 341 depends on BPF_SYSCALL 342 depends on !DEBUG_INFO_DWARF5 || PAHOLE_VERSION >= 121 343 help 344 Generate deduplicated BTF type information from DWARF debug info. 345 Turning this on expects presence of pahole tool, which will convert 346 DWARF type info into equivalent deduplicated BTF type info. 347 348config PAHOLE_HAS_SPLIT_BTF 349 def_bool PAHOLE_VERSION >= 119 350 351config PAHOLE_HAS_BTF_TAG 352 def_bool PAHOLE_VERSION >= 123 353 depends on CC_IS_CLANG 354 help 355 Decide whether pahole emits btf_tag attributes (btf_type_tag and 356 btf_decl_tag) or not. Currently only clang compiler implements 357 these attributes, so make the config depend on CC_IS_CLANG. 358 359config DEBUG_INFO_BTF_MODULES 360 def_bool y 361 depends on DEBUG_INFO_BTF && MODULES && PAHOLE_HAS_SPLIT_BTF 362 help 363 Generate compact split BTF type information for kernel modules. 364 365config MODULE_ALLOW_BTF_MISMATCH 366 bool "Allow loading modules with non-matching BTF type info" 367 depends on DEBUG_INFO_BTF_MODULES 368 help 369 For modules whose split BTF does not match vmlinux, load without 370 BTF rather than refusing to load. The default behavior with 371 module BTF enabled is to reject modules with such mismatches; 372 this option will still load module BTF where possible but ignore 373 it when a mismatch is found. 374 375config GDB_SCRIPTS 376 bool "Provide GDB scripts for kernel debugging" 377 help 378 This creates the required links to GDB helper scripts in the 379 build directory. If you load vmlinux into gdb, the helper 380 scripts will be automatically imported by gdb as well, and 381 additional functions are available to analyze a Linux kernel 382 instance. See Documentation/dev-tools/gdb-kernel-debugging.rst 383 for further details. 384 385endif # DEBUG_INFO 386 387config FRAME_WARN 388 int "Warn for stack frames larger than" 389 range 0 8192 390 default 2048 if GCC_PLUGIN_LATENT_ENTROPY 391 default 2048 if PARISC 392 default 1536 if (!64BIT && XTENSA) 393 default 1024 if !64BIT 394 default 2048 if 64BIT 395 help 396 Tell gcc to warn at build time for stack frames larger than this. 397 Setting this too low will cause a lot of warnings. 398 Setting it to 0 disables the warning. 399 400config STRIP_ASM_SYMS 401 bool "Strip assembler-generated symbols during link" 402 default n 403 help 404 Strip internal assembler-generated symbols during a link (symbols 405 that look like '.Lxxx') so they don't pollute the output of 406 get_wchan() and suchlike. 407 408config READABLE_ASM 409 bool "Generate readable assembler code" 410 depends on DEBUG_KERNEL 411 depends on CC_IS_GCC 412 help 413 Disable some compiler optimizations that tend to generate human unreadable 414 assembler output. This may make the kernel slightly slower, but it helps 415 to keep kernel developers who have to stare a lot at assembler listings 416 sane. 417 418config HEADERS_INSTALL 419 bool "Install uapi headers to usr/include" 420 depends on !UML 421 help 422 This option will install uapi headers (headers exported to user-space) 423 into the usr/include directory for use during the kernel build. 424 This is unneeded for building the kernel itself, but needed for some 425 user-space program samples. It is also needed by some features such 426 as uapi header sanity checks. 427 428config DEBUG_SECTION_MISMATCH 429 bool "Enable full Section mismatch analysis" 430 depends on CC_IS_GCC 431 help 432 The section mismatch analysis checks if there are illegal 433 references from one section to another section. 434 During linktime or runtime, some sections are dropped; 435 any use of code/data previously in these sections would 436 most likely result in an oops. 437 In the code, functions and variables are annotated with 438 __init,, etc. (see the full list in include/linux/init.h), 439 which results in the code/data being placed in specific sections. 440 The section mismatch analysis is always performed after a full 441 kernel build, and enabling this option causes the following 442 additional step to occur: 443 - Add the option -fno-inline-functions-called-once to gcc commands. 444 When inlining a function annotated with __init in a non-init 445 function, we would lose the section information and thus 446 the analysis would not catch the illegal reference. 447 This option tells gcc to inline less (but it does result in 448 a larger kernel). 449 450config SECTION_MISMATCH_WARN_ONLY 451 bool "Make section mismatch errors non-fatal" 452 default y 453 help 454 If you say N here, the build process will fail if there are any 455 section mismatch, instead of just throwing warnings. 456 457 If unsure, say Y. 458 459config DEBUG_FORCE_FUNCTION_ALIGN_64B 460 bool "Force all function address 64B aligned" 461 depends on EXPERT && (X86_64 || ARM64 || PPC32 || PPC64 || ARC) 462 help 463 There are cases that a commit from one domain changes the function 464 address alignment of other domains, and cause magic performance 465 bump (regression or improvement). Enable this option will help to 466 verify if the bump is caused by function alignment changes, while 467 it will slightly increase the kernel size and affect icache usage. 468 469 It is mainly for debug and performance tuning use. 470 471# 472# Select this config option from the architecture Kconfig, if it 473# is preferred to always offer frame pointers as a config 474# option on the architecture (regardless of KERNEL_DEBUG): 475# 476config ARCH_WANT_FRAME_POINTERS 477 bool 478 479config FRAME_POINTER 480 bool "Compile the kernel with frame pointers" 481 depends on DEBUG_KERNEL && (M68K || UML || SUPERH) || ARCH_WANT_FRAME_POINTERS 482 default y if (DEBUG_INFO && UML) || ARCH_WANT_FRAME_POINTERS 483 help 484 If you say Y here the resulting kernel image will be slightly 485 larger and slower, but it gives very useful debugging information 486 in case of kernel bugs. (precise oopses/stacktraces/warnings) 487 488config OBJTOOL 489 bool 490 491config STACK_VALIDATION 492 bool "Compile-time stack metadata validation" 493 depends on HAVE_STACK_VALIDATION && UNWINDER_FRAME_POINTER 494 select OBJTOOL 495 default n 496 help 497 Validate frame pointer rules at compile-time. This helps ensure that 498 runtime stack traces are more reliable. 499 500 For more information, see 501 tools/objtool/Documentation/objtool.txt. 502 503config NOINSTR_VALIDATION 504 bool 505 depends on HAVE_NOINSTR_VALIDATION && DEBUG_ENTRY 506 select OBJTOOL 507 default y 508 509config VMLINUX_MAP 510 bool "Generate vmlinux.map file when linking" 511 depends on EXPERT 512 help 513 Selecting this option will pass "-Map=vmlinux.map" to ld 514 when linking vmlinux. That file can be useful for verifying 515 and debugging magic section games, and for seeing which 516 pieces of code get eliminated with 517 CONFIG_LD_DEAD_CODE_DATA_ELIMINATION. 518 519config DEBUG_FORCE_WEAK_PER_CPU 520 bool "Force weak per-cpu definitions" 521 depends on DEBUG_KERNEL 522 help 523 s390 and alpha require percpu variables in modules to be 524 defined weak to work around addressing range issue which 525 puts the following two restrictions on percpu variable 526 definitions. 527 528 1. percpu symbols must be unique whether static or not 529 2. percpu variables can't be defined inside a function 530 531 To ensure that generic code follows the above rules, this 532 option forces all percpu variables to be defined as weak. 533 534endmenu # "Compiler options" 535 536menu "Generic Kernel Debugging Instruments" 537 538config MAGIC_SYSRQ 539 bool "Magic SysRq key" 540 depends on !UML 541 help 542 If you say Y here, you will have some control over the system even 543 if the system crashes for example during kernel debugging (e.g., you 544 will be able to flush the buffer cache to disk, reboot the system 545 immediately or dump some status information). This is accomplished 546 by pressing various keys while holding SysRq (Alt+PrintScreen). It 547 also works on a serial console (on PC hardware at least), if you 548 send a BREAK and then within 5 seconds a command keypress. The 549 keys are documented in <file:Documentation/admin-guide/sysrq.rst>. 550 Don't say Y unless you really know what this hack does. 551 552config MAGIC_SYSRQ_DEFAULT_ENABLE 553 hex "Enable magic SysRq key functions by default" 554 depends on MAGIC_SYSRQ 555 default 0x1 556 help 557 Specifies which SysRq key functions are enabled by default. 558 This may be set to 1 or 0 to enable or disable them all, or 559 to a bitmask as described in Documentation/admin-guide/sysrq.rst. 560 561config MAGIC_SYSRQ_SERIAL 562 bool "Enable magic SysRq key over serial" 563 depends on MAGIC_SYSRQ 564 default y 565 help 566 Many embedded boards have a disconnected TTL level serial which can 567 generate some garbage that can lead to spurious false sysrq detects. 568 This option allows you to decide whether you want to enable the 569 magic SysRq key. 570 571config MAGIC_SYSRQ_SERIAL_SEQUENCE 572 string "Char sequence that enables magic SysRq over serial" 573 depends on MAGIC_SYSRQ_SERIAL 574 default "" 575 help 576 Specifies a sequence of characters that can follow BREAK to enable 577 SysRq on a serial console. 578 579 If unsure, leave an empty string and the option will not be enabled. 580 581config DEBUG_FS 582 bool "Debug Filesystem" 583 help 584 debugfs is a virtual file system that kernel developers use to put 585 debugging files into. Enable this option to be able to read and 586 write to these files. 587 588 For detailed documentation on the debugfs API, see 589 Documentation/filesystems/. 590 591 If unsure, say N. 592 593choice 594 prompt "Debugfs default access" 595 depends on DEBUG_FS 596 default DEBUG_FS_ALLOW_ALL 597 help 598 This selects the default access restrictions for debugfs. 599 It can be overridden with kernel command line option 600 debugfs=[on,no-mount,off]. The restrictions apply for API access 601 and filesystem registration. 602 603config DEBUG_FS_ALLOW_ALL 604 bool "Access normal" 605 help 606 No restrictions apply. Both API and filesystem registration 607 is on. This is the normal default operation. 608 609config DEBUG_FS_DISALLOW_MOUNT 610 bool "Do not register debugfs as filesystem" 611 help 612 The API is open but filesystem is not loaded. Clients can still do 613 their work and read with debug tools that do not need 614 debugfs filesystem. 615 616config DEBUG_FS_ALLOW_NONE 617 bool "No access" 618 help 619 Access is off. Clients get -PERM when trying to create nodes in 620 debugfs tree and debugfs is not registered as a filesystem. 621 Client can then back-off or continue without debugfs access. 622 623endchoice 624 625source "lib/Kconfig.kgdb" 626source "lib/Kconfig.ubsan" 627source "lib/Kconfig.kcsan" 628 629endmenu 630 631menu "Networking Debugging" 632 633source "net/Kconfig.debug" 634 635endmenu # "Networking Debugging" 636 637menu "Memory Debugging" 638 639source "mm/Kconfig.debug" 640 641config DEBUG_OBJECTS 642 bool "Debug object operations" 643 depends on DEBUG_KERNEL 644 help 645 If you say Y here, additional code will be inserted into the 646 kernel to track the life time of various objects and validate 647 the operations on those objects. 648 649config DEBUG_OBJECTS_SELFTEST 650 bool "Debug objects selftest" 651 depends on DEBUG_OBJECTS 652 help 653 This enables the selftest of the object debug code. 654 655config DEBUG_OBJECTS_FREE 656 bool "Debug objects in freed memory" 657 depends on DEBUG_OBJECTS 658 help 659 This enables checks whether a k/v free operation frees an area 660 which contains an object which has not been deactivated 661 properly. This can make kmalloc/kfree-intensive workloads 662 much slower. 663 664config DEBUG_OBJECTS_TIMERS 665 bool "Debug timer objects" 666 depends on DEBUG_OBJECTS 667 help 668 If you say Y here, additional code will be inserted into the 669 timer routines to track the life time of timer objects and 670 validate the timer operations. 671 672config DEBUG_OBJECTS_WORK 673 bool "Debug work objects" 674 depends on DEBUG_OBJECTS 675 help 676 If you say Y here, additional code will be inserted into the 677 work queue routines to track the life time of work objects and 678 validate the work operations. 679 680config DEBUG_OBJECTS_RCU_HEAD 681 bool "Debug RCU callbacks objects" 682 depends on DEBUG_OBJECTS 683 help 684 Enable this to turn on debugging of RCU list heads (call_rcu() usage). 685 686config DEBUG_OBJECTS_PERCPU_COUNTER 687 bool "Debug percpu counter objects" 688 depends on DEBUG_OBJECTS 689 help 690 If you say Y here, additional code will be inserted into the 691 percpu counter routines to track the life time of percpu counter 692 objects and validate the percpu counter operations. 693 694config DEBUG_OBJECTS_ENABLE_DEFAULT 695 int "debug_objects bootup default value (0-1)" 696 range 0 1 697 default "1" 698 depends on DEBUG_OBJECTS 699 help 700 Debug objects boot parameter default value 701 702config SHRINKER_DEBUG 703 bool "Enable shrinker debugging support" 704 depends on DEBUG_FS 705 help 706 Say Y to enable the shrinker debugfs interface which provides 707 visibility into the kernel memory shrinkers subsystem. 708 Disable it to avoid an extra memory footprint. 709 710config HAVE_DEBUG_KMEMLEAK 711 bool 712 713config DEBUG_KMEMLEAK 714 bool "Kernel memory leak detector" 715 depends on DEBUG_KERNEL && HAVE_DEBUG_KMEMLEAK 716 select DEBUG_FS 717 select STACKTRACE if STACKTRACE_SUPPORT 718 select KALLSYMS 719 select CRC32 720 help 721 Say Y here if you want to enable the memory leak 722 detector. The memory allocation/freeing is traced in a way 723 similar to the Boehm's conservative garbage collector, the 724 difference being that the orphan objects are not freed but 725 only shown in /sys/kernel/debug/kmemleak. Enabling this 726 feature will introduce an overhead to memory 727 allocations. See Documentation/dev-tools/kmemleak.rst for more 728 details. 729 730 Enabling DEBUG_SLAB or SLUB_DEBUG may increase the chances 731 of finding leaks due to the slab objects poisoning. 732 733 In order to access the kmemleak file, debugfs needs to be 734 mounted (usually at /sys/kernel/debug). 735 736config DEBUG_KMEMLEAK_MEM_POOL_SIZE 737 int "Kmemleak memory pool size" 738 depends on DEBUG_KMEMLEAK 739 range 200 1000000 740 default 16000 741 help 742 Kmemleak must track all the memory allocations to avoid 743 reporting false positives. Since memory may be allocated or 744 freed before kmemleak is fully initialised, use a static pool 745 of metadata objects to track such callbacks. After kmemleak is 746 fully initialised, this memory pool acts as an emergency one 747 if slab allocations fail. 748 749config DEBUG_KMEMLEAK_TEST 750 tristate "Simple test for the kernel memory leak detector" 751 depends on DEBUG_KMEMLEAK && m 752 help 753 This option enables a module that explicitly leaks memory. 754 755 If unsure, say N. 756 757config DEBUG_KMEMLEAK_DEFAULT_OFF 758 bool "Default kmemleak to off" 759 depends on DEBUG_KMEMLEAK 760 help 761 Say Y here to disable kmemleak by default. It can then be enabled 762 on the command line via kmemleak=on. 763 764config DEBUG_KMEMLEAK_AUTO_SCAN 765 bool "Enable kmemleak auto scan thread on boot up" 766 default y 767 depends on DEBUG_KMEMLEAK 768 help 769 Depending on the cpu, kmemleak scan may be cpu intensive and can 770 stall user tasks at times. This option enables/disables automatic 771 kmemleak scan at boot up. 772 773 Say N here to disable kmemleak auto scan thread to stop automatic 774 scanning. Disabling this option disables automatic reporting of 775 memory leaks. 776 777 If unsure, say Y. 778 779config DEBUG_STACK_USAGE 780 bool "Stack utilization instrumentation" 781 depends on DEBUG_KERNEL && !IA64 782 help 783 Enables the display of the minimum amount of free stack which each 784 task has ever had available in the sysrq-T and sysrq-P debug output. 785 786 This option will slow down process creation somewhat. 787 788config SCHED_STACK_END_CHECK 789 bool "Detect stack corruption on calls to schedule()" 790 depends on DEBUG_KERNEL 791 default n 792 help 793 This option checks for a stack overrun on calls to schedule(). 794 If the stack end location is found to be over written always panic as 795 the content of the corrupted region can no longer be trusted. 796 This is to ensure no erroneous behaviour occurs which could result in 797 data corruption or a sporadic crash at a later stage once the region 798 is examined. The runtime overhead introduced is minimal. 799 800config ARCH_HAS_DEBUG_VM_PGTABLE 801 bool 802 help 803 An architecture should select this when it can successfully 804 build and run DEBUG_VM_PGTABLE. 805 806config DEBUG_VM 807 bool "Debug VM" 808 depends on DEBUG_KERNEL 809 help 810 Enable this to turn on extended checks in the virtual-memory system 811 that may impact performance. 812 813 If unsure, say N. 814 815config DEBUG_VM_MAPLE_TREE 816 bool "Debug VM maple trees" 817 depends on DEBUG_VM 818 select DEBUG_MAPLE_TREE 819 help 820 Enable VM maple tree debugging information and extra validations. 821 822 If unsure, say N. 823 824config DEBUG_VM_RB 825 bool "Debug VM red-black trees" 826 depends on DEBUG_VM 827 help 828 Enable VM red-black tree debugging information and extra validations. 829 830 If unsure, say N. 831 832config DEBUG_VM_PGFLAGS 833 bool "Debug page-flags operations" 834 depends on DEBUG_VM 835 help 836 Enables extra validation on page flags operations. 837 838 If unsure, say N. 839 840config DEBUG_VM_PGTABLE 841 bool "Debug arch page table for semantics compliance" 842 depends on MMU 843 depends on ARCH_HAS_DEBUG_VM_PGTABLE 844 default y if DEBUG_VM 845 help 846 This option provides a debug method which can be used to test 847 architecture page table helper functions on various platforms in 848 verifying if they comply with expected generic MM semantics. This 849 will help architecture code in making sure that any changes or 850 new additions of these helpers still conform to expected 851 semantics of the generic MM. Platforms will have to opt in for 852 this through ARCH_HAS_DEBUG_VM_PGTABLE. 853 854 If unsure, say N. 855 856config ARCH_HAS_DEBUG_VIRTUAL 857 bool 858 859config DEBUG_VIRTUAL 860 bool "Debug VM translations" 861 depends on DEBUG_KERNEL && ARCH_HAS_DEBUG_VIRTUAL 862 help 863 Enable some costly sanity checks in virtual to page code. This can 864 catch mistakes with virt_to_page() and friends. 865 866 If unsure, say N. 867 868config DEBUG_NOMMU_REGIONS 869 bool "Debug the global anon/private NOMMU mapping region tree" 870 depends on DEBUG_KERNEL && !MMU 871 help 872 This option causes the global tree of anonymous and private mapping 873 regions to be regularly checked for invalid topology. 874 875config DEBUG_MEMORY_INIT 876 bool "Debug memory initialisation" if EXPERT 877 default !EXPERT 878 help 879 Enable this for additional checks during memory initialisation. 880 The sanity checks verify aspects of the VM such as the memory model 881 and other information provided by the architecture. Verbose 882 information will be printed at KERN_DEBUG loglevel depending 883 on the mminit_loglevel= command-line option. 884 885 If unsure, say Y 886 887config MEMORY_NOTIFIER_ERROR_INJECT 888 tristate "Memory hotplug notifier error injection module" 889 depends on MEMORY_HOTPLUG && NOTIFIER_ERROR_INJECTION 890 help 891 This option provides the ability to inject artificial errors to 892 memory hotplug notifier chain callbacks. It is controlled through 893 debugfs interface under /sys/kernel/debug/notifier-error-inject/memory 894 895 If the notifier call chain should be failed with some events 896 notified, write the error code to "actions/<notifier event>/error". 897 898 Example: Inject memory hotplug offline error (-12 == -ENOMEM) 899 900 # cd /sys/kernel/debug/notifier-error-inject/memory 901 # echo -12 > actions/MEM_GOING_OFFLINE/error 902 # echo offline > /sys/devices/system/memory/memoryXXX/state 903 bash: echo: write error: Cannot allocate memory 904 905 To compile this code as a module, choose M here: the module will 906 be called memory-notifier-error-inject. 907 908 If unsure, say N. 909 910config DEBUG_PER_CPU_MAPS 911 bool "Debug access to per_cpu maps" 912 depends on DEBUG_KERNEL 913 depends on SMP 914 help 915 Say Y to verify that the per_cpu map being accessed has 916 been set up. This adds a fair amount of code to kernel memory 917 and decreases performance. 918 919 Say N if unsure. 920 921config DEBUG_KMAP_LOCAL 922 bool "Debug kmap_local temporary mappings" 923 depends on DEBUG_KERNEL && KMAP_LOCAL 924 help 925 This option enables additional error checking for the kmap_local 926 infrastructure. Disable for production use. 927 928config ARCH_SUPPORTS_KMAP_LOCAL_FORCE_MAP 929 bool 930 931config DEBUG_KMAP_LOCAL_FORCE_MAP 932 bool "Enforce kmap_local temporary mappings" 933 depends on DEBUG_KERNEL && ARCH_SUPPORTS_KMAP_LOCAL_FORCE_MAP 934 select KMAP_LOCAL 935 select DEBUG_KMAP_LOCAL 936 help 937 This option enforces temporary mappings through the kmap_local 938 mechanism for non-highmem pages and on non-highmem systems. 939 Disable this for production systems! 940 941config DEBUG_HIGHMEM 942 bool "Highmem debugging" 943 depends on DEBUG_KERNEL && HIGHMEM 944 select DEBUG_KMAP_LOCAL_FORCE_MAP if ARCH_SUPPORTS_KMAP_LOCAL_FORCE_MAP 945 select DEBUG_KMAP_LOCAL 946 help 947 This option enables additional error checking for high memory 948 systems. Disable for production systems. 949 950config HAVE_DEBUG_STACKOVERFLOW 951 bool 952 953config DEBUG_STACKOVERFLOW 954 bool "Check for stack overflows" 955 depends on DEBUG_KERNEL && HAVE_DEBUG_STACKOVERFLOW 956 help 957 Say Y here if you want to check for overflows of kernel, IRQ 958 and exception stacks (if your architecture uses them). This 959 option will show detailed messages if free stack space drops 960 below a certain limit. 961 962 These kinds of bugs usually occur when call-chains in the 963 kernel get too deep, especially when interrupts are 964 involved. 965 966 Use this in cases where you see apparently random memory 967 corruption, especially if it appears in 'struct thread_info' 968 969 If in doubt, say "N". 970 971source "lib/Kconfig.kasan" 972source "lib/Kconfig.kfence" 973 974endmenu # "Memory Debugging" 975 976config DEBUG_SHIRQ 977 bool "Debug shared IRQ handlers" 978 depends on DEBUG_KERNEL 979 help 980 Enable this to generate a spurious interrupt just before a shared 981 interrupt handler is deregistered (generating one when registering 982 is currently disabled). Drivers need to handle this correctly. Some 983 don't and need to be caught. 984 985menu "Debug Oops, Lockups and Hangs" 986 987config PANIC_ON_OOPS 988 bool "Panic on Oops" 989 help 990 Say Y here to enable the kernel to panic when it oopses. This 991 has the same effect as setting oops=panic on the kernel command 992 line. 993 994 This feature is useful to ensure that the kernel does not do 995 anything erroneous after an oops which could result in data 996 corruption or other issues. 997 998 Say N if unsure. 999 1000config PANIC_ON_OOPS_VALUE 1001 int 1002 range 0 1 1003 default 0 if !PANIC_ON_OOPS 1004 default 1 if PANIC_ON_OOPS 1005 1006config PANIC_TIMEOUT 1007 int "panic timeout" 1008 default 0 1009 help 1010 Set the timeout value (in seconds) until a reboot occurs when 1011 the kernel panics. If n = 0, then we wait forever. A timeout 1012 value n > 0 will wait n seconds before rebooting, while a timeout 1013 value n < 0 will reboot immediately. 1014 1015config LOCKUP_DETECTOR 1016 bool 1017 1018config SOFTLOCKUP_DETECTOR 1019 bool "Detect Soft Lockups" 1020 depends on DEBUG_KERNEL && !S390 1021 select LOCKUP_DETECTOR 1022 help 1023 Say Y here to enable the kernel to act as a watchdog to detect 1024 soft lockups. 1025 1026 Softlockups are bugs that cause the kernel to loop in kernel 1027 mode for more than 20 seconds, without giving other tasks a 1028 chance to run. The current stack trace is displayed upon 1029 detection and the system will stay locked up. 1030 1031config BOOTPARAM_SOFTLOCKUP_PANIC 1032 bool "Panic (Reboot) On Soft Lockups" 1033 depends on SOFTLOCKUP_DETECTOR 1034 help 1035 Say Y here to enable the kernel to panic on "soft lockups", 1036 which are bugs that cause the kernel to loop in kernel 1037 mode for more than 20 seconds (configurable using the watchdog_thresh 1038 sysctl), without giving other tasks a chance to run. 1039 1040 The panic can be used in combination with panic_timeout, 1041 to cause the system to reboot automatically after a 1042 lockup has been detected. This feature is useful for 1043 high-availability systems that have uptime guarantees and 1044 where a lockup must be resolved ASAP. 1045 1046 Say N if unsure. 1047 1048config HARDLOCKUP_DETECTOR_PERF 1049 bool 1050 select SOFTLOCKUP_DETECTOR 1051 1052# 1053# Enables a timestamp based low pass filter to compensate for perf based 1054# hard lockup detection which runs too fast due to turbo modes. 1055# 1056config HARDLOCKUP_CHECK_TIMESTAMP 1057 bool 1058 1059# 1060# arch/ can define HAVE_HARDLOCKUP_DETECTOR_ARCH to provide their own hard 1061# lockup detector rather than the perf based detector. 1062# 1063config HARDLOCKUP_DETECTOR 1064 bool "Detect Hard Lockups" 1065 depends on DEBUG_KERNEL && !S390 1066 depends on HAVE_HARDLOCKUP_DETECTOR_PERF || HAVE_HARDLOCKUP_DETECTOR_ARCH 1067 select LOCKUP_DETECTOR 1068 select HARDLOCKUP_DETECTOR_PERF if HAVE_HARDLOCKUP_DETECTOR_PERF 1069 help 1070 Say Y here to enable the kernel to act as a watchdog to detect 1071 hard lockups. 1072 1073 Hardlockups are bugs that cause the CPU to loop in kernel mode 1074 for more than 10 seconds, without letting other interrupts have a 1075 chance to run. The current stack trace is displayed upon detection 1076 and the system will stay locked up. 1077 1078config BOOTPARAM_HARDLOCKUP_PANIC 1079 bool "Panic (Reboot) On Hard Lockups" 1080 depends on HARDLOCKUP_DETECTOR 1081 help 1082 Say Y here to enable the kernel to panic on "hard lockups", 1083 which are bugs that cause the kernel to loop in kernel 1084 mode with interrupts disabled for more than 10 seconds (configurable 1085 using the watchdog_thresh sysctl). 1086 1087 Say N if unsure. 1088 1089config DETECT_HUNG_TASK 1090 bool "Detect Hung Tasks" 1091 depends on DEBUG_KERNEL 1092 default SOFTLOCKUP_DETECTOR 1093 help 1094 Say Y here to enable the kernel to detect "hung tasks", 1095 which are bugs that cause the task to be stuck in 1096 uninterruptible "D" state indefinitely. 1097 1098 When a hung task is detected, the kernel will print the 1099 current stack trace (which you should report), but the 1100 task will stay in uninterruptible state. If lockdep is 1101 enabled then all held locks will also be reported. This 1102 feature has negligible overhead. 1103 1104config DEFAULT_HUNG_TASK_TIMEOUT 1105 int "Default timeout for hung task detection (in seconds)" 1106 depends on DETECT_HUNG_TASK 1107 default 120 1108 help 1109 This option controls the default timeout (in seconds) used 1110 to determine when a task has become non-responsive and should 1111 be considered hung. 1112 1113 It can be adjusted at runtime via the kernel.hung_task_timeout_secs 1114 sysctl or by writing a value to 1115 /proc/sys/kernel/hung_task_timeout_secs. 1116 1117 A timeout of 0 disables the check. The default is two minutes. 1118 Keeping the default should be fine in most cases. 1119 1120config BOOTPARAM_HUNG_TASK_PANIC 1121 bool "Panic (Reboot) On Hung Tasks" 1122 depends on DETECT_HUNG_TASK 1123 help 1124 Say Y here to enable the kernel to panic on "hung tasks", 1125 which are bugs that cause the kernel to leave a task stuck 1126 in uninterruptible "D" state. 1127 1128 The panic can be used in combination with panic_timeout, 1129 to cause the system to reboot automatically after a 1130 hung task has been detected. This feature is useful for 1131 high-availability systems that have uptime guarantees and 1132 where a hung tasks must be resolved ASAP. 1133 1134 Say N if unsure. 1135 1136config WQ_WATCHDOG 1137 bool "Detect Workqueue Stalls" 1138 depends on DEBUG_KERNEL 1139 help 1140 Say Y here to enable stall detection on workqueues. If a 1141 worker pool doesn't make forward progress on a pending work 1142 item for over a given amount of time, 30s by default, a 1143 warning message is printed along with dump of workqueue 1144 state. This can be configured through kernel parameter 1145 "workqueue.watchdog_thresh" and its sysfs counterpart. 1146 1147config TEST_LOCKUP 1148 tristate "Test module to generate lockups" 1149 depends on m 1150 help 1151 This builds the "test_lockup" module that helps to make sure 1152 that watchdogs and lockup detectors are working properly. 1153 1154 Depending on module parameters it could emulate soft or hard 1155 lockup, "hung task", or locking arbitrary lock for a long time. 1156 Also it could generate series of lockups with cooling-down periods. 1157 1158 If unsure, say N. 1159 1160endmenu # "Debug lockups and hangs" 1161 1162menu "Scheduler Debugging" 1163 1164config SCHED_DEBUG 1165 bool "Collect scheduler debugging info" 1166 depends on DEBUG_KERNEL && PROC_FS 1167 default y 1168 help 1169 If you say Y here, the /proc/sched_debug file will be provided 1170 that can help debug the scheduler. The runtime overhead of this 1171 option is minimal. 1172 1173config SCHED_INFO 1174 bool 1175 default n 1176 1177config SCHEDSTATS 1178 bool "Collect scheduler statistics" 1179 depends on DEBUG_KERNEL && PROC_FS 1180 select SCHED_INFO 1181 help 1182 If you say Y here, additional code will be inserted into the 1183 scheduler and related routines to collect statistics about 1184 scheduler behavior and provide them in /proc/schedstat. These 1185 stats may be useful for both tuning and debugging the scheduler 1186 If you aren't debugging the scheduler or trying to tune a specific 1187 application, you can say N to avoid the very slight overhead 1188 this adds. 1189 1190endmenu 1191 1192config DEBUG_TIMEKEEPING 1193 bool "Enable extra timekeeping sanity checking" 1194 help 1195 This option will enable additional timekeeping sanity checks 1196 which may be helpful when diagnosing issues where timekeeping 1197 problems are suspected. 1198 1199 This may include checks in the timekeeping hotpaths, so this 1200 option may have a (very small) performance impact to some 1201 workloads. 1202 1203 If unsure, say N. 1204 1205config DEBUG_PREEMPT 1206 bool "Debug preemptible kernel" 1207 depends on DEBUG_KERNEL && PREEMPTION && TRACE_IRQFLAGS_SUPPORT 1208 default y 1209 help 1210 If you say Y here then the kernel will use a debug variant of the 1211 commonly used smp_processor_id() function and will print warnings 1212 if kernel code uses it in a preemption-unsafe way. Also, the kernel 1213 will detect preemption count underflows. 1214 1215menu "Lock Debugging (spinlocks, mutexes, etc...)" 1216 1217config LOCK_DEBUGGING_SUPPORT 1218 bool 1219 depends on TRACE_IRQFLAGS_SUPPORT && STACKTRACE_SUPPORT && LOCKDEP_SUPPORT 1220 default y 1221 1222config PROVE_LOCKING 1223 bool "Lock debugging: prove locking correctness" 1224 depends on DEBUG_KERNEL && LOCK_DEBUGGING_SUPPORT 1225 select LOCKDEP 1226 select DEBUG_SPINLOCK 1227 select DEBUG_MUTEXES if !PREEMPT_RT 1228 select DEBUG_RT_MUTEXES if RT_MUTEXES 1229 select DEBUG_RWSEMS 1230 select DEBUG_WW_MUTEX_SLOWPATH 1231 select DEBUG_LOCK_ALLOC 1232 select PREEMPT_COUNT if !ARCH_NO_PREEMPT 1233 select TRACE_IRQFLAGS 1234 default n 1235 help 1236 This feature enables the kernel to prove that all locking 1237 that occurs in the kernel runtime is mathematically 1238 correct: that under no circumstance could an arbitrary (and 1239 not yet triggered) combination of observed locking 1240 sequences (on an arbitrary number of CPUs, running an 1241 arbitrary number of tasks and interrupt contexts) cause a 1242 deadlock. 1243 1244 In short, this feature enables the kernel to report locking 1245 related deadlocks before they actually occur. 1246 1247 The proof does not depend on how hard and complex a 1248 deadlock scenario would be to trigger: how many 1249 participant CPUs, tasks and irq-contexts would be needed 1250 for it to trigger. The proof also does not depend on 1251 timing: if a race and a resulting deadlock is possible 1252 theoretically (no matter how unlikely the race scenario 1253 is), it will be proven so and will immediately be 1254 reported by the kernel (once the event is observed that 1255 makes the deadlock theoretically possible). 1256 1257 If a deadlock is impossible (i.e. the locking rules, as 1258 observed by the kernel, are mathematically correct), the 1259 kernel reports nothing. 1260 1261 NOTE: this feature can also be enabled for rwlocks, mutexes 1262 and rwsems - in which case all dependencies between these 1263 different locking variants are observed and mapped too, and 1264 the proof of observed correctness is also maintained for an 1265 arbitrary combination of these separate locking variants. 1266 1267 For more details, see Documentation/locking/lockdep-design.rst. 1268 1269config PROVE_RAW_LOCK_NESTING 1270 bool "Enable raw_spinlock - spinlock nesting checks" 1271 depends on PROVE_LOCKING 1272 default n 1273 help 1274 Enable the raw_spinlock vs. spinlock nesting checks which ensure 1275 that the lock nesting rules for PREEMPT_RT enabled kernels are 1276 not violated. 1277 1278 NOTE: There are known nesting problems. So if you enable this 1279 option expect lockdep splats until these problems have been fully 1280 addressed which is work in progress. This config switch allows to 1281 identify and analyze these problems. It will be removed and the 1282 check permanently enabled once the main issues have been fixed. 1283 1284 If unsure, select N. 1285 1286config LOCK_STAT 1287 bool "Lock usage statistics" 1288 depends on DEBUG_KERNEL && LOCK_DEBUGGING_SUPPORT 1289 select LOCKDEP 1290 select DEBUG_SPINLOCK 1291 select DEBUG_MUTEXES if !PREEMPT_RT 1292 select DEBUG_RT_MUTEXES if RT_MUTEXES 1293 select DEBUG_LOCK_ALLOC 1294 default n 1295 help 1296 This feature enables tracking lock contention points 1297 1298 For more details, see Documentation/locking/lockstat.rst 1299 1300 This also enables lock events required by "perf lock", 1301 subcommand of perf. 1302 If you want to use "perf lock", you also need to turn on 1303 CONFIG_EVENT_TRACING. 1304 1305 CONFIG_LOCK_STAT defines "contended" and "acquired" lock events. 1306 (CONFIG_LOCKDEP defines "acquire" and "release" events.) 1307 1308config DEBUG_RT_MUTEXES 1309 bool "RT Mutex debugging, deadlock detection" 1310 depends on DEBUG_KERNEL && RT_MUTEXES 1311 help 1312 This allows rt mutex semantics violations and rt mutex related 1313 deadlocks (lockups) to be detected and reported automatically. 1314 1315config DEBUG_SPINLOCK 1316 bool "Spinlock and rw-lock debugging: basic checks" 1317 depends on DEBUG_KERNEL 1318 select UNINLINE_SPIN_UNLOCK 1319 help 1320 Say Y here and build SMP to catch missing spinlock initialization 1321 and certain other kinds of spinlock errors commonly made. This is 1322 best used in conjunction with the NMI watchdog so that spinlock 1323 deadlocks are also debuggable. 1324 1325config DEBUG_MUTEXES 1326 bool "Mutex debugging: basic checks" 1327 depends on DEBUG_KERNEL && !PREEMPT_RT 1328 help 1329 This feature allows mutex semantics violations to be detected and 1330 reported. 1331 1332config DEBUG_WW_MUTEX_SLOWPATH 1333 bool "Wait/wound mutex debugging: Slowpath testing" 1334 depends on DEBUG_KERNEL && LOCK_DEBUGGING_SUPPORT 1335 select DEBUG_LOCK_ALLOC 1336 select DEBUG_SPINLOCK 1337 select DEBUG_MUTEXES if !PREEMPT_RT 1338 select DEBUG_RT_MUTEXES if PREEMPT_RT 1339 help 1340 This feature enables slowpath testing for w/w mutex users by 1341 injecting additional -EDEADLK wound/backoff cases. Together with 1342 the full mutex checks enabled with (CONFIG_PROVE_LOCKING) this 1343 will test all possible w/w mutex interface abuse with the 1344 exception of simply not acquiring all the required locks. 1345 Note that this feature can introduce significant overhead, so 1346 it really should not be enabled in a production or distro kernel, 1347 even a debug kernel. If you are a driver writer, enable it. If 1348 you are a distro, do not. 1349 1350config DEBUG_RWSEMS 1351 bool "RW Semaphore debugging: basic checks" 1352 depends on DEBUG_KERNEL 1353 help 1354 This debugging feature allows mismatched rw semaphore locks 1355 and unlocks to be detected and reported. 1356 1357config DEBUG_LOCK_ALLOC 1358 bool "Lock debugging: detect incorrect freeing of live locks" 1359 depends on DEBUG_KERNEL && LOCK_DEBUGGING_SUPPORT 1360 select DEBUG_SPINLOCK 1361 select DEBUG_MUTEXES if !PREEMPT_RT 1362 select DEBUG_RT_MUTEXES if RT_MUTEXES 1363 select LOCKDEP 1364 help 1365 This feature will check whether any held lock (spinlock, rwlock, 1366 mutex or rwsem) is incorrectly freed by the kernel, via any of the 1367 memory-freeing routines (kfree(), kmem_cache_free(), free_pages(), 1368 vfree(), etc.), whether a live lock is incorrectly reinitialized via 1369 spin_lock_init()/mutex_init()/etc., or whether there is any lock 1370 held during task exit. 1371 1372config LOCKDEP 1373 bool 1374 depends on DEBUG_KERNEL && LOCK_DEBUGGING_SUPPORT 1375 select STACKTRACE 1376 select KALLSYMS 1377 select KALLSYMS_ALL 1378 1379config LOCKDEP_SMALL 1380 bool 1381 1382config LOCKDEP_BITS 1383 int "Bitsize for MAX_LOCKDEP_ENTRIES" 1384 depends on LOCKDEP && !LOCKDEP_SMALL 1385 range 10 30 1386 default 15 1387 help 1388 Try increasing this value if you hit "BUG: MAX_LOCKDEP_ENTRIES too low!" message. 1389 1390config LOCKDEP_CHAINS_BITS 1391 int "Bitsize for MAX_LOCKDEP_CHAINS" 1392 depends on LOCKDEP && !LOCKDEP_SMALL 1393 range 10 30 1394 default 16 1395 help 1396 Try increasing this value if you hit "BUG: MAX_LOCKDEP_CHAINS too low!" message. 1397 1398config LOCKDEP_STACK_TRACE_BITS 1399 int "Bitsize for MAX_STACK_TRACE_ENTRIES" 1400 depends on LOCKDEP && !LOCKDEP_SMALL 1401 range 10 30 1402 default 19 1403 help 1404 Try increasing this value if you hit "BUG: MAX_STACK_TRACE_ENTRIES too low!" message. 1405 1406config LOCKDEP_STACK_TRACE_HASH_BITS 1407 int "Bitsize for STACK_TRACE_HASH_SIZE" 1408 depends on LOCKDEP && !LOCKDEP_SMALL 1409 range 10 30 1410 default 14 1411 help 1412 Try increasing this value if you need large MAX_STACK_TRACE_ENTRIES. 1413 1414config LOCKDEP_CIRCULAR_QUEUE_BITS 1415 int "Bitsize for elements in circular_queue struct" 1416 depends on LOCKDEP 1417 range 10 30 1418 default 12 1419 help 1420 Try increasing this value if you hit "lockdep bfs error:-1" warning due to __cq_enqueue() failure. 1421 1422config DEBUG_LOCKDEP 1423 bool "Lock dependency engine debugging" 1424 depends on DEBUG_KERNEL && LOCKDEP 1425 select DEBUG_IRQFLAGS 1426 help 1427 If you say Y here, the lock dependency engine will do 1428 additional runtime checks to debug itself, at the price 1429 of more runtime overhead. 1430 1431config DEBUG_ATOMIC_SLEEP 1432 bool "Sleep inside atomic section checking" 1433 select PREEMPT_COUNT 1434 depends on DEBUG_KERNEL 1435 depends on !ARCH_NO_PREEMPT 1436 help 1437 If you say Y here, various routines which may sleep will become very 1438 noisy if they are called inside atomic sections: when a spinlock is 1439 held, inside an rcu read side critical section, inside preempt disabled 1440 sections, inside an interrupt, etc... 1441 1442config DEBUG_LOCKING_API_SELFTESTS 1443 bool "Locking API boot-time self-tests" 1444 depends on DEBUG_KERNEL 1445 help 1446 Say Y here if you want the kernel to run a short self-test during 1447 bootup. The self-test checks whether common types of locking bugs 1448 are detected by debugging mechanisms or not. (if you disable 1449 lock debugging then those bugs won't be detected of course.) 1450 The following locking APIs are covered: spinlocks, rwlocks, 1451 mutexes and rwsems. 1452 1453config LOCK_TORTURE_TEST 1454 tristate "torture tests for locking" 1455 depends on DEBUG_KERNEL 1456 select TORTURE_TEST 1457 help 1458 This option provides a kernel module that runs torture tests 1459 on kernel locking primitives. The kernel module may be built 1460 after the fact on the running kernel to be tested, if desired. 1461 1462 Say Y here if you want kernel locking-primitive torture tests 1463 to be built into the kernel. 1464 Say M if you want these torture tests to build as a module. 1465 Say N if you are unsure. 1466 1467config WW_MUTEX_SELFTEST 1468 tristate "Wait/wound mutex selftests" 1469 help 1470 This option provides a kernel module that runs tests on the 1471 on the struct ww_mutex locking API. 1472 1473 It is recommended to enable DEBUG_WW_MUTEX_SLOWPATH in conjunction 1474 with this test harness. 1475 1476 Say M if you want these self tests to build as a module. 1477 Say N if you are unsure. 1478 1479config SCF_TORTURE_TEST 1480 tristate "torture tests for smp_call_function*()" 1481 depends on DEBUG_KERNEL 1482 select TORTURE_TEST 1483 help 1484 This option provides a kernel module that runs torture tests 1485 on the smp_call_function() family of primitives. The kernel 1486 module may be built after the fact on the running kernel to 1487 be tested, if desired. 1488 1489config CSD_LOCK_WAIT_DEBUG 1490 bool "Debugging for csd_lock_wait(), called from smp_call_function*()" 1491 depends on DEBUG_KERNEL 1492 depends on 64BIT 1493 default n 1494 help 1495 This option enables debug prints when CPUs are slow to respond 1496 to the smp_call_function*() IPI wrappers. These debug prints 1497 include the IPI handler function currently executing (if any) 1498 and relevant stack traces. 1499 1500endmenu # lock debugging 1501 1502config TRACE_IRQFLAGS 1503 depends on TRACE_IRQFLAGS_SUPPORT 1504 bool 1505 help 1506 Enables hooks to interrupt enabling and disabling for 1507 either tracing or lock debugging. 1508 1509config TRACE_IRQFLAGS_NMI 1510 def_bool y 1511 depends on TRACE_IRQFLAGS 1512 depends on TRACE_IRQFLAGS_NMI_SUPPORT 1513 1514config DEBUG_IRQFLAGS 1515 bool "Debug IRQ flag manipulation" 1516 help 1517 Enables checks for potentially unsafe enabling or disabling of 1518 interrupts, such as calling raw_local_irq_restore() when interrupts 1519 are enabled. 1520 1521config STACKTRACE 1522 bool "Stack backtrace support" 1523 depends on STACKTRACE_SUPPORT 1524 help 1525 This option causes the kernel to create a /proc/pid/stack for 1526 every process, showing its current stack trace. 1527 It is also used by various kernel debugging features that require 1528 stack trace generation. 1529 1530config WARN_ALL_UNSEEDED_RANDOM 1531 bool "Warn for all uses of unseeded randomness" 1532 default n 1533 help 1534 Some parts of the kernel contain bugs relating to their use of 1535 cryptographically secure random numbers before it's actually possible 1536 to generate those numbers securely. This setting ensures that these 1537 flaws don't go unnoticed, by enabling a message, should this ever 1538 occur. This will allow people with obscure setups to know when things 1539 are going wrong, so that they might contact developers about fixing 1540 it. 1541 1542 Unfortunately, on some models of some architectures getting 1543 a fully seeded CRNG is extremely difficult, and so this can 1544 result in dmesg getting spammed for a surprisingly long 1545 time. This is really bad from a security perspective, and 1546 so architecture maintainers really need to do what they can 1547 to get the CRNG seeded sooner after the system is booted. 1548 However, since users cannot do anything actionable to 1549 address this, by default this option is disabled. 1550 1551 Say Y here if you want to receive warnings for all uses of 1552 unseeded randomness. This will be of use primarily for 1553 those developers interested in improving the security of 1554 Linux kernels running on their architecture (or 1555 subarchitecture). 1556 1557config DEBUG_KOBJECT 1558 bool "kobject debugging" 1559 depends on DEBUG_KERNEL 1560 help 1561 If you say Y here, some extra kobject debugging messages will be sent 1562 to the syslog. 1563 1564config DEBUG_KOBJECT_RELEASE 1565 bool "kobject release debugging" 1566 depends on DEBUG_OBJECTS_TIMERS 1567 help 1568 kobjects are reference counted objects. This means that their 1569 last reference count put is not predictable, and the kobject can 1570 live on past the point at which a driver decides to drop its 1571 initial reference to the kobject gained on allocation. An 1572 example of this would be a struct device which has just been 1573 unregistered. 1574 1575 However, some buggy drivers assume that after such an operation, 1576 the memory backing the kobject can be immediately freed. This 1577 goes completely against the principles of a refcounted object. 1578 1579 If you say Y here, the kernel will delay the release of kobjects 1580 on the last reference count to improve the visibility of this 1581 kind of kobject release bug. 1582 1583config HAVE_DEBUG_BUGVERBOSE 1584 bool 1585 1586menu "Debug kernel data structures" 1587 1588config DEBUG_LIST 1589 bool "Debug linked list manipulation" 1590 depends on DEBUG_KERNEL || BUG_ON_DATA_CORRUPTION 1591 help 1592 Enable this to turn on extended checks in the linked-list 1593 walking routines. 1594 1595 If unsure, say N. 1596 1597config DEBUG_PLIST 1598 bool "Debug priority linked list manipulation" 1599 depends on DEBUG_KERNEL 1600 help 1601 Enable this to turn on extended checks in the priority-ordered 1602 linked-list (plist) walking routines. This checks the entire 1603 list multiple times during each manipulation. 1604 1605 If unsure, say N. 1606 1607config DEBUG_SG 1608 bool "Debug SG table operations" 1609 depends on DEBUG_KERNEL 1610 help 1611 Enable this to turn on checks on scatter-gather tables. This can 1612 help find problems with drivers that do not properly initialize 1613 their sg tables. 1614 1615 If unsure, say N. 1616 1617config DEBUG_NOTIFIERS 1618 bool "Debug notifier call chains" 1619 depends on DEBUG_KERNEL 1620 help 1621 Enable this to turn on sanity checking for notifier call chains. 1622 This is most useful for kernel developers to make sure that 1623 modules properly unregister themselves from notifier chains. 1624 This is a relatively cheap check but if you care about maximum 1625 performance, say N. 1626 1627config BUG_ON_DATA_CORRUPTION 1628 bool "Trigger a BUG when data corruption is detected" 1629 select DEBUG_LIST 1630 help 1631 Select this option if the kernel should BUG when it encounters 1632 data corruption in kernel memory structures when they get checked 1633 for validity. 1634 1635 If unsure, say N. 1636 1637config DEBUG_MAPLE_TREE 1638 bool "Debug maple trees" 1639 depends on DEBUG_KERNEL 1640 help 1641 Enable maple tree debugging information and extra validations. 1642 1643 If unsure, say N. 1644 1645endmenu 1646 1647config DEBUG_CREDENTIALS 1648 bool "Debug credential management" 1649 depends on DEBUG_KERNEL 1650 help 1651 Enable this to turn on some debug checking for credential 1652 management. The additional code keeps track of the number of 1653 pointers from task_structs to any given cred struct, and checks to 1654 see that this number never exceeds the usage count of the cred 1655 struct. 1656 1657 Furthermore, if SELinux is enabled, this also checks that the 1658 security pointer in the cred struct is never seen to be invalid. 1659 1660 If unsure, say N. 1661 1662source "kernel/rcu/Kconfig.debug" 1663 1664config DEBUG_WQ_FORCE_RR_CPU 1665 bool "Force round-robin CPU selection for unbound work items" 1666 depends on DEBUG_KERNEL 1667 default n 1668 help 1669 Workqueue used to implicitly guarantee that work items queued 1670 without explicit CPU specified are put on the local CPU. This 1671 guarantee is no longer true and while local CPU is still 1672 preferred work items may be put on foreign CPUs. Kernel 1673 parameter "workqueue.debug_force_rr_cpu" is added to force 1674 round-robin CPU selection to flush out usages which depend on the 1675 now broken guarantee. This config option enables the debug 1676 feature by default. When enabled, memory and cache locality will 1677 be impacted. 1678 1679config CPU_HOTPLUG_STATE_CONTROL 1680 bool "Enable CPU hotplug state control" 1681 depends on DEBUG_KERNEL 1682 depends on HOTPLUG_CPU 1683 default n 1684 help 1685 Allows to write steps between "offline" and "online" to the CPUs 1686 sysfs target file so states can be stepped granular. This is a debug 1687 option for now as the hotplug machinery cannot be stopped and 1688 restarted at arbitrary points yet. 1689 1690 Say N if your are unsure. 1691 1692config LATENCYTOP 1693 bool "Latency measuring infrastructure" 1694 depends on DEBUG_KERNEL 1695 depends on STACKTRACE_SUPPORT 1696 depends on PROC_FS 1697 depends on FRAME_POINTER || MIPS || PPC || S390 || MICROBLAZE || ARM || ARC || X86 1698 select KALLSYMS 1699 select KALLSYMS_ALL 1700 select STACKTRACE 1701 select SCHEDSTATS 1702 help 1703 Enable this option if you want to use the LatencyTOP tool 1704 to find out which userspace is blocking on what kernel operations. 1705 1706source "kernel/trace/Kconfig" 1707 1708config PROVIDE_OHCI1394_DMA_INIT 1709 bool "Remote debugging over FireWire early on boot" 1710 depends on PCI && X86 1711 help 1712 If you want to debug problems which hang or crash the kernel early 1713 on boot and the crashing machine has a FireWire port, you can use 1714 this feature to remotely access the memory of the crashed machine 1715 over FireWire. This employs remote DMA as part of the OHCI1394 1716 specification which is now the standard for FireWire controllers. 1717 1718 With remote DMA, you can monitor the printk buffer remotely using 1719 firescope and access all memory below 4GB using fireproxy from gdb. 1720 Even controlling a kernel debugger is possible using remote DMA. 1721 1722 Usage: 1723 1724 If ohci1394_dma=early is used as boot parameter, it will initialize 1725 all OHCI1394 controllers which are found in the PCI config space. 1726 1727 As all changes to the FireWire bus such as enabling and disabling 1728 devices cause a bus reset and thereby disable remote DMA for all 1729 devices, be sure to have the cable plugged and FireWire enabled on 1730 the debugging host before booting the debug target for debugging. 1731 1732 This code (~1k) is freed after boot. By then, the firewire stack 1733 in charge of the OHCI-1394 controllers should be used instead. 1734 1735 See Documentation/core-api/debugging-via-ohci1394.rst for more information. 1736 1737source "samples/Kconfig" 1738 1739config ARCH_HAS_DEVMEM_IS_ALLOWED 1740 bool 1741 1742config STRICT_DEVMEM 1743 bool "Filter access to /dev/mem" 1744 depends on MMU && DEVMEM 1745 depends on ARCH_HAS_DEVMEM_IS_ALLOWED || GENERIC_LIB_DEVMEM_IS_ALLOWED 1746 default y if PPC || X86 || ARM64 1747 help 1748 If this option is disabled, you allow userspace (root) access to all 1749 of memory, including kernel and userspace memory. Accidental 1750 access to this is obviously disastrous, but specific access can 1751 be used by people debugging the kernel. Note that with PAT support 1752 enabled, even in this case there are restrictions on /dev/mem 1753 use due to the cache aliasing requirements. 1754 1755 If this option is switched on, and IO_STRICT_DEVMEM=n, the /dev/mem 1756 file only allows userspace access to PCI space and the BIOS code and 1757 data regions. This is sufficient for dosemu and X and all common 1758 users of /dev/mem. 1759 1760 If in doubt, say Y. 1761 1762config IO_STRICT_DEVMEM 1763 bool "Filter I/O access to /dev/mem" 1764 depends on STRICT_DEVMEM 1765 help 1766 If this option is disabled, you allow userspace (root) access to all 1767 io-memory regardless of whether a driver is actively using that 1768 range. Accidental access to this is obviously disastrous, but 1769 specific access can be used by people debugging kernel drivers. 1770 1771 If this option is switched on, the /dev/mem file only allows 1772 userspace access to *idle* io-memory ranges (see /proc/iomem) This 1773 may break traditional users of /dev/mem (dosemu, legacy X, etc...) 1774 if the driver using a given range cannot be disabled. 1775 1776 If in doubt, say Y. 1777 1778menu "$(SRCARCH) Debugging" 1779 1780source "arch/$(SRCARCH)/Kconfig.debug" 1781 1782endmenu 1783 1784menu "Kernel Testing and Coverage" 1785 1786source "lib/kunit/Kconfig" 1787 1788config NOTIFIER_ERROR_INJECTION 1789 tristate "Notifier error injection" 1790 depends on DEBUG_KERNEL 1791 select DEBUG_FS 1792 help 1793 This option provides the ability to inject artificial errors to 1794 specified notifier chain callbacks. It is useful to test the error 1795 handling of notifier call chain failures. 1796 1797 Say N if unsure. 1798 1799config PM_NOTIFIER_ERROR_INJECT 1800 tristate "PM notifier error injection module" 1801 depends on PM && NOTIFIER_ERROR_INJECTION 1802 default m if PM_DEBUG 1803 help 1804 This option provides the ability to inject artificial errors to 1805 PM notifier chain callbacks. It is controlled through debugfs 1806 interface /sys/kernel/debug/notifier-error-inject/pm 1807 1808 If the notifier call chain should be failed with some events 1809 notified, write the error code to "actions/<notifier event>/error". 1810 1811 Example: Inject PM suspend error (-12 = -ENOMEM) 1812 1813 # cd /sys/kernel/debug/notifier-error-inject/pm/ 1814 # echo -12 > actions/PM_SUSPEND_PREPARE/error 1815 # echo mem > /sys/power/state 1816 bash: echo: write error: Cannot allocate memory 1817 1818 To compile this code as a module, choose M here: the module will 1819 be called pm-notifier-error-inject. 1820 1821 If unsure, say N. 1822 1823config OF_RECONFIG_NOTIFIER_ERROR_INJECT 1824 tristate "OF reconfig notifier error injection module" 1825 depends on OF_DYNAMIC && NOTIFIER_ERROR_INJECTION 1826 help 1827 This option provides the ability to inject artificial errors to 1828 OF reconfig notifier chain callbacks. It is controlled 1829 through debugfs interface under 1830 /sys/kernel/debug/notifier-error-inject/OF-reconfig/ 1831 1832 If the notifier call chain should be failed with some events 1833 notified, write the error code to "actions/<notifier event>/error". 1834 1835 To compile this code as a module, choose M here: the module will 1836 be called of-reconfig-notifier-error-inject. 1837 1838 If unsure, say N. 1839 1840config NETDEV_NOTIFIER_ERROR_INJECT 1841 tristate "Netdev notifier error injection module" 1842 depends on NET && NOTIFIER_ERROR_INJECTION 1843 help 1844 This option provides the ability to inject artificial errors to 1845 netdevice notifier chain callbacks. It is controlled through debugfs 1846 interface /sys/kernel/debug/notifier-error-inject/netdev 1847 1848 If the notifier call chain should be failed with some events 1849 notified, write the error code to "actions/<notifier event>/error". 1850 1851 Example: Inject netdevice mtu change error (-22 = -EINVAL) 1852 1853 # cd /sys/kernel/debug/notifier-error-inject/netdev 1854 # echo -22 > actions/NETDEV_CHANGEMTU/error 1855 # ip link set eth0 mtu 1024 1856 RTNETLINK answers: Invalid argument 1857 1858 To compile this code as a module, choose M here: the module will 1859 be called netdev-notifier-error-inject. 1860 1861 If unsure, say N. 1862 1863config FUNCTION_ERROR_INJECTION 1864 def_bool y 1865 depends on HAVE_FUNCTION_ERROR_INJECTION && KPROBES 1866 1867config FAULT_INJECTION 1868 bool "Fault-injection framework" 1869 depends on DEBUG_KERNEL 1870 help 1871 Provide fault-injection framework. 1872 For more details, see Documentation/fault-injection/. 1873 1874config FAILSLAB 1875 bool "Fault-injection capability for kmalloc" 1876 depends on FAULT_INJECTION 1877 depends on SLAB || SLUB 1878 help 1879 Provide fault-injection capability for kmalloc. 1880 1881config FAIL_PAGE_ALLOC 1882 bool "Fault-injection capability for alloc_pages()" 1883 depends on FAULT_INJECTION 1884 help 1885 Provide fault-injection capability for alloc_pages(). 1886 1887config FAULT_INJECTION_USERCOPY 1888 bool "Fault injection capability for usercopy functions" 1889 depends on FAULT_INJECTION 1890 help 1891 Provides fault-injection capability to inject failures 1892 in usercopy functions (copy_from_user(), get_user(), ...). 1893 1894config FAIL_MAKE_REQUEST 1895 bool "Fault-injection capability for disk IO" 1896 depends on FAULT_INJECTION && BLOCK 1897 help 1898 Provide fault-injection capability for disk IO. 1899 1900config FAIL_IO_TIMEOUT 1901 bool "Fault-injection capability for faking disk interrupts" 1902 depends on FAULT_INJECTION && BLOCK 1903 help 1904 Provide fault-injection capability on end IO handling. This 1905 will make the block layer "forget" an interrupt as configured, 1906 thus exercising the error handling. 1907 1908 Only works with drivers that use the generic timeout handling, 1909 for others it won't do anything. 1910 1911config FAIL_FUTEX 1912 bool "Fault-injection capability for futexes" 1913 select DEBUG_FS 1914 depends on FAULT_INJECTION && FUTEX 1915 help 1916 Provide fault-injection capability for futexes. 1917 1918config FAULT_INJECTION_DEBUG_FS 1919 bool "Debugfs entries for fault-injection capabilities" 1920 depends on FAULT_INJECTION && SYSFS && DEBUG_FS 1921 help 1922 Enable configuration of fault-injection capabilities via debugfs. 1923 1924config FAIL_FUNCTION 1925 bool "Fault-injection capability for functions" 1926 depends on FAULT_INJECTION_DEBUG_FS && FUNCTION_ERROR_INJECTION 1927 help 1928 Provide function-based fault-injection capability. 1929 This will allow you to override a specific function with a return 1930 with given return value. As a result, function caller will see 1931 an error value and have to handle it. This is useful to test the 1932 error handling in various subsystems. 1933 1934config FAIL_MMC_REQUEST 1935 bool "Fault-injection capability for MMC IO" 1936 depends on FAULT_INJECTION_DEBUG_FS && MMC 1937 help 1938 Provide fault-injection capability for MMC IO. 1939 This will make the mmc core return data errors. This is 1940 useful to test the error handling in the mmc block device 1941 and to test how the mmc host driver handles retries from 1942 the block device. 1943 1944config FAIL_SUNRPC 1945 bool "Fault-injection capability for SunRPC" 1946 depends on FAULT_INJECTION_DEBUG_FS && SUNRPC_DEBUG 1947 help 1948 Provide fault-injection capability for SunRPC and 1949 its consumers. 1950 1951config FAULT_INJECTION_STACKTRACE_FILTER 1952 bool "stacktrace filter for fault-injection capabilities" 1953 depends on FAULT_INJECTION_DEBUG_FS && STACKTRACE_SUPPORT 1954 depends on !X86_64 1955 select STACKTRACE 1956 depends on FRAME_POINTER || MIPS || PPC || S390 || MICROBLAZE || ARM || ARC || X86 1957 help 1958 Provide stacktrace filter for fault-injection capabilities 1959 1960config ARCH_HAS_KCOV 1961 bool 1962 help 1963 An architecture should select this when it can successfully 1964 build and run with CONFIG_KCOV. This typically requires 1965 disabling instrumentation for some early boot code. 1966 1967config CC_HAS_SANCOV_TRACE_PC 1968 def_bool $(cc-option,-fsanitize-coverage=trace-pc) 1969 1970 1971config KCOV 1972 bool "Code coverage for fuzzing" 1973 depends on ARCH_HAS_KCOV 1974 depends on CC_HAS_SANCOV_TRACE_PC || GCC_PLUGINS 1975 depends on !ARCH_WANTS_NO_INSTR || HAVE_NOINSTR_HACK || \ 1976 GCC_VERSION >= 120000 || CLANG_VERSION >= 130000 1977 select DEBUG_FS 1978 select GCC_PLUGIN_SANCOV if !CC_HAS_SANCOV_TRACE_PC 1979 select OBJTOOL if HAVE_NOINSTR_HACK 1980 help 1981 KCOV exposes kernel code coverage information in a form suitable 1982 for coverage-guided fuzzing (randomized testing). 1983 1984 If RANDOMIZE_BASE is enabled, PC values will not be stable across 1985 different machines and across reboots. If you need stable PC values, 1986 disable RANDOMIZE_BASE. 1987 1988 For more details, see Documentation/dev-tools/kcov.rst. 1989 1990config KCOV_ENABLE_COMPARISONS 1991 bool "Enable comparison operands collection by KCOV" 1992 depends on KCOV 1993 depends on $(cc-option,-fsanitize-coverage=trace-cmp) 1994 help 1995 KCOV also exposes operands of every comparison in the instrumented 1996 code along with operand sizes and PCs of the comparison instructions. 1997 These operands can be used by fuzzing engines to improve the quality 1998 of fuzzing coverage. 1999 2000config KCOV_INSTRUMENT_ALL 2001 bool "Instrument all code by default" 2002 depends on KCOV 2003 default y 2004 help 2005 If you are doing generic system call fuzzing (like e.g. syzkaller), 2006 then you will want to instrument the whole kernel and you should 2007 say y here. If you are doing more targeted fuzzing (like e.g. 2008 filesystem fuzzing with AFL) then you will want to enable coverage 2009 for more specific subsets of files, and should say n here. 2010 2011config KCOV_IRQ_AREA_SIZE 2012 hex "Size of interrupt coverage collection area in words" 2013 depends on KCOV 2014 default 0x40000 2015 help 2016 KCOV uses preallocated per-cpu areas to collect coverage from 2017 soft interrupts. This specifies the size of those areas in the 2018 number of unsigned long words. 2019 2020menuconfig RUNTIME_TESTING_MENU 2021 bool "Runtime Testing" 2022 def_bool y 2023 2024if RUNTIME_TESTING_MENU 2025 2026config LKDTM 2027 tristate "Linux Kernel Dump Test Tool Module" 2028 depends on DEBUG_FS 2029 help 2030 This module enables testing of the different dumping mechanisms by 2031 inducing system failures at predefined crash points. 2032 If you don't need it: say N 2033 Choose M here to compile this code as a module. The module will be 2034 called lkdtm. 2035 2036 Documentation on how to use the module can be found in 2037 Documentation/fault-injection/provoke-crashes.rst 2038 2039config CPUMASK_KUNIT_TEST 2040 tristate "KUnit test for cpumask" if !KUNIT_ALL_TESTS 2041 depends on KUNIT 2042 default KUNIT_ALL_TESTS 2043 help 2044 Enable to turn on cpumask tests, running at boot or module load time. 2045 2046 For more information on KUnit and unit tests in general, please refer 2047 to the KUnit documentation in Documentation/dev-tools/kunit/. 2048 2049 If unsure, say N. 2050 2051config TEST_LIST_SORT 2052 tristate "Linked list sorting test" if !KUNIT_ALL_TESTS 2053 depends on KUNIT 2054 default KUNIT_ALL_TESTS 2055 help 2056 Enable this to turn on 'list_sort()' function test. This test is 2057 executed only once during system boot (so affects only boot time), 2058 or at module load time. 2059 2060 If unsure, say N. 2061 2062config TEST_MIN_HEAP 2063 tristate "Min heap test" 2064 depends on DEBUG_KERNEL || m 2065 help 2066 Enable this to turn on min heap function tests. This test is 2067 executed only once during system boot (so affects only boot time), 2068 or at module load time. 2069 2070 If unsure, say N. 2071 2072config TEST_SORT 2073 tristate "Array-based sort test" if !KUNIT_ALL_TESTS 2074 depends on KUNIT 2075 default KUNIT_ALL_TESTS 2076 help 2077 This option enables the self-test function of 'sort()' at boot, 2078 or at module load time. 2079 2080 If unsure, say N. 2081 2082config TEST_DIV64 2083 tristate "64bit/32bit division and modulo test" 2084 depends on DEBUG_KERNEL || m 2085 help 2086 Enable this to turn on 'do_div()' function test. This test is 2087 executed only once during system boot (so affects only boot time), 2088 or at module load time. 2089 2090 If unsure, say N. 2091 2092config KPROBES_SANITY_TEST 2093 tristate "Kprobes sanity tests" if !KUNIT_ALL_TESTS 2094 depends on DEBUG_KERNEL 2095 depends on KPROBES 2096 depends on KUNIT 2097 default KUNIT_ALL_TESTS 2098 help 2099 This option provides for testing basic kprobes functionality on 2100 boot. Samples of kprobe and kretprobe are inserted and 2101 verified for functionality. 2102 2103 Say N if you are unsure. 2104 2105config FPROBE_SANITY_TEST 2106 bool "Self test for fprobe" 2107 depends on DEBUG_KERNEL 2108 depends on FPROBE 2109 depends on KUNIT=y 2110 help 2111 This option will enable testing the fprobe when the system boot. 2112 A series of tests are made to verify that the fprobe is functioning 2113 properly. 2114 2115 Say N if you are unsure. 2116 2117config BACKTRACE_SELF_TEST 2118 tristate "Self test for the backtrace code" 2119 depends on DEBUG_KERNEL 2120 help 2121 This option provides a kernel module that can be used to test 2122 the kernel stack backtrace code. This option is not useful 2123 for distributions or general kernels, but only for kernel 2124 developers working on architecture code. 2125 2126 Note that if you want to also test saved backtraces, you will 2127 have to enable STACKTRACE as well. 2128 2129 Say N if you are unsure. 2130 2131config TEST_REF_TRACKER 2132 tristate "Self test for reference tracker" 2133 depends on DEBUG_KERNEL && STACKTRACE_SUPPORT 2134 select REF_TRACKER 2135 help 2136 This option provides a kernel module performing tests 2137 using reference tracker infrastructure. 2138 2139 Say N if you are unsure. 2140 2141config RBTREE_TEST 2142 tristate "Red-Black tree test" 2143 depends on DEBUG_KERNEL 2144 help 2145 A benchmark measuring the performance of the rbtree library. 2146 Also includes rbtree invariant checks. 2147 2148config REED_SOLOMON_TEST 2149 tristate "Reed-Solomon library test" 2150 depends on DEBUG_KERNEL || m 2151 select REED_SOLOMON 2152 select REED_SOLOMON_ENC16 2153 select REED_SOLOMON_DEC16 2154 help 2155 This option enables the self-test function of rslib at boot, 2156 or at module load time. 2157 2158 If unsure, say N. 2159 2160config INTERVAL_TREE_TEST 2161 tristate "Interval tree test" 2162 depends on DEBUG_KERNEL 2163 select INTERVAL_TREE 2164 help 2165 A benchmark measuring the performance of the interval tree library 2166 2167config PERCPU_TEST 2168 tristate "Per cpu operations test" 2169 depends on m && DEBUG_KERNEL 2170 help 2171 Enable this option to build test module which validates per-cpu 2172 operations. 2173 2174 If unsure, say N. 2175 2176config ATOMIC64_SELFTEST 2177 tristate "Perform an atomic64_t self-test" 2178 help 2179 Enable this option to test the atomic64_t functions at boot or 2180 at module load time. 2181 2182 If unsure, say N. 2183 2184config ASYNC_RAID6_TEST 2185 tristate "Self test for hardware accelerated raid6 recovery" 2186 depends on ASYNC_RAID6_RECOV 2187 select ASYNC_MEMCPY 2188 help 2189 This is a one-shot self test that permutes through the 2190 recovery of all the possible two disk failure scenarios for a 2191 N-disk array. Recovery is performed with the asynchronous 2192 raid6 recovery routines, and will optionally use an offload 2193 engine if one is available. 2194 2195 If unsure, say N. 2196 2197config TEST_HEXDUMP 2198 tristate "Test functions located in the hexdump module at runtime" 2199 2200config STRING_SELFTEST 2201 tristate "Test string functions at runtime" 2202 2203config TEST_STRING_HELPERS 2204 tristate "Test functions located in the string_helpers module at runtime" 2205 2206config TEST_STRSCPY 2207 tristate "Test strscpy*() family of functions at runtime" 2208 2209config TEST_KSTRTOX 2210 tristate "Test kstrto*() family of functions at runtime" 2211 2212config TEST_PRINTF 2213 tristate "Test printf() family of functions at runtime" 2214 2215config TEST_SCANF 2216 tristate "Test scanf() family of functions at runtime" 2217 2218config TEST_BITMAP 2219 tristate "Test bitmap_*() family of functions at runtime" 2220 help 2221 Enable this option to test the bitmap functions at boot. 2222 2223 If unsure, say N. 2224 2225config TEST_UUID 2226 tristate "Test functions located in the uuid module at runtime" 2227 2228config TEST_XARRAY 2229 tristate "Test the XArray code at runtime" 2230 2231config TEST_RHASHTABLE 2232 tristate "Perform selftest on resizable hash table" 2233 help 2234 Enable this option to test the rhashtable functions at boot. 2235 2236 If unsure, say N. 2237 2238config TEST_SIPHASH 2239 tristate "Perform selftest on siphash functions" 2240 help 2241 Enable this option to test the kernel's siphash (<linux/siphash.h>) hash 2242 functions on boot (or module load). 2243 2244 This is intended to help people writing architecture-specific 2245 optimized versions. If unsure, say N. 2246 2247config TEST_IDA 2248 tristate "Perform selftest on IDA functions" 2249 2250config TEST_PARMAN 2251 tristate "Perform selftest on priority array manager" 2252 depends on PARMAN 2253 help 2254 Enable this option to test priority array manager on boot 2255 (or module load). 2256 2257 If unsure, say N. 2258 2259config TEST_IRQ_TIMINGS 2260 bool "IRQ timings selftest" 2261 depends on IRQ_TIMINGS 2262 help 2263 Enable this option to test the irq timings code on boot. 2264 2265 If unsure, say N. 2266 2267config TEST_LKM 2268 tristate "Test module loading with 'hello world' module" 2269 depends on m 2270 help 2271 This builds the "test_module" module that emits "Hello, world" 2272 on printk when loaded. It is designed to be used for basic 2273 evaluation of the module loading subsystem (for example when 2274 validating module verification). It lacks any extra dependencies, 2275 and will not normally be loaded by the system unless explicitly 2276 requested by name. 2277 2278 If unsure, say N. 2279 2280config TEST_BITOPS 2281 tristate "Test module for compilation of bitops operations" 2282 depends on m 2283 help 2284 This builds the "test_bitops" module that is much like the 2285 TEST_LKM module except that it does a basic exercise of the 2286 set/clear_bit macros and get_count_order/long to make sure there are 2287 no compiler warnings from C=1 sparse checker or -Wextra 2288 compilations. It has no dependencies and doesn't run or load unless 2289 explicitly requested by name. for example: modprobe test_bitops. 2290 2291 If unsure, say N. 2292 2293config TEST_VMALLOC 2294 tristate "Test module for stress/performance analysis of vmalloc allocator" 2295 default n 2296 depends on MMU 2297 depends on m 2298 help 2299 This builds the "test_vmalloc" module that should be used for 2300 stress and performance analysis. So, any new change for vmalloc 2301 subsystem can be evaluated from performance and stability point 2302 of view. 2303 2304 If unsure, say N. 2305 2306config TEST_USER_COPY 2307 tristate "Test user/kernel boundary protections" 2308 depends on m 2309 help 2310 This builds the "test_user_copy" module that runs sanity checks 2311 on the copy_to/from_user infrastructure, making sure basic 2312 user/kernel boundary testing is working. If it fails to load, 2313 a regression has been detected in the user/kernel memory boundary 2314 protections. 2315 2316 If unsure, say N. 2317 2318config TEST_BPF 2319 tristate "Test BPF filter functionality" 2320 depends on m && NET 2321 help 2322 This builds the "test_bpf" module that runs various test vectors 2323 against the BPF interpreter or BPF JIT compiler depending on the 2324 current setting. This is in particular useful for BPF JIT compiler 2325 development, but also to run regression tests against changes in 2326 the interpreter code. It also enables test stubs for eBPF maps and 2327 verifier used by user space verifier testsuite. 2328 2329 If unsure, say N. 2330 2331config TEST_BLACKHOLE_DEV 2332 tristate "Test blackhole netdev functionality" 2333 depends on m && NET 2334 help 2335 This builds the "test_blackhole_dev" module that validates the 2336 data path through this blackhole netdev. 2337 2338 If unsure, say N. 2339 2340config FIND_BIT_BENCHMARK 2341 tristate "Test find_bit functions" 2342 help 2343 This builds the "test_find_bit" module that measure find_*_bit() 2344 functions performance. 2345 2346 If unsure, say N. 2347 2348config TEST_FIRMWARE 2349 tristate "Test firmware loading via userspace interface" 2350 depends on FW_LOADER 2351 help 2352 This builds the "test_firmware" module that creates a userspace 2353 interface for testing firmware loading. This can be used to 2354 control the triggering of firmware loading without needing an 2355 actual firmware-using device. The contents can be rechecked by 2356 userspace. 2357 2358 If unsure, say N. 2359 2360config TEST_SYSCTL 2361 tristate "sysctl test driver" 2362 depends on PROC_SYSCTL 2363 help 2364 This builds the "test_sysctl" module. This driver enables to test the 2365 proc sysctl interfaces available to drivers safely without affecting 2366 production knobs which might alter system functionality. 2367 2368 If unsure, say N. 2369 2370config BITFIELD_KUNIT 2371 tristate "KUnit test bitfield functions at runtime" if !KUNIT_ALL_TESTS 2372 depends on KUNIT 2373 default KUNIT_ALL_TESTS 2374 help 2375 Enable this option to test the bitfield functions at boot. 2376 2377 KUnit tests run during boot and output the results to the debug log 2378 in TAP format (http://testanything.org/). Only useful for kernel devs 2379 running the KUnit test harness, and not intended for inclusion into a 2380 production build. 2381 2382 For more information on KUnit and unit tests in general please refer 2383 to the KUnit documentation in Documentation/dev-tools/kunit/. 2384 2385 If unsure, say N. 2386 2387config HASH_KUNIT_TEST 2388 tristate "KUnit Test for integer hash functions" if !KUNIT_ALL_TESTS 2389 depends on KUNIT 2390 default KUNIT_ALL_TESTS 2391 help 2392 Enable this option to test the kernel's string (<linux/stringhash.h>), and 2393 integer (<linux/hash.h>) hash functions on boot. 2394 2395 KUnit tests run during boot and output the results to the debug log 2396 in TAP format (https://testanything.org/). Only useful for kernel devs 2397 running the KUnit test harness, and not intended for inclusion into a 2398 production build. 2399 2400 For more information on KUnit and unit tests in general please refer 2401 to the KUnit documentation in Documentation/dev-tools/kunit/. 2402 2403 This is intended to help people writing architecture-specific 2404 optimized versions. If unsure, say N. 2405 2406config RESOURCE_KUNIT_TEST 2407 tristate "KUnit test for resource API" if !KUNIT_ALL_TESTS 2408 depends on KUNIT 2409 default KUNIT_ALL_TESTS 2410 help 2411 This builds the resource API unit test. 2412 Tests the logic of API provided by resource.c and ioport.h. 2413 For more information on KUnit and unit tests in general please refer 2414 to the KUnit documentation in Documentation/dev-tools/kunit/. 2415 2416 If unsure, say N. 2417 2418config SYSCTL_KUNIT_TEST 2419 tristate "KUnit test for sysctl" if !KUNIT_ALL_TESTS 2420 depends on KUNIT 2421 default KUNIT_ALL_TESTS 2422 help 2423 This builds the proc sysctl unit test, which runs on boot. 2424 Tests the API contract and implementation correctness of sysctl. 2425 For more information on KUnit and unit tests in general please refer 2426 to the KUnit documentation in Documentation/dev-tools/kunit/. 2427 2428 If unsure, say N. 2429 2430config LIST_KUNIT_TEST 2431 tristate "KUnit Test for Kernel Linked-list structures" if !KUNIT_ALL_TESTS 2432 depends on KUNIT 2433 default KUNIT_ALL_TESTS 2434 help 2435 This builds the linked list KUnit test suite. 2436 It tests that the API and basic functionality of the list_head type 2437 and associated macros. 2438 2439 KUnit tests run during boot and output the results to the debug log 2440 in TAP format (https://testanything.org/). Only useful for kernel devs 2441 running the KUnit test harness, and not intended for inclusion into a 2442 production build. 2443 2444 For more information on KUnit and unit tests in general please refer 2445 to the KUnit documentation in Documentation/dev-tools/kunit/. 2446 2447 If unsure, say N. 2448 2449config LINEAR_RANGES_TEST 2450 tristate "KUnit test for linear_ranges" 2451 depends on KUNIT 2452 select LINEAR_RANGES 2453 help 2454 This builds the linear_ranges unit test, which runs on boot. 2455 Tests the linear_ranges logic correctness. 2456 For more information on KUnit and unit tests in general please refer 2457 to the KUnit documentation in Documentation/dev-tools/kunit/. 2458 2459 If unsure, say N. 2460 2461config CMDLINE_KUNIT_TEST 2462 tristate "KUnit test for cmdline API" if !KUNIT_ALL_TESTS 2463 depends on KUNIT 2464 default KUNIT_ALL_TESTS 2465 help 2466 This builds the cmdline API unit test. 2467 Tests the logic of API provided by cmdline.c. 2468 For more information on KUnit and unit tests in general please refer 2469 to the KUnit documentation in Documentation/dev-tools/kunit/. 2470 2471 If unsure, say N. 2472 2473config BITS_TEST 2474 tristate "KUnit test for bits.h" if !KUNIT_ALL_TESTS 2475 depends on KUNIT 2476 default KUNIT_ALL_TESTS 2477 help 2478 This builds the bits unit test. 2479 Tests the logic of macros defined in bits.h. 2480 For more information on KUnit and unit tests in general please refer 2481 to the KUnit documentation in Documentation/dev-tools/kunit/. 2482 2483 If unsure, say N. 2484 2485config SLUB_KUNIT_TEST 2486 tristate "KUnit test for SLUB cache error detection" if !KUNIT_ALL_TESTS 2487 depends on SLUB_DEBUG && KUNIT 2488 default KUNIT_ALL_TESTS 2489 help 2490 This builds SLUB allocator unit test. 2491 Tests SLUB cache debugging functionality. 2492 For more information on KUnit and unit tests in general please refer 2493 to the KUnit documentation in Documentation/dev-tools/kunit/. 2494 2495 If unsure, say N. 2496 2497config RATIONAL_KUNIT_TEST 2498 tristate "KUnit test for rational.c" if !KUNIT_ALL_TESTS 2499 depends on KUNIT && RATIONAL 2500 default KUNIT_ALL_TESTS 2501 help 2502 This builds the rational math unit test. 2503 For more information on KUnit and unit tests in general please refer 2504 to the KUnit documentation in Documentation/dev-tools/kunit/. 2505 2506 If unsure, say N. 2507 2508config MEMCPY_KUNIT_TEST 2509 tristate "Test memcpy(), memmove(), and memset() functions at runtime" if !KUNIT_ALL_TESTS 2510 depends on KUNIT 2511 default KUNIT_ALL_TESTS 2512 help 2513 Builds unit tests for memcpy(), memmove(), and memset() functions. 2514 For more information on KUnit and unit tests in general please refer 2515 to the KUnit documentation in Documentation/dev-tools/kunit/. 2516 2517 If unsure, say N. 2518 2519config OVERFLOW_KUNIT_TEST 2520 tristate "Test check_*_overflow() functions at runtime" if !KUNIT_ALL_TESTS 2521 depends on KUNIT 2522 default KUNIT_ALL_TESTS 2523 help 2524 Builds unit tests for the check_*_overflow(), size_*(), allocation, and 2525 related functions. 2526 2527 For more information on KUnit and unit tests in general please refer 2528 to the KUnit documentation in Documentation/dev-tools/kunit/. 2529 2530 If unsure, say N. 2531 2532config STACKINIT_KUNIT_TEST 2533 tristate "Test level of stack variable initialization" if !KUNIT_ALL_TESTS 2534 depends on KUNIT 2535 default KUNIT_ALL_TESTS 2536 help 2537 Test if the kernel is zero-initializing stack variables and 2538 padding. Coverage is controlled by compiler flags, 2539 CONFIG_INIT_STACK_ALL_PATTERN, CONFIG_INIT_STACK_ALL_ZERO, 2540 CONFIG_GCC_PLUGIN_STRUCTLEAK, CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF, 2541 or CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL. 2542 2543config TEST_UDELAY 2544 tristate "udelay test driver" 2545 help 2546 This builds the "udelay_test" module that helps to make sure 2547 that udelay() is working properly. 2548 2549 If unsure, say N. 2550 2551config TEST_STATIC_KEYS 2552 tristate "Test static keys" 2553 depends on m 2554 help 2555 Test the static key interfaces. 2556 2557 If unsure, say N. 2558 2559config TEST_KMOD 2560 tristate "kmod stress tester" 2561 depends on m 2562 depends on NETDEVICES && NET_CORE && INET # for TUN 2563 depends on BLOCK 2564 depends on PAGE_SIZE_LESS_THAN_256KB # for BTRFS 2565 select TEST_LKM 2566 select XFS_FS 2567 select TUN 2568 select BTRFS_FS 2569 help 2570 Test the kernel's module loading mechanism: kmod. kmod implements 2571 support to load modules using the Linux kernel's usermode helper. 2572 This test provides a series of tests against kmod. 2573 2574 Although technically you can either build test_kmod as a module or 2575 into the kernel we disallow building it into the kernel since 2576 it stress tests request_module() and this will very likely cause 2577 some issues by taking over precious threads available from other 2578 module load requests, ultimately this could be fatal. 2579 2580 To run tests run: 2581 2582 tools/testing/selftests/kmod/kmod.sh --help 2583 2584 If unsure, say N. 2585 2586config TEST_DEBUG_VIRTUAL 2587 tristate "Test CONFIG_DEBUG_VIRTUAL feature" 2588 depends on DEBUG_VIRTUAL 2589 help 2590 Test the kernel's ability to detect incorrect calls to 2591 virt_to_phys() done against the non-linear part of the 2592 kernel's virtual address map. 2593 2594 If unsure, say N. 2595 2596config TEST_MEMCAT_P 2597 tristate "Test memcat_p() helper function" 2598 help 2599 Test the memcat_p() helper for correctly merging two 2600 pointer arrays together. 2601 2602 If unsure, say N. 2603 2604config TEST_LIVEPATCH 2605 tristate "Test livepatching" 2606 default n 2607 depends on DYNAMIC_DEBUG 2608 depends on LIVEPATCH 2609 depends on m 2610 help 2611 Test kernel livepatching features for correctness. The tests will 2612 load test modules that will be livepatched in various scenarios. 2613 2614 To run all the livepatching tests: 2615 2616 make -C tools/testing/selftests TARGETS=livepatch run_tests 2617 2618 Alternatively, individual tests may be invoked: 2619 2620 tools/testing/selftests/livepatch/test-callbacks.sh 2621 tools/testing/selftests/livepatch/test-livepatch.sh 2622 tools/testing/selftests/livepatch/test-shadow-vars.sh 2623 2624 If unsure, say N. 2625 2626config TEST_OBJAGG 2627 tristate "Perform selftest on object aggreration manager" 2628 default n 2629 depends on OBJAGG 2630 help 2631 Enable this option to test object aggregation manager on boot 2632 (or module load). 2633 2634config TEST_MEMINIT 2635 tristate "Test heap/page initialization" 2636 help 2637 Test if the kernel is zero-initializing heap and page allocations. 2638 This can be useful to test init_on_alloc and init_on_free features. 2639 2640 If unsure, say N. 2641 2642config TEST_HMM 2643 tristate "Test HMM (Heterogeneous Memory Management)" 2644 depends on TRANSPARENT_HUGEPAGE 2645 depends on DEVICE_PRIVATE 2646 select HMM_MIRROR 2647 select MMU_NOTIFIER 2648 help 2649 This is a pseudo device driver solely for testing HMM. 2650 Say M here if you want to build the HMM test module. 2651 Doing so will allow you to run tools/testing/selftest/vm/hmm-tests. 2652 2653 If unsure, say N. 2654 2655config TEST_FREE_PAGES 2656 tristate "Test freeing pages" 2657 help 2658 Test that a memory leak does not occur due to a race between 2659 freeing a block of pages and a speculative page reference. 2660 Loading this module is safe if your kernel has the bug fixed. 2661 If the bug is not fixed, it will leak gigabytes of memory and 2662 probably OOM your system. 2663 2664config TEST_FPU 2665 tristate "Test floating point operations in kernel space" 2666 depends on X86 && !KCOV_INSTRUMENT_ALL 2667 help 2668 Enable this option to add /sys/kernel/debug/selftest_helpers/test_fpu 2669 which will trigger a sequence of floating point operations. This is used 2670 for self-testing floating point control register setting in 2671 kernel_fpu_begin(). 2672 2673 If unsure, say N. 2674 2675config TEST_CLOCKSOURCE_WATCHDOG 2676 tristate "Test clocksource watchdog in kernel space" 2677 depends on CLOCKSOURCE_WATCHDOG 2678 help 2679 Enable this option to create a kernel module that will trigger 2680 a test of the clocksource watchdog. This module may be loaded 2681 via modprobe or insmod in which case it will run upon being 2682 loaded, or it may be built in, in which case it will run 2683 shortly after boot. 2684 2685 If unsure, say N. 2686 2687endif # RUNTIME_TESTING_MENU 2688 2689config ARCH_USE_MEMTEST 2690 bool 2691 help 2692 An architecture should select this when it uses early_memtest() 2693 during boot process. 2694 2695config MEMTEST 2696 bool "Memtest" 2697 depends on ARCH_USE_MEMTEST 2698 help 2699 This option adds a kernel parameter 'memtest', which allows memtest 2700 to be set and executed. 2701 memtest=0, mean disabled; -- default 2702 memtest=1, mean do 1 test pattern; 2703 ... 2704 memtest=17, mean do 17 test patterns. 2705 If you are unsure how to answer this question, answer N. 2706 2707 2708 2709config HYPERV_TESTING 2710 bool "Microsoft Hyper-V driver testing" 2711 default n 2712 depends on HYPERV && DEBUG_FS 2713 help 2714 Select this option to enable Hyper-V vmbus testing. 2715 2716endmenu # "Kernel Testing and Coverage" 2717 2718source "Documentation/Kconfig" 2719 2720endmenu # Kernel hacking 2721