1menu "Kernel hacking" 2 3source "lib/Kconfig.debug" 4 5config EARLY_PRINTK 6 bool "Early SCIF console support" 7 8config DEBUG_KERNEL_WITH_GDB_STUB 9 bool "GDB Stub kernel debug" 10 11config SH64_PROC_TLB 12 bool "Debug: report TLB fill/purge activity through /proc/tlb" 13 depends on PROC_FS 14 15config SH64_PROC_ASIDS 16 bool "Debug: report ASIDs through /proc/asids" 17 depends on PROC_FS 18 19config SH64_SR_WATCH 20 bool "Debug: set SR.WATCH to enable hardware watchpoints and trace" 21 22config POOR_MANS_STRACE 23 bool "Debug: enable rudimentary strace facility" 24 help 25 This option allows system calls to be traced to the console. It also 26 aids in detecting kernel stack underflow. It is useful for debugging 27 early-userland problems (e.g. init incurring fatal exceptions.) 28 29config SH_ALPHANUMERIC 30 bool "Enable debug outputs to on-board alphanumeric display" 31 32config SH_NO_BSS_INIT 33 bool "Avoid zeroing BSS (to speed-up startup on suitable platforms)" 34 35config FRAME_POINTER 36 bool "Compile the kernel with frame pointers" 37 default y if KGDB 38 help 39 If you say Y here the resulting kernel image will be slightly larger 40 and slower, but it will give very useful debugging information. 41 If you don't debug the kernel, you can say N, but we may not be able 42 to solve problems without frame pointers. 43 44endmenu 45