1menu "Kernel hacking"
2
3source "lib/Kconfig.debug"
4
5config EARLY_PRINTK
6	bool "Early SCIF console support"
7
8config DEBUG_KERNEL_WITH_GDB_STUB
9	bool "GDB Stub kernel debug"
10
11config SH64_PROC_TLB
12	bool "Debug: report TLB fill/purge activity through /proc/tlb"
13	depends on PROC_FS
14
15config SH64_PROC_ASIDS
16	bool "Debug: report ASIDs through /proc/asids"
17	depends on PROC_FS
18
19config SH64_SR_WATCH
20	bool "Debug: set SR.WATCH to enable hardware watchpoints and trace"
21
22config POOR_MANS_STRACE
23	bool "Debug: enable rudimentary strace facility"
24	help
25	  This option allows system calls to be traced to the console.  It also
26	  aids in detecting kernel stack underflow.  It is useful for debugging
27	  early-userland problems (e.g. init incurring fatal exceptions.)
28
29config SH_ALPHANUMERIC
30	bool "Enable debug outputs to on-board alphanumeric display"
31
32config SH_NO_BSS_INIT
33	bool "Avoid zeroing BSS (to speed-up startup on suitable platforms)"
34
35config FRAME_POINTER
36	bool "Compile the kernel with frame pointers"
37	default y if KGDB
38	help
39	  If you say Y here the resulting kernel image will be slightly larger
40	  and slower, but it will give very useful debugging information.
41	  If you don't debug the kernel, you can say N, but we may not be able
42	  to solve problems without frame pointers.
43
44endmenu
45