Kconfig.debug (bbd2e05fad3e692ff2495895975bd0fce02bdbae) Kconfig.debug (bece04b5b41dd7730dd06aec0d6b15c53d1fbb5a)
1# SPDX-License-Identifier: GPL-2.0-only
2menu "Kernel hacking"
3
4menu "printk and dmesg options"
5
6config PRINTK_TIME
7 bool "Show timing information on printks"
8 depends on PRINTK

--- 1965 unchanged lines hidden (view full) ---

1974config CC_HAS_SANCOV_TRACE_PC
1975 def_bool $(cc-option,-fsanitize-coverage=trace-pc)
1976
1977
1978config KCOV
1979 bool "Code coverage for fuzzing"
1980 depends on ARCH_HAS_KCOV
1981 depends on CC_HAS_SANCOV_TRACE_PC || GCC_PLUGINS
1# SPDX-License-Identifier: GPL-2.0-only
2menu "Kernel hacking"
3
4menu "printk and dmesg options"
5
6config PRINTK_TIME
7 bool "Show timing information on printks"
8 depends on PRINTK

--- 1965 unchanged lines hidden (view full) ---

1974config CC_HAS_SANCOV_TRACE_PC
1975 def_bool $(cc-option,-fsanitize-coverage=trace-pc)
1976
1977
1978config KCOV
1979 bool "Code coverage for fuzzing"
1980 depends on ARCH_HAS_KCOV
1981 depends on CC_HAS_SANCOV_TRACE_PC || GCC_PLUGINS
1982 depends on !ARCH_WANTS_NO_INSTR || STACK_VALIDATION || \
1983 GCC_VERSION >= 120000 || CLANG_VERSION >= 130000
1982 select DEBUG_FS
1983 select GCC_PLUGIN_SANCOV if !CC_HAS_SANCOV_TRACE_PC
1984 help
1985 KCOV exposes kernel code coverage information in a form suitable
1986 for coverage-guided fuzzing (randomized testing).
1987
1988 If RANDOMIZE_BASE is enabled, PC values will not be stable across
1989 different machines and across reboots. If you need stable PC values,

--- 686 unchanged lines hidden ---
1984 select DEBUG_FS
1985 select GCC_PLUGIN_SANCOV if !CC_HAS_SANCOV_TRACE_PC
1986 help
1987 KCOV exposes kernel code coverage information in a form suitable
1988 for coverage-guided fuzzing (randomized testing).
1989
1990 If RANDOMIZE_BASE is enabled, PC values will not be stable across
1991 different machines and across reboots. If you need stable PC values,

--- 686 unchanged lines hidden ---