Kconfig.debug (bbd2e05fad3e692ff2495895975bd0fce02bdbae) | Kconfig.debug (bece04b5b41dd7730dd06aec0d6b15c53d1fbb5a) |
---|---|
1# SPDX-License-Identifier: GPL-2.0-only 2menu "Kernel hacking" 3 4menu "printk and dmesg options" 5 6config PRINTK_TIME 7 bool "Show timing information on printks" 8 depends on PRINTK --- 1965 unchanged lines hidden (view full) --- 1974config CC_HAS_SANCOV_TRACE_PC 1975 def_bool $(cc-option,-fsanitize-coverage=trace-pc) 1976 1977 1978config KCOV 1979 bool "Code coverage for fuzzing" 1980 depends on ARCH_HAS_KCOV 1981 depends on CC_HAS_SANCOV_TRACE_PC || GCC_PLUGINS | 1# SPDX-License-Identifier: GPL-2.0-only 2menu "Kernel hacking" 3 4menu "printk and dmesg options" 5 6config PRINTK_TIME 7 bool "Show timing information on printks" 8 depends on PRINTK --- 1965 unchanged lines hidden (view full) --- 1974config CC_HAS_SANCOV_TRACE_PC 1975 def_bool $(cc-option,-fsanitize-coverage=trace-pc) 1976 1977 1978config KCOV 1979 bool "Code coverage for fuzzing" 1980 depends on ARCH_HAS_KCOV 1981 depends on CC_HAS_SANCOV_TRACE_PC || GCC_PLUGINS |
1982 depends on !ARCH_WANTS_NO_INSTR || STACK_VALIDATION || \ 1983 GCC_VERSION >= 120000 || CLANG_VERSION >= 130000 |
|
1982 select DEBUG_FS 1983 select GCC_PLUGIN_SANCOV if !CC_HAS_SANCOV_TRACE_PC 1984 help 1985 KCOV exposes kernel code coverage information in a form suitable 1986 for coverage-guided fuzzing (randomized testing). 1987 1988 If RANDOMIZE_BASE is enabled, PC values will not be stable across 1989 different machines and across reboots. If you need stable PC values, --- 686 unchanged lines hidden --- | 1984 select DEBUG_FS 1985 select GCC_PLUGIN_SANCOV if !CC_HAS_SANCOV_TRACE_PC 1986 help 1987 KCOV exposes kernel code coverage information in a form suitable 1988 for coverage-guided fuzzing (randomized testing). 1989 1990 If RANDOMIZE_BASE is enabled, PC values will not be stable across 1991 different machines and across reboots. If you need stable PC values, --- 686 unchanged lines hidden --- |