Lines Matching +full:boot +full:- +full:enabled
1 # SPDX-License-Identifier: GPL-2.0-only
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
31 be enabled in combination with hibernation as that would result in
38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc
54 memory. This can make kmalloc/kfree-intensive workloads much slower.
64 will still exist (with SYSFS enabled), it will not provide e.g. cache
73 Boot with debugging on by default. SLUB boots by default with
75 equivalent to specifying the "slub_debug" parameter on boot.
79 "slub_debug=-".
92 "page_owner=on" to boot parameter in order to enable it. Eats
93 a fair amount of memory if enabled. See tools/mm/page_owner_sort.c
94 for user-space helper.
117 is disabled, and can be optionally enabled via page_table_check=on
119 enabled.
129 have a potential performance impact if enabled with the
130 "page_poison=1" kernel boot option.
136 checking the poison pattern on alloc, you can boot the kernel with
151 nil until the tracepoints are actually enabled.
154 bool "Testcase for the marking rodata read-only"
157 This option enables a testcase for the setting rodata read-only.
163 bool "Warn on W+X mappings at boot"
168 Generate a warning if any W+X mappings are found at boot.
187 once the kernel has booted up - it's a one time check.
231 allocations. See Documentation/dev-tools/kmemleak.rst for more
257 Say Y here to disable kmemleak by default. It can then be enabled
261 bool "Enable kmemleak auto scan thread on boot up"
267 kmemleak scan at boot up.
276 bool "Statistics for per-vma locks"
280 faults handled under protection of per-vma locks. When enabled, the
282 kernel developers to evaluate effectiveness of per-vma locks and to