Lines Matching +full:boot +full:- +full:enabled
1 # SPDX-License-Identifier: GPL-2.0-only
24 use-after-free). The error reports for these checks can be augmented
26 PAGE_OWNER is also selected and enabled on boot.
31 be enabled in combination with hibernation as that would result in
38 enabled by DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc
56 will still exist (with SYSFS enabled), it will not provide e.g. cache
65 Boot with debugging on by default. SLUB boots by default with
67 equivalent to specifying the "slab_debug" parameter on boot.
71 "slab_debug=-".
86 detect use-after-free accesses in such caches.
116 "page_owner=on" to boot parameter in order to enable it. Eats
117 a fair amount of memory if enabled. See tools/mm/page_owner_sort.c
118 for user-space helper.
141 is disabled, and can be optionally enabled via page_table_check=on
143 enabled.
153 have a potential performance impact if enabled with the
154 "page_poison=1" kernel boot option.
160 checking the poison pattern on alloc, you can boot the kernel with
175 nil until the tracepoints are actually enabled.
178 bool "Testcase for the marking rodata read-only"
181 This option enables a testcase for the setting rodata read-only.
187 bool "Warn on W+X mappings at boot"
192 Generate a warning if any W+X mappings are found at boot.
211 once the kernel has booted up - it's a one time check.
255 allocations. See Documentation/dev-tools/kmemleak.rst for more
281 Say Y here to disable kmemleak by default. It can then be enabled
285 bool "Enable kmemleak auto scan thread on boot up"
291 kmemleak scan at boot up.
300 bool "Statistics for per-vma locks"
304 faults handled under protection of per-vma locks. When enabled, the
306 kernel developers to evaluate effectiveness of per-vma locks and to