Lines Matching +full:additional +full:- +full:devs
1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
50 int "Default console loglevel (1-15)"
60 Note: This does not affect the log level of un-prefixed printk()
65 int "quiet console loglevel (1-15)"
76 int "Default message log level (1-7)"
82 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
118 enabled/disabled based on various levels of scope - per source file,
158 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
162 nullarbor:~ # echo -n 'file svcsock.c +p' >
166 nullarbor:~ # echo -n 'module nfsd +p' >
170 nullarbor:~ # echo -n 'func svc_process +p' >
174 nullarbor:~ # echo -n 'func svc_process -p' >
177 See Documentation/admin-guide/dynamic-debug-howto.rst for additional
207 debugging but costs about 70-100K of memory.
225 menu "Compile-time checks and compiler options"
235 # older binutils ports do not support when utilizing RISC-V style linker
238 def_bool $(as-instr,.uleb128 .Lexpr_end4 - .Lexpr_start3\n.Lexpr_start3:\n.Lexpr_end4:)
246 This adds debug symbols to the kernel and modules (gcc -g), and
290 5.0+ accepts the -gdwarf-5 flag but only had partial support for some
294 15-18% savings in resulting image and debug info section sizes as
332 depends on $(cc-option,-gz=zlib)
333 depends on $(ld-option,--compress-debug-sections=zlib)
338 Users of dpkg-deb via scripts/package/builddeb may find an increase in
347 depends on $(cc-option,-gz=zstd)
348 depends on $(ld-option,--compress-debug-sections=zstd)
359 depends on $(cc-option,-gsplit-dwarf)
360 # RISC-V linker relaxation + -gsplit-dwarf has issues with LLVM and GCC
362 # https://github.com/llvm/llvm-project/issues/56642
406 Support for the --lang_exclude flag which makes pahole exclude
420 bool "Allow loading modules with non-matching BTF type info"
435 additional functions are available to analyze a Linux kernel
436 instance. See Documentation/process/debugging/gdb-kernel-debugging.rst
457 bool "Strip assembler-generated symbols during link"
460 Strip internal assembler-generated symbols during a link (symbols
478 This option will install uapi headers (headers exported to user-space)
481 user-space program samples. It is also needed by some features such
498 additional step to occur:
499 - Add the option -fno-inline-functions-called-once to gcc commands.
500 When inlining a function annotated with __init in a non-init
507 bool "Make section mismatch errors non-fatal"
549 bool "Compile-time stack metadata validation"
554 Validate frame pointer rules at compile-time. This helps ensure that
570 Selecting this option will pass "-Map=vmlinux.map" to ld
592 bool "Force weak per-cpu definitions"
621 keys are documented in <file:Documentation/admin-guide/sysrq.rst>.
631 to a bitmask as described in Documentation/admin-guide/sysrq.rst.
672 debugfs=[on,no-mount,off]. The restrictions apply for API access
691 Access is off. Clients get -PERM when trying to create nodes in
693 Client can then back-off or continue without debugfs access.
717 If you say Y here, additional code will be inserted into the
733 properly. This can make kmalloc/kfree-intensive workloads
740 If you say Y here, additional code will be inserted into the
748 If you say Y here, additional code will be inserted into the
762 If you say Y here, additional code will be inserted into the
767 int "debug_objects bootup default value (0-1)"
787 task has ever had available in the sysrq-T and sysrq-P debug output.
818 Enable this to turn on extended checks in the virtual-memory system
828 Enable additional IPIs that ensure lazy tlb mm references are removed
843 bool "Debug VM red-black trees"
846 Enable VM red-black tree debugging information and extra validations.
851 bool "Debug page-flags operations"
897 Enable this for additional checks during memory initialisation.
901 on the mminit_loglevel= command-line option.
911 debugfs interface under /sys/kernel/debug/notifier-error-inject/memory
916 Example: Inject memory hotplug offline error (-12 == -ENOMEM)
918 # cd /sys/kernel/debug/notifier-error-inject/memory
919 # echo -12 > actions/MEM_GOING_OFFLINE/error
924 be called memory-notifier-error-inject.
943 This option enables additional error checking for the kmap_local
956 mechanism for non-highmem pages and on non-highmem systems.
965 This option enables additional error checking for high memory
980 These kinds of bugs usually occur when call-chains in the
1110 high-availability systems that have uptime guarantees and
1149 # Note that arch-specific variants are always preferred.
1164 an arch-specific hardlockup detector or if resources needed
1187 The arch-specific implementation of the hardlockup detector will
1237 to determine when a task has become non-responsive and should
1258 high-availability systems that have uptime guarantees and
1275 bool "Report per-cpu work items which hog CPU for too long"
1278 Say Y here to enable reporting of concurrency-managed per-cpu work
1282 them from stalling other per-cpu work items. Occassional
1296 Also it could generate series of lockups with cooling-down periods.
1322 If you say Y here, additional code will be inserted into the
1338 if kernel code uses it in a preemption-unsafe way. Also, the kernel
1379 participant CPUs, tasks and irq-contexts would be needed
1392 and rwsems - in which case all dependencies between these
1397 For more details, see Documentation/locking/lockdep-design.rst.
1400 bool "Enable raw_spinlock - spinlock nesting checks" if !ARCH_SUPPORTS_RT
1438 bool "Spinlock and rw-lock debugging: basic checks"
1463 injecting additional -EDEADLK wound/backoff cases. Together with
1489 memory-freeing routines (kfree(), kmem_cache_free(), free_pages(),
1542 … Try increasing this value if you hit "lockdep bfs error:-1" warning due to __cq_enqueue() failure.
1550 additional runtime checks to debug itself, at the price
1565 bool "Locking API boot-time self-tests"
1568 Say Y here if you want the kernel to run a short self-test during
1569 bootup. The self-test checks whether common types of locking bugs
1584 Say Y here if you want kernel locking-primitive torture tests
1736 Enable this to turn on extended checks in the linked-list walking
1749 Enable this to turn on extended checks in the priority-ordered
1750 linked-list (plist) walking routines. This checks the entire
1759 Enable this to turn on checks on scatter-gather tables. This can
1797 bool "Force round-robin CPU selection for unbound work items"
1806 round-robin CPU selection to flush out usages which depend on the
1875 in charge of the OHCI-1394 controllers should be used instead.
1877 See Documentation/core-api/debugging-via-ohci1394.rst for more information.
1909 io-memory regardless of whether a driver is actively using that
1914 userspace access to *idle* io-memory ranges (see /proc/iomem) This
1948 interface /sys/kernel/debug/notifier-error-inject/pm
1953 Example: Inject PM suspend error (-12 = -ENOMEM)
1955 # cd /sys/kernel/debug/notifier-error-inject/pm/
1956 # echo -12 > actions/PM_SUSPEND_PREPARE/error
1961 be called pm-notifier-error-inject.
1972 /sys/kernel/debug/notifier-error-inject/OF-reconfig/
1978 be called of-reconfig-notifier-error-inject.
1988 interface /sys/kernel/debug/notifier-error-inject/netdev
1993 Example: Inject netdevice mtu change error (-22 = -EINVAL)
1995 # cd /sys/kernel/debug/notifier-error-inject/netdev
1996 # echo -22 > actions/NETDEV_CHANGEMTU/error
2001 be called netdev-notifier-error-inject.
2006 bool "Fault-injections of functions"
2016 bool "Fault-injection framework"
2019 Provide fault-injection framework.
2020 For more details, see Documentation/fault-injection/.
2023 bool "Fault-injection capability for kmalloc"
2026 Provide fault-injection capability for kmalloc.
2029 bool "Fault-injection capability for alloc_pages()"
2032 Provide fault-injection capability for alloc_pages().
2038 Provides fault-injection capability to inject failures
2042 bool "Fault-injection capability for disk IO"
2045 Provide fault-injection capability for disk IO.
2048 bool "Fault-injection capability for faking disk interrupts"
2051 Provide fault-injection capability on end IO handling. This
2059 bool "Fault-injection capability for futexes"
2063 Provide fault-injection capability for futexes.
2066 bool "Debugfs entries for fault-injection capabilities"
2069 Enable configuration of fault-injection capabilities via debugfs.
2072 bool "Fault-injection capability for functions"
2075 Provide function-based fault-injection capability.
2082 bool "Fault-injection capability for MMC IO"
2085 Provide fault-injection capability for MMC IO.
2092 bool "Fault-injection capability for SunRPC"
2095 Provide fault-injection capability for SunRPC and
2099 bool "Fault-injection capability forcing skb to reallocate"
2102 Provide fault-injection capability that forces the skb to be
2106 Documentation/fault-injection/fault-injection.rst
2109 bool "Configfs interface for fault-injection capabilities"
2113 This option allows configfs-based drivers to dynamically configure
2114 fault-injection via configfs. Each parameter for driver-specific
2115 fault-injection can be made visible as a configfs attribute in a
2120 bool "stacktrace filter for fault-injection capabilities"
2126 Provide stacktrace filter for fault-injection capabilities
2136 def_bool $(cc-option,-fsanitize-coverage=trace-pc)
2150 for coverage-guided fuzzing (randomized testing).
2152 For more details, see Documentation/dev-tools/kcov.rst.
2157 depends on $(cc-option,-fsanitize-coverage=trace-cmp)
2180 KCOV uses preallocated per-cpu areas to collect coverage from
2208 the kernel command line (when built-in), or from userspace (when
2209 built-in or modular).
2244 Documentation/fault-injection/provoke-crashes.rst
2254 to the KUnit documentation in Documentation/dev-tools/kunit/.
2280 tristate "Array-based sort test" if !KUNIT_ALL_TESTS
2284 This option enables the self-test function of 'sort()' at boot,
2372 tristate "Red-Black tree test"
2379 tristate "Reed-Solomon library test"
2385 This option enables the self-test function of rslib at boot,
2401 Enable this option to build test module which validates per-cpu
2407 tristate "Perform an atomic64_t self-test"
2419 This is a one-shot self test that permutes through the
2421 N-disk array. Recovery is performed with the asynchronous
2528 no compiler warnings from C=1 sparse checker or -Wextra
2584 actual firmware-using device. The contents can be rechecked by
2607 in TAP format (http://testanything.org/). Only useful for kernel devs
2612 to the KUnit documentation in Documentation/dev-tools/kunit/.
2624 in TAP format (http://testanything.org/). Only useful for kernel devs
2629 to the KUnit documentation in Documentation/dev-tools/kunit/.
2641 in TAP format (http://testanything.org/). Only useful for kernel devs
2646 to the KUnit documentation in Documentation/dev-tools/kunit/.
2659 in TAP format (https://testanything.org/). Only useful for kernel devs
2664 to the KUnit documentation in Documentation/dev-tools/kunit/.
2666 This is intended to help people writing architecture-specific
2678 to the KUnit documentation in Documentation/dev-tools/kunit/.
2690 to the KUnit documentation in Documentation/dev-tools/kunit/.
2695 tristate "KUnit Test for Kernel Linked-list structures" if !KUNIT_ALL_TESTS
2704 in TAP format (https://testanything.org/). Only useful for kernel devs
2709 to the KUnit documentation in Documentation/dev-tools/kunit/.
2722 in Documentation/dev-tools/kunit/.
2734 to the KUnit documentation in Documentation/dev-tools/kunit/.
2746 to the KUnit documentation in Documentation/dev-tools/kunit/.
2758 to the KUnit documentation in Documentation/dev-tools/kunit/.
2770 to the KUnit documentation in Documentation/dev-tools/kunit/.
2781 to the KUnit documentation in Documentation/dev-tools/kunit/.
2792 to the KUnit documentation in Documentation/dev-tools/kunit/.
2804 to the KUnit documentation in Documentation/dev-tools/kunit/.
2817 to the KUnit documentation in Documentation/dev-tools/kunit/.
2826 Test if the kernel is zero-initializing stack variables and
2862 This is intended to help people writing architecture-specific
2879 This is intended to help people writing architecture-specific
2940 tools/testing/selftests/kmod/kmod.sh --help
3084 virt_to_phys() done against the non-linear part of the
3108 Test if the kernel is zero-initializing heap and page allocations.
3122 Doing so will allow you to run tools/testing/selftest/vm/hmm-tests.
3141 for self-testing floating point control register setting in
3214 memtest=0, mean disabled; -- default
3223 bool "Microsoft Hyper-V driver testing"
3227 Select this option to enable Hyper-V vmbus testing.
3237 Enables rustc's `-Cdebug-assertions` codegen option.
3253 Enables rustc's `-Coverflow-checks` codegen option.
3256 overflow. When overflow-checks are enabled, a Rust panic will occur
3264 bool "Allow unoptimized build-time assertions"
3288 please refer to the KUnit documentation in Documentation/dev-tools/kunit/.