Lines Matching +full:arc +full:- +full:timer

1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
62 int "Default console loglevel (1-15)"
72 Note: This does not affect the log level of un-prefixed printk()
77 int "quiet console loglevel (1-15)"
88 int "Default message log level (1-7)"
94 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
130 enabled/disabled based on various levels of scope - per source file,
170 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
174 nullarbor:~ # echo -n 'file svcsock.c +p' >
178 nullarbor:~ # echo -n 'module nfsd +p' >
182 nullarbor:~ # echo -n 'func svc_process +p' >
186 nullarbor:~ # echo -n 'func svc_process -p' >
189 See Documentation/admin-guide/dynamic-debug-howto.rst for additional
219 debugging but costs about 70-100K of memory.
247 menu "Compile-time checks and compiler options"
257 # older binutils ports do not support when utilizing RISC-V style linker
260 def_bool $(as-instr,.uleb128 .Lexpr_end4 - .Lexpr_start3\n.Lexpr_start3:\n.Lexpr_end4:)
268 This adds debug symbols to the kernel and modules (gcc -g), and
312 5.0+ accepts the -gdwarf-5 flag but only had partial support for some
316 15-18% savings in resulting image and debug info section sizes as
354 depends on $(cc-option,-gz=zlib)
355 depends on $(ld-option,--compress-debug-sections=zlib)
359 Users of dpkg-deb via debian/rules may find an increase in
368 depends on $(cc-option,-gz=zstd)
369 depends on $(ld-option,--compress-debug-sections=zstd)
380 depends on $(cc-option,-gsplit-dwarf)
381 # RISC-V linker relaxation + -gsplit-dwarf has issues with LLVM and GCC
383 # https://github.com/llvm/llvm-project/issues/56642
422 Support for the --lang_exclude flag which makes pahole exclude
436 bool "Allow loading modules with non-matching BTF type info"
452 instance. See Documentation/process/debugging/gdb-kernel-debugging.rst
472 bool "Strip assembler-generated symbols during link"
475 Strip internal assembler-generated symbols during a link (symbols
492 This option will install uapi headers (headers exported to user-space)
495 user-space program samples. It is also needed by some features such
513 -fno-inline-functions-called-once to be added to gcc commands.
516 a non-init function, we would lose the section information and thus
521 bool "Make section mismatch errors non-fatal"
531 depends on EXPERT && (X86_64 || ARM64 || PPC32 || PPC64 || ARC || RISCV || S390)
574 bool "Compile-time stack metadata validation"
579 Validate frame pointer rules at compile-time. This helps ensure that
595 Selecting this option will pass "-Map=vmlinux.map" to ld
617 bool "Force weak per-cpu definitions"
632 bool "Compiler context-analysis warnings"
634 # Branch profiling re-defines "if", which messes with the compiler's
641 and releasing user-definable "context locks".
649 For more details, see Documentation/dev-tools/context-analysis.rst.
656 Enable tree-wide context analysis. This is likely to produce a
657 large number of false positives - enable at your own risk.
676 keys are documented in <file:Documentation/admin-guide/sysrq.rst>.
686 to a bitmask as described in Documentation/admin-guide/sysrq.rst.
739 Access is off. Clients get -PERM when trying to create nodes in
741 Client can then back-off or continue without debugfs access.
782 properly. This can make kmalloc/kfree-intensive workloads
786 bool "Debug timer objects"
790 timer routines to track the life time of timer objects and
791 validate the timer operations.
816 int "debug_objects bootup default value (0-1)"
836 task has ever had available in the sysrq-T and sysrq-P debug output.
876 Enable this to turn on extended checks in the virtual-memory system
901 bool "Debug VM red-black trees"
904 Enable VM red-black tree debugging information and extra validations.
909 bool "Debug page-flags operations"
959 on the mminit_loglevel= command-line option.
969 debugfs interface under /sys/kernel/debug/notifier-error-inject/memory
974 Example: Inject memory hotplug offline error (-12 == -ENOMEM)
976 # cd /sys/kernel/debug/notifier-error-inject/memory
977 # echo -12 > actions/MEM_GOING_OFFLINE/error
982 be called memory-notifier-error-inject.
1014 mechanism for non-highmem pages and on non-highmem systems.
1038 These kinds of bugs usually occur when call-chains in the
1155 Set to a non-zero value N to enable the kernel to panic on "soft
1163 high-availability systems that have uptime guarantees and
1202 # Note that arch-specific variants are always preferred.
1217 an arch-specific hardlockup detector or if resources needed
1240 The arch-specific implementation of the hardlockup detector will
1290 to determine when a task has become non-responsive and should
1305 When set to a non-zero value, a kernel panic will be triggered
1312 high-availability systems that have uptime guarantees and
1356 high-availability systems that have uptime guarantees and
1363 bool "Report per-cpu work items which hog CPU for too long"
1366 Say Y here to enable reporting of concurrency-managed per-cpu work
1370 them from stalling other per-cpu work items. Occassional
1384 Also it could generate series of lockups with cooling-down periods.
1417 if kernel code uses it in a preemption-unsafe way. Also, the kernel
1430 mis-aligned access.
1476 participant CPUs, tasks and irq-contexts would be needed
1489 and rwsems - in which case all dependencies between these
1494 For more details, see Documentation/locking/lockdep-design.rst.
1497 bool "Enable raw_spinlock - spinlock nesting checks" if !ARCH_SUPPORTS_RT
1535 bool "Spinlock and rw-lock debugging: basic checks"
1560 injecting additional -EDEADLK wound/backoff cases. Together with
1586 memory-freeing routines (kfree(), kmem_cache_free(), free_pages(),
1647 … Try increasing this value if you hit "lockdep bfs error:-1" warning due to __cq_enqueue() failure.
1670 bool "Locking API boot-time self-tests"
1673 Say Y here if you want the kernel to run a short self-test during
1674 bootup. The self-test checks whether common types of locking bugs
1689 Say Y here if you want kernel locking-primitive torture tests
1814 Enable this to turn on extended checks in the linked-list walking
1827 Enable this to turn on extended checks in the priority-ordered
1828 linked-list (plist) walking routines. This checks the entire
1837 Enable this to turn on checks on scatter-gather tables. This can
1875 bool "Force round-robin CPU selection for unbound work items"
1884 round-robin CPU selection to flush out usages which depend on the
1907 depends on FRAME_POINTER || MIPS || PPC || S390 || MICROBLAZE || ARM || ARC || X86
1953 in charge of the OHCI-1394 controllers should be used instead.
1955 See Documentation/core-api/debugging-via-ohci1394.rst for more information.
1987 io-memory regardless of whether a driver is actively using that
1992 userspace access to *idle* io-memory ranges (see /proc/iomem) This
2026 interface /sys/kernel/debug/notifier-error-inject/pm
2031 Example: Inject PM suspend error (-12 = -ENOMEM)
2033 # cd /sys/kernel/debug/notifier-error-inject/pm/
2034 # echo -12 > actions/PM_SUSPEND_PREPARE/error
2039 be called pm-notifier-error-inject.
2050 /sys/kernel/debug/notifier-error-inject/OF-reconfig/
2056 be called of-reconfig-notifier-error-inject.
2066 interface /sys/kernel/debug/notifier-error-inject/netdev
2071 Example: Inject netdevice mtu change error (-22 = -EINVAL)
2073 # cd /sys/kernel/debug/notifier-error-inject/netdev
2074 # echo -22 > actions/NETDEV_CHANGEMTU/error
2079 be called netdev-notifier-error-inject.
2084 bool "Fault-injections of functions"
2094 bool "Fault-injection framework"
2097 Provide fault-injection framework.
2098 For more details, see Documentation/fault-injection/.
2101 bool "Fault-injection capability for kmalloc"
2104 Provide fault-injection capability for kmalloc.
2107 bool "Fault-injection capability for alloc_pages()"
2110 Provide fault-injection capability for alloc_pages().
2116 Provides fault-injection capability to inject failures
2120 bool "Fault-injection capability for disk IO"
2123 Provide fault-injection capability for disk IO.
2126 bool "Fault-injection capability for faking disk interrupts"
2129 Provide fault-injection capability on end IO handling. This
2137 bool "Fault-injection capability for futexes"
2141 Provide fault-injection capability for futexes.
2144 bool "Debugfs entries for fault-injection capabilities"
2147 Enable configuration of fault-injection capabilities via debugfs.
2150 bool "Fault-injection capability for functions"
2153 Provide function-based fault-injection capability.
2160 bool "Fault-injection capability for MMC IO"
2163 Provide fault-injection capability for MMC IO.
2170 bool "Fault-injection capability for SunRPC"
2173 Provide fault-injection capability for SunRPC and
2177 bool "Fault-injection capability forcing skb to reallocate"
2180 Provide fault-injection capability that forces the skb to be
2184 Documentation/fault-injection/fault-injection.rst
2187 bool "Configfs interface for fault-injection capabilities"
2191 This option allows configfs-based drivers to dynamically configure
2192 fault-injection via configfs. Each parameter for driver-specific
2193 fault-injection can be made visible as a configfs attribute in a
2198 bool "stacktrace filter for fault-injection capabilities"
2202 depends on FRAME_POINTER || MIPS || PPC || S390 || MICROBLAZE || ARM || ARC || X86
2204 Provide stacktrace filter for fault-injection capabilities
2222 for coverage-guided fuzzing (randomized testing).
2224 For more details, see Documentation/dev-tools/kcov.rst.
2229 depends on $(cc-option,-fsanitize-coverage=trace-cmp)
2252 KCOV uses preallocated per-cpu areas to collect coverage from
2280 the kernel command line (when built-in), or from userspace (when
2281 built-in or modular).
2316 Documentation/fault-injection/provoke-crashes.rst
2326 to the KUnit documentation in Documentation/dev-tools/kunit/.
2342 tristate "Array-based sort test" if !KUNIT_ALL_TESTS
2346 This option enables the self-test function of 'sort()' at boot,
2434 tristate "Red-Black tree test"
2441 tristate "Reed-Solomon library test"
2447 This option enables the self-test function of rslib at boot,
2463 Enable this option to build test module which validates per-cpu
2469 tristate "Perform an atomic64_t self-test"
2481 This is a one-shot self test that permutes through the
2483 N-disk array. Recovery is performed with the asynchronous
2541 tristate "KUnit test ffs-family functions at runtime" if !KUNIT_ALL_TESTS
2545 This builds KUnit tests for ffs-family bit manipulation functions
2549 and cross-architecture consistency of bit scanning functions.
2552 please refer to Documentation/dev-tools/kunit/.
2600 to the KUnit documentation in Documentation/dev-tools/kunit/.
2632 no compiler warnings from C=1 sparse checker or -Wextra
2701 actual firmware-using device. The contents can be rechecked by
2725 For micro-benchmarks and compiler warning checks, enable TEST_BITOPS.
2742 to the KUnit documentation in Documentation/dev-tools/kunit/.
2759 to the KUnit documentation in Documentation/dev-tools/kunit/.
2776 to the KUnit documentation in Documentation/dev-tools/kunit/.
2794 to the KUnit documentation in Documentation/dev-tools/kunit/.
2796 This is intended to help people writing architecture-specific
2808 to the KUnit documentation in Documentation/dev-tools/kunit/.
2820 to the KUnit documentation in Documentation/dev-tools/kunit/.
2834 to the KUnit documentation in Documentation/dev-tools/kunit/.
2839 tristate "KUnit Test for Kernel Linked-list structures" if !KUNIT_ALL_TESTS
2853 to the KUnit documentation in Documentation/dev-tools/kunit/.
2858 tristate "KUnit Test for Kernel Private Linked-list structures" if !KUNIT_ALL_TESTS
2862 This builds the KUnit test for the private linked-list primitives
2880 in Documentation/dev-tools/kunit/.
2892 to the KUnit documentation in Documentation/dev-tools/kunit/.
2897 bool "Compiler context-analysis warnings test"
2900 This builds the test for compiler-based context analysis. The test
2915 Enable a built-in kernel test module for the Live Update
2918 This module validates the File-Lifecycle-Bound subsystem by
2941 to the KUnit documentation in Documentation/dev-tools/kunit/.
2958 to the KUnit documentation in Documentation/dev-tools/kunit/.
2970 to the KUnit documentation in Documentation/dev-tools/kunit/.
2982 to the KUnit documentation in Documentation/dev-tools/kunit/.
2993 to the KUnit documentation in Documentation/dev-tools/kunit/.
3004 to the KUnit documentation in Documentation/dev-tools/kunit/.
3027 to the KUnit documentation in Documentation/dev-tools/kunit/.
3040 to the KUnit documentation in Documentation/dev-tools/kunit/.
3057 Test if the kernel is zero-initializing stack variables and
3100 This is intended to help people writing architecture-specific
3166 tools/testing/selftests/kmod/kmod.sh --help
3310 virt_to_phys() done against the non-linear part of the
3334 Test if the kernel is zero-initializing heap and page allocations.
3348 Doing so will allow you to run tools/testing/selftest/vm/hmm-tests.
3367 for self-testing floating point control register setting in
3407 For detailed documentation about KHO, see Documentation/core-api/kho.
3411 tools/testing/selftests/kho/vmtest.sh -h
3533 memtest=0, mean disabled; -- default
3542 bool "Microsoft Hyper-V driver testing"
3546 Select this option to enable Hyper-V vmbus testing.
3556 Enables rustc's `-Cdebug-assertions` codegen option.
3572 Enables rustc's `-Coverflow-checks` codegen option.
3575 overflow. When overflow-checks are enabled, a Rust panic will occur
3583 bool "Allow unoptimized build-time assertions"
3607 please refer to the KUnit documentation in Documentation/dev-tools/kunit/.