Lines Matching +full:has +full:- +full:builtin +full:- +full:dma
1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
50 int "Default console loglevel (1-15)"
60 Note: This does not affect the log level of un-prefixed printk()
65 int "quiet console loglevel (1-15)"
76 int "Default message log level (1-7)"
82 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
118 enabled/disabled based on various levels of scope - per source file,
158 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
162 nullarbor:~ # echo -n 'file svcsock.c +p' >
166 nullarbor:~ # echo -n 'module nfsd +p' >
170 nullarbor:~ # echo -n 'func svc_process +p' >
174 nullarbor:~ # echo -n 'func svc_process -p' >
177 See Documentation/admin-guide/dynamic-debug-howto.rst for additional
207 debugging but costs about 70-100K of memory.
225 menu "Compile-time checks and compiler options"
230 A kernel debug info option other than "None" has been selected
235 # older binutils ports do not support when utilizing RISC-V style linker
238 def_bool $(as-instr,.uleb128 .Lexpr_end4 - .Lexpr_start3\n.Lexpr_start3:\n.Lexpr_end4:)
246 This adds debug symbols to the kernel and modules (gcc -g), and
290 5.0+ accepts the -gdwarf-5 flag but only had partial support for some
294 15-18% savings in resulting image and debug info section sizes as
298 config if they rely on tooling that has not yet been updated to
332 depends on $(cc-option,-gz=zlib)
333 depends on $(ld-option,--compress-debug-sections=zlib)
338 Users of dpkg-deb via debian/rules may find an increase in
347 depends on $(cc-option,-gz=zstd)
348 depends on $(ld-option,--compress-debug-sections=zstd)
359 depends on $(cc-option,-gsplit-dwarf)
360 # RISC-V linker relaxation + -gsplit-dwarf has issues with LLVM and GCC
362 # https://github.com/llvm/llvm-project/issues/56642
406 Support for the --lang_exclude flag which makes pahole exclude
420 bool "Allow loading modules with non-matching BTF type info"
436 instance. See Documentation/process/debugging/gdb-kernel-debugging.rst
457 bool "Strip assembler-generated symbols during link"
460 Strip internal assembler-generated symbols during a link (symbols
477 This option will install uapi headers (headers exported to user-space)
480 user-space program samples. It is also needed by some features such
498 - Add the option -fno-inline-functions-called-once to gcc commands.
499 When inlining a function annotated with __init in a non-init
506 bool "Make section mismatch errors non-fatal"
559 bool "Compile-time stack metadata validation"
564 Validate frame pointer rules at compile-time. This helps ensure that
580 Selecting this option will pass "-Map=vmlinux.map" to ld
587 bool "Generate address range information for builtin modules"
596 This option generates modules.builtin.ranges in the build tree with
602 bool "Force weak per-cpu definitions"
631 keys are documented in <file:Documentation/admin-guide/sysrq.rst>.
641 to a bitmask as described in Documentation/admin-guide/sysrq.rst.
682 debugfs=[on,no-mount,off]. The restrictions apply for API access
701 Access is off. Clients get -PERM when trying to create nodes in
703 Client can then back-off or continue without debugfs access.
742 which contains an object which has not been deactivated
743 properly. This can make kmalloc/kfree-intensive workloads
777 int "debug_objects bootup default value (0-1)"
797 task has ever had available in the sysrq-T and sysrq-P debug output.
837 Enable this to turn on extended checks in the virtual-memory system
862 bool "Debug VM red-black trees"
865 Enable VM red-black tree debugging information and extra validations.
870 bool "Debug page-flags operations"
920 on the mminit_loglevel= command-line option.
930 debugfs interface under /sys/kernel/debug/notifier-error-inject/memory
935 Example: Inject memory hotplug offline error (-12 == -ENOMEM)
937 # cd /sys/kernel/debug/notifier-error-inject/memory
938 # echo -12 > actions/MEM_GOING_OFFLINE/error
943 be called memory-notifier-error-inject.
952 Say Y to verify that the per_cpu map being accessed has
975 mechanism for non-highmem pages and on non-highmem systems.
999 These kinds of bugs usually occur when call-chains in the
1061 has the same effect as setting oops=panic on the kernel command
1128 lockup has been detected. This feature is useful for
1129 high-availability systems that have uptime guarantees and
1146 # sparc64: has a custom implementation which is not using the common
1168 # Note that arch-specific variants are always preferred.
1183 an arch-specific hardlockup detector or if resources needed
1206 The arch-specific implementation of the hardlockup detector will
1248 feature has negligible overhead.
1256 to determine when a task has become non-responsive and should
1276 hung task has been detected. This feature is useful for
1277 high-availability systems that have uptime guarantees and
1305 bool "Report per-cpu work items which hog CPU for too long"
1308 Say Y here to enable reporting of concurrency-managed per-cpu work
1312 them from stalling other per-cpu work items. Occassional
1326 Also it could generate series of lockups with cooling-down periods.
1359 if kernel code uses it in a preemption-unsafe way. Also, the kernel
1362 This option has potential to introduce high runtime overhead,
1400 participant CPUs, tasks and irq-contexts would be needed
1413 and rwsems - in which case all dependencies between these
1418 For more details, see Documentation/locking/lockdep-design.rst.
1421 bool "Enable raw_spinlock - spinlock nesting checks" if !ARCH_SUPPORTS_RT
1459 bool "Spinlock and rw-lock debugging: basic checks"
1484 injecting additional -EDEADLK wound/backoff cases. Together with
1510 memory-freeing routines (kfree(), kmem_cache_free(), free_pages(),
1563 … Try increasing this value if you hit "lockdep bfs error:-1" warning due to __cq_enqueue() failure.
1586 bool "Locking API boot-time self-tests"
1589 Say Y here if you want the kernel to run a short self-test during
1590 bootup. The self-test checks whether common types of locking bugs
1605 Say Y here if you want kernel locking-primitive torture tests
1736 example of this would be a struct device which has just been
1757 Enable this to turn on extended checks in the linked-list walking
1770 Enable this to turn on extended checks in the priority-ordered
1771 linked-list (plist) walking routines. This checks the entire
1780 Enable this to turn on checks on scatter-gather tables. This can
1818 bool "Force round-robin CPU selection for unbound work items"
1827 round-robin CPU selection to flush out usages which depend on the
1876 on boot and the crashing machine has a FireWire port, you can use
1878 over FireWire. This employs remote DMA as part of the OHCI1394
1881 With remote DMA, you can monitor the printk buffer remotely using
1883 Even controlling a kernel debugger is possible using remote DMA.
1891 devices cause a bus reset and thereby disable remote DMA for all
1896 in charge of the OHCI-1394 controllers should be used instead.
1898 See Documentation/core-api/debugging-via-ohci1394.rst for more information.
1930 io-memory regardless of whether a driver is actively using that
1935 userspace access to *idle* io-memory ranges (see /proc/iomem) This
1969 interface /sys/kernel/debug/notifier-error-inject/pm
1974 Example: Inject PM suspend error (-12 = -ENOMEM)
1976 # cd /sys/kernel/debug/notifier-error-inject/pm/
1977 # echo -12 > actions/PM_SUSPEND_PREPARE/error
1982 be called pm-notifier-error-inject.
1993 /sys/kernel/debug/notifier-error-inject/OF-reconfig/
1999 be called of-reconfig-notifier-error-inject.
2009 interface /sys/kernel/debug/notifier-error-inject/netdev
2014 Example: Inject netdevice mtu change error (-22 = -EINVAL)
2016 # cd /sys/kernel/debug/notifier-error-inject/netdev
2017 # echo -22 > actions/NETDEV_CHANGEMTU/error
2022 be called netdev-notifier-error-inject.
2027 bool "Fault-injections of functions"
2037 bool "Fault-injection framework"
2040 Provide fault-injection framework.
2041 For more details, see Documentation/fault-injection/.
2044 bool "Fault-injection capability for kmalloc"
2047 Provide fault-injection capability for kmalloc.
2050 bool "Fault-injection capability for alloc_pages()"
2053 Provide fault-injection capability for alloc_pages().
2059 Provides fault-injection capability to inject failures
2063 bool "Fault-injection capability for disk IO"
2066 Provide fault-injection capability for disk IO.
2069 bool "Fault-injection capability for faking disk interrupts"
2072 Provide fault-injection capability on end IO handling. This
2080 bool "Fault-injection capability for futexes"
2084 Provide fault-injection capability for futexes.
2087 bool "Debugfs entries for fault-injection capabilities"
2090 Enable configuration of fault-injection capabilities via debugfs.
2093 bool "Fault-injection capability for functions"
2096 Provide function-based fault-injection capability.
2103 bool "Fault-injection capability for MMC IO"
2106 Provide fault-injection capability for MMC IO.
2113 bool "Fault-injection capability for SunRPC"
2116 Provide fault-injection capability for SunRPC and
2120 bool "Fault-injection capability forcing skb to reallocate"
2123 Provide fault-injection capability that forces the skb to be
2127 Documentation/fault-injection/fault-injection.rst
2130 bool "Configfs interface for fault-injection capabilities"
2134 This option allows configfs-based drivers to dynamically configure
2135 fault-injection via configfs. Each parameter for driver-specific
2136 fault-injection can be made visible as a configfs attribute in a
2141 bool "stacktrace filter for fault-injection capabilities"
2147 Provide stacktrace filter for fault-injection capabilities
2165 for coverage-guided fuzzing (randomized testing).
2167 For more details, see Documentation/dev-tools/kcov.rst.
2172 depends on $(cc-option,-fsanitize-coverage=trace-cmp)
2195 KCOV uses preallocated per-cpu areas to collect coverage from
2223 the kernel command line (when built-in), or from userspace (when
2224 built-in or modular).
2259 Documentation/fault-injection/provoke-crashes.rst
2269 to the KUnit documentation in Documentation/dev-tools/kunit/.
2295 tristate "Array-based sort test" if !KUNIT_ALL_TESTS
2299 This option enables the self-test function of 'sort()' at boot,
2387 tristate "Red-Black tree test"
2394 tristate "Reed-Solomon library test"
2400 This option enables the self-test function of rslib at boot,
2416 Enable this option to build test module which validates per-cpu
2422 tristate "Perform an atomic64_t self-test"
2434 This is a one-shot self test that permutes through the
2436 N-disk array. Recovery is performed with the asynchronous
2522 to the KUnit documentation in Documentation/dev-tools/kunit/.
2562 no compiler warnings from C=1 sparse checker or -Wextra
2563 compilations. It has no dependencies and doesn't run or load unless
2608 actual firmware-using device. The contents can be rechecked by
2636 to the KUnit documentation in Documentation/dev-tools/kunit/.
2653 to the KUnit documentation in Documentation/dev-tools/kunit/.
2670 to the KUnit documentation in Documentation/dev-tools/kunit/.
2688 to the KUnit documentation in Documentation/dev-tools/kunit/.
2690 This is intended to help people writing architecture-specific
2702 to the KUnit documentation in Documentation/dev-tools/kunit/.
2714 to the KUnit documentation in Documentation/dev-tools/kunit/.
2728 to the KUnit documentation in Documentation/dev-tools/kunit/.
2733 tristate "KUnit Test for Kernel Linked-list structures" if !KUNIT_ALL_TESTS
2747 to the KUnit documentation in Documentation/dev-tools/kunit/.
2760 in Documentation/dev-tools/kunit/.
2772 to the KUnit documentation in Documentation/dev-tools/kunit/.
2784 to the KUnit documentation in Documentation/dev-tools/kunit/.
2796 to the KUnit documentation in Documentation/dev-tools/kunit/.
2808 to the KUnit documentation in Documentation/dev-tools/kunit/.
2819 to the KUnit documentation in Documentation/dev-tools/kunit/.
2830 to the KUnit documentation in Documentation/dev-tools/kunit/.
2842 to the KUnit documentation in Documentation/dev-tools/kunit/.
2855 to the KUnit documentation in Documentation/dev-tools/kunit/.
2872 Test if the kernel is zero-initializing stack variables and
2916 This is intended to help people writing architecture-specific
2933 This is intended to help people writing architecture-specific
2999 tools/testing/selftests/kmod/kmod.sh --help
3025 A: has KALLSYSMS_NUMSYMS exported symbols
3046 Since it has 10 * KALLSYMS_NUMSYMS it means we can first test
3143 virt_to_phys() done against the non-linear part of the
3167 Test if the kernel is zero-initializing heap and page allocations.
3181 Doing so will allow you to run tools/testing/selftest/vm/hmm-tests.
3190 Loading this module is safe if your kernel has the bug fixed.
3200 for self-testing floating point control register setting in
3311 memtest=0, mean disabled; -- default
3320 bool "Microsoft Hyper-V driver testing"
3324 Select this option to enable Hyper-V vmbus testing.
3334 Enables rustc's `-Cdebug-assertions` codegen option.
3350 Enables rustc's `-Coverflow-checks` codegen option.
3353 overflow. When overflow-checks are enabled, a Rust panic will occur
3361 bool "Allow unoptimized build-time assertions"
3385 please refer to the KUnit documentation in Documentation/dev-tools/kunit/.