Lines Matching +full:arm +full:- +full:firmware +full:- +full:suite

1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
50 int "Default console loglevel (1-15)"
60 Note: This does not affect the log level of un-prefixed printk()
65 int "quiet console loglevel (1-15)"
76 int "Default message log level (1-7)"
82 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
118 enabled/disabled based on various levels of scope - per source file,
158 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
162 nullarbor:~ # echo -n 'file svcsock.c +p' >
166 nullarbor:~ # echo -n 'module nfsd +p' >
170 nullarbor:~ # echo -n 'func svc_process +p' >
174 nullarbor:~ # echo -n 'func svc_process -p' >
177 See Documentation/admin-guide/dynamic-debug-howto.rst for additional
207 debugging but costs about 70-100K of memory.
225 menu "Compile-time checks and compiler options"
235 # older binutils ports do not support when utilizing RISC-V style linker
238 def_bool $(as-instr,.uleb128 .Lexpr_end4 - .Lexpr_start3\n.Lexpr_start3:\n.Lexpr_end4:)
246 This adds debug symbols to the kernel and modules (gcc -g), and
290 5.0+ accepts the -gdwarf-5 flag but only had partial support for some
294 15-18% savings in resulting image and debug info section sizes as
332 depends on $(cc-option,-gz=zlib)
333 depends on $(ld-option,--compress-debug-sections=zlib)
338 Users of dpkg-deb via scripts/package/builddeb may find an increase in
347 depends on $(cc-option,-gz=zstd)
348 depends on $(ld-option,--compress-debug-sections=zstd)
359 depends on $(cc-option,-gsplit-dwarf)
360 # RISC-V linker relaxation + -gsplit-dwarf has issues with LLVM and GCC
362 # https://github.com/llvm/llvm-project/issues/56642
406 Support for the --lang_exclude flag which makes pahole exclude
420 bool "Allow loading modules with non-matching BTF type info"
436 instance. See Documentation/process/debugging/gdb-kernel-debugging.rst
457 bool "Strip assembler-generated symbols during link"
460 Strip internal assembler-generated symbols during a link (symbols
478 This option will install uapi headers (headers exported to user-space)
481 user-space program samples. It is also needed by some features such
499 - Add the option -fno-inline-functions-called-once to gcc commands.
500 When inlining a function annotated with __init in a non-init
507 bool "Make section mismatch errors non-fatal"
549 bool "Compile-time stack metadata validation"
554 Validate frame pointer rules at compile-time. This helps ensure that
570 Selecting this option will pass "-Map=vmlinux.map" to ld
592 bool "Force weak per-cpu definitions"
621 keys are documented in <file:Documentation/admin-guide/sysrq.rst>.
631 to a bitmask as described in Documentation/admin-guide/sysrq.rst.
672 debugfs=[on,no-mount,off]. The restrictions apply for API access
691 Access is off. Clients get -PERM when trying to create nodes in
693 Client can then back-off or continue without debugfs access.
733 properly. This can make kmalloc/kfree-intensive workloads
767 int "debug_objects bootup default value (0-1)"
787 task has ever had available in the sysrq-T and sysrq-P debug output.
818 Enable this to turn on extended checks in the virtual-memory system
843 bool "Debug VM red-black trees"
846 Enable VM red-black tree debugging information and extra validations.
851 bool "Debug page-flags operations"
901 on the mminit_loglevel= command-line option.
911 debugfs interface under /sys/kernel/debug/notifier-error-inject/memory
916 Example: Inject memory hotplug offline error (-12 == -ENOMEM)
918 # cd /sys/kernel/debug/notifier-error-inject/memory
919 # echo -12 > actions/MEM_GOING_OFFLINE/error
924 be called memory-notifier-error-inject.
956 mechanism for non-highmem pages and on non-highmem systems.
980 These kinds of bugs usually occur when call-chains in the
1110 high-availability systems that have uptime guarantees and
1149 # Note that arch-specific variants are always preferred.
1164 an arch-specific hardlockup detector or if resources needed
1187 The arch-specific implementation of the hardlockup detector will
1237 to determine when a task has become non-responsive and should
1258 high-availability systems that have uptime guarantees and
1275 bool "Report per-cpu work items which hog CPU for too long"
1278 Say Y here to enable reporting of concurrency-managed per-cpu work
1282 them from stalling other per-cpu work items. Occassional
1296 Also it could generate series of lockups with cooling-down periods.
1338 if kernel code uses it in a preemption-unsafe way. Also, the kernel
1379 participant CPUs, tasks and irq-contexts would be needed
1392 and rwsems - in which case all dependencies between these
1397 For more details, see Documentation/locking/lockdep-design.rst.
1400 bool "Enable raw_spinlock - spinlock nesting checks" if !ARCH_SUPPORTS_RT
1438 bool "Spinlock and rw-lock debugging: basic checks"
1463 injecting additional -EDEADLK wound/backoff cases. Together with
1489 memory-freeing routines (kfree(), kmem_cache_free(), free_pages(),
1542 … Try increasing this value if you hit "lockdep bfs error:-1" warning due to __cq_enqueue() failure.
1565 bool "Locking API boot-time self-tests"
1568 Say Y here if you want the kernel to run a short self-test during
1569 bootup. The self-test checks whether common types of locking bugs
1584 Say Y here if you want kernel locking-primitive torture tests
1736 Enable this to turn on extended checks in the linked-list walking
1749 Enable this to turn on extended checks in the priority-ordered
1750 linked-list (plist) walking routines. This checks the entire
1759 Enable this to turn on checks on scatter-gather tables. This can
1797 bool "Force round-robin CPU selection for unbound work items"
1806 round-robin CPU selection to flush out usages which depend on the
1829 depends on FRAME_POINTER || MIPS || PPC || S390 || MICROBLAZE || ARM || ARC || X86
1875 in charge of the OHCI-1394 controllers should be used instead.
1877 See Documentation/core-api/debugging-via-ohci1394.rst for more information.
1909 io-memory regardless of whether a driver is actively using that
1914 userspace access to *idle* io-memory ranges (see /proc/iomem) This
1948 interface /sys/kernel/debug/notifier-error-inject/pm
1953 Example: Inject PM suspend error (-12 = -ENOMEM)
1955 # cd /sys/kernel/debug/notifier-error-inject/pm/
1956 # echo -12 > actions/PM_SUSPEND_PREPARE/error
1961 be called pm-notifier-error-inject.
1972 /sys/kernel/debug/notifier-error-inject/OF-reconfig/
1978 be called of-reconfig-notifier-error-inject.
1988 interface /sys/kernel/debug/notifier-error-inject/netdev
1993 Example: Inject netdevice mtu change error (-22 = -EINVAL)
1995 # cd /sys/kernel/debug/notifier-error-inject/netdev
1996 # echo -22 > actions/NETDEV_CHANGEMTU/error
2001 be called netdev-notifier-error-inject.
2006 bool "Fault-injections of functions"
2016 bool "Fault-injection framework"
2019 Provide fault-injection framework.
2020 For more details, see Documentation/fault-injection/.
2023 bool "Fault-injection capability for kmalloc"
2026 Provide fault-injection capability for kmalloc.
2029 bool "Fault-injection capability for alloc_pages()"
2032 Provide fault-injection capability for alloc_pages().
2038 Provides fault-injection capability to inject failures
2042 bool "Fault-injection capability for disk IO"
2045 Provide fault-injection capability for disk IO.
2048 bool "Fault-injection capability for faking disk interrupts"
2051 Provide fault-injection capability on end IO handling. This
2059 bool "Fault-injection capability for futexes"
2063 Provide fault-injection capability for futexes.
2066 bool "Debugfs entries for fault-injection capabilities"
2069 Enable configuration of fault-injection capabilities via debugfs.
2072 bool "Fault-injection capability for functions"
2075 Provide function-based fault-injection capability.
2082 bool "Fault-injection capability for MMC IO"
2085 Provide fault-injection capability for MMC IO.
2092 bool "Fault-injection capability for SunRPC"
2095 Provide fault-injection capability for SunRPC and
2099 bool "Fault-injection capability forcing skb to reallocate"
2102 Provide fault-injection capability that forces the skb to be
2106 Documentation/fault-injection/fault-injection.rst
2109 bool "Configfs interface for fault-injection capabilities"
2113 This option allows configfs-based drivers to dynamically configure
2114 fault-injection via configfs. Each parameter for driver-specific
2115 fault-injection can be made visible as a configfs attribute in a
2120 bool "stacktrace filter for fault-injection capabilities"
2124 depends on FRAME_POINTER || MIPS || PPC || S390 || MICROBLAZE || ARM || ARC || X86
2126 Provide stacktrace filter for fault-injection capabilities
2136 def_bool $(cc-option,-fsanitize-coverage=trace-pc)
2150 for coverage-guided fuzzing (randomized testing).
2152 For more details, see Documentation/dev-tools/kcov.rst.
2157 depends on $(cc-option,-fsanitize-coverage=trace-cmp)
2180 KCOV uses preallocated per-cpu areas to collect coverage from
2208 the kernel command line (when built-in), or from userspace (when
2209 built-in or modular).
2244 Documentation/fault-injection/provoke-crashes.rst
2254 to the KUnit documentation in Documentation/dev-tools/kunit/.
2280 tristate "Array-based sort test" if !KUNIT_ALL_TESTS
2284 This option enables the self-test function of 'sort()' at boot,
2372 tristate "Red-Black tree test"
2379 tristate "Reed-Solomon library test"
2385 This option enables the self-test function of rslib at boot,
2401 Enable this option to build test module which validates per-cpu
2407 tristate "Perform an atomic64_t self-test"
2419 This is a one-shot self test that permutes through the
2421 N-disk array. Recovery is performed with the asynchronous
2528 no compiler warnings from C=1 sparse checker or -Wextra
2578 tristate "Test firmware loading via userspace interface"
2582 interface for testing firmware loading. This can be used to
2583 control the triggering of firmware loading without needing an
2584 actual firmware-using device. The contents can be rechecked by
2612 to the KUnit documentation in Documentation/dev-tools/kunit/.
2629 to the KUnit documentation in Documentation/dev-tools/kunit/.
2646 to the KUnit documentation in Documentation/dev-tools/kunit/.
2664 to the KUnit documentation in Documentation/dev-tools/kunit/.
2666 This is intended to help people writing architecture-specific
2678 to the KUnit documentation in Documentation/dev-tools/kunit/.
2690 to the KUnit documentation in Documentation/dev-tools/kunit/.
2695 tristate "KUnit Test for Kernel Linked-list structures" if !KUNIT_ALL_TESTS
2699 This builds the linked list KUnit test suite.
2709 to the KUnit documentation in Documentation/dev-tools/kunit/.
2718 This builds the hashtable KUnit test suite.
2722 in Documentation/dev-tools/kunit/.
2734 to the KUnit documentation in Documentation/dev-tools/kunit/.
2746 to the KUnit documentation in Documentation/dev-tools/kunit/.
2758 to the KUnit documentation in Documentation/dev-tools/kunit/.
2770 to the KUnit documentation in Documentation/dev-tools/kunit/.
2781 to the KUnit documentation in Documentation/dev-tools/kunit/.
2792 to the KUnit documentation in Documentation/dev-tools/kunit/.
2804 to the KUnit documentation in Documentation/dev-tools/kunit/.
2817 to the KUnit documentation in Documentation/dev-tools/kunit/.
2826 Test if the kernel is zero-initializing stack variables and
2862 This is intended to help people writing architecture-specific
2869 Include benchmarks in the KUnit test suite for the CRC functions.
2879 This is intended to help people writing architecture-specific
2940 tools/testing/selftests/kmod/kmod.sh --help
3084 virt_to_phys() done against the non-linear part of the
3108 Test if the kernel is zero-initializing heap and page allocations.
3122 Doing so will allow you to run tools/testing/selftest/vm/hmm-tests.
3141 for self-testing floating point control register setting in
3174 This option enables the KUnit test suite for the int_pow function,
3175 which performs integer exponentiation. The test suite is designed to
3190 This option enables the KUnit test suite for the int_sqrt() function,
3191 which performs square root calculation. The test suite checks
3214 memtest=0, mean disabled; -- default
3223 bool "Microsoft Hyper-V driver testing"
3227 Select this option to enable Hyper-V vmbus testing.
3237 Enables rustc's `-Cdebug-assertions` codegen option.
3253 Enables rustc's `-Coverflow-checks` codegen option.
3256 overflow. When overflow-checks are enabled, a Rust panic will occur
3264 bool "Allow unoptimized build-time assertions"
3288 please refer to the KUnit documentation in Documentation/dev-tools/kunit/.