• Home
  • Raw
  • Download

Lines Matching +full:processor +full:- +full:intensive

1 # SPDX-License-Identifier: GPL-2.0-only
19 parameter printk.time=1. See Documentation/admin-guide/kernel-parameters.rst
26 in task context) or a caller "processor id" (if not in task context)
39 int "Default console loglevel (1-15)"
49 Note: This does not affect the log level of un-prefixed printk()
54 int "quiet console loglevel (1-15)"
65 int "Default message log level (1-7)"
71 This was hard-coded to KERN_WARNING since at least 2.6.10 but folks
107 enabled/disabled based on various levels of scope - per source file,
147 nullarbor:~ # echo -n 'file svcsock.c line 1603 +p' >
151 nullarbor:~ # echo -n 'file svcsock.c +p' >
155 nullarbor:~ # echo -n 'module nfsd +p' >
159 nullarbor:~ # echo -n 'func svc_process +p' >
163 nullarbor:~ # echo -n 'func svc_process -p' >
166 See Documentation/admin-guide/dynamic-debug-howto.rst for additional
196 debugging but costs about 70-100K of memory.
200 menu "Compile-time checks and compiler options"
208 This adds debug symbols to the kernel and modules (gcc -g), and
231 depends on $(cc-option,-gz=zlib)
232 depends on $(ld-option,--compress-debug-sections=zlib)
237 Users of dpkg-deb via scripts/package/builddeb may find an increase in
246 depends on $(cc-option,-gsplit-dwarf)
261 depends on $(cc-option,-gdwarf-4)
284 instance. See Documentation/dev-tools/gdb-kernel-debugging.rst
312 bool "Strip assembler-generated symbols during link"
315 Strip internal assembler-generated symbols during a link (symbols
332 This option will install uapi headers (headers exported to user-space)
335 user-space program samples. It is also needed by some features such
352 - Add the option -fno-inline-functions-called-once to gcc commands.
353 When inlining a function annotated with __init in a non-init
360 bool "Make section mismatch errors non-fatal"
397 bool "Compile-time stack metadata validation"
401 Add compile-time checks to validate stack metadata, including frame
409 tools/objtool/Documentation/stack-validation.txt.
417 bool "Force weak per-cpu definitions"
446 keys are documented in <file:Documentation/admin-guide/sysrq.rst>.
456 to a bitmask as described in Documentation/admin-guide/sysrq.rst.
497 debugfs=[on,no-mount,off]. The restrictions apply for API access
516 Access is off. Clients get -PERM when trying to create nodes in
518 Client can then back-off or continue without debugfs access.
567 properly. This can make kmalloc/kfree-intensive workloads
601 int "debug_objects bootup default value (0-1)"
614 memory. This can make kmalloc/kfree-intensive workloads much slower.
627 "slub_debug=-".
640 Try running: slabinfo -DA
659 allocations. See Documentation/dev-tools/kmemleak.rst for more
701 Depending on the cpu, kmemleak scan may be cpu intensive and can
716 task has ever had available in the sysrq-T and sysrq-P debug output.
742 Enable this to turn on extended checks in the virtual-memory system
752 can cause significant overhead, so only enable it in non-production
758 bool "Debug VM red-black trees"
761 Enable VM red-black tree debugging information and extra validations.
766 bool "Debug page-flags operations"
816 on the mminit_loglevel= command-line option.
826 debugfs interface under /sys/kernel/debug/notifier-error-inject/memory
831 Example: Inject memory hotplug offline error (-12 == -ENOMEM)
833 # cd /sys/kernel/debug/notifier-error-inject/memory
834 # echo -12 > actions/MEM_GOING_OFFLINE/error
839 be called memory-notifier-error-inject.
873 These kinds of bugs usually occur when call-chains in the
953 high-availability systems that have uptime guarantees and
1034 to determine when a task has become non-responsive and should
1055 high-availability systems that have uptime guarantees and
1087 Also it could generate series of lockups with cooling-down periods.
1142 if kernel code uses it in a preemption-unsafe way. Also, the kernel
1183 participant CPUs, tasks and irq-contexts would be needed
1196 and rwsems - in which case all dependencies between these
1201 For more details, see Documentation/locking/lockdep-design.rst.
1204 bool "Enable raw_spinlock - spinlock nesting checks"
1250 bool "Spinlock and rw-lock debugging: basic checks"
1274 injecting additional -EDEADLK wound/backoff cases. Together with
1300 memory-freeing routines (kfree(), kmem_cache_free(), free_pages(),
1353 … Try increasing this value if you hit "lockdep bfs error:-1" warning due to __cq_enqueue() failure.
1375 bool "Locking API boot-time self-tests"
1378 Say Y here if you want the kernel to run a short self-test during
1379 bootup. The self-test checks whether common types of locking bugs
1394 Say Y here if you want kernel locking-primitive torture tests
1517 Enable this to turn on extended checks in the linked-list
1526 Enable this to turn on extended checks in the priority-ordered
1527 linked-list (plist) walking routines. This checks the entire
1536 Enable this to turn on checks on scatter-gather tables. This can
1582 bool "Force round-robin CPU selection for unbound work items"
1591 round-robin CPU selection to flush out usages which depend on the
1609 may introduce non-contiguous block device numbers. This
1678 in charge of the OHCI-1394 controllers should be used instead.
1680 See Documentation/core-api/debugging-via-ohci1394.rst for more information.
1712 io-memory regardless of whether a driver is actively using that
1717 userspace access to *idle* io-memory ranges (see /proc/iomem) This
1751 interface /sys/kernel/debug/notifier-error-inject/pm
1756 Example: Inject PM suspend error (-12 = -ENOMEM)
1758 # cd /sys/kernel/debug/notifier-error-inject/pm/
1759 # echo -12 > actions/PM_SUSPEND_PREPARE/error
1764 be called pm-notifier-error-inject.
1775 /sys/kernel/debug/notifier-error-inject/OF-reconfig/
1781 be called of-reconfig-notifier-error-inject.
1791 interface /sys/kernel/debug/notifier-error-inject/netdev
1796 Example: Inject netdevice mtu change error (-22 = -EINVAL)
1798 # cd /sys/kernel/debug/notifier-error-inject/netdev
1799 # echo -22 > actions/NETDEV_CHANGEMTU/error
1804 be called netdev-notifier-error-inject.
1809 bool "Fault-injections of functions"
1819 bool "Fault-injection framework"
1822 Provide fault-injection framework.
1823 For more details, see Documentation/fault-injection/.
1826 bool "Fault-injection capability for kmalloc"
1830 Provide fault-injection capability for kmalloc.
1833 bool "Fault-injection capability for alloc_pages()"
1836 Provide fault-injection capability for alloc_pages().
1842 Provides fault-injection capability to inject failures
1846 bool "Fault-injection capability for disk IO"
1849 Provide fault-injection capability for disk IO.
1852 bool "Fault-injection capability for faking disk interrupts"
1855 Provide fault-injection capability on end IO handling. This
1863 bool "Fault-injection capability for futexes"
1867 Provide fault-injection capability for futexes.
1870 bool "Debugfs entries for fault-injection capabilities"
1873 Enable configuration of fault-injection capabilities via debugfs.
1876 bool "Fault-injection capability for functions"
1879 Provide function-based fault-injection capability.
1886 bool "Fault-injection capability for MMC IO"
1889 Provide fault-injection capability for MMC IO.
1896 bool "stacktrace filter for fault-injection capabilities"
1902 Provide stacktrace filter for fault-injection capabilities
1912 def_bool $(cc-option,-fsanitize-coverage=trace-pc)
1923 for coverage-guided fuzzing (randomized testing).
1929 For more details, see Documentation/dev-tools/kcov.rst.
1934 depends on $(cc-option,-fsanitize-coverage=trace-cmp)
1957 KCOV uses preallocated per-cpu areas to collect coverage from
1978 Documentation/fault-injection/provoke-crashes.rst
2001 tristate "Array-based sort test"
2004 This option enables the self-test function of 'sort()' at boot,
2035 tristate "Red-Black tree test"
2042 tristate "Reed-Solomon library test"
2048 This option enables the self-test function of rslib at boot,
2064 Enable this option to build test module which validates per-cpu
2070 tristate "Perform an atomic64_t self-test"
2082 This is a one-shot self test that permutes through the
2084 N-disk array. Recovery is performed with the asynchronous
2135 This is intended to help people writing architecture-specific
2178 no compiler warnings from C=1 sparse checker or -Wextra
2246 actual firmware-using device. The contents can be rechecked by
2273 to the KUnit documentation in Documentation/dev-tools/kunit/.
2285 to the KUnit documentation in Documentation/dev-tools/kunit/.
2290 tristate "KUnit Test for Kernel Linked-list structures" if !KUNIT_ALL_TESTS
2304 to the KUnit documentation in Documentation/dev-tools/kunit/.
2316 to the KUnit documentation in Documentation/dev-tools/kunit/.
2327 to the KUnit documentation in Documentation/dev-tools/kunit/.
2369 tools/testing/selftests/kmod/kmod.sh --help
2378 virt_to_phys() done against the non-linear part of the
2403 make -C tools/testing/selftests TARGETS=livepatch run_tests
2407 tools/testing/selftests/livepatch/test-callbacks.sh
2408 tools/testing/selftests/livepatch/test-livepatch.sh
2409 tools/testing/selftests/livepatch/test-shadow-vars.sh
2425 Test if the kernel is zero-initializing stack variables and
2435 Test if the kernel is zero-initializing heap and page allocations.
2449 Doing so will allow you to run tools/testing/selftest/vm/hmm-tests.
2468 for self-testing floating point control register setting in
2480 memtest=0, mean disabled; -- default
2489 bool "Microsoft Hyper-V driver testing"
2493 Select this option to enable Hyper-V vmbus testing.