Lines Matching refs:be
8 messages to be added to the output of the syslog() system
13 be included, not that the timestamp is recorded.
45 what it believes to be lockup conditions.
55 otherwise be available at runtime. These messages can then be
62 pr_debug() calls in it are enabled by default, but can be
70 filesystem must first be mounted before making use of this feature.
72 file contains a list of the debug statements that can be enabled. The
140 be happy. But if you merely need debugging information to
176 scripts will be automatically imported by gdb as well, and
231 that reason most of these unused exports will soon be removed. This
262 debugging files into. Enable this option to be able to read and
341 If you say Y here the resulting kernel image will be slightly
349 s390 and alpha require percpu variables in modules to be
354 1. percpu symbols must be unique whether static or not
355 2. percpu variables can't be defined inside a function
358 option forces all percpu variables to be defined as weak.
368 will be able to flush the buffer cache to disk, reboot the system
382 This may be set to 1 or 0 to enable or disable them all, or
399 If you say Y here, additional code will be inserted into the
422 If you say Y here, additional code will be inserted into the
430 If you say Y here, additional code will be inserted into the
444 If you say Y here, additional code will be inserted into the
477 possible with slub_debug=xxx. SLUB debugging may be switched
487 order find ways to optimize the allocator. This should never be
517 In order to access the kmemleak file, debugfs needs to be
527 reporting false positives. Since memory may be allocated or
544 Say Y here to disable kmemleak by default. It can then be enabled
597 regions to be regularly checked for invalid topology.
606 information will be printed at KERN_DEBUG loglevel depending
619 If the notifier call chain should be failed with some events
630 be called memory-notifier-error-inject.
694 If RANDOMIZE_BASE is enabled, PC values will not be stable across
706 Drivers ought to be able to handle interrupts coming in at those
707 points; some don't and need to be caught.
728 The overhead should be minimal. A periodic hrtimer runs to
732 hrtimer interrupt on one cpu will be used to check for hardlockups
736 thresholds can be controlled through the sysctl watchdog_thresh.
779 The panic can be used in combination with panic_timeout,
783 where a lockup must be resolved ASAP.
800 which are bugs that cause the task to be stuck in
806 enabled then all held locks will also be reported. This
816 be considered hung.
818 It can be adjusted at runtime via the kernel.hung_task_timeout_secs
823 Keeping the default should be fine in most cases.
833 The panic can be used in combination with panic_timeout,
837 where a hung tasks must be resolved ASAP.
883 If you say Y here, the /proc/sched_debug file will be provided
895 runqueue is throttled. This may be useful for detecting
905 If you say Y here, additional code will be inserted into the
908 stats may be useful for both tuning and debugging the scheduler
919 If the stack end location is found to be over written always panic as
920 the content of the corrupted region can no longer be trusted.
929 which may be helpful when diagnosing issues where timekeeping
942 If you say Y here, additional code will be inserted into the
944 reprogrammed. The statistics can be read from /proc/timer_stats.
949 (it defaults to deactivated on bootup and will only be activated
969 deadlocks (lockups) to be detected and reported automatically.
985 This feature allows mutex semantics violations to be detected and
1001 it really should not be enabled in a production or distro kernel,
1041 deadlock scenario would be to trigger: how many
1042 participant CPUs, tasks and irq-contexts would be needed
1046 is), it will be proven so and will immediately be
1054 NOTE: this feature can also be enabled for rwlocks, mutexes
1116 lock debugging then those bugs wont be detected of course.)
1127 on kernel locking primitives. The kernel module may be built
1128 after the fact on the running kernel to be tested, if desired.
1131 to be built into the kernel.
1156 If you say Y here, some extra kobject debugging messages will be sent
1167 example of this would be a struct device which has just been
1171 the memory backing the kobject can be immediately freed. This
1240 security pointer in the cred struct is never seen to be invalid.
1256 disabling, allowing multiple RCU-lockdep warnings to be printed
1269 to flag any non-RCU used of annotated pointers. This can be
1291 on the RCU infrastructure. The kernel module may be built
1292 after the fact on the running kernel to be tested, if desired.
1294 Say Y here if you want RCU torture tests to be built into
1440 option forces most block device numbers to be allocated from
1468 This option provides a kernel module that can be used to test
1473 If the notifier call chain should be failed with some events
1484 be called cpu-notifier-error-inject.
1497 If the notifier call chain should be failed with some events
1508 be called pm-notifier-error-inject.
1521 If the notifier call chain should be failed with some events
1525 be called of-reconfig-notifier-error-inject.
1646 Choose M here to compile this code as a module. The module will be
1649 Documentation on how to use the module can be found in
1678 This option provides a kernel module that can be used to test
1784 devices, be sure to have the cable plugged and FireWire enabled on
1788 in charge of the OHCI-1394 controllers should be used instead.
1806 With this option you will be able to detect common bugs in device
1826 on printk when loaded. It is designed to be used for basic
1829 and will not normally be loaded by the system unless explicitly
1867 interface for testing firmware loading. This can be used to
1869 actual firmware-using device. The contents can be rechecked by
1888 to be set.