Home
last modified time | relevance | path

Searched full:might (Results 1 – 25 of 6337) sorted by relevance

12345678910>>...254

/kernel/linux/linux-6.6/Documentation/admin-guide/
Dreporting-issues.rst21 In all other cases try your best guess which kernel part might be causing the
55 developers. It might be all that's needed for people already familiar with
89 kernel modules on-the-fly, which solutions like DKMS might be doing locally
93 that made the kernel set this flag might be causing the issue you face.
111 thoroughly for reports that might match your issue. If you find anything,
119 situations; during the merge window that actually might be even the best
149 link to it. Include or upload all other information that might be relevant,
188 the issue might have already been fixed there. If you first noticed the
212 might not get the issue solved in older releases: the fix might be too big
219 the issue in mainline, as its commit message might tell you if the fix is
[all …]
Dquickly-build-trimmed-linux.rst18 which might be relevant for you.]*
32 # Hint: at this point you might want to adjust the build configuration; you'll
47 # Reminder: you might want to add or modify a build tag at this point.
73 that might occur at a particular point -- and how to then get things rolling
78 might want to switch to a rendered version, as it makes it a lot easier to
224 aspect in mind when using a kernel built with this make target, as it might
231 * Check if you might want to or have to adjust some kernel configuration
235 might need to decode a stack trace found for example in a 'panic', 'Oops',
296 version you care about, as git otherwise might retrieve the entire commit
307 At this point you might want to patch the sources again or set/modify a build
[all …]
/kernel/linux/linux-6.6/Documentation/livepatch/
Dcumulative-patches.rst5 There might be dependencies between livepatches. If multiple patches need
10 This might become a maintenance nightmare. Especially when more patches
36 As a result, the livepatch authors might maintain sources only for one
42 actually in use. Also the livepatch might then be seen as a "normal"
83 As a result, it might be dangerous to replace newer cumulative patches by
84 older ones. The old livepatches might not provide the necessary callbacks.
86 This might be seen as a limitation in some scenarios. But it makes life
101 A good practice might be to remove shadow variables in the post-unpatch
Dsystem-state.rst13 The problems might come with shadow variables and callbacks. They might
31 The state of the system might get modified either by several livepatch callbacks
99 It might be the original system state or the state modification
113 - Allocate *state->data* when necessary. The allocation might fail
125 - Clean up its own mess in case of error. It might be done by a custom
154 state. It might mean doing nothing.
166 It might be called also during the transition reverse. Therefore it
/kernel/linux/linux-5.10/Documentation/livepatch/
Dcumulative-patches.rst5 There might be dependencies between livepatches. If multiple patches need
10 This might become a maintenance nightmare. Especially when more patches
36 As a result, the livepatch authors might maintain sources only for one
42 actually in use. Also the livepatch might then be seen as a "normal"
83 As a result, it might be dangerous to replace newer cumulative patches by
84 older ones. The old livepatches might not provide the necessary callbacks.
86 This might be seen as a limitation in some scenarios. But it makes life
101 A good practice might be to remove shadow variables in the post-unpatch
Dsystem-state.rst13 The problems might come with shadow variables and callbacks. They might
31 The state of the system might get modified either by several livepatch callbacks
99 It might be the original system state or the state modification
113 - Allocate *state->data* when necessary. The allocation might fail
125 - Clean up its own mess in case of error. It might be done by a custom
154 state. It might mean doing nothing.
166 It might be called also during the transition reverse. Therefore it
/kernel/linux/linux-6.6/net/netfilter/
Dnf_conntrack_proto_dccp.c103 * We are the man in the middle. All the packets go through us but might
139 * sPO -> sIG Ignore, conntrack might be out of sync
140 * sOP -> sIG Ignore, conntrack might be out of sync
141 * sCR -> sIG Ignore, conntrack might be out of sync
142 * sCG -> sIG Ignore, conntrack might be out of sync
151 * sRQ -> sIG Ignore, might be response to ignored Request
152 * sRS -> sIG Ignore, might be response to ignored Request
153 * sPO -> sIG Ignore, might be response to ignored Request
154 * sOP -> sIG Ignore, might be response to ignored Request
155 * sCR -> sIG Ignore, might be response to ignored Request
[all …]
/kernel/linux/linux-5.10/net/netfilter/
Dnf_conntrack_proto_dccp.c101 * We are the man in the middle. All the packets go through us but might
137 * sPO -> sIG Ignore, conntrack might be out of sync
138 * sOP -> sIG Ignore, conntrack might be out of sync
139 * sCR -> sIG Ignore, conntrack might be out of sync
140 * sCG -> sIG Ignore, conntrack might be out of sync
149 * sRQ -> sIG Ignore, might be response to ignored Request
150 * sRS -> sIG Ignore, might be response to ignored Request
151 * sPO -> sIG Ignore, might be response to ignored Request
152 * sOP -> sIG Ignore, might be response to ignored Request
153 * sCR -> sIG Ignore, might be response to ignored Request
[all …]
/kernel/linux/linux-5.10/Documentation/RCU/
Drcu_dereference.rst106 can now be speculated, such that it might happen before the
182 might provide, especially if you are making use of feedback-based
243 You might be surprised that the outcome (r1 == 143 && r2 == 44) is possible,
244 but you should not be. After all, the updater might have been invoked
310 first pointer might be. This lack of knowledge prevents the compiler
311 from carrying out optimizations that otherwise might destroy the ordering
315 But without rcu_dereference(), the compiler knows more than you might
377 2. If the access might be within an RCU read-side critical section
385 3. If the access might be within an RCU read-side critical section
404 is appropriate. In addition, rcu_dereference_raw() might be
[all …]
Drcubarrier.rst19 such readers might hold a reference to them. RCU updates can therefore be
23 given that readers might well leave absolutely no trace of their
26 element p from a linked list might do the following, while holding an
38 context might then be as follows::
44 IRQ context. The function p_callback() might be defined as follows::
68 One might be tempted to try several back-to-back synchronize_rcu()
70 heavy RCU-callback load, then some of the callbacks might be deferred
187 Is there any other situation where rcu_barrier() might
192 Your module might have additional complications. For example, if your
302 Is there any other situation where rcu_barrier() might
/kernel/linux/linux-5.10/Documentation/ABI/stable/
Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
73 Might return "0" in case of special security settings
105 Might return "<denied>" in case of special security settings
/kernel/linux/linux-6.6/Documentation/driver-api/soundwire/
Derror_handling.rst21 and after a number of such errors are detected the bus might be reset. Note
38 backtracking and restarting the entire programming sequence might be a
39 solution. Alternatively some implementations might directly issue a bus
58 hard-reset might be the best solution.
62 that the Slave might behave in implementation-defined ways. The bus
/kernel/linux/linux-5.10/Documentation/driver-api/soundwire/
Derror_handling.rst21 and after a number of such errors are detected the bus might be reset. Note
38 backtracking and restarting the entire programming sequence might be a
39 solution. Alternatively some implementations might directly issue a bus
58 hard-reset might be the best solution.
62 that the Slave might behave in implementation-defined ways. The bus
/kernel/linux/linux-6.6/Documentation/RCU/
Drcu_dereference.rst113 can now be speculated, such that it might happen before the
195 might provide, especially if you are making use of feedback-based
260 You might be surprised that the outcome (r1 == 143 && r2 == 44) is possible,
261 but you should not be. After all, the updater might have been invoked
333 first pointer might be. This lack of knowledge prevents the compiler
334 from carrying out optimizations that otherwise might destroy the ordering
338 But without rcu_dereference(), the compiler knows more than you might
400 2. If the access might be within an RCU read-side critical section
408 3. If the access might be within an RCU read-side critical section
427 is appropriate. In addition, rcu_dereference_raw() might be
[all …]
/kernel/linux/linux-6.6/Documentation/power/
Denergy-model.rst17 Alternatively, userspace might be best positioned. And so on. In order to avoid
23 The power values might be expressed in micro-Watts or in an 'abstract scale'.
24 Multiple subsystems might use the EM and it is up to the system integrator to
28 powercap power values expressed in an 'abstract scale' might cause issues.
30 thus the real micro-Watts might be needed. An example of these requirements can
33 Kernel subsystems might implement automatic detection to check whether EM
110 subsystems which use EM might rely on this flag to check if all EM devices use
111 the same scale. If there are different scales, these subsystems might decide
123 (static + dynamic). These power values might be coming directly from
155 The EM which is registered using this method might not reflect correctly the
/kernel/linux/linux-6.6/Documentation/ABI/stable/
Dsysfs-hypervisor-xen7 Might return "<denied>" in case of special security settings
16 Might return "<denied>" in case of special security settings
25 Might return "<denied>" in case of special security settings
56 Might return "<denied>" in case of special security settings
73 Might return "0" in case of special security settings
105 Might return "<denied>" in case of special security settings
/kernel/linux/linux-5.10/drivers/media/test-drivers/vidtv/
Dvidtv_pes.h87 * @n_pes_h_s_bytes: Padding bytes. Might be used by an encoder if needed, gets
89 * @access_unit_len: The size of _one_ access unit (with any headers it might need)
104 /* might be used by an encoder if needed, gets discarded by decoder */
117 * @n_stuffing_bytes: Padding bytes. Might be used by an encoder if needed, gets
136 * @access_unit_len: The size of _one_ access unit (with any headers it might need)
148 * @n_pes_h_s_bytes: Padding bytes. Might be used by an encoder if needed, gets
/kernel/linux/linux-6.6/Documentation/core-api/
Dprintk-index.rst21 is not always trivial. Various changes might be backported. Various kernel
22 versions might be used on different monitored systems.
24 This is where the printk index feature might become useful. It provides
44 might appear in "vmlinux" when the module is built-in.
68 between various kernels. Especially the line number might change
118 interface might then show the printk formats including these prefixes.
/kernel/linux/linux-6.6/drivers/media/test-drivers/vidtv/
Dvidtv_pes.h87 * @n_pes_h_s_bytes: Padding bytes. Might be used by an encoder if needed, gets
89 * @access_unit_len: The size of _one_ access unit (with any headers it might need)
104 /* might be used by an encoder if needed, gets discarded by decoder */
117 * @n_stuffing_bytes: Padding bytes. Might be used by an encoder if needed, gets
136 * @access_unit_len: The size of _one_ access unit (with any headers it might need)
148 * @n_pes_h_s_bytes: Padding bytes. Might be used by an encoder if needed, gets
/kernel/linux/linux-6.6/Documentation/dev-tools/kunit/
Dfaq.rst34 (``tools/testing/kunit/kunit.py``) that might not support some architectures
37 In short, yes, you can run KUnit on other architectures, but it might require
55 usually just two or three. For example, someone might write an integration
62 code under test. For example, someone might write an end-to-end test for the
74 parameter. This might show details or error messages hidden by the kunit_tool
90 It also preserves any config changes you might make, so you can
/kernel/linux/linux-6.6/tools/testing/selftests/mm/
Dmkdirty.c3 * Test handling of code that might set PTE/PMD dirty in read-only VMAs.
107 * Unshare the page (populating a fresh anon page that might be set in test_ptrace_write()
178 /* Trigger page migration. Might not be available or fail. */ in test_page_migration()
202 * Write to the first page, which might populate a fresh anon THP in test_page_migration_thp()
217 /* Trigger page migration. Might not be available or fail. */ in test_page_migration_thp()
241 * Write to the first page, which might populate a fresh anon THP in test_pte_mapped_thp()
308 /* Place a page in a read-only VMA, which might set the PTE dirty. */ in test_uffdio_copy()
366 /* PTE-mapping a THP might propagate the dirty PMD bit to the PTEs. */ in main()
/kernel/linux/linux-6.6/Documentation/process/
Dvolatile-considered-harmful.rst36 change unexpectedly while the_lock is held. Any other code which might
40 compiler might think it knows what will be in shared_data, but the
61 Another situation where one might be tempted to use volatile is
76 - The above-mentioned accessor functions might use volatile on
92 - Pointers to data structures in coherent memory which might be modified
/kernel/linux/linux-5.10/Documentation/process/
Dvolatile-considered-harmful.rst36 change unexpectedly while the_lock is held. Any other code which might
40 compiler might think it knows what will be in shared_data, but the
61 Another situation where one might be tempted to use volatile is
76 - The above-mentioned accessor functions might use volatile on
92 - Pointers to data structures in coherent memory which might be modified
/kernel/linux/linux-6.6/Documentation/userspace-api/media/rc/
Dlirc-set-wideband-receiver.rst39 This might be useful of receivers that have otherwise narrow band receiver
40 that prevents them to be used with some remotes. Wide band receiver might
46 Wide band receiver might be implicitly enabled if you enable
/kernel/linux/linux-5.10/Documentation/userspace-api/media/rc/
Dlirc-set-wideband-receiver.rst39 This might be useful of receivers that have otherwise narrow band receiver
40 that prevents them to be used with some remotes. Wide band receiver might
46 Wide band receiver might be implictly enabled if you enable

12345678910>>...254