Searched +full:d +full:- +full:tlb +full:- +full:sets (Results 1 – 7 of 7) sorted by relevance
| /Documentation/devicetree/bindings/riscv/ |
| D | cpus.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR MIT) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: RISC-V bindings for 'cpus' DT nodes 10 - Paul Walmsley <paul.walmsley@sifive.com> 11 - Palmer Dabbelt <palmer@sifive.com> 14 This document uses some terminology common to the RISC-V community 18 mandated by the RISC-V ISA: a PC and some registers. This 28 - items: 29 - enum: [all …]
|
| /Documentation/x86/ |
| D | pti.rst | 1 .. SPDX-License-Identifier: GPL-2.0 27 This approach helps to ensure that side-channel attacks leveraging 30 Once enabled at compile-time, it can be disabled at boot with the 31 'nopti' or 'pti=' kernel parameters (see kernel-parameters.txt). 36 When PTI is enabled, the kernel manages two sets of page tables. 43 that any missed kernel->user CR3 switch will immediately crash 49 each CPU's copy of the area a compile-time-fixed virtual address. 65 Protection against side-channel attacks is important. But, 70 a. Each process now needs an order-1 PGD instead of order-0. 86 non-PTI SYSCALL entry code, so requires mapping fewer [all …]
|
| /Documentation/networking/ |
| D | bonding.txt | 7 Corrections, HA extensions : 2000/10/03-15 : 8 - Willy Tarreau <willy at meta-x.org> 9 - Constantine Gavrilov <const-g at xpert.com> 10 - Chad N. Tindel <ctindel at ieee dot org> 11 - Janice Girouard <girouard at us dot ibm dot com> 12 - Jay Vosburgh <fubar at us dot ibm dot com> 16 - Mitch Williams <mitch.a.williams at intel.com> 29 the original tools from extreme-linux and beowulf sites will not work 114 ----------------------------------------------- 130 ------------------------------------- [all …]
|
| /Documentation/admin-guide/ |
| D | sysrq.rst | 22 - 0 - disable sysrq completely 23 - 1 - enable all functions of sysrq 24 - >1 - bitmask of allowed sysrq functions (see below for detailed function 27 2 = 0x2 - enable control of console logging level 28 4 = 0x4 - enable control of keyboard (SAK, unraw) 29 8 = 0x8 - enable debugging dumps of processes etc. 30 16 = 0x10 - enable sync command 31 32 = 0x20 - enable remount read-only 32 64 = 0x40 - enable signalling of processes (term, kill, oom-kill) 33 128 = 0x80 - allow reboot/poweroff [all …]
|
| D | kernel-parameters.txt | 5 force -- enable ACPI if default was off 6 on -- enable ACPI but allow fallback to DT [arm64] 7 off -- disable ACPI if default was on 8 noirq -- do not use ACPI for IRQ routing 9 strict -- Be less tolerant of platforms that are not 11 rsdt -- prefer RSDT over (default) XSDT 12 copy_dsdt -- copy DSDT to memory 56 Documentation/firmware-guide/acpi/debug.rst for more information about 119 Disable auto-serialization of AML methods 122 auto-serialization feature. [all …]
|
| /Documentation/ |
| D | DMA-API-HOWTO.txt | 10 with example pseudo-code. For a concise description of the API, see 11 DMA-API.txt. 23 The virtual memory system (TLB, page tables, etc.) translates virtual 39 supports 64-bit addresses for main memory and PCI BARs, it may use an IOMMU 40 so devices only need to use 32-bit DMA addresses. 49 +-------+ +------+ +------+ 52 C +-------+ --------> B +------+ ----------> +------+ A 54 +-----+ | | | | bridge | | +--------+ 55 | | | | +------+ | | | | 58 +-----+ +-------+ +------+ +------+ +--------+ [all …]
|
| /Documentation/RCU/ |
| D | RTFP.txt | 4 This document describes RCU-related publications, and is followed by 19 with short-lived threads, such as the K42 research operating system. 20 However, Linux has long-lived tasks, so more is needed. 23 serialization, which is an RCU-like mechanism that relies on the presence 27 that these overheads were not so expensive in the mid-80s. Nonetheless, 28 passive serialization appears to be the first deferred-destruction 30 has lapsed, so this approach may be used in non-GPL software, if desired. 34 In 1987, Rashid et al. described lazy TLB-flush [RichardRashid87a]. 36 this paper helped inspire the update-side batching used in the later 38 a description of Argus that noted that use of out-of-date values can [all …]
|