Searched full:is (Results 1 – 25 of 4276) sorted by relevance
12345678910>>...172
| /Documentation/admin-guide/ |
| D | kernel-parameters.rst | 6 The following is a consolidated list of the kernel parameters as 16 Everything after "``--``" is passed as an argument to init. 46 nohz_full, irqaffinity, rcu_nocbs. The format of this list is: 81 enabled and if respective hardware is present. The text in square brackets at 83 parameter is applicable:: 85 ACPI ACPI support is enabled. 86 AGP AGP (Accelerated Graphics Port) is enabled. 87 ALSA ALSA sound support is enabled. 88 APIC APIC support is enabled. 89 APM Advanced Power Management support is enabled. [all …]
|
| /Documentation/core-api/ |
| D | debug-objects.rst | 10 debugobjects is a generic infrastructure to track the life time of 13 debugobjects is useful to check for the following error patterns: 21 debugobjects is not changing the data structure of the real object so it 56 Each detected error is reported in the statistics and a limited number 70 This function is called whenever the initialization function of a real 71 object is called. 73 When the real object is already tracked by debugobjects it is checked, 74 whether the object can be initialized. Initializing is not allowed for 82 When the real object is not yet tracked by debugobjects, debugobjects 84 object state to ODEBUG_STATE_INIT. It verifies that the object is not [all …]
|
| /Documentation/networking/ |
| D | ipvs-sysctl.txt | 6 It sets the always mode drop rate, which is used in the mode 3 12 It sets the available memory threshold (in pages), which is 13 used in the automatic modes of defense. When there is no 15 enabled and the variable is automatically set to 2, otherwise 16 the strategy is disabled and the variable is set to 1. 22 If set, disable the director function while the server is 29 port reuse. It is a bitmap, with the values being: 36 bit 1: enable rescheduling of new connections when it is safe. 37 That is, whenever expire_nodest_conn and for TCP sockets, when 38 the connection is in TIME_WAIT state (which is only possible if [all …]
|
| D | strparser.txt | 6 The stream parser (strparser) is a utility that parses messages of an 16 In receive callback mode, the strparser is called from the data_ready 21 outside source. Message are parsed and delivered as the sequence is 30 callbacks include a parse_msg function that is called to perform 32 that is called when a full message has been completed. 40 Called to initialize a stream parser. strp is a struct of type 41 strparser that is allocated by the upper layer. sk is the TCP 43 callback mode; in general mode this is set to NULL. Callbacks 48 Temporarily pause a stream parser. Message parsing is suspended 57 strp_stop is called to completely stop stream parser operations. [all …]
|
| D | altera_tse.txt | 5 This is the driver for the Altera Triple-Speed Ethernet (TSE) controllers 15 to test this driver may be found there as well. Support is also available from 21 this driver was tested against. The sopc2dts tool is used to create the 25 Triple-Speed Ethernet instance is using an SGDMA or MSGDMA component. The 30 The SGDMA component is to be deprecated in the near future (over the next 1-2 32 SGDMA support is included for existing designs and reference in case a 40 Scatter-gather DMA is not supported by the SGDMA or MSGDMA at this time. 50 The kernel configuration option is ALTERA_TSE: 56 dma_rx_num: Number of descriptors in the RX list (default is 64); 57 dma_tx_num: Number of descriptors in the TX list (default is 64). [all …]
|
| D | xfrm_proc.txt | 9 The xfrm_proc code is a set of statistics showing numbers of packets 18 All errors which is not matched others 20 No buffer is left 24 No state is found 25 i.e. Either inbound SPI, address, or IPsec protocol at SA is wrong 28 e.g. SA key is wrong 33 i.e. Sequence number is out of window 35 State is expired 38 e.g. UDP encapsulation type is mismatch 40 State is invalid [all …]
|
| /Documentation/scsi/ |
| D | st.txt | 2 The driver is currently maintained by Kai Mäkisara (email 10 The driver is generic, i.e., it does not contain any code tailored 15 directly with ioctls. This is administratively a very simple and 23 new tape is loaded into the drive or if writing begins at the 24 beginning of the tape. The second method is applicable if the tape 26 QIC-drives). The result is that any tape can be read, writing can be 27 continued using existing format, and the default format is used if 28 the tape is rewritten from the beginning (or a new tape is written 29 for the first time). The first method is applicable if the drive 30 does not perform auto-detection well enough and there is a single [all …]
|
| D | scsi_eh.txt | 32 Each SCSI command is represented with struct scsi_cmnd (== scmd). A 34 scmd->list and scmd->eh_entry. The former is used for free list or 36 discussion. The latter is used for completion and EH lists and unless 50 For all non-EH commands, scsi_done() is the completion callback. It 60 scsi_finish_command() is invoked for the command. The 70 scmd is requeued to blk queue. 73 scsi_eh_scmd_add(scmd) is invoked for the command. See 79 The timeout handler is scsi_times_out(). When a timeout occurs, this 86 This indicates that more time is required to finish the 87 command. Timer is restarted. This action is counted as a [all …]
|
| /Documentation/driver-api/driver-model/ |
| D | binding.rst | 5 Driver binding is the process of associating a device with a device 16 type in the system. When device_register is called for a device, it is 18 list of all drivers of that bus type. When driver_register is called 19 for a driver, it is inserted at the end of this list. These are the 26 When a new device is added, the bus's list of drivers is iterated over 29 supports. The format and semantics for comparing IDs is bus-specific. 31 algorithm, it is up to the bus driver to provide a callback to compare 37 If a match is found, the device's driver field is set to the driver 38 and the driver's probe callback is called. This gives the driver a 45 Upon the successful completion of probe, the device is registered with [all …]
|
| /Documentation/virt/kvm/ |
| D | locking.txt | 9 - kvm->lock is taken outside vcpu->mutex 11 - kvm->lock is taken outside kvm->slots_lock and kvm->irq_lock 13 - kvm->slots_lock is taken outside kvm->irq_lock, though acquiring 14 them together is quite rare. 16 On x86, vcpu->mutex is taken outside kvm->arch.hyperv.hv_lock. 18 Everything else is a leaf: no other lock is taken inside the critical 26 Fast page fault is the fast path which fixes the guest page fault out of 30 1. Access Tracking: The SPTE is not present, but it is marked for access 31 tracking i.e. the SPTE_SPECIAL_MASK is set. That means we need to 32 restore the saved R/X bits. This is described in more detail later below. [all …]
|
| /Documentation/driver-api/md/ |
| D | raid5-ppl.rst | 5 Partial Parity Log (PPL) is a feature available for RAID5 arrays. The issue 6 addressed by PPL is that after a dirty shutdown, parity of a particular stripe 7 may become inconsistent with data on other member disks. If the array is also 8 in degraded state, there is no way to recalculate parity, because one of the 9 disks is missing. This can lead to silent data corruption when rebuilding the 10 array or using it is as degraded - data calculated from parity for array blocks 12 be incorrect. Such condition is known as the RAID5 Write Hole. Because of 15 Partial parity for a write operation is the XOR of stripe data chunks not 16 modified by this write. It is just enough data needed for recovering from the 20 this stripe is missing, this updated parity can be used to recover its [all …]
|
| /Documentation/devicetree/bindings/devfreq/ |
| D | rk3399_dmc.txt | 20 a DCF interrupt is triggered. 32 placed into power-down mode if bus is idle 37 placed into self-refresh mode if bus is idle 39 clocks freq is half of DRAM clock), default 40 value is "0". 45 clock arg gating started if bus is idle for 50 self-refresh power down mode if bus is idle 52 This parameter is for LPDDR4 only. 57 be gated if bus is idle for standby_idle * DFI 61 When DDR frequency is less than DRAM_DLL_DISB_FREQ, [all …]
|
| /Documentation/vm/ |
| D | hugetlbfs_reserv.rst | 13 to be used. If no huge page exists at page fault time, the task is sent 16 of huge pages at mmap() time. The idea is that if there were not enough 23 describe how huge page reserve processing is done in the v4.10 kernel. 28 This description is primarily targeted at kernel developers who are modifying 36 This is a global (per-hstate) count of reserved huge pages. Reserved 38 Therefore, the number of huge pages generally available is computed 41 A reserve map is described by the structure:: 52 There is one reserve map for each huge page mapping in the system. 54 the mapping. A region is described as:: 70 Indicates this task is the owner of the reservations [all …]
|
| /Documentation/x86/ |
| D | mds.rst | 9 Microarchitectural Data Sampling (MDS) is a family of side channel attacks 21 buffers are partitioned between Hyper-Threads so cross thread forwarding is 23 buffer is repartitioned which can expose data from one thread to the other. 26 L1 miss situations and to hold data which is returned or sent in response 28 operation and also write data to the cache. When the fill buffer is 32 Hyper-Threads so cross thread leakage is possible. 35 from memory or I/O. The received data is then forwarded to the register 40 thread leakage is possible. 42 MDSUM is a special case of MSBDS, MFBDS and MLPDS. An uncacheable load from 50 It is assumed that attack code resides in user space or in a guest with one [all …]
|
| /Documentation/locking/ |
| D | rt-mutex-design.rst | 13 that happen without this code, but that is in the concept to understand 14 what the code actually is doing. 16 The goal of this document is to help others understand the priority 17 inheritance (PI) algorithm that is used, as well as reasons for the 24 Priority inversion is when a lower priority process executes while a higher 28 the high priority process must wait until the lower priority process is done 29 with the resource. This is a priority inversion. What we want to prevent 30 is something called unbounded priority inversion. That is when the high 31 priority process is prevented from running by a lower priority process for 34 The classic example of unbounded priority inversion is where you have three [all …]
|
| /Documentation/media/uapi/cec/ |
| D | cec-ioc-receive.rst | 1 .. Permission is granted to copy, distribute and/or modify this 5 .. and no Back-Cover Texts. A copy of the license is included at 47 If the file descriptor is in non-blocking mode and there are no received 49 error code. If the file descriptor is in blocking mode and ``timeout`` 50 is non-zero and no message arrived within ``timeout`` milliseconds, then 62 The :ref:`ioctl CEC_TRANSMIT <CEC_TRANSMIT>` is only available if 63 ``CEC_CAP_TRANSMIT`` is set. If there is no more room in the transmit 67 to core messages (see :ref:`cec-core-processing`), so it is not a good 70 If the file descriptor is in non-blocking mode then the transmit will 75 The ``sequence`` field is filled in for every transmit and this can be [all …]
|
| D | cec-ioc-g-mode.rst | 1 .. Permission is granted to copy, distribute and/or modify this 5 .. and no Back-Cover Texts. A copy of the license is included at 45 depending on the chosen mode. The initiator is the filehandle that is 47 follower is the filehandle that receives messages sent to the CEC 51 When a CEC message is received, then the CEC framework will decide how 52 it will be processed. If the message is a reply to an earlier 53 transmitted message, then the reply is sent back to the filehandle that 54 is waiting for it. In addition the CEC framework will process it. 56 If the message is not a reply, then the CEC framework will process it 57 first. If there is no follower, then the message is just discarded and a [all …]
|
| /Documentation/filesystems/ |
| D | sharedsubtree.txt | 42 Here is an example: 44 Let's say /mnt has a mount that is shared. 48 so the sample 'smount' program is no longer needed and has been 72 And the same is true even when /dev/sd0 is mounted on /mnt/a. The 76 2b) A slave mount is like a shared mount except that mount and umount events 79 All slave mounts have a master mount which is a shared. 81 Here is an example: 83 Let's say /mnt has a mount which is shared. 89 the new mount at /tmp becomes a shared mount and it is a replica of 121 This is the mount we are familiar with. Its the default type. [all …]
|
| D | autofs.txt | 11 The goal of autofs is to provide on-demand mounting and race free 15 1. There is no need to delay boot until all filesystems that 18 continue freely. This is particularly important for 33 The "autofs" filesystem module is only one part of an autofs system. 41 "autofs" is a Linux kernel module with provides the "autofs" 55 directory should be a mount trap or not is quite _ad hoc_, largely for 56 historical reasons, and is determined in part by the 60 mount is considered to be *indirect*), then the root directory is 61 always a regular directory, otherwise it is a mount trap when it is 63 *offset* are treated identically so a concise summary is that the root [all …]
|
| D | path-lookup.rst | 5 This write-up is based on three articles published at lwn.net: 21 exploration is needed to discover, is that it is complex. There are 25 tool that we will make extensive use of is "divide and conquer". For 50 It is tempting to describe the second kind as starting with a 52 slashes and components, it can be empty, in other words. This is 54 in Linux permit it when the ``AT_EMPTY_PATH`` flag is given. For 60 everything else. The "everything else" is the easy bit. In all cases 64 The final component is not so simple. Not only do different system 67 pathname that is just slashes have a final component. If it does 84 directory entry that is to be created for a directory immediately [all …]
|
| /Documentation/ABI/testing/ |
| D | sysfs-devices-power | 14 space to check if the device is enabled to wake up the system 32 events this file is not present. In that case the device cannot 48 The default for all devices is "auto", which means that they may 52 the device is suspended causes it to be woken up. 73 It generally is unsafe to permit the asynchronous suspend/resume 74 of a device unless it is certain that all of the PM dependencies 76 devices this attribute is set to "enabled" by bus type code or 86 attribute is read-only. If the device is not capable to wake up 87 the system from sleep states, this attribute is not present. 88 If the device is not enabled to wake up the system from sleep [all …]
|
| /Documentation/driver-api/nvdimm/ |
| D | security.rst | 17 The "security" sysfs attribute is provided in the nvdimm sysfs directory. For 23 frozen, and overwrite. If security is not supported, the sysfs attribute 26 The "store" attribute takes several commands when it is being written to 39 The key is associated to the payload by the DIMM id. For example: 46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA 47 security specification [2]. A key is initially acquired via the request_key() 48 kernel API call during nvdimm unlock. It is up to the user to make sure that 55 encrypted-keys of enc32 format. TPM usage with a master trusted key is 61 retrieve the key from the kernel user keyring. This is the only time 66 the passphrase for the respective nvdimms. It is also recommended that the [all …]
|
| /Documentation/networking/device_drivers/toshiba/ |
| D | spider_net.txt | 12 device driver in the Linux kernel tree. The spidernet is a gigabit 18 The receive (RX) ring is a circular linked list of RX descriptors, 27 "full" and "not-in-use". An "empty" or "ready" descriptor is ready 29 and is waiting to be emptied and processed by the OS. A "not-in-use" 30 descriptor is neither empty or full; it is simply not ready. It may 31 not even have a data buffer in it, or is otherwise unusable. 36 ring is handed off to the hardware, which sequentially fills in the 40 This filling and emptying is managed by three pointers, the "head" 43 currently being filled. When this descr is filled, the hardware 44 marks it full, and advances the GDACTDPA by one. Thus, when there is [all …]
|
| /Documentation/devicetree/bindings/media/ |
| D | cec-gpio.txt | 4 is hooked up to a pull-up GPIO line and - optionally - the HPD line is 7 Please note: the maximum voltage for the CEC line is 3.63V, for the HPD and 8 5V lines it is 5.3V. So you may need some sort of level conversion circuitry 13 - cec-gpios: gpio that the CEC line is connected to. The line should be 16 If the CEC line is associated with an HDMI receiver/transmitter, then the 17 following property is also required: 21 If the CEC line is not associated with an HDMI receiver/transmitter, then 22 the following property is optional and can be used for debugging HPD changes: 24 - hpd-gpios: gpio that the HPD line is connected to. 26 This property is optional and can be used for debugging changes on the 5V line: [all …]
|
| /Documentation/infiniband/ |
| D | tag_matching.rst | 16 and the earliest posted-receive is the pair that must be used to satisfy the 21 When a message is sent from the sender to the receiver, the communication 23 corresponding matching receive is posted. If a matching receive is posted, 24 this is an expected message, otherwise it is called an unexpected message. 31 1. The Eager protocol- the complete message is sent when the send is 32 processed by the sender. A completion send is received in the send_cq 37 corresponding buffer is posted, the responder will use the information from 50 When send is initiated and arrives at the receive side, if there is no 51 pre-posted receive for this arriving message, it is passed to the software and 52 placed in the unexpected message list. Otherwise the match is processed, [all …]
|
12345678910>>...172