/kernel/module/ |
D | Kconfig | 9 tool to add (and sometimes remove) them. If you say Y here, 16 If you say Y here, you will need to run "make 17 modules_install" to put the modules under /lib/modules/ 18 where modprobe can find them (you may need to be root to do 36 Without this option you will not be able to unload any 45 This option allows you to force a module to unload, even if the 47 without waiting for anyone to stop using it (using the -f option to 56 This option allows you to maintain a record of each unloaded 57 module that tainted the kernel. In addition to displaying a 65 Usually, you have to use modules compiled with your kernel. [all …]
|
/kernel/power/ |
D | Kconfig | 3 bool "Suspend to RAM and standby" 7 Allow the system to enter sleep states in which main memory is 9 suspend-to-RAM state (e.g. the ACPI S3 state). 12 bool "Enable freezer for suspend to RAM/standby" \ 17 This allows you to turn off the freezer for suspend. If this is 18 done, no tasks are frozen for suspend to RAM/standby. 23 bool "Skip kernel's sys_sync() on suspend to RAM/standby" 28 Some systems prefer not to pay this cost on every invocation 31 at '/sys/power/sync_on_suspend' to configure this behaviour. 33 to change the default to disable the kernel sys_sync(). [all …]
|
/kernel/rcu/ |
D | Kconfig | 16 thousands of CPUs. It also scales down nicely to 27 is also required. It also scales down nicely to 42 bool "Make expert-level adjustments to RCU configuration" 45 This option needs to be enabled if you wish to make 46 expert-level adjustments to RCU configuration. By default, 50 obscure RCU options to be set up. 52 Say Y if you need to make expert-level adjustments to RCU. 123 these readers to appear in the idle loop as well as on the 137 the TINY and TREE variants of RCU. The purpose is to allow 138 the tiny variants to disable RCU CPU stall warnings, while [all …]
|
D | Kconfig.debug | 18 need to be converted to pass a lockdep expression. To prevent 35 after the fact on the running kernel to be tested, if desired. 37 Say Y here if you want RCU performance tests to be built into 39 Say M if you want the RCU performance tests to build as a module. 51 after the fact on the running kernel to be tested, if desired. 53 Say Y here if you want RCU torture tests to be built into 55 Say M if you want the RCU torture tests to build as a module. 67 The kernel module may be built after the fact on the running kernel to be 71 Say M if you want to build it as a module instead. 95 says to use the RCU_CPU_STALL_TIMEOUT value converted from [all …]
|
/kernel/trace/ |
D | Kconfig | 126 Adds a very slight overhead to tracing when enabled. 135 of the kernel can use them to generate or add hooks to them. 139 # This allows those options to appear when no other tracer is selected. But the 141 # GENERIC_TRACER and TRACING to avoid circular dependencies to accomplish the 160 # Minimum requirements an architecture has to meet for us to 161 # be able to offer generic tracing facilities: 183 Enable developer to setup ftrace subsystem via supplemental 197 Enable the kernel to trace every kernel function. This is done 198 by using a compiler feature to insert a small, 5-byte No-Operation 213 Enable the kernel to trace a function at both its return [all …]
|
/kernel/bpf/ |
D | Kconfig | 7 # Used by archs to tell that they support BPF JIT compiler plus which 19 # Used by archs to tell that they want the BPF JIT compiler enabled by 37 Enable the bpf() system call that allows to manipulate BPF programs 47 allows the kernel to generate native code when a program is loaded 60 Enables BPF JIT and removes BPF interpreter to avoid speculative 64 is permanently set to 1 and setting any other value than that will 77 /proc/sys/kernel/unprivileged_bpf_disabled knob to 2. An admin can 78 still reenable it by setting it to 0 later on, or permanently 79 disable it by setting it to 1 (from which no other transition to 82 Unprivileged BPF could be used to exploit certain potential [all …]
|
D | core.c | 1223 struct bpf_insn *to = to_buff; in bpf_jit_blind_insn() local 1253 *to++ = BPF_ALU64_REG(BPF_XOR, from->dst_reg, from->dst_reg); in bpf_jit_blind_insn() 1267 *to++ = BPF_ALU32_IMM(BPF_MOV, BPF_REG_AX, imm_rnd ^ from->imm); in bpf_jit_blind_insn() 1268 *to++ = BPF_ALU32_IMM(BPF_XOR, BPF_REG_AX, imm_rnd); in bpf_jit_blind_insn() 1269 *to++ = BPF_ALU32_REG(from->code, from->dst_reg, BPF_REG_AX); in bpf_jit_blind_insn() 1281 *to++ = BPF_ALU64_IMM(BPF_MOV, BPF_REG_AX, imm_rnd ^ from->imm); in bpf_jit_blind_insn() 1282 *to++ = BPF_ALU64_IMM(BPF_XOR, BPF_REG_AX, imm_rnd); in bpf_jit_blind_insn() 1283 *to++ = BPF_ALU64_REG(from->code, from->dst_reg, BPF_REG_AX); in bpf_jit_blind_insn() 1301 *to++ = BPF_ALU64_IMM(BPF_MOV, BPF_REG_AX, imm_rnd ^ from->imm); in bpf_jit_blind_insn() 1302 *to++ = BPF_ALU64_IMM(BPF_XOR, BPF_REG_AX, imm_rnd); in bpf_jit_blind_insn() [all …]
|
D | dispatcher.c | 133 struct bpf_prog *to) in bpf_dispatcher_change_prog() argument 138 if (from == to) in bpf_dispatcher_change_prog() 160 changed |= bpf_dispatcher_add_prog(d, to); in bpf_dispatcher_change_prog()
|
/kernel/futex/ |
D | waitwake.c | 504 struct hrtimer_sleeper *to) in futex_sleep_multiple() argument 506 if (to && !to->task) in futex_sleep_multiple() 532 struct hrtimer_sleeper *to) in futex_wait_multiple() argument 536 if (to) in futex_wait_multiple() 537 hrtimer_sleeper_start_expires(to, HRTIMER_MODE_ABS); in futex_wait_multiple() 549 futex_sleep_multiple(vs, count, to); in futex_wait_multiple() 557 if (to && !to->task) in futex_wait_multiple() 641 struct hrtimer_sleeper timeout, *to; in futex_wait() local 652 to = futex_setup_timer(abs_time, &timeout, flags, in futex_wait() 664 futex_wait_queue(hb, &q, to); in futex_wait() [all …]
|
D | requeue.c | 766 struct hrtimer_sleeper timeout, *to; in futex_wait_requeue_pi() local 783 to = futex_setup_timer(abs_time, &timeout, flags, in futex_wait_requeue_pi() 819 futex_wait_queue(hb, &q, to); in futex_wait_requeue_pi() 825 ret = handle_early_requeue_pi_wakeup(hb, &q, to); in futex_wait_requeue_pi() 851 ret = rt_mutex_wait_proxy_lock(pi_mutex, to, &rt_waiter); in futex_wait_requeue_pi() 891 if (to) { in futex_wait_requeue_pi() 892 hrtimer_cancel(&to->timer); in futex_wait_requeue_pi() 893 destroy_hrtimer_on_stack(&to->timer); in futex_wait_requeue_pi()
|
D | pi.c | 932 struct hrtimer_sleeper timeout, *to; in futex_lock_pi() local 945 to = futex_setup_timer(time, &timeout, flags, 0); in futex_lock_pi() 1036 if (unlikely(to)) in futex_lock_pi() 1037 hrtimer_sleeper_start_expires(to, HRTIMER_MODE_ABS); in futex_lock_pi() 1039 ret = rt_mutex_wait_proxy_lock(&q.pi_state->pi_mutex, to, &rt_waiter); in futex_lock_pi() 1076 if (to) { in futex_lock_pi() 1077 hrtimer_cancel(&to->timer); in futex_lock_pi() 1078 destroy_hrtimer_on_stack(&to->timer); in futex_lock_pi()
|
D | syscalls.c | 252 struct hrtimer_sleeper to; in SYSCALL_DEFINE5() local 287 futex_setup_timer(&time, &to, flag_clkid, 0); in SYSCALL_DEFINE5() 298 ret = futex_wait_multiple(futexv, nr_futexes, timeout ? &to : NULL); in SYSCALL_DEFINE5() 304 hrtimer_cancel(&to.timer); in SYSCALL_DEFINE5() 305 destroy_hrtimer_on_stack(&to.timer); in SYSCALL_DEFINE5()
|
/kernel/time/ |
D | Kconfig | 8 # Watchdog function for clocksources to detect instabilities 51 # Select to handle posix CPU timers from task_work 72 Enable this option to test RTC library functions. 89 # only related to the tick functionality. Oneshot clockevent devices 116 Most of the time you want to say Y here. 132 Adaptively try to shutdown the tick whenever possible, even when 137 You need to fill up the nohz_full boot parameter with the 138 desired range of dynticks CPUs to use it. This is implemented at 156 tracking to enter/exit RCU extended quiescent states. 163 The major pre-requirement for full dynticks to work is to [all …]
|
/kernel/gcov/ |
D | Kconfig | 16 Additionally specify CONFIG_GCOV_PROFILE_ALL=y to get profiling data 18 directories, add a line similar to the following to the respective 34 Note that the debugfs filesystem has to be mounted to access 52 larger and run slower. Also be sure to exclude files from profiling 53 which are not linked to the kernel image to prevent linker errors.
|
/kernel/ |
D | Kconfig.preempt | 28 scientific/computation system, or if you want to maximize the 38 "explicit preemption points" to the kernel code. These new 39 preemption points have been selected to reduce the maximum 43 This allows reaction to interactive events by allowing a 44 low priority process to voluntarily preempt itself even if it 46 applications to run more 'smoothly' even when the system is 58 preemptible. This allows reaction to interactive events by 59 permitting a low priority process to be preempted involuntarily 61 otherwise not be about to reach a natural preemption point. 62 This allows applications to run more 'smoothly' even when the [all …]
|
D | signal.c | 3345 int copy_siginfo_to_user(siginfo_t __user *to, const kernel_siginfo_t *from) in copy_siginfo_to_user() argument 3347 char __user *expansion = si_expansion(to); in copy_siginfo_to_user() 3348 if (copy_to_user(to, from , sizeof(struct kernel_siginfo))) in copy_siginfo_to_user() 3378 static int __copy_siginfo_from_user(int signo, kernel_siginfo_t *to, in __copy_siginfo_from_user() argument 3381 if (copy_from_user(to, from, sizeof(struct kernel_siginfo))) in __copy_siginfo_from_user() 3383 to->si_signo = signo; in __copy_siginfo_from_user() 3384 return post_copy_siginfo_from_user(to, from); in __copy_siginfo_from_user() 3387 int copy_siginfo_from_user(kernel_siginfo_t *to, const siginfo_t __user *from) in copy_siginfo_from_user() argument 3389 if (copy_from_user(to, from, sizeof(struct kernel_siginfo))) in copy_siginfo_from_user() 3391 return post_copy_siginfo_from_user(to, from); in copy_siginfo_from_user() [all …]
|
D | Kconfig.hz | 11 to have the timer interrupt run at 1000 Hz but 100 Hz may be more 12 beneficial for servers and NUMA systems that do not need to have 16 environment leading to NR_CPUS * HZ number of timer interrupts 32 on SMP and NUMA systems. If you are going to be using NTSC video 47 systems requiring fast interactive responses to events.
|
/kernel/dma/ |
D | Kconfig | 43 # need to enable this. 97 # Should be selected if we can mmap non-coherent mappings to userspace. 98 # The only thing that is really required is a way to set an uncached bit 123 to allocate big physically-contiguous blocks of memory for use with 138 Enable this option to get pernuma CMA areas so that devices like 154 default, but it can be enabled by passing cma=size[MG] to the kernel. 166 enabled by passing cma=size[MG] to the kernel. 191 DMA mapping framework by default aligns all buffers to the smallest 192 PAGE_SIZE order which is greater than or equal to the requested buffer 193 size. This works well for buffers up to a few hundreds kilobytes, but [all …]
|
/kernel/livepatch/ |
D | Kconfig | 16 Say Y here if you want to support kernel live patching. 18 module uses the interface provided by this option to register 19 a patch, causing calls to patched functions to be redirected 20 to new function code contained in the patch module.
|
/kernel/kcsan/ |
D | .kunitconfig | 1 # Note that the KCSAN tests need to run on an SMP setup. 3 # option to configure a machine with several cores. For example: 11 # Need some level of concurrency to test a concurrency sanitizer. 17 # Set these if you want to run test_barrier_nothreads 21 # This prevents the test from timing out on many setups. Feel free to remove
|
/kernel/irq/ |
D | Kconfig | 120 to define a high CONFIG_NR_CPUS value but still want to have 126 If you don't know what to do here, say N. 136 developers and debugging of hard to diagnose interrupt problems. 138 If you don't know what to do here, say N. 145 Allow to specify the low level IRQ handler at run time. 147 # Cavium Octeon is the last system to use this deprecated option
|
/kernel/bpf/preload/iterators/ |
D | README | 2 If you change "iterators.bpf.c" do "make -j" in this directory to rebuild "iterators.skel.h". 3 Make sure to have clang 10 installed.
|
/kernel/events/ |
D | hw_breakpoint.c | 779 static void hw_breakpoint_copy_attr(struct perf_event_attr *to, in hw_breakpoint_copy_attr() argument 782 to->bp_addr = from->bp_addr; in hw_breakpoint_copy_attr() 783 to->bp_type = from->bp_type; in hw_breakpoint_copy_attr() 784 to->bp_len = from->bp_len; in hw_breakpoint_copy_attr() 785 to->disabled = from->disabled; in hw_breakpoint_copy_attr()
|
D | ring_buffer.c | 575 unsigned long from, unsigned long to) in perf_output_copy_aux() argument 582 to &= (rb->aux_nr_pages << PAGE_SHIFT) - 1; in perf_output_copy_aux() 586 if (to > from) in perf_output_copy_aux() 587 tocopy = min(tocopy, to - from); in perf_output_copy_aux() 601 } while (to != from); in perf_output_copy_aux()
|
/kernel/trace/rv/ |
D | Kconfig | 48 The model is borken on purpose: it serves to test reactors. 59 monitor can cause a reaction to the detection of an exception
|