Searched +full:foo +full:- +full:over +full:- +full:udp (Results 1 – 5 of 5) sorted by relevance
| /Documentation/networking/ |
| D | netconsole.rst | 1 .. SPDX-License-Identifier: GPL-2.0 26 This module logs kernel printk messages over UDP allowing debugging of 29 It can be used either built-in or as a module. As a built-in, 41 netconsole=[+][r][src-port]@[src-ip]/[<dev>],[tgt-port]@<tgt-ip>/[tgt-macaddr] 46 src-port source for UDP packets (defaults to 6665) 47 src-ip source IP to use (interface address) 49 tgt-port port for logging agent (6666) 50 tgt-ip IP address for logging agent 51 tgt-macaddr ethernet MAC address for logging agent (broadcast) 71 Built-in netconsole starts immediately after the TCP stack is [all …]
|
| D | bonding.rst | 1 .. SPDX-License-Identifier: GPL-2.0 11 Corrections, HA extensions: 2000/10/03-15: 13 - Willy Tarreau <willy at meta-x.org> 14 - Constantine Gavrilov <const-g at xpert.com> 15 - Chad N. Tindel <ctindel at ieee dot org> 16 - Janice Girouard <girouard at us dot ibm dot com> 17 - Jay Vosburgh <fubar at us dot ibm dot com> 22 - Mitch Williams <mitch.a.williams at intel.com> 35 the original tools from extreme-linux and beowulf sites will not work 119 ----------------------------------------------- [all …]
|
| /Documentation/netlink/specs/ |
| D | fou.yaml | 1 # SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 5 protocol: genetlink-legacy 8 Foo-over-UDP. 10 c-family-name: fou-genl-name 11 c-version-name: fou-genl-version 12 max-by-define: true 13 kernel-policy: global 16 - 19 name-prefix: fou-encap- 20 enum-name: [all …]
|
| /Documentation/bpf/ |
| D | verifier.rst | 32 After kernel function call, R1-R5 are reset to unreadable and 35 Since R6-R9 are callee saved, their state is preserved across the call. 40 bpf_call foo 72 stack bounds, which are [-MAX_BPF_STACK, 0). In this example offset is 8, 78 Classic BPF verifier does similar check with M[0-15] memory slots. 81 bpf_ld R0 = *(u32 *)(R10 - 4) 85 Though R10 is correct read-only register and has type PTR_TO_STACK 86 and R10 - 4 is within stack bounds, there were no stores into that location. 88 Pointer register spill/fill is tracked as well, since four (R6-R9) 91 Allowed function calls are customized with bpf_verifier_ops->get_func_proto() [all …]
|
| /Documentation/admin-guide/ |
| D | kernel-parameters.txt | 16 force -- enable ACPI if default was off 17 on -- enable ACPI but allow fallback to DT [arm64,riscv64] 18 off -- disable ACPI if default was on 19 noirq -- do not use ACPI for IRQ routing 20 strict -- Be less tolerant of platforms that are not 22 rsdt -- prefer RSDT over (default) XSDT 23 copy_dsdt -- copy DSDT to memory 24 nospcr -- disable console in ACPI SPCR table as 41 If set to vendor, prefer vendor-specific driver 73 Documentation/firmware-guide/acpi/debug.rst for more information about [all …]
|