Home
last modified time | relevance | path

Searched full:is (Results 1 – 25 of 4308) sorted by relevance

12345678910>>...173

/Documentation/admin-guide/
Dkernel-parameters.rst6 The following is a consolidated list of the kernel parameters as implemented
16 Everything after "``--``" is passed as an argument to init.
46 nohz_full, irqaffinity, rcu_nocbs. The format of this list is:
74 Keep in mind that "N" is dynamic, so if system changes cause the bitmap width
80 so that "nohz_full=all" is the equivalent of "nohz_full=0-N".
82 The semantics of "N" and "all" is supported on a level of bitmaps and holds for
93 were enabled and if respective hardware is present. This list should be kept
96 is applicable::
98 ACPI ACPI support is enabled.
99 AGP AGP (Accelerated Graphics Port) is enabled.
[all …]
Dthunderbolt.rst6 USB4 is the public specification based on Thunderbolt 3 protocol with
8 manager is an entity running on the host router (host controller)
17 connection manager implementation is to be used. To be on the safe side the
19 ``user`` which means PCIe tunneling is disabled by default. The
22 is expected to be accompanied with an IOMMU based DMA protection.
26 The interface presented here is not meant for end users. Instead there
45 (usbonly). The reason for these is the fact that the connected devices can
48 it is not always available for various reasons.
50 Some USB4 systems have a BIOS setting to disable PCIe tunneling. This is
57 approval is needed. In BIOS settings this is typically called
[all …]
/Documentation/core-api/
Ddebug-objects.rst10 debugobjects is a generic infrastructure to track the life time of
13 debugobjects is useful to check for the following error patterns:
21 debugobjects is not changing the data structure of the real object so it
56 Each detected error is reported in the statistics and a limited number
70 This function is called whenever the initialization function of a real
71 object is called.
73 When the real object is already tracked by debugobjects it is checked,
74 whether the object can be initialized. Initializing is not allowed for
82 When the real object is not yet tracked by debugobjects, debugobjects
84 object state to ODEBUG_STATE_INIT. It verifies that the object is not
[all …]
Dswiotlb.rst7 swiotlb is a memory buffer allocator used by the Linux kernel DMA layer. It is
11 to the limitations. The DMA is done to/from this temporary memory buffer, and
13 memory buffer. This approach is generically called "bounce buffering", and the
14 temporary memory buffer is called a "bounce buffer".
20 if bounce buffering is necessary. If so, the DMA layer manages the allocation,
25 memory buffer, doing bounce buffering is slower than doing DMA directly to the
26 original memory buffer, and it consumes more CPU resources. So it is used only
38 encrypted by default, and the memory is not accessible by the host hypervisor
40 directed to guest memory that is unencrypted. CoCo VMs set a kernel-wide option
41 to force all DMA I/O to use bounce buffers, and the bounce buffer memory is set
[all …]
/Documentation/driver-api/driver-model/
Dbinding.rst5 Driver binding is the process of associating a device with a device
16 type in the system. When device_register is called for a device, it is
18 list of all drivers of that bus type. When driver_register is called
19 for a driver, it is inserted at the end of this list. These are the
26 When a new device is added, the bus's list of drivers is iterated over
29 supports. The format and semantics for comparing IDs is bus-specific.
31 algorithm, it is up to the bus driver to provide a callback to compare
37 If a match is found, the device's driver field is set to the driver
38 and the driver's probe callback is called. This gives the driver a
45 Upon the successful completion of probe, the device is registered with
[all …]
/Documentation/networking/
Dipvs-sysctl.rst13 It sets the always mode drop rate, which is used in the mode 3
19 It sets the available memory threshold (in pages), which is
20 used in the automatic modes of defense. When there is no
22 enabled and the variable is automatically set to 2, otherwise
23 the strategy is disabled and the variable is set to 1.
29 If set, disable the director function while the server is
36 port reuse. It is a bitmap, with the values being:
42 bit 1: enable rescheduling of new connections when it is safe.
43 That is, whenever expire_nodest_conn and for TCP sockets, when
44 the connection is in TIME_WAIT state (which is only possible if
[all …]
Dstrparser.rst10 The stream parser (strparser) is a utility that parses messages of an
20 In receive callback mode, the strparser is called from the data_ready
25 outside source. Message are parsed and delivered as the sequence is
34 callbacks include a parse_msg function that is called to perform
36 that is called when a full message has been completed.
46 Called to initialize a stream parser. strp is a struct of type
47 strparser that is allocated by the upper layer. sk is the TCP
49 callback mode; in general mode this is set to NULL. Callbacks
56 Temporarily pause a stream parser. Message parsing is suspended
69 strp_stop is called to completely stop stream parser operations.
[all …]
/Documentation/scsi/
Dst.rst8 The driver is currently maintained by Kai Mäkisara (email
17 The driver is generic, i.e., it does not contain any code tailored
22 directly with ioctls. This is administratively a very simple and
30 new tape is loaded into the drive or if writing begins at the
31 beginning of the tape. The second method is applicable if the tape
33 QIC-drives). The result is that any tape can be read, writing can be
34 continued using existing format, and the default format is used if
35 the tape is rewritten from the beginning (or a new tape is written
36 for the first time). The first method is applicable if the drive
37 does not perform auto-detection well enough and there is a single
[all …]
/Documentation/driver-api/md/
Draid5-ppl.rst5 Partial Parity Log (PPL) is a feature available for RAID5 arrays. The issue
6 addressed by PPL is that after a dirty shutdown, parity of a particular stripe
7 may become inconsistent with data on other member disks. If the array is also
8 in degraded state, there is no way to recalculate parity, because one of the
9 disks is missing. This can lead to silent data corruption when rebuilding the
10 array or using it is as degraded - data calculated from parity for array blocks
12 be incorrect. Such condition is known as the RAID5 Write Hole. Because of
15 Partial parity for a write operation is the XOR of stripe data chunks not
16 modified by this write. It is just enough data needed for recovering from the
20 this stripe is missing, this updated parity can be used to recover its
[all …]
/Documentation/arch/x86/
Dmds.rst9 Microarchitectural Data Sampling (MDS) is a family of side channel attacks
21 buffers are partitioned between Hyper-Threads so cross thread forwarding is
23 buffer is repartitioned which can expose data from one thread to the other.
26 L1 miss situations and to hold data which is returned or sent in response
28 operation and also write data to the cache. When the fill buffer is
32 Hyper-Threads so cross thread leakage is possible.
35 from memory or I/O. The received data is then forwarded to the register
40 thread leakage is possible.
42 MDSUM is a special case of MSBDS, MFBDS and MLPDS. An uncacheable load from
50 It is assumed that attack code resides in user space or in a guest with one
[all …]
/Documentation/mm/
Dhugetlbfs_reserv.rst11 are to be used. If no huge page exists at page fault time, the task is sent
14 of huge pages at mmap() time. The idea is that if there were not enough
21 describe how huge page reserve processing is done in the v4.10 kernel.
26 This description is primarily targeted at kernel developers who are modifying
34 This is a global (per-hstate) count of reserved huge pages. Reserved
36 Therefore, the number of huge pages generally available is computed
39 A reserve map is described by the structure::
50 There is one reserve map for each huge page mapping in the system.
52 the mapping. A region is described as::
68 Indicates this task is the owner of the reservations
[all …]
/Documentation/locking/
Drt-mutex-design.rst13 that happen without this code, but that is in the concept to understand
14 what the code actually is doing.
16 The goal of this document is to help others understand the priority
17 inheritance (PI) algorithm that is used, as well as reasons for the
24 Priority inversion is when a lower priority process executes while a higher
28 the high priority process must wait until the lower priority process is done
29 with the resource. This is a priority inversion. What we want to prevent
30 is something called unbounded priority inversion. That is when the high
31 priority process is prevented from running by a lower priority process for
34 The classic example of unbounded priority inversion is where you have three
[all …]
/Documentation/networking/device_drivers/ethernet/altera/
Daltera_tse.rst11 This is the driver for the Altera Triple-Speed Ethernet (TSE) controllers
21 to test this driver may be found there as well. Support is also available from
27 this driver was tested against. The sopc2dts tool is used to create the
31 Triple-Speed Ethernet instance is using an SGDMA or MSGDMA component. The
36 The SGDMA component is to be deprecated in the near future (over the next 1-2
38 SGDMA support is included for existing designs and reference in case a
46 Scatter-gather DMA is not supported by the SGDMA or MSGDMA at this time.
58 The kernel configuration option is ALTERA_TSE:
67 - dma_rx_num: Number of descriptors in the RX list (default is 64);
68 - dma_tx_num: Number of descriptors in the TX list (default is 64).
[all …]
/Documentation/filesystems/
Dautofs.rst8 The goal of autofs is to provide on-demand mounting and race free
12 1. There is no need to delay boot until all filesystems that
15 continue freely. This is particularly important for
30 The "autofs" filesystem module is only one part of an autofs system.
38 "autofs" is a Linux kernel module which provides the "autofs"
52 directory should be a mount trap is based on a master map. This master
53 map is consulted by autofs to determine which directories are mount
55 On most systems, the default master map is located at */etc/auto.master*.
58 mount is considered to be *indirect*), then the root directory is
59 always a regular directory, otherwise it is a mount trap when it is
[all …]
Dpath-lookup.rst5 This write-up is based on three articles published at lwn.net:
22 exploration is needed to discover, is that it is complex. There are
26 tool that we will make extensive use of is "divide and conquer". For
51 It is tempting to describe the second kind as starting with a
53 slashes and components, it can be empty, in other words. This is
55 in Linux permit it when the ``AT_EMPTY_PATH`` flag is given. For
61 everything else. The "everything else" is the easy bit. In all cases
65 The final component is not so simple. Not only do different system
68 pathname that is just slashes have a final component. If it does
85 directory entry that is to be created for a directory immediately
[all …]
Dsharedsubtree.rst45 Here is an example:
47 Let's say /mnt has a mount that is shared::
52 so the sample 'smount' program is no longer needed and has been
82 And the same is true even when /dev/sd0 is mounted on /mnt/a. The
86 2b) A slave mount is like a shared mount except that mount and umount events
89 All slave mounts have a master mount which is a shared.
91 Here is an example:
93 Let's say /mnt has a mount which is shared.
99 the new mount at /tmp becomes a shared mount and it is a replica of
131 This is the mount we are familiar with. Its the default type.
[all …]
/Documentation/block/
Dublk.rst10 ublk is a generic framework for implementing block device logic from userspace.
11 The motivation behind it is that moving virtual block drivers into userspace,
28 ublk block device (``/dev/ublkb*``) is added by ublk driver. Any IO request
31 program. ``ublksrv`` [#userspace]_ is one of such implementation. It
33 user block device conveniently, while also generic type block device is
37 After the IO is handled by userspace, the result is committed back to the
39 logic is totally done by userspace, such as loop's IO handling, NBD's IO
42 ``/dev/ublkb*`` is driven by blk-mq request-based driver. Each request is
44 IO too, which is 1:1 mapped with IO of ``/dev/ublkb*``.
47 ``io_uring`` passthrough command; that is why ublk is also one io_uring based
[all …]
/Documentation/devicetree/bindings/iio/adc/
Dadi,ad7944.yaml45 When this property is omitted, it is assumed that the device is using what
46 the datasheet calls "4-wire mode". This is the conventional SPI mode used
48 line is used to initiate the conversion and the SDI line is connected to
51 When this property is present, it indicates that the device is using one
55 definition of 3-wire mode is NOT at all related to the standard
56 spi-3wire property!) This mode is often used when the ADC is the only
57 device on the bus. In this mode, SDI is tied to VIO, and the CNV line
59 which case the CS line of the controller is unused.
60 * chain: The datasheet calls this "chain mode". This mode is used to save
62 one chip is tied to the SDO of the next chip in the chain and the SDI of
[all …]
/Documentation/userspace-api/media/cec/
Dcec-ioc-g-mode.rst41 depending on the chosen mode. The initiator is the filehandle that is
43 follower is the filehandle that receives messages sent to the CEC
47 When a CEC message is received, then the CEC framework will decide how
48 it will be processed. If the message is a reply to an earlier
49 transmitted message, then the reply is sent back to the filehandle that
50 is waiting for it. In addition the CEC framework will process it.
52 If the message is not a reply, then the CEC framework will process it
53 first. If there is no follower, then the message is just discarded and a
54 feature abort is sent back to the initiator if the framework couldn't
55 process it. If there is a follower, then the message is passed on to the
[all …]
Dcec-ioc-receive.rst42 If the file descriptor is in non-blocking mode and there are no received
44 error code. If the file descriptor is in blocking mode and ``timeout``
45 is non-zero and no message arrived within ``timeout`` milliseconds, then
60 The :ref:`ioctl CEC_TRANSMIT <CEC_TRANSMIT>` is only available if
61 ``CEC_CAP_TRANSMIT`` is set. If there is no more room in the transmit
65 to core messages (see :ref:`cec-core-processing`), so it is not a good
68 If the file descriptor is in non-blocking mode then the transmit will
77 address is invalid (due to e.g. a disconnect) will return ``ENONET``.
80 'TV' when the physical address is invalid since some TVs pull the hotplug detect
85 physical address, but the cable is still connected and CEC still works.
[all …]
/Documentation/arch/riscv/
Dhwprobe.rst6 The RISC-V hardware probing interface is based around a single syscall, which
7 is defined in <asm/hwprobe.h>::
21 value if the key is recognized. If a key is unknown to the kernel, its key field
22 will be cleared to -1, and its value set to 0. The CPU set is defined by
32 set of CPUs, the values of each key are given and the set of CPUs is reduced
34 How matching is done depends on the key type. For value-like keys, matching
36 means the result of a logical AND of the pair's value with the CPU's value is
37 exactly the same as the pair's value. Additionally, when ``cpus`` is an empty
38 set, then it is initialized to all online CPUs which fit within it, i.e. the
39 CPU set returned is the reduction of all the online CPUs which can be
[all …]
/Documentation/driver-api/nvdimm/
Dsecurity.rst17 The "security" sysfs attribute is provided in the nvdimm sysfs directory. For
23 frozen, and overwrite. If security is not supported, the sysfs attribute
26 The "store" attribute takes several commands when it is being written to
39 The key is associated to the payload by the DIMM id. For example:
46 key "passphrase" is expected to be 32bytes long. This is similar to the ATA
47 security specification [2]. A key is initially acquired via the request_key()
48 kernel API call during nvdimm unlock. It is up to the user to make sure that
55 encrypted-keys of enc32 format. TPM usage with a master trusted key is
61 retrieve the key from the kernel user keyring. This is the only time
66 the passphrase for the respective nvdimms. It is also recommended that the
[all …]
/Documentation/networking/device_drivers/cellular/qualcomm/
Drmnet.rst10 rmnet driver is used for supporting the Multiplexing and aggregation
11 Protocol (MAP). This protocol is used by all recent chipsets using Qualcomm
23 Aggregation is required to achieve high data rates. This involves hardware
42 Command (1)/ Data (0) bit value is to indicate if the packet is a MAP command
43 or data packet. Command packet is used for transport level flow control. Data
48 Padding is the number of bytes to be appended to the payload to
51 Multiplexer ID is to indicate the PDN on which data has to be sent.
68 Command (1)/ Data (0) bit value is to indicate if the packet is a MAP command
69 or data packet. Command packet is used for transport level flow control. Data
74 Padding is the number of bytes to be appended to the payload to
[all …]
/Documentation/networking/device_drivers/ethernet/toshiba/
Dspider_net.rst14 device driver in the Linux kernel tree. The spidernet is a gigabit
20 The receive (RX) ring is a circular linked list of RX descriptors,
29 "full" and "not-in-use". An "empty" or "ready" descriptor is ready
31 and is waiting to be emptied and processed by the OS. A "not-in-use"
32 descriptor is neither empty or full; it is simply not ready. It may
33 not even have a data buffer in it, or is otherwise unusable.
38 ring is handed off to the hardware, which sequentially fills in the
42 This filling and emptying is managed by three pointers, the "head"
45 currently being filled. When this descr is filled, the hardware
46 marks it full, and advances the GDACTDPA by one. Thus, when there is
[all …]
/Documentation/infiniband/
Dtag_matching.rst16 and the earliest posted-receive is the pair that must be used to satisfy the
21 When a message is sent from the sender to the receiver, the communication
23 corresponding matching receive is posted. If a matching receive is posted,
24 this is an expected message, otherwise it is called an unexpected message.
31 1. The Eager protocol- the complete message is sent when the send is
32 processed by the sender. A completion send is received in the send_cq
37 corresponding buffer is posted, the responder will use the information from
50 When send is initiated and arrives at the receive side, if there is no
51 pre-posted receive for this arriving message, it is passed to the software and
52 placed in the unexpected message list. Otherwise the match is processed,
[all …]

12345678910>>...173