Home
last modified time | relevance | path

Searched +full:keep +full:- +full:a +full:- +full:live (Results 1 – 25 of 40) sorted by relevance

12

/Documentation/devicetree/bindings/soc/intel/
Dintel,hps-copy-engine.yaml1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause)
4 ---
5 $id: http://devicetree.org/schemas/soc/intel/intel,hps-copy-engine.yaml#
6 $schema: http://devicetree.org/meta-schemas/core.yaml#
11 - Matthew Gerlach <matthew.gerlach@linux.intel.com>
15 a bootable image from host memory to HPS DDR. Additionally, there is a
17 well as a keep-a-live indication to the host.
21 const: intel,hps-copy-engine
23 '#dma-cells':
30 - compatible
[all …]
/Documentation/admin-guide/mm/
Duserfaultfd.rst8 Userfaults allow the implementation of on-demand paging from userland
12 For example userfaults allows a proper and more optimal implementation
18 Userspace creates a new userfaultfd, initializes it, and registers one or more
20 region(s) result in a message being delivered to the userfaultfd, notifying
26 1) ``read/POLLIN`` protocol to notify a userland thread of the faults
38 Vmas are not suitable for page- (or hugepage) granular fault tracking
43 passed using unix domain sockets to a manager process, so the same
44 manager process could handle the userfaults of a multitude of
48 is a corner case that would currently return ``-EBUSY``).
53 Creating a userfaultfd
[all …]
/Documentation/devicetree/bindings/net/
Dmaxlinear,gpy2xx.yaml1 # SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
10 - Andrew Lunn <andrew@lunn.ch>
11 - Michael Walle <michael@walle.cc>
14 - $ref: ethernet-phy.yaml#
17 maxlinear,use-broken-interrupts:
19 Interrupts are broken on some GPY2xx PHYs in that they keep the
20 interrupt line asserted for a random amount of time even after the
24 can live with the consequences, this property can be used to enable
[all …]
/Documentation/filesystems/ext4/
Dallocators.rst1 .. SPDX-License-Identifier: GPL-2.0
4 ---------------------------------
7 generally a desirably quality of a filesystem. On a spinning disk,
9 that the head actuator and disk must perform to access a data block,
13 effect of concentrating writes on a single erase block, which can speed
17 The first tool that ext4 uses to combat fragmentation is the multi-block
18 allocator. When a file is first created, the block allocator
23 files) then the file data gets written out in a single multi-block
24 extent. A second related trick that ext4 uses is delayed allocation.
25 Under this scheme, when a file needs more blocks to absorb file writes,
[all …]
/Documentation/core-api/
Ddebug-objects.rst2 The object-lifetime debugging infrastructure
10 debugobjects is a generic infrastructure to track the life time of
15 - Activation of uninitialized objects
17 - Initialization of active objects
19 - Usage of freed/destroyed objects
22 can be compiled in with a minimal runtime impact and enabled on demand
23 with a kernel command line option.
28 A kernel subsystem needs to provide a data structure which describes the
33 information can be retrieved from a live system instead of hard core
39 - debug_object_init
[all …]
/Documentation/mm/
Dhighmem.rst5 By: Peter Zijlstra <a.p.zijlstra@chello.nl>
14 impossible for the kernel to keep all of the available physical memory mapped
18 The part of (physical) memory not covered by a permanent mapping is what we
30 +--------+ 0xffffffff
32 +--------+ 0xc0000000
36 +--------+ 0x00000000
39 time, but because we need virtual address space for other things - including
40 temporary maps to access the rest of the physical memory - the actual direct
54 * kmap_local_page(), kmap_local_folio() - These functions are used to create
57 them. The only differences between them consist in the first taking a pointer
[all …]
/Documentation/livepatch/
Dlivepatch.rst15 There are many situations where users are reluctant to reboot a system. It may
18 users want to also have a stable and secure system. Livepatching gives users
20 functions without a system reboot.
30 - The kernel probes are the most generic. The code can be redirected by
31 putting a breakpoint instruction instead of any instruction.
33 - The function tracer calls the code from a predefined location that is
35 compiler using the '-pg' gcc option.
37 - Livepatching typically needs to redirect the code at the very beginning
44 a base. A Kprobe is registered as a ftrace handler when the function entry
46 a live patch is called with the help of a custom ftrace handler. But there are
[all …]
/Documentation/accounting/
Dtaskstats.rst2 Per-task statistics interface
6 Taskstats is a netlink-based interface for sending per-task and
7 per-process statistics from the kernel to userspace.
11 - efficiently provide statistics during lifetime of a task and on its exit
12 - unified interface for multiple accounting subsystems
13 - extensibility for use by future accounting patches
16 -----------
19 Linux task defined by struct task_struct. per-pid stats are the same as
20 per-task stats.
25 leader - a process is deemed alive as long as it has any task belonging to it.
[all …]
/Documentation/security/
Dself-protection.rst2 Kernel Self-Protection
5 Kernel self-protection is the design and implementation of systems and
7 the kernel itself. This covers a wide range of issues, including removing
10 this document, but it should serve as a reasonable starting point and
13 In the worst-case scenario, we assume an unprivileged local attacker
17 cover the more limited cases as well. A higher bar, and one that should
18 still be kept in mind, is protecting the kernel against a _privileged_
19 local attacker, since the root user has access to a vastly increased
23 The goals for successful self-protection systems would be that they
24 are effective, on by default, require no opt-in by developers, have no
[all …]
Dipe.rst1 .. SPDX-License-Identifier: GPL-2.0
3 Integrity Policy Enforcement (IPE) - Kernel Documentation
10 :doc:`IPE admin guide </admin-guide/LSM/ipe>`.
13 ---------------------
16 of a locked-down system. This system would be born-secure, and have
20 policy. A mandatory access control system would be present, and
21 as a result, xattrs would have to be protected. This lead to a selection
27 2. DM-Verity
29 Both options were carefully considered, however the choice to use DM-Verity
40 there must be some form of selector to determine whether a read should
[all …]
/Documentation/networking/device_drivers/cable/
Dsb1000.rst1 .. SPDX-License-Identifier: GPL-2.0
7 sb1000 is a module network device driver for the General Instrument (also known
9 which is used by a number of cable TV companies to provide cable modem access.
10 It's a one-way downstream-only cable modem, meaning that your upstream net link
14 a great deal of thanks for this wonderful piece of code!
19 Support for this device is now a part of the standard Linux kernel. The
23 1. The "cmconfig" program. This is a utility which supplements "ifconfig"
26 2. Several PPP scripts which live in /etc/ppp to make connecting via your
36 - http://web.archive.org/web/%2E/http://home.adelphia.net/~siglercm/sb1000.html
37 - http://web.archive.org/web/%2E/http://linuxpower.cx/~cable/
[all …]
/Documentation/virt/kvm/
Dppc-pv.rst1 .. SPDX-License-Identifier: GPL-2.0
25 Linux is running on KVM, a node /hypervisor exists. That node contains a
28 Once you determined you're running under a PV capable KVM, you can now use
34 Inside the device tree's /hypervisor node there's a property called
35 'hypercall-instructions'. This property contains at most 4 opcodes that make
36 up the hypercall. To call a hypercall, just call these instructions.
43 r0 - volatile
53 r12 - volatile
73 To enable communication between the hypervisor and guest there is a new shared
80 applicable to the target. For now, we always map the page to -4096. This way we
[all …]
/Documentation/filesystems/xfs/
Dxfs-online-fsck-design.rst1 .. SPDX-License-Identifier: GPL-2.0
8 Heading 3 uses "----"
25 - To help kernel distributors understand exactly what the XFS online fsck
28 - To help people reading the code to familiarize themselves with the relevant
31 - To help developers maintaining the system by capturing the reasons
41 Part 1 defines what fsck tools are and the motivations for writing a new one.
42 Parts 2 and 3 present a high level overview of how online fsck process works
54 1. What is a Filesystem Check?
57 A Unix filesystem has four main responsibilities:
59 - Provide a hierarchy of names through which application programs can associate
[all …]
/Documentation/bpf/
Dverifier.rst16 At the start of the program the register R1 contains a pointer to context
32 After kernel function call, R1-R5 are reset to unreadable and
33 R0 has a return type of the function.
35 Since R6-R9 are callee saved, their state is preserved across the call.
44 is a correct program. If there was R1 instead of R6, it would have
56 will be rejected, since R1 doesn't have a valid pointer type at the time of
59 At the start R1 type is PTR_TO_CTX (a pointer to generic ``struct bpf_context``)
60 A callback is used to customize verifier to restrict eBPF program access to only
67 intends to load a word from address R6 + 8 and store it into R0
72 stack bounds, which are [-MAX_BPF_STACK, 0). In this example offset is 8,
[all …]
/Documentation/process/
D2.Process.rst6 Linux kernel development in the early 1990's was a pretty loose affair,
7 with relatively small numbers of users and developers involved. With a
9 course of one year, the kernel has since had to evolve a number of
10 processes to keep development happening smoothly. A solid understanding of
14 ---------------
16 The kernel developers use a loosely time-based release process, with a new
29 Every 5.x release is a major kernel release with new features, internal
30 API changes, and more. A typical release can contain about 13,000
32 the leading edge of Linux kernel development; the kernel uses a
35 A relatively straightforward discipline is followed with regard to the
[all …]
Dmanagement-style.rst6 This is a short document describing the preferred (or made up, depending
8 mirror the :ref:`process/coding-style.rst <codingstyle>` document to some
14 to do with reality. It started as a lark, but that doesn't mean that it
20 budget of your group, you're almost certainly not a kernel manager.
24 People", and NOT read it. Burn it, it's a great symbolic gesture.
27 making it painfully obvious to the questioner that we don't have a clue
35 ------------
37 Everybody thinks managers make decisions, and that decision-making is
42 The name of the game is to **avoid** having to make a decision. In
43 particular, if somebody tells you "choose (a) or (b), we really need you
[all …]
/Documentation/filesystems/
Dconfigfs.rst2 Configfs - Userspace-driven Kernel Object Configuration
16 configfs is a ram-based filesystem that provides the converse of
17 sysfs's functionality. Where sysfs is a filesystem-based view of
18 kernel objects, configfs is a filesystem-based manager of kernel
21 With sysfs, an object is created in kernel (for example, when a device
27 representation, and sysfs is merely a window on all this.
29 A configfs config_item is created via an explicit userspace operation:
38 system. One is not a replacement for the other.
43 configfs can be compiled as a module or into the kernel. You can access
46 mount -t configfs none /config
[all …]
Dramfs-rootfs-initramfs.rst1 .. SPDX-License-Identifier: GPL-2.0
12 --------------
14 Ramfs is a very simple filesystem that exports Linux's disk caching
15 mechanisms (the page cache and dentry cache) as a dynamically resizable
16 RAM-based filesystem.
24 memory. A similar mechanism (the dentry cache) greatly speeds up access to
34 you're mounting the disk cache as a filesystem. Because of this, ramfs is not
39 ------------------
41 The older "ram disk" mechanism created a synthetic block device out of
42 an area of RAM and used it as backing store for a filesystem. This block
[all …]
Df2fs.rst1 .. SPDX-License-Identifier: GPL-2.0
4 WHAT IS Flash-Friendly File System (F2FS)?
7 NAND flash memory-based storage devices, such as SSD, eMMC, and SD cards, have
8 been equipped on a variety systems ranging from mobile to server systems. Since
10 disks, a file system, an upper layer to the storage device, should adapt to the
13 F2FS is a file system exploiting NAND flash memory-based storage devices, which
14 is based on Log-structured File System (LFS). The design has been focused on
18 Since a NAND flash memory-based storage device shows different characteristic
20 F2FS and its tools support various parameters not only for configuring on-disk
24 a consistency checking tool (fsck.f2fs), and a debugging tool (dump.f2fs).
[all …]
/Documentation/virt/kvm/x86/
Dmmu.rst1 .. SPDX-License-Identifier: GPL-2.0
8 for presenting a standard x86 mmu to the guest, while translating guest
13 - correctness:
17 a particular implementation such as tlb size)
18 - security:
21 - performance:
23 - scaling:
25 - hardware:
27 - integration:
31 - dirty tracking:
[all …]
/Documentation/doc-guide/
Dcontributing.rst1 .. SPDX-License-Identifier: GPL-2.0
6 Documentation is an important part of any software-development project.
8 developers work more effectively. Without top-quality documentation, a lot
9 of time is wasted in reverse-engineering the code and making avoidable
13 it needs to be to support a project of this size and importance.
16 Kernel documentation improvements can be made by developers at a variety of
17 skill levels; they are a relatively easy way to learn the kernel process in
18 general and find a place in the community. The bulk of what follows is the
23 ---------------------------
26 documentation to where it should be. This list contains a number of
[all …]
/Documentation/networking/
Dip-sysctl.rst1 .. SPDX-License-Identifier: GPL-2.0
10 ip_forward - BOOLEAN
11 - 0 - disabled (default)
12 - not 0 - enabled
20 ip_default_ttl - INTEGER
21 Default value of TTL field (Time To Live) for outgoing (but not
25 ip_no_pmtu_disc - INTEGER
26 Disable Path MTU Discovery. If enabled in mode 1 and a
27 fragmentation-required ICMP is received, the PMTU to this
37 Mode 3 is a hardened pmtu discover mode. The kernel will only
[all …]
/Documentation/admin-guide/
Dreporting-issues.rst1 .. SPDX-License-Identifier: (GPL-2.0+ OR CC-BY-4.0)
11 Are you facing a regression with vanilla kernels from the same stable or
23 expect to be told about problems, which most of the time will be by email with a
27 <https://kernel.org/>`_. If the issue is present there, send a report.
29 The issue was fixed there, but you would like to see it resolved in a still
35 **General remarks**: When installing and testing a kernel as outlined above,
36 ensure it's vanilla (IOW: not patched and not using add-on modules). Also make
37 sure it's built and running in a healthy environment and not already tainted
42 issue, like the kernel and the distro used. In case of a regression, CC the
44 to pin-point the culprit with a bisection; if you succeed, include its
[all …]
/Documentation/arch/arm/omap/
Ddss.rst7 TV-out and multiple display support, but there are lots of small improvements
10 The DSS2 driver (omapdss module) is in arch/arm/plat-omap/dss/, and the FB,
11 panel and controller drivers are in drivers/video/omap2/. DSS1 and DSS2 live
15 --------
19 - MIPI DPI (parallel) output
20 - MIPI DSI output in command mode
21 - MIPI DBI (RFBI) output
22 - SDI output
23 - TV output
24 - All pieces can be compiled as a module or inside kernel
[all …]
/Documentation/networking/dsa/
Dconfiguration.rst1 .. SPDX-License-Identifier: GPL-2.0
10 .. _dsa-config-showcases:
13 -----------------------
15 To configure a DSA switch a couple of commands need to be executed. In this
19 Every switch port acts as a different configurable Ethernet port
25 Every switch port except one upstream port is part of a configurable
32 Through DSA every port of a switch is handled like a normal linux Ethernet
42 - when a DSA user interface is brought up, the conduit interface is
44 - when the conduit interface is brought down, all DSA user interfaces are
56 a user interface
[all …]

12