Home
last modified time | relevance | path

Searched full:of (Results 1 – 25 of 5423) sorted by relevance

12345678910>>...217

/Documentation/devicetree/bindings/clock/
Dfsl,imx8-acm.yaml35 for the full list of i.MX8 ACM clock IDs.
64 - description: power domain of IMX_SC_R_AUDIO_CLK_0
65 - description: power domain of IMX_SC_R_AUDIO_CLK_1
66 - description: power domain of IMX_SC_R_MCLK_OUT_0
67 - description: power domain of IMX_SC_R_MCLK_OUT_1
68 - description: power domain of IMX_SC_R_AUDIO_PLL_0
69 - description: power domain of IMX_SC_R_AUDIO_PLL_1
70 - description: power domain of IMX_SC_R_ASRC_0
71 - description: power domain of IMX_SC_R_ASRC_1
72 - description: power domain of IMX_SC_R_ESAI_0
[all …]
/Documentation/filesystems/
Ddirectory-locking.rst7 kinds of locks - per-inode (->i_rwsem) and per-filesystem
44 * decide which of the source and target need to be locked.
58 ancestor of the other, lock the parent of source first.
60 * verify that the source is not a descendent of the target and
61 target is not a descendent of source; fail the operation otherwise.
73 in its own right; it may happen as part of lookup. We speak of the
75 picture of those - especially for network filesystems. What we have
76 is a bunch of subtrees visible in dcache and locking happens on those.
79 when one growing tree reaches the root of another? That can happen in
81 from the same NFS4 server and doing lookups in one of them has reached
[all …]
/Documentation/sound/designs/
Dtracepoints.rst12 This subsystem includes two categories of tracepoints; for state of PCM buffer
13 and for processing of PCM hardware parameters. These tracepoints are available
18 Tracepoints for state of PCM buffer
24 Tracepoints for processing of PCM hardware parameters
30 In a design of ALSA PCM core, data transmission is abstracted as PCM substream.
34 interaction between applications and ALSA PCM core. Once decided, runtime of
38 structure includes several types of parameters. Applications set preferable
41 set of parameters. The latter is used for an actual decision of the parameters.
49 Configurable. This type of parameter is described in
50 struct snd_mask and represent mask values. As of PCM protocol
[all …]
/Documentation/process/
Dcode-of-conduct-interpretation.rst3 Linux Kernel Contributor Covenant Code of Conduct Interpretation
7 provide a set of rules for almost any open source community. Every
9 Because of this, this document describes how we in the Linux kernel
14 to "traditional" ways of developing software. Your contributions and
19 the best possible solution for the overall success of Linux. This
22 quality of submission and eventual result to ever decrease.
27 The Code of Conduct uses the term "maintainers" numerous times. In the
35 The Code of Conduct mentions rights and responsibilities for
43 behave in the parts of the community where they are active. That
44 responsibility is upon all of us, and ultimately the Code of Conduct
[all …]
D1.Intro.rst9 The rest of this section covers the scope of the kernel development process
10 and the kinds of frustrations that developers and their employers can
14 influence the direction of kernel development. Code contributed to the
18 release cycle, and the mechanics of the merge window. The various phases in
20 discussion of tools and mailing lists. Developers wanting to get started
29 patches are covered, and there is an introduction to some of the tools
32 :ref:`development_posting` talks about the process of posting patches for
40 of the development process; this section offers a number of tips on how to
44 :ref:`development_advancedtopics` introduces a couple of "advanced" topics:
53 The Linux kernel, at over 8 million lines of code and well over 1000
[all …]
D4.Coding.rst7 process, the proof of any kernel development project is in the resulting
9 (or not) into the mainline tree. So it is the quality of this code which
10 will determine the ultimate success of the project.
13 number of ways in which kernel developers can go wrong. Then the focus
25 :ref:`Documentation/process/coding-style.rst <codingstyle>`. For much of
27 advisory. As a result, there is a substantial amount of code in the kernel
28 which does not meet the coding style guidelines. The presence of that code
31 The first of these is to believe that the kernel coding standards do not
32 matter and are not enforced. The truth of the matter is that adding new
36 requires some uniformity of code to make it possible for developers to
[all …]
Dcve.rst9 in inappropriate ways and for inappropriate reasons. Because of this,
11 combination of continuing pressure to assign CVEs and other forms of
13 outside of the kernel community has made it clear that the kernel
18 of the :doc:`normal Linux kernel security bug reporting
21 A list of all assigned CVEs for the Linux kernel can be found in the
22 archives of the linux-cve mailing list, as seen on
23 https://lore.kernel.org/linux-cve-announce/. To get notice of the
30 As part of the normal stable release process, kernel changes that are
37 any bug might be exploitable to compromise the security of the kernel,
38 but the possibility of exploitation is often not evident when the bug is
[all …]
/Documentation/admin-guide/
Diostats.rst16 is mounted on ``/sys``, although of course it may be mounted anywhere.
20 Here are examples of these different formats::
38 a choice of ``cat /sys/block/hda/stat`` or ``grep 'hda ' /proc/diskstats``.
40 The advantage of one over the other is that the sysfs choice works well
41 if you are watching a known, small set of disks. ``/proc/diskstats`` may
42 be a better choice if you are watching a large number of disks because
43 you'll avoid the overhead of 50, 100, or 500 or more opens/closes with
44 each snapshot of your disk statistics.
47 the above example, the first field of statistics would be 446216.
51 minor device numbers, and device name. Each of these formats provides
[all …]
/Documentation/scheduler/
Dsched-stats.rst5 Version 16 of schedstats changed the order of definitions within
6 'enum cpu_idle_type', which changed the order of [CPU_MAX_IDLE_TYPES]
7 columns in show_schedstat(). In particular the position of CPU_IDLE
8 and __CPU_NOT_IDLE changed places. The size of the array is unchanged.
10 Version 15 of schedstats dropped counters for some sched_yield:
14 Version 14 of schedstats includes support for sched_domains, which hit the
21 In version 14 of schedstat, there is at least one level of domain
26 sometimes balancing only between pairs of cpus. At this time, there
32 of these will need to start with a baseline observation and then calculate
34 which does this for many of the fields is available at
[all …]
/Documentation/admin-guide/perf/
Dhns3-pmu.rst6 End Point device to collect performance statistics of HiSilicon SoC NIC.
9 HNS3 PMU supports collection of performance statistics such as bandwidth,
17 The HNS3 PMU driver registers a perf PMU with the name of its sicl id.::
21 PMU driver provides description of available events, filter modes, format,
24 The "events" directory describes the event code of all supported events
27 The "filtermode" directory describes the supported filter modes of each
30 The "format" directory describes all formats of the config (events) and
31 config1 (filter options) fields of the perf_event_attr structure.
33 The "identifier" file shows version of PMU hardware device.
35 The "bdf_min" and "bdf_max" files show the supported bdf range of each
[all …]
/Documentation/userspace-api/media/
Dfdl-appendix.rst15 The purpose of this License is to make a manual, textbook, or other
16 written document "free" in the sense of freedom: to assure everyone the
23 This License is a kind of "copyleft", which means that derivative works
24 of the document must themselves be free in the same sense. It
32 used for any textual work, regardless of subject matter or whether it is
47 terms of this License. The "Document", below, refers to any such manual
48 or work. Any member of the public is a licensee, and is addressed as
54 A "Modified Version" of the Document means any work containing the
55 Document or a portion of it, either copied verbatim, or with
61 A "Secondary Section" is a named appendix or a front-matter section of
[all …]
/Documentation/networking/device_drivers/ethernet/mellanox/mlx5/
Dcounters.rst22 addition, each group of counters may have different counter types.
71 An aggregation of software ring counters.
86 A set of the physical port counters, per priority per port.
105 Increment of these counters might indicate a problem. Each of these counters
119 explicitly documented since `tx[i]_packets` describes the behavior of both
127 These counters provide information on the amount of traffic that was accelerated
145 - The number of packets received on ring i.
149 - The number of bytes received on ring i.
153 - The number of packets transmitted on ring i.
157 - The number of bytes transmitted on ring i.
[all …]
/Documentation/admin-guide/mm/
Dhugetlbpage.rst8 The intent of this file is to give a brief summary of hugetlbpage support in
9 the Linux kernel. This support is built on top of multiple page size support
13 256M and ppc64 supports 4K and 16M. A TLB is a cache of virtual-to-physical
15 Operating systems try to make best use of limited number of TLB resources.
27 The ``/proc/meminfo`` file provides information about the total number of
29 default huge page size and information about the number of free, reserved
30 and surplus huge pages in the pool of huge pages of default size.
32 size of the arguments to system calls that map huge page regions.
34 The output of ``cat /proc/meminfo`` will include lines like::
46 is the size of the pool of huge pages.
[all …]
/Documentation/input/
Dmulti-touch-protocol.rst13 In order to utilize the full power of the new multi-touch and multi-user
17 drivers to report details for an arbitrary number of contacts.
19 The protocol is divided into two types, depending on the capabilities of the
22 devices capable of tracking identifiable contacts (type B), the protocol
32 Contact details are sent sequentially as separate packets of ABS_MT
33 events. Only the ABS_MT events are recognized as part of a contact
35 applications, the MT protocol can be implemented on top of the ST protocol
39 input_mt_sync() at the end of each packet. This generates a SYN_MT_REPORT
44 input_mt_slot(), with a slot as argument, at the beginning of each packet.
46 prepare for updates of the given slot.
[all …]
/Documentation/arch/powerpc/
Dassociativity.rst5 Associativity represents the groupings of the various platform resources into
6 domains of substantially similar mean performance relative to resources outside
7 of that domain. Resources subsets of a given domain that exhibit better
9 are represented as being members of a sub-grouping domain. This performance
10 characteristic is presented in terms of NUMA node distance within the Linux kernel.
13 PAPR interface currently supports different ways of communicating these resource
17 Hypervisor indicates the type/form of associativity used via "ibm,architecture-vec-5 property".
18 Bit 0 of byte 5 in the "ibm,architecture-vec-5" property indicates usage of Form 0 or Form 1.
19 A value of 1 indicates the usage of Form 1 associativity. For Form 2 associativity
20 bit 2 of byte 5 in the "ibm,architecture-vec-5" property is used.
[all …]
/Documentation/filesystems/ext4/
Dgroup_descr.rst6 Each block group on the filesystem has one of these descriptors
9 standard configuration is for each block group to contain a full copy of
13 Notice how the group descriptor records the location of both bitmaps and
18 of the groups' bitmaps and inode tables into one long run in the first
19 group of the flex group.
36 checksum is the crc16 of the FS UUID, the group number, and the group
38 checksum is the lower 16 bits of the checksum of the FS UUID, the group
56 - Lower 32-bits of location of block bitmap.
60 - Lower 32-bits of location of inode bitmap.
64 - Lower 32-bits of location of inode table.
[all …]
/Documentation/arch/riscv/
Dhwprobe.rst18 The arguments are split into three groups: an array of key-value pairs, a CPU
26 value returned will be a logical AND of the values for the specified CPUs.
31 of sys_riscv_hwprobe(). Instead of populating the values of keys for a given
32 set of CPUs, the values of each key are given and the set of CPUs is reduced
33 by sys_riscv_hwprobe() to only those which match each of the key-value pairs.
36 means the result of a logical AND of the pair's value with the CPU's value is
39 CPU set returned is the reduction of all the online CPUs which can be
40 represented with a CPU set of size ``cpusetsize``.
48 * :c:macro:`RISCV_HWPROBE_KEY_MVENDORID`: Contains the value of ``mvendorid``,
51 * :c:macro:`RISCV_HWPROBE_KEY_MARCHID`: Contains the value of ``marchid``, as
[all …]
/Documentation/admin-guide/device-mapper/
Dvdo.rst10 corruption, relying instead on integrity protection of the storage below
17 Formatting a vdo volume requires the use of the 'vdoformat' tool, available
25 enter or come up in read-only mode. Because read-only mode is indicative of
26 data-loss, a positive action must be taken to bring vdo out of read-only
40 Each vdo volume reserves 3GB of space for metadata, or more depending on
43 requirements. An estimation of the space saved for a specific dataset can
68 The size of the device which the vdo volume will service,
69 in sectors. Must match the current logical size of the vdo
76 The size of the device holding the vdo volume, as a number
77 of 4096-byte blocks. Must match the current size of the vdo
[all …]
Dstatistics.rst5 Device Mapper supports the collection of I/O statistics on user-defined
6 regions of a DM device. If no regions are defined no statistics are
14 The I/O statistics counters for each step-sized area of a region are
19 histogram of latencies. All these counters may be accessed by sending
33 The creation of DM statistics will allocate memory via kmalloc or
34 fallback to using vmalloc space. At most, 1/4 of the overall system
50 a range of <length> 512-byte sectors
59 number of areas.
62 The number of optional arguments
69 instead of the "jiffies" variable. When this argument is
[all …]
/Documentation/admin-guide/pm/
Dintel_idle.rst16 ``intel_idle`` is a part of the
19 Nehalem and later generations of Intel processors, but the level of support for
27 logical CPU executing it is idle and so it may be possible to put some of the
29 arguments (passed in the ``EAX`` and ``ECX`` registers of the target CPU), the
30 first of which, referred to as a *hint*, can be used by the processor to
42 .. _intel-idle-enumeration-of-states:
44 Enumeration of Idle States
50 as C-states (in the ACPI terminology) or idle states. The list of meaningful
51 ``MWAIT`` hint values and idle states (i.e. low-power configurations of the
53 depend on the configuration of the platform.
[all …]
/Documentation/devicetree/bindings/display/
Dst,stih4xx.txt6 - reg: Physical base address of the IP registers and length of memory mapped region.
14 - reg: Physical base address of the IP registers and length of memory mapped region.
16 number of clocks may depend of the SoC type.
18 - clock-names: names of the clocks listed in clocks property in the same
22 This device must be the parent of all the sub-components and is responsible
23 of bind them.
26 - ranges: to allow probing of subdevices
29 must be a child of sti-display-subsystem
32 - reg: Physical base address of the IP registers and length of memory mapped region.
34 number of clocks may depend of the SoC type.
[all …]
/Documentation/mm/
Dzsmalloc.rst10 any object of size PAGE_SIZE/2 or larger would occupy an entire page.
11 This was one of the major issues with its predecessor (xvmalloc).
13 To overcome these issues, zsmalloc allocates a bunch of 0-order pages
19 For simplicity, zsmalloc can only allocate objects of size up to PAGE_SIZE
20 since this satisfies the requirements of all its current users (in the
27 location of the allocated object. The reason for this indirection is that
38 ``/sys/kernel/debug/zsmalloc/<user name>``. Here is a sample of stat output::
57 the number of zspages with usage ratio less than 10% (see below)
59 the number of zspages with usage ratio between 10% and 20%
61 the number of zspages with usage ratio between 20% and 30%
[all …]
/Documentation/devicetree/bindings/riscv/
Dextensions.yaml15 RISC-V has a large number of extensions, some of which are "standard"
22 made without the creation of a new extension.
24 ratified states, with the exception of the I, Zicntr & Zihpm extensions.
41 Due to revisions of the ISA specification, some deviations
43 Notably, riscv,isa was defined prior to the creation of the
57 version of the unprivileged ISA specification.
72 version of the unprivileged ISA specification.
75 the Zicntr and Zihpm extensions after the ratification of the
76 20191213 version of the unprivileged specification.
81 ratified in the 20191213 version of the unprivileged ISA
[all …]
/Documentation/security/
Dcredentials.rst18 userspace programs. Linux has a variety of actionable objects, including:
28 As a part of the description of all these objects there is a set of
29 credentials. What's in the set depends on the type of object.
33 Amongst the credentials of most objects, there will be a subset that
34 indicates the ownership of that object. This is used for resource
42 Also amongst the credentials of those objects, there will be a subset that
43 indicates the 'objective context' of that object. This may or may not be
47 The objective context is used as part of the security calculation that is
54 Most of the objects in the system are inactive: they don't act on other
65 A subject has an additional interpretation of its credentials. A subset
[all …]
/Documentation/arch/arm64/
Dasymmetric-32bit.rst7 This document describes the impact of asymmetric 32-bit SoCs on the
8 execution of 32-bit (``AArch32``) applications.
16 of the CPUs are capable of executing 32-bit user applications. On such
19 ``execve(2)`` of 32-bit ELF binaries, with the latter returning
20 ``-ENOEXEC``. If the mismatch is detected during late onlining of a
24 Surprisingly, these SoCs have been produced with the intention of
26 well with the default behaviour of Linux.
29 altogether, so if you're stuck in the unenviable position of needing to
30 run 32-bit code on one of these transitionary platforms then you would
32 retirement. If neither of those options are practical, then read on.
[all …]

12345678910>>...217