Searched +full:state +full:- +full:labels (Results 1 – 22 of 22) sorted by relevance
| /Documentation/devicetree/bindings/sound/ |
| D | simple-audio-mux.yaml | 1 # SPDX-License-Identifier: (GPL-2.0+ OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/sound/simple-audio-mux.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Alexandre Belloni <aleandre.belloni@bootlin.com> 17 - $ref: dai-common.yaml# 21 const: simple-audio-mux 23 mux-gpios: 27 state-labels: 28 description: State of input line. default is "Input 1", "Input 2" [all …]
|
| /Documentation/admin-guide/LSM/ |
| D | Smack.rst | 7 - The Elevator, from Dark Star 21 - The kernel 22 - Basic utilities, which are helpful but not required 23 - Configuration data 41 git://github.com/smack-team/smack.git 77 Smack uses extended attributes (xattrs) to store labels on filesystem 120 # attr -S -s SMACK64 -V "value" path 121 # chsmack -a value path 128 in the smackfs filesystem. This pseudo-filesystem is mounted 153 change-rule [all …]
|
| D | ipe.rst | 1 .. SPDX-License-Identifier: GPL-2.0 9 attempting to use IPE. If you're looking for more developer-focused 13 -------- 17 mechanisms that rely on labels and paths for decision-making, IPE focuses 34 a file's origin, such as dm-verity or fs-verity, which provide a layer of 36 that trust files from a dm-verity protected device. dm-verity ensures the 37 integrity of an entire device by providing a verifiable and immutable state 38 of its contents. Similarly, fs-verity offers filesystem-level integrity 40 fs-verity. These two features cannot be turned off once established, so 49 from initramfs) or evaluating the internal state of an immutable security [all …]
|
| /Documentation/sphinx/ |
| D | kfigure.py | 1 # -*- coding: utf-8; mode: python -*- 14 handling from the author's POV. Directives like ``kernel-figure`` implement 15 methods *to* always get the best output-format even if some tools are not 19 * ``.. kernel-image``: for image handling / a ``.. image::`` replacement 21 * ``.. kernel-figure``: for figure handling / a ``.. figure::`` replacement 23 * ``.. kernel-render``: for render markup / a concept to embed *render* 26 - ``DOT``: render embedded Graphviz's **DOC** 27 - ``SVG``: render embedded Scalable Vector Graphics (**SVG**) 28 - ... *developable* 33 available, the DOT language is inserted as literal-block. [all …]
|
| /Documentation/ABI/testing/ |
| D | sysfs-power | 9 What: /sys/power/state 13 The /sys/power/state file controls system sleep states. 14 Reading from this file returns the available sleep state 15 labels, which may be "mem" (suspend), "standby" (power-on 16 suspend), "freeze" (suspend-to-idle) and "disk" (hibernation). 19 to transition into the corresponding state, if available. 21 See Documentation/admin-guide/pm/sleep-states.rst for more 32 to suspend the system (by writing "mem" to the /sys/power/state 39 See Documentation/admin-guide/pm/sleep-states.rst for more 47 suspend-to-disk mechanism. Reading from this file returns [all …]
|
| D | sysfs-bus-iio | 3 Contact: linux-iio@vger.kernel.org 11 Contact: linux-iio@vger.kernel.org 25 Contact: linux-iio@vger.kernel.org 31 Contact: linux-iio@vger.kernel.org 38 Contact: linux-iio@vger.kernel.org 44 The contents of the label are free-form, but there are some 48 a certain wlan or wwan antenna the following standardized labels 51 * "proximity-wifi" 52 * "proximity-lte" 53 * "proximity-wifi-lte" [all …]
|
| /Documentation/staging/ |
| D | static-keys.rst | 30 performance-sensitive fast-path kernel code, via a GCC feature and a code 74 https://gcc.gnu.org/ml/gcc-patches/2009-07/msg01556.html 77 by default, without the need to check memory. Then, at run-time, we can patch 86 consist of a single atomic 'no-op' instruction (5 bytes on x86), in the 87 straight-line code path. When the branch is 'flipped', we will patch the 88 'no-op' in the straight-line codepath with a 'jump' instruction to the 89 out-of-line true branch. Thus, changing branch direction is expensive but 110 allocated at run-time. 152 The state and the reference count can be retrieved with 'static_key_enabled()' 180 4) Architecture level code patching interface, 'jump labels' [all …]
|
| /Documentation/networking/ |
| D | pktgen.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 Enable CONFIG_NET_PKTGEN to compile and build pktgen either in-kernel 31 overload type of benchmarking, as this could hurt the normal use-case. 35 # ethtool -G ethX tx 1024 44 ring-buffers for various performance reasons, and packets stalling 49 and the cleanup interval is affected by the ethtool --coalesce setting 50 of parameter "rx-usecs". 54 # ethtool -C ethX rx-usecs 30 72 * add_device DEVICE@NAME -- adds a single device 73 * rem_device_all -- remove all associated devices [all …]
|
| D | ip-sysctl.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 ip_forward - BOOLEAN 11 - 0 - disabled (default) 12 - not 0 - enabled 17 parameters to their default state (RFC1122 for hosts, RFC1812 20 ip_default_ttl - INTEGER 25 ip_no_pmtu_disc - INTEGER 27 fragmentation-required ICMP is received, the PMTU to this 38 accept fragmentation-needed errors if the underlying protocol 48 Possible values: 0-3 [all …]
|
| /Documentation/filesystems/bcachefs/ |
| D | CodingStyle.rst | 1 .. SPDX-License-Identifier: GPL-2.0 11 Things don't always have to be perfect - nitpicking often does more harm than 12 good. But appreciate beauty when you see it - and let people know. 26 you're not sure if it can happen and not sure how to handle it yet - make it a 33 expensive - but don't turn everything into a debug mode assertion, so that 43 Good assertions are based on state, not logic. To write good assertions, you 44 have to think about what the invariants on your state are. 52 elide - if we were working in a language with embedded correctness proofs that 56 invariants with runtime checks - much like the way people working in 60 Looking for ways to make your assertions simpler - and higher level - will [all …]
|
| /Documentation/netlink/specs/ |
| D | ovs_flow.yaml | 1 # SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 5 protocol: genetlink-legacy 6 uapi-header: linux/openvswitch.h 12 - 13 name: ovs-header 18 - 19 name: dp-ifindex 24 - 25 name: ovs-flow-stats 28 - [all …]
|
| D | tc.yaml | 1 # SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 4 protocol: netlink-raw 12 - 16 - 19 - 23 - 26 - 29 - 32 - 35 - [all …]
|
| D | nftables.yaml | 1 # SPDX-License-Identifier: ((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 4 protocol: netlink-raw 11 - 15 - 16 name: nfgen-family 18 - 21 - 22 name: res-id 23 byte-order: big-endian 25 - [all …]
|
| /Documentation/security/ |
| D | ipe.rst | 1 .. SPDX-License-Identifier: GPL-2.0 3 Integrity Policy Enforcement (IPE) - Kernel Documentation 10 :doc:`IPE admin guide </admin-guide/LSM/ipe>`. 13 --------------------- 16 of a locked-down system. This system would be born-secure, and have 27 2. DM-Verity 29 Both options were carefully considered, however the choice to use DM-Verity 43 At the time, this was done with mandatory access control labels. An IMA 44 policy would indicate what labels required integrity verification, which 46 modify filesystem offline, the attacker could wipe all the xattrs - [all …]
|
| /Documentation/admin-guide/RAS/ |
| D | main.rst | 1 .. SPDX-License-Identifier: GPL-2.0 37 ------------- 51 Self-Monitoring, Analysis and Reporting Technology (SMART). 59 --------------- 72 * **Correctable Error (CE)** - the error detection mechanism detected and 76 * **Uncorrected Error (UE)** - the amount of errors happened above the error 77 correction threshold, and the system was unable to auto-correct. 79 * **Fatal Error** - when an UE error happens on a critical component of the 83 * **Non-fatal Error** - when an UE error happens on an unused component, 84 like a CPU in power down state or an unused memory bank, the system may [all …]
|
| /Documentation/driver-api/nvdimm/ |
| D | nvdimm.rst | 2 LIBNVDIMM: Non-Volatile Devices 5 libnvdimm - kernel / libndctl - userspace helper library 18 PMEM-REGIONs, Atomic Sectors, and DAX 50 A system-physical-address range where writes are persistent. A 55 DIMM Physical Address, is a DIMM-relative offset. With one DIMM in 56 the system there would be a 1:1 system-physical-address:DPA association. 59 system-physical-address. 68 device - in this case the firmware. 72 It defines a vendor-id, device-id, and interface format for a given DIMM. 76 Existing software may have an expectation that the power-fail-atomicity [all …]
|
| /Documentation/process/ |
| D | maintainer-kvm-x86.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 -------- 17 ----- 21 ----- 25 specific tree, ``github.com/kvm-x86/linux.git``. 39 using finer-grained topic branches is to make it easier to keep tabs on an area 42 in-flight commits' SHA1 hashes, and having to reject a pull request due to bugs 46 via a Cthulhu merge on an as-needed basis, i.e. when a topic branch is updated. 69 Patches that will be taken through a non-KVM tree (most often through the tip 83 ----------- [all …]
|
| /Documentation/devicetree/bindings/gpio/ |
| D | gpio.txt | 5 ----------------- 7 GPIO properties should be named "[<name>-]gpios", with <name> being the purpose 8 of this GPIO for the device. While a non-existent <name> is considered valid 10 for new bindings. Also, GPIO properties named "[<name>-]gpio" are valid and old 24 and bit-banged data signals: 27 gpio-controller; 28 #gpio-cells = <2>; 32 data-gpios = <&gpio1 12 0>, 44 recommended to use the two-cell approach. 48 include/dt-bindings/gpio/gpio.h whenever possible: [all …]
|
| /Documentation/networking/dsa/ |
| D | dsa.rst | 22 An Ethernet switch typically comprises multiple front-panel ports and one 27 gateways, or even top-of-rack switches. This host Ethernet controller will 36 For each front-panel port, DSA creates specialized network devices which are 37 used as controlling and data-flowing endpoints for use by the Linux networking 46 - what port is this frame coming from 47 - what was the reason why this frame got forwarded 48 - how to send CPU originated traffic to specific ports 52 on Port-based VLAN IDs). 57 - the "cpu" port is the Ethernet switch facing side of the management 61 - the "dsa" port(s) are just conduits between two or more switches, and as such [all …]
|
| /Documentation/filesystems/ |
| D | coda.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 Coda Kernel-Venus Interface 10 Coda -- this document describes the client kernel-Venus interface. 35 level filesystem code needed for the operation of the Coda file sys- 124 leads to an almost natural environment for implementing a kernel-level 153 pre-processing, the VFS starts invoking exported routines in the FS 198 not go into the calls exported to the VFS layer but we will state the 208 up processes. The Coda FS driver processes VFS- and pioctl-requests 220 memory for the request. Since the data buffer is re-used to hold the 283 processing. The VFS routine will now continue. (-- If a VFS request [all …]
|
| /Documentation/block/ |
| D | inline-encryption.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 keys directly in low-level I/O requests. However, most inline encryption 22 low-level I/O request then just contains a keyslot index and data unit number. 30 Inline encryption hardware is also very different from "self-encrypting drives", 31 such as those based on the TCG Opal or ATA Security standards. Self-encrypting 32 drives don't provide fine-grained control of encryption and provide no way to 34 provides fine-grained control of encryption, including the choice of key and 43 layered devices like device-mapper and loopback (i.e. we want to be able to use 50 - We need a way for upper layers (e.g. filesystems) to specify an encryption 56 - Different inline encryption hardware has different supported algorithms, [all …]
|
| /Documentation/filesystems/xfs/ |
| D | xfs-online-fsck-design.rst | 1 .. SPDX-License-Identifier: GPL-2.0 8 Heading 3 uses "----" 25 - To help kernel distributors understand exactly what the XFS online fsck 28 - To help people reading the code to familiarize themselves with the relevant 31 - To help developers maintaining the system by capturing the reasons 59 - Provide a hierarchy of names through which application programs can associate 62 - Virtualize physical storage media across those names, and 64 - Retrieve the named data blobs at any time. 66 - Examine resource usage. 79 cross-references different types of metadata records with each other to look [all …]
|