Home
last modified time | relevance | path

Searched +full:two +full:- +full:user (Results 1 – 25 of 1025) sorted by relevance

12345678910>>...41

/Linux-v5.10/Documentation/networking/
Dxfrm_sync.rst1 .. SPDX-License-Identifier: GPL-2.0
21 This way a backup stays as closely up-to-date as an active member.
25 For this reason, we also add a nagle-like algorithm to restrict
28 These thresholds are set system-wide via sysctls or can be updated
32 - the lifetime byte counter
36 - the replay sequence for both inbound and outbound
39 ----------------------
41 nlmsghdr:aevent_id:optional-TLVs.
49 A XFRM_MSG_NEWAE will have at least two TLVs (as is
76 message (kernel<->user) as well the cause (config, query or event).
[all …]
Daf_xdp.rst1 .. SPDX-License-Identifier: GPL-2.0
20 XDP programs to redirect frames to a memory buffer in a user-space
24 syscall. Associated with each XSK are two rings: the RX ring and the
38 is simply an offset within the entire UMEM region. The user space
42 UMEM also has two rings: the FILL ring and the COMPLETION ring. The
47 kernel has transmitted completely and can now be used again by user
59 corresponding two rings, sets the XDP_SHARED_UMEM flag in the bind
64 single-consumer / single-producer (for performance reasons), the new
72 user-space application can place an XSK at an arbitrary place in this
79 traffic to user space through the XSK.
[all …]
Dgtp.rst1 .. SPDX-License-Identifier: GPL-2.0
11 In 'drivers/net/gtp.c' you are finding a kernel-level implementation
18 tunneling User-IP payload between a mobile station (phone, modem)
29 technology-dependent protocol stack for transmitting the user IP
35 is translated into GTP *without breaking the end-to-end tunnel*. So
38 At some point the GTP packet ends up on the so-called GGSN (GSM/UMTS)
39 or P-GW (LTE), which terminates the tunnel, decapsulates the packet
42 theoretically some non-IP network like X.25).
58 It *only* implements the so-called 'user plane', carrying the User-IP
59 payload, called GTP-U. It does not implement the 'control plane',
[all …]
/Linux-v5.10/Documentation/admin-guide/namespaces/
Dcompatibility-list.rst5 This document contains the information about the problems user
13 - UTS IPC VFS PID User Net
19 User 2 2 X
33 2. Intentionally, two equal user IDs in different user namespaces
35 words, user 10 in one user namespace shouldn't have the same
36 access permissions to files, belonging to user 10 in another
39 The same is true for the IPC namespaces being shared - two users
40 from different user namespaces should not access the same IPC objects
/Linux-v5.10/Documentation/gpu/
Dkomeda-kms.rst1 .. SPDX-License-Identifier: GPL-2.0
23 -----
30 ------
39 -------------------
43 user can also insert a scaler between compositor and wb_layer to down scale
47 --------------------------
52 -----------------------------
57 --------------------------------
62 ------
66 introduces Layer Split, which splits the whole image to two half parts and feeds
[all …]
/Linux-v5.10/Documentation/core-api/
Dpadata.rst1 .. SPDX-License-Identifier: GPL-2.0
23 ------------
43 ------------------
45 The CPUs used to run jobs can be changed in two ways, programatically with
58 live in /sys/kernel/pcrypt/<instance-name>. Within an instance's directory
59 there are two files, parallel_cpumask and serial_cpumask, and either cpumask
64 Reading one of these files shows the user-supplied cpumask, which may be
67 Padata maintains two pairs of cpumasks internally, the user-supplied cpumasks
69 cpumask.) The user-supplied cpumasks default to all possible CPUs on instance
71 subset of the user-supplied cpumasks and contain only the online CPUs in the
[all …]
Dcachetlb.rst19 if it can be proven that a user address space has never executed
25 virtual-->physical address translations obtained from the software
43 This interface flushes an entire user address space from
56 Here we are flushing a specific range of (user) virtual
59 modifications for the address space 'vma->vm_mm' in the range
60 'start' to 'end-1' will be visible to the cpu. That is, after
62 virtual addresses in the range 'start' to 'end-1'.
78 address space is available via vma->vm_mm. Also, one may
79 test (vma->vm_flags & VM_EXEC) to see if this region is
81 split-tlb type setups).
[all …]
/Linux-v5.10/drivers/thermal/intel/
DKconfig1 # SPDX-License-Identifier: GPL-2.0-only
8 enforce idle time which results in more package C-state residency. The
9 user interface is exposed via generic thermal framework.
20 two trip points which can be set by user to get notifications via thermal
40 temperature sensor (DTS). These SoCs have two additional DTSs in
42 thermal zone. There are two trip points. One of the trip point can
43 be set by user mode programs to get notifications via Linux thermal
52 temperature sensor (DTS). For X1000 SoC, it has one on-die DTS.
53 The DTS will be registered as a thermal zone. There are two trip points:
/Linux-v5.10/Documentation/ia64/
Defirtc.rst13 the IA-64 platform.
15 The purpose of this driver is to supply an API for kernel and user applications
31 Because we wanted to minimize the impact on existing user-level apps using
39 the reference date is different. Year is the using the full 4-digit format.
44 without necessarily impacting any of the user applications. The decoupling
47 The driver exposes two interfaces, one via the device file and a set of
48 ioctl()s. The other is read-only via the /proc filesystem.
54 "public" API of the two drivers. The specifics of the legacy RTC are still
62 Two ioctl()s, compatible with the legacy RTC calls:
90 Those two ioctl()s can be exercised with the hwclock command:
[all …]
/Linux-v5.10/Documentation/kbuild/
Dkconfig-macro-language.rst6 -------
9 two languages in one. One language describes dependency graphs consisting of
13 There is clear distinction between the two language stages. For example, you
21 $(CC) -o $(APP) $(SRC)
27 gcc -o foo foo.c
32 The idea is quite similar in Kconfig - it is possible to describe a Kconfig
38 def_bool $(shell, $(srctree)/scripts/gcc-check-foo.sh $(CC))
46 Then, Kconfig moves onto the evaluation stage to resolve inter-symbol
47 dependency as explained in kconfig-language.rst.
51 ---------
[all …]
/Linux-v5.10/Documentation/hwmon/
Dadm9240.rst10 Addresses scanned: I2C 0x2c - 0x2f
20 Addresses scanned: I2C 0x2c - 0x2f
24 http://pdfserv.maxim-ic.com/en/ds/DS1780.pdf
30 Addresses scanned: I2C 0x2c - 0x2f
37 - Frodo Looijaard <frodol@dds.nl>,
38 - Philip Edelbrock <phil@netroedge.com>,
39 - Michiel Rook <michiel@grendelproject.nl>,
40 - Grant Coady <gcoady.lk@gmail.com> with guidance
44 ---------
46 chip MSB 5-bit address. Each chip reports a unique manufacturer
[all …]
/Linux-v5.10/Documentation/admin-guide/pm/
Dstrategies.rst1 .. SPDX-License-Identifier: GPL-2.0
13 The Linux kernel supports two major high-level power management strategies.
15 One of them is based on using global low-power states of the whole system in
16 which user space code cannot be executed and the overall system activity is
17 significantly reduced, referred to as :doc:`sleep states <sleep-states>`. The
18 kernel puts the system into one of these states when requested by user space
21 user space code can run. Because sleep states are global and the whole system
23 :doc:`system-wide power management <system-wide>`.
25 The other strategy, referred to as the :doc:`working-state power management
26 <working-state>`, is based on adjusting the power states of individual hardware
[all …]
/Linux-v5.10/Documentation/vm/
Dactive_mm.rst9 List: linux-kernel
12 Date: 1999-07-30 21:36:24
14 Cc'd to linux-kernel, because I don't write explanations all that often,
21 > discussed on the mailing lists---I just returned from vacation and
22 > wasn't able to follow linux-kernel for a while).
26 - we have "real address spaces" and "anonymous address spaces". The
28 user-level page tables at all, so when we do a context switch into an
33 doesn't need any user mappings - all kernel threads basically fall into
35 some amount of time they are not going to be interested in user space,
37 switching the VM state around. Currently only the old-style bdflush
[all …]
/Linux-v5.10/Documentation/driver-api/thermal/
Dx86_pkg_temperature_thermal.rst14 ---------
16 Intel® 64 and IA-32 Architectures Software Developer’s Manual (Jan, 2013):
20 -----------
23 zone with maximum two user mode configurable trip points. Number of trip points
25 user mode can receive notification via thermal notification mechanism and can
30 --------------------
37 This contains two trip points:
39 - trip_point_0_temp
40 - trip_point_1_temp
42 User can set any temperature between 0 to TJ-Max temperature. Temperature units
[all …]
/Linux-v5.10/Documentation/firmware-guide/acpi/
Dvideo_extension.rst1 .. SPDX-License-Identifier: GPL-2.0
16 Export a sysfs interface for user space to control backlight level
26 Documentation/ABI/stable/sysfs-class-backlight.
65 The first two levels are for when laptop are on AC or on battery and are
70 as a "brightness level" indicator. Thus from the user space perspective
74 Notify user space about hotkey event
77 There are generally two cases for hotkey event reporting:
79 i) For some laptops, when user presses the hotkey, a scancode will be
80 generated and sent to user space through the input device created by
82 following key code will appear to user space::
[all …]
/Linux-v5.10/arch/x86/kernel/
Dumip.c2 * umip.c Emulation for instruction protected by the User-Mode Instruction
6 * Ricardo Neri <ricardo.neri-calderon@linux.intel.com>
13 #include <asm/insn-eval.h>
19 /** DOC: Emulation for User-Mode Instruction Prevention (UMIP)
21 * User-Mode Instruction Prevention is a security feature present in recent
23 * SIDT, SLDT, SMSW and STR) from being run in user mode by issuing a general
26 * Rather than relaying to the user space the general protection fault caused by
27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be
38 * The instructions protected by UMIP can be split in two groups. Those which
44 * not the actual location of the table. The result is emulated as a hard-coded
[all …]
/Linux-v5.10/Documentation/admin-guide/nfs/
Dnfs-idmapper.rst5 Id mapper is used by NFS to translate user and group ids into names, and to
6 translate user and group names into ids. Part of this translation involves
7 performing an upcall to userspace to request the information. There are two
8 ways NFS could obtain this information: placing a call to /sbin/request-key
11 NFS will attempt to call /sbin/request-key first. If this succeeds, the
12 result will be cached using the generic request-key cache. This call should
13 only fail if /etc/request-key.conf is not configured for the id_resolver key
14 type, see the "Configuring" section below if you wish to use the request-key
17 If the call to /sbin/request-key fails (if /etc/request-key.conf is not
26 The file /etc/request-key.conf will need to be modified so /sbin/request-key can
[all …]
/Linux-v5.10/drivers/usb/gadget/legacy/
DKconfig1 # SPDX-License-Identifier: GPL-2.0
7 # NOTE: Gadget support ** DOES NOT ** depend on host-side CONFIG_USB !!
9 # - Host systems (like PCs) need CONFIG_USB (with "A" jacks).
10 # - Peripherals (like PDAs) need CONFIG_USB_GADGET (with "B" jacks).
11 # - Some systems have both kinds of controllers.
13 # With help from a special transceiver and a "Mini-AB" jack, systems with
14 # both kinds of controller can also support "USB On-the-Go" (CONFIG_USB_OTG).
23 # Gadget drivers are hardware-neutral, or "platform independent",
44 Gadget Zero is a two-configuration device. It either sinks and
47 conformance. The driver needs only two bulk-capable endpoints, so
[all …]
/Linux-v5.10/drivers/staging/comedi/drivers/
Djr3_pci.h1 /* SPDX-License-Identifier: GPL-2.0 */
31 * two-byte words.
42 * Channels 1-6 contain the coupled force data Fx through Mz. Channel
43 * 7 contains the sensor's calibration data. The use of channels 8-15
90 * or the other so that two force vectors or two moment vectors are
93 * have two force vectors, set changeV1 to 1.
139 * was detected in the on-board RAM during the power-up
142 * bit latches, and must be reset by the user.
152 * user. A very fast system using the force data for feedback might
169 * received from the sensor. There are two reasons the CRC may not
[all …]
/Linux-v5.10/Documentation/driver-api/iio/
Dcore.rst6 many different types of embedded sensors and a standard interface to user space
8 :file:`drivers/iio/industrialio-*`
11 ----------------------
13 * struct iio_dev - industrial I/O device
14 * iio_device_alloc() - allocate an :c:type:`iio_dev` from a driver
15 * iio_device_free() - free an :c:type:`iio_dev` from a driver
16 * iio_device_register() - register a device with the IIO subsystem
17 * iio_device_unregister() - unregister a device from the IIO
25 There are two ways for a user space application to interact with an IIO driver.
33 :doc:`SPI <../spi>` driver and will create two routines, probe and remove.
[all …]
/Linux-v5.10/drivers/misc/lkdtm/
Dusercopy.c1 // SPDX-License-Identifier: GPL-2.0
17 * into choosing the non-const path to make sure we trigger the
28 * Instead of adding -Wno-return-local-addr, just pass the stack address
66 bad_stack -= sizeof(unsigned long); in do_usercopy_stack()
73 pr_warn("Failed to allocate user memory\n"); in do_usercopy_stack()
119 * This checks for whole-object size validation with hardened usercopy,
125 unsigned char *one, *two; in do_usercopy_heap_size() local
131 two = kmalloc(size, GFP_KERNEL); in do_usercopy_heap_size()
132 if (!one || !two) { in do_usercopy_heap_size()
141 pr_warn("Failed to allocate user memory\n"); in do_usercopy_heap_size()
[all …]
/Linux-v5.10/arch/x86/include/asm/
Dsegment.h1 /* SPDX-License-Identifier: GPL-2.0 */
13 ((((base) & _AC(0xff000000,ULL)) << (56-24)) | \
15 (((limit) & _AC(0x000f0000,ULL)) << (48-16)) | \
29 * Bottom two bits of selector give the ring
37 * determine whether the context is user mode or kernel mode with
46 /* User mode is privilege level 3: */
60 * The layout of the per-CPU GDT under Linux:
62 * 0 - null <=== cacheline #1
63 * 1 - reserved
64 * 2 - reserved
[all …]
/Linux-v5.10/Documentation/RCU/
Drcu.rst6 The basic idea behind RCU (read-copy update) is to split destructive
7 operations into two parts, one that prevents anyone from seeing the data
9 A "grace period" must elapse between the two parts, and this grace period
11 since dropped their references. For example, an RCU-protected deletion
18 --------------------------
20 - Why would anyone want to use RCU?
22 The advantage of RCU's two-part approach is that RCU readers need
27 in read-mostly situations. The fact that RCU readers need not
28 acquire locks can also greatly simplify deadlock-avoidance code.
30 - How can the updater tell when a grace period has completed
[all …]
/Linux-v5.10/Documentation/ABI/removed/
Dsysfs-kernel-uids2 Date: December 2007, finally removed in kernel v2.6.34-rc1
7 to set the cpu bandwidth a user is allowed. This is a
9 are two users logged in, each with an equal number of
11 example would be, if User A has shares = 1024 and user
12 B has shares = 2048, User B will get twice the CPU
13 bandwidth user A will. For more details refer
14 Documentation/scheduler/sched-design-CFS.rst
/Linux-v5.10/Documentation/driver-api/usb/
Dgadget.rst11 This document presents a Linux-USB "Gadget" kernel mode API, for use
17 - Supports USB 2.0, for high speed devices which can stream data at
20 - Handles devices with dozens of endpoints just as well as ones with
21 just two fixed-function ones. Gadget drivers can be written so
24 - Flexible enough to expose more complex USB device capabilities such
28 - USB "On-The-Go" (OTG) support, in conjunction with updates to the
29 Linux-USB host side.
31 - Sharing data structures and API models with the Linux-USB host side
32 API. This helps the OTG support, and looks forward to more-symmetric
36 - Minimalist, so it's easier to support new device controller hardware.
[all …]

12345678910>>...41