/Linux-v5.10/Documentation/admin-guide/sysctl/ |
D | user.rst | 15 limits on the number of namespaces and other objects that have 18 The primary purpose of these limits is to stop programs that 21 intention that the defaults of these limits are set high enough that 26 verified to be below the per user limit in that user namespace. 33 This recursive counting of created objects ensures that creating a 41 The maximum number of cgroup namespaces that any user in the current 47 The maximum number of ipc namespaces that any user in the current 53 The maximum number of mount namespaces that any user in the current 59 The maximum number of network namespaces that any user in the 65 The maximum number of pid namespaces that any user in the current [all …]
|
/Linux-v5.10/Documentation/core-api/ |
D | dma-attributes.rst | 5 This document describes the semantics of the DMA attributes that are 11 DMA_ATTR_WEAK_ORDERING specifies that reads and writes to the mapping 12 may be weakly ordered, that is that reads and writes may pass each other. 15 those that do not will simply ignore the attribute and exhibit default 21 DMA_ATTR_WRITE_COMBINE specifies that writes to the mapping may be 25 those that do not will simply ignore the attribute and exhibit default 37 that you won't dereference the pointer returned by dma_alloc_attr(). You 38 can treat it as a cookie that must be passed to dma_mmap_attrs() and 39 dma_free_attrs(). Make sure that both of these also get this attribute 43 DMA_ATTR_NO_KERNEL_MAPPING, those that do not will simply ignore the [all …]
|
/Linux-v5.10/Documentation/process/ |
D | management-style.rst | 14 to do with reality. It started as a lark, but that doesn't mean that it 27 making it painfully obvious to the questioner that we don't have a clue 37 Everybody thinks managers make decisions, and that decision-making is 47 competent to make that decision for them. 51 Namely that you are in the wrong job, and that **they** should be managing 60 It helps to realize that the key difference between a big decision and a 62 can be made small by just always making sure that if you were wrong (and 67 And people will even see that as true leadership (*cough* bullshit 71 things that can't be undone. Don't get ushered into a corner from which 75 It turns out that since nobody would be stupid enough to ever really let [all …]
|
D | 6.Followthrough.rst | 8 patches. One of the biggest mistakes that even experienced kernel 9 developers can make is to conclude that their work is now done. In truth, 13 It is a rare patch which is so good at its first posting that there is no 16 code. You, as the author of that code, will be expected to work with the 17 kernel community to ensure that your code is up to the kernel's quality 32 value and why you went to the trouble of writing it. But that value 36 to substantial rewrites - come from the understanding that Linux will 49 be working on the kernel years from now, but they understand that their 54 What all of this comes down to is that, when reviewers send you comments, 55 you need to pay attention to the technical observations that they are [all …]
|
/Linux-v5.10/Documentation/vm/ |
D | active_mm.rst | 14 Cc'd to linux-kernel, because I don't write explanations all that often, 27 difference is that an anonymous address space doesn't care about the 32 The obvious use for a "anonymous address space" is any thread that 34 this category, but even "real" threads can temporarily say that for 36 and that the scheduler might as well try to avoid wasting time on 38 sync does that. 41 tsk->mm will be NULL, for the logical reason that an anonymous process 45 "stole" for such an anonymous user. For that, we have "tsk->active_mm", 48 The rule is that for a process with a real address space (ie tsk->mm is 57 To support all that, the "struct mm_struct" now has two counters: a [all …]
|
D | memory-model.rst | 12 however, that this range contains small holes that are not accessible 20 whether it is possible to manually override that default. 34 helpers that allow the conversion from PFN to `struct page` and vice 44 In the FLATMEM memory model, there is a global `mem_map` array that 51 usable until the call to :c:func:`memblock_free_all` that hands all the 55 it may free parts of the `mem_map` array that do not cover the 74 things, `pg_data_t` holds the `node_mem_map` array that maps 75 physical pages belonging to that node. The `node_start_pfn` field of 76 `pg_data_t` is the number of the first page frame belonging to that 87 node hosting that page. [all …]
|
/Linux-v5.10/Documentation/networking/devlink/ |
D | devlink-trap.rst | 21 kernel so that it will route it as well and generate an ICMP Time Exceeded 39 as it allows users to obtain further visibility into packet drops that would 123 Generic packet traps are used to describe traps that trap well-defined packets 124 or packets that are trapped due to well-defined conditions (e.g., TTL error). 136 - Traps incoming packets that the device decided to drop because of a 140 - Traps incoming packets that the device decided to drop in case of VLAN 145 - Traps incoming packets that the device decided to drop in case they are 146 tagged with a VLAN that is not configured on the ingress bridge port 149 - Traps incoming packets that the device decided to drop in case the STP 153 - Traps packets that the device decided to drop in case they need to be [all …]
|
/Linux-v5.10/Documentation/driver-api/driver-model/ |
D | binding.rst | 6 driver that can control it. Bus drivers have typically handled this 15 The bus type structure contains a list of all devices that are on that bus 18 list of all drivers of that bus type. When driver_register is called 27 to find one that supports it. In order to determine that, the device 28 ID of the device must match one of the device IDs that the driver 39 chance to verify that it really does support the hardware, and that 47 class, and that is set in the driver's devclass field. 63 A symlink is created in the bus's 'devices' directory that points to 66 A symlink is created in the driver's 'devices' directory that points 70 symlink is created in that directory that points to the device's [all …]
|
/Linux-v5.10/Documentation/power/ |
D | freezing-of-tasks.rst | 17 There are three per-task flags used for that, PF_NOFREEZE, PF_FROZEN 18 and PF_FREEZER_SKIP (the last one is auxiliary). The tasks that have 28 sets this variable. After this, it executes try_to_freeze_tasks() that sends a 30 All freezable tasks must react to that by calling try_to_freeze(), which 33 it loop until PF_FROZEN is cleared for it. Then, we say that the task is 40 try_to_freeze() function (defined in include/linux/freezer.h), that checks 47 that combine interruptible sleep with checking if the task is to be frozen and 69 order to clear the PF_FROZEN flag for each frozen task. Then, the tasks that 101 IV. Why do we do that? 111 filesystem-related information that must be consistent with the state of the [all …]
|
D | s2ram.rst | 11 2) If that does not help, try reading tricks.txt and 21 always it's a driver that is buggy. Thank God for the suspend/resume 22 debugging - the thing that Chuck tried to disable. That's often the _only_ 25 driver that doesn't resume and recompile and reboot). 28 machine that doesn't boot) is: 49 which means that the last trace event was just before trying to resume 50 device 0000:01:00.0. Then figure out what driver is controlling that 55 the culprit may be a device from a loadable kernel module that is not loaded 63 that "radeonfb" simply cannot resume that device - it tries to set the 70 Reason for this is that the RTC is the only reliably available piece of [all …]
|
/Linux-v5.10/Documentation/filesystems/ |
D | directory-locking.rst | 12 that "inode pointer" order in the following. 25 4) rename() that is _not_ cross-directory. Locking rules: caller locks 37 * check that source is not a directory 61 The rules above obviously guarantee that all directories that are going to be 102 blocked on source and it means that it doesn't hold any locks. 105 has a child that is also contended. Indeed, suppose that it is held by 107 is blocked on belongs to child of that object due to (1). 109 It means that one of the operations is cross-directory rename. 111 would have a contended child and we had assumed that no object is its 117 would again have an infinite set of contended objects). But that [all …]
|
D | path-lookup.rst | 22 exploration is needed to discover, is that it is complex. There are 23 many rules, special cases, and implementation alternatives that all 26 tool that we will make extensive use of is "divide and conquer". For 41 of elements: "slashes" that are sequences of one or more "``/``" 42 characters, and "components" that are sequences of one or more 43 non-"``/``" characters. These form two kinds of paths. Those that 52 component, but that isn't always accurate: a pathname can lack both 62 it must identify a directory that already exists, otherwise an error 68 pathname that is just slashes have a final component. If it does 75 tempting to consider that to have an empty final component. In many [all …]
|
/Linux-v5.10/Documentation/block/ |
D | inline-encryption.rst | 17 encryption context programmed into that keyslot. This is very different from 37 - IE hardware has a limited number of "keyslots" that can be programmed 41 that specified keyslot. When possible, we want to make multiple requests with 46 needs to be able to use that encryption context when it processes the bio. 55 We add a struct bio_crypt_ctx to struct bio that can 64 We introduce a keyslot manager (KSM) that handles the translation from 67 upper layers. The generic mode of operation is: each device driver that wants 69 Upper layers that want to use IE on this device can then use this KSM in 72 that the device supports IE. 76 referencing that keyslot). When a new encryption context needs a keyslot, it [all …]
|
/Linux-v5.10/Documentation/powerpc/ |
D | qe_firmware.rst | 31 the particular license, please see the license text that is distributed with 45 integers that compose the actual QE microcode. 47 The term 'firmware' refers to a binary blob that contains the microcode as 48 well as other data that 55 Firmware files are binary files that contain only a firmware. 70 needs split I-RAM. Split I-RAM is only meaningful for SOCs that have 80 5) If necessary, device drivers that need the virtual traps and extended mode 91 This structure contains 6 words that the application should copy to some 119 This is a double word bit array (64 bits) that defines special functionality 127 | 0 | General | Indicates that prior to each host command | [all …]
|
/Linux-v5.10/Documentation/i2c/ |
D | fault-codes.rst | 13 faults. There may be fancier recovery schemes that are appropriate in 18 result for an operation ... it doesn't indicate that anything is wrong 19 at all, just that the outcome wasn't on the "golden path". 23 the right fault code, so that it can (in turn) behave correctly. 33 Note that the descriptions here are not exhaustive. There are other 34 codes that may be returned, and other cases where these codes should 48 atomic context, when some task is already using that I2C bus 57 host. Note that even if PECs are in use, you should not rely 64 or that the reset was attempted but failed. 85 Returned by any component that can't allocate memory when [all …]
|
/Linux-v5.10/Documentation/userspace-api/media/cec/ |
D | cec-ioc-dqevent.rst | 40 the new one. This means that intermediate results can be thrown away but 41 that the latest event is always available. This also means that is it 42 possible to read two successive events that have the same value (e.g. 44 the same state). In that case the intermediate state changes were lost but 45 it is guaranteed that the state did change in between the two events. 65 has the unregistered logical address. In that case all other bits are 0. 69 This field is only valid if ``CEC_CAP_CONNECTOR_INFO`` is set. If that 70 capability is set and ``have_conn_info`` is zero, then that indicates 71 that the HDMI connector device is not instantiated, either because 91 size of the message queue guarantees that all messages received in [all …]
|
/Linux-v5.10/Documentation/firmware-guide/acpi/ |
D | osi.rst | 10 can evaluate that method, look to see if it supports 'XYZ' 14 that OSPM supports" 22 Linux runs on two groups of machines -- those that are tested by the OEM 23 to be compatible with Linux, and those that were never tested with Linux, 26 The larger group is the systems tested to run only Windows. Not only that, 30 Experience shows that taking untested paths through the BIOS 37 Windows to its list of _OSI strings. So it is possible that additional strings 39 But it is likely that they will all eventually be added. 52 via the linux-acpi@vger.kernel.org mailing list. When that patch 55 by the OS. Linux distributors can back-port that patch for Linux [all …]
|
/Linux-v5.10/Documentation/RCU/ |
D | stallwarn.rst | 9 options that can be used to fine-tune the detector's operation. Finally, 33 - Booting Linux using a console connection that is too slow to 40 - Anything that prevents RCU's grace-period kthreads from running. 50 that low-priority task is not permitted to run on any other CPU, 56 - A CPU-bound real-time task in a CONFIG_PREEMPT_RT kernel that 67 help avoid this problem. However, please note that doing this 74 Note that certain high-overhead debugging options, for example 82 slow system. Note that thermal throttling and on-demand governors 86 interrupt on a CPU that is not in dyntick-idle mode. This 90 - A hardware or software issue that prevents time-based wakeups [all …]
|
D | rcu_dereference.rst | 17 bugs due to games that compilers and DEC Alpha can play. 21 DEC Alpha can load a pointer, dereference that pointer, and 22 return data preceding initialization that preceded the store of 34 There are a very few exceptions, namely that you can temporarily 38 bits of that pointer. This clearly means that the pointer 51 rights to substitute zero for this sort of expression, so that 56 and "b" are integers that happen to be equal, the expression 60 - If you are using RCU to protect JITed functions, so that the 65 using the same memory that was used by an earlier JITed function. 81 As before, the reason this is buggy is that relational operators [all …]
|
D | rcuref.rst | 8 Please note that the percpu-ref feature is likely your first 119 The key point is that the initial reference added by add() is not removed 120 until after a grace period has elapsed following removal. This means that 121 search_and_reference() cannot find this element, which means that the value 123 readers that can or ever will be able to reference the element. The 124 element can therefore safely be freed. This in turn guarantees that if 125 any reader finds the element, that reader may safely acquire a reference 129 in listing B is that any call to search_and_reference() that locates 130 a given object will succeed in obtaining a reference to that object, 131 even given a concurrent invocation of delete() for that same object. [all …]
|
/Linux-v5.10/Documentation/RCU/Design/Expedited-Grace-Periods/ |
D | Expedited-Grace-Periods.rst | 21 given that they for all intents and purposes hammer every CPU that 24 The one saving grace is that the hammer has grown a bit smaller 30 of that quiescent state. 49 or a state that is reached after some time. 62 Otherwise, it sets flags so that the outermost ``rcu_read_unlock()`` 65 CPUs that might have RCU read-side critical sections. 71 When that happens, RCU will enqueue the task, which will the continue to 87 | the CPUs? After all, that would avoid all those real-time-unfriendly | 97 | ``rcu_read_unlock()`` invocation, which means that the remote state | 98 | testing would not help the worst-case latency that real-time | [all …]
|
/Linux-v5.10/Documentation/userspace-api/media/v4l/ |
D | colorspaces.rst | 10 biology. Just because you have three numbers that describe the 'red', 11 'green' and 'blue' components of the color of a pixel does not mean that 12 you can accurately display that color. A colorspace defines what it 17 In order to do that we first need to have a good definition of color, 18 i.e. some way to uniquely and unambiguously define a color so that 20 the human eye has color receptors that are sensitive to three different 34 possible that different SPDs will result in the same stimulation of 39 between SPDs and the perceived color and that resulted in the CIE 1931 40 standard that defines spectral weighting functions that model the 41 perception of color. Specifically that standard defines functions that [all …]
|
/Linux-v5.10/Documentation/maintainer/ |
D | rebasing-and-merging.rst | 12 those tools incorrectly, but avoiding problems is not actually all that 15 One thing to be aware of in general is that, unlike many other projects, 26 within a repository. There are two different types of operations that are 43 history; used improperly, it can obscure that history and introduce bugs. 45 There are a few rules of thumb that can help developers to avoid the worst 48 - History that has been exposed to the world beyond your private system 51 work is in need of rebasing, that is usually a sign that it is not yet 58 testing services. If you do expose a branch that may be unstable in 59 this way, be sure that prospective users know not to base work on it. 61 - Do not rebase a branch that contains history created by others. If you [all …]
|
/Linux-v5.10/Documentation/filesystems/ext4/ |
D | allocators.rst | 6 ext4 recognizes (better than ext3, anyway) that data locality is 9 that the head actuator and disk must perform to access a data block, 17 The first tool that ext4 uses to combat fragmentation is the multi-block 20 that the space will get written soon. When the file is closed, the 24 extent. A second related trick that ext4 uses is delayed allocation. 30 is that the filesystem can make better location decisions. 32 The third trick that ext4 (and ext3) uses is that it tries to keep a 38 The fourth trick is that all the inodes in a directory are placed in the 40 here is that all the files in a directory might be related, therefore it 43 The fifth trick is that the disk volume is cut up into 128MB block [all …]
|
/Linux-v5.10/drivers/pinctrl/intel/ |
D | Kconfig | 23 Cherryview/Braswell pinctrl driver provides an interface that 36 provides an interface that allows configuring of PCH pins and 47 interface that allows configuring of SoC pins and using them as 63 Broxton pinctrl driver provides an interface that allows 71 This pinctrl driver provides an interface that allows configuring 79 This pinctrl driver provides an interface that allows configuring 87 This pinctrl driver provides an interface that allows configuring 95 This pinctrl driver provides an interface that allows configuring 103 This pinctrl driver provides an interface that allows configuring 111 This pinctrl driver provides an interface that allows configuring [all …]
|