/Linux-v5.10/Documentation/networking/ |
D | xfrm_sync.rst | 1 .. SPDX-License-Identifier: GPL-2.0 21 This way a backup stays as closely up-to-date as an active member. 25 For this reason, we also add a nagle-like algorithm to restrict 28 These thresholds are set system-wide via sysctls or can be updated 32 - the lifetime byte counter 36 - the replay sequence for both inbound and outbound 39 ---------------------- 41 nlmsghdr:aevent_id:optional-TLVs. 49 A XFRM_MSG_NEWAE will have at least two TLVs (as is 76 message (kernel<->user) as well the cause (config, query or event). [all …]
|
D | af_xdp.rst | 1 .. SPDX-License-Identifier: GPL-2.0 20 XDP programs to redirect frames to a memory buffer in a user-space 24 syscall. Associated with each XSK are two rings: the RX ring and the 38 is simply an offset within the entire UMEM region. The user space 42 UMEM also has two rings: the FILL ring and the COMPLETION ring. The 47 kernel has transmitted completely and can now be used again by user 59 corresponding two rings, sets the XDP_SHARED_UMEM flag in the bind 64 single-consumer / single-producer (for performance reasons), the new 72 user-space application can place an XSK at an arbitrary place in this 79 traffic to user space through the XSK. [all …]
|
D | gtp.rst | 1 .. SPDX-License-Identifier: GPL-2.0 11 In 'drivers/net/gtp.c' you are finding a kernel-level implementation 18 tunneling User-IP payload between a mobile station (phone, modem) 29 technology-dependent protocol stack for transmitting the user IP 35 is translated into GTP *without breaking the end-to-end tunnel*. So 38 At some point the GTP packet ends up on the so-called GGSN (GSM/UMTS) 39 or P-GW (LTE), which terminates the tunnel, decapsulates the packet 42 theoretically some non-IP network like X.25). 58 It *only* implements the so-called 'user plane', carrying the User-IP 59 payload, called GTP-U. It does not implement the 'control plane', [all …]
|
/Linux-v5.10/Documentation/admin-guide/namespaces/ |
D | compatibility-list.rst | 5 This document contains the information about the problems user 13 - UTS IPC VFS PID User Net 19 User 2 2 X 33 2. Intentionally, two equal user IDs in different user namespaces 35 words, user 10 in one user namespace shouldn't have the same 36 access permissions to files, belonging to user 10 in another 39 The same is true for the IPC namespaces being shared - two users 40 from different user namespaces should not access the same IPC objects
|
/Linux-v5.10/Documentation/gpu/ |
D | komeda-kms.rst | 1 .. SPDX-License-Identifier: GPL-2.0 23 ----- 30 ------ 39 ------------------- 43 user can also insert a scaler between compositor and wb_layer to down scale 47 -------------------------- 52 ----------------------------- 57 -------------------------------- 62 ------ 66 introduces Layer Split, which splits the whole image to two half parts and feeds [all …]
|
/Linux-v5.10/Documentation/core-api/ |
D | padata.rst | 1 .. SPDX-License-Identifier: GPL-2.0 23 ------------ 43 ------------------ 45 The CPUs used to run jobs can be changed in two ways, programatically with 58 live in /sys/kernel/pcrypt/<instance-name>. Within an instance's directory 59 there are two files, parallel_cpumask and serial_cpumask, and either cpumask 64 Reading one of these files shows the user-supplied cpumask, which may be 67 Padata maintains two pairs of cpumasks internally, the user-supplied cpumasks 69 cpumask.) The user-supplied cpumasks default to all possible CPUs on instance 71 subset of the user-supplied cpumasks and contain only the online CPUs in the [all …]
|
D | cachetlb.rst | 19 if it can be proven that a user address space has never executed 25 virtual-->physical address translations obtained from the software 43 This interface flushes an entire user address space from 56 Here we are flushing a specific range of (user) virtual 59 modifications for the address space 'vma->vm_mm' in the range 60 'start' to 'end-1' will be visible to the cpu. That is, after 62 virtual addresses in the range 'start' to 'end-1'. 78 address space is available via vma->vm_mm. Also, one may 79 test (vma->vm_flags & VM_EXEC) to see if this region is 81 split-tlb type setups). [all …]
|
/Linux-v5.10/drivers/thermal/intel/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 8 enforce idle time which results in more package C-state residency. The 9 user interface is exposed via generic thermal framework. 20 two trip points which can be set by user to get notifications via thermal 40 temperature sensor (DTS). These SoCs have two additional DTSs in 42 thermal zone. There are two trip points. One of the trip point can 43 be set by user mode programs to get notifications via Linux thermal 52 temperature sensor (DTS). For X1000 SoC, it has one on-die DTS. 53 The DTS will be registered as a thermal zone. There are two trip points:
|
/Linux-v5.10/Documentation/ia64/ |
D | efirtc.rst | 13 the IA-64 platform. 15 The purpose of this driver is to supply an API for kernel and user applications 31 Because we wanted to minimize the impact on existing user-level apps using 39 the reference date is different. Year is the using the full 4-digit format. 44 without necessarily impacting any of the user applications. The decoupling 47 The driver exposes two interfaces, one via the device file and a set of 48 ioctl()s. The other is read-only via the /proc filesystem. 54 "public" API of the two drivers. The specifics of the legacy RTC are still 62 Two ioctl()s, compatible with the legacy RTC calls: 90 Those two ioctl()s can be exercised with the hwclock command: [all …]
|
/Linux-v5.10/Documentation/kbuild/ |
D | kconfig-macro-language.rst | 6 ------- 9 two languages in one. One language describes dependency graphs consisting of 13 There is clear distinction between the two language stages. For example, you 21 $(CC) -o $(APP) $(SRC) 27 gcc -o foo foo.c 32 The idea is quite similar in Kconfig - it is possible to describe a Kconfig 38 def_bool $(shell, $(srctree)/scripts/gcc-check-foo.sh $(CC)) 46 Then, Kconfig moves onto the evaluation stage to resolve inter-symbol 47 dependency as explained in kconfig-language.rst. 51 --------- [all …]
|
/Linux-v5.10/Documentation/hwmon/ |
D | adm9240.rst | 10 Addresses scanned: I2C 0x2c - 0x2f 20 Addresses scanned: I2C 0x2c - 0x2f 24 http://pdfserv.maxim-ic.com/en/ds/DS1780.pdf 30 Addresses scanned: I2C 0x2c - 0x2f 37 - Frodo Looijaard <frodol@dds.nl>, 38 - Philip Edelbrock <phil@netroedge.com>, 39 - Michiel Rook <michiel@grendelproject.nl>, 40 - Grant Coady <gcoady.lk@gmail.com> with guidance 44 --------- 46 chip MSB 5-bit address. Each chip reports a unique manufacturer [all …]
|
/Linux-v5.10/Documentation/admin-guide/pm/ |
D | strategies.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 The Linux kernel supports two major high-level power management strategies. 15 One of them is based on using global low-power states of the whole system in 16 which user space code cannot be executed and the overall system activity is 17 significantly reduced, referred to as :doc:`sleep states <sleep-states>`. The 18 kernel puts the system into one of these states when requested by user space 21 user space code can run. Because sleep states are global and the whole system 23 :doc:`system-wide power management <system-wide>`. 25 The other strategy, referred to as the :doc:`working-state power management 26 <working-state>`, is based on adjusting the power states of individual hardware [all …]
|
/Linux-v5.10/Documentation/vm/ |
D | active_mm.rst | 9 List: linux-kernel 12 Date: 1999-07-30 21:36:24 14 Cc'd to linux-kernel, because I don't write explanations all that often, 21 > discussed on the mailing lists---I just returned from vacation and 22 > wasn't able to follow linux-kernel for a while). 26 - we have "real address spaces" and "anonymous address spaces". The 28 user-level page tables at all, so when we do a context switch into an 33 doesn't need any user mappings - all kernel threads basically fall into 35 some amount of time they are not going to be interested in user space, 37 switching the VM state around. Currently only the old-style bdflush [all …]
|
/Linux-v5.10/Documentation/driver-api/thermal/ |
D | x86_pkg_temperature_thermal.rst | 14 --------- 16 Intel® 64 and IA-32 Architectures Software Developer’s Manual (Jan, 2013): 20 ----------- 23 zone with maximum two user mode configurable trip points. Number of trip points 25 user mode can receive notification via thermal notification mechanism and can 30 -------------------- 37 This contains two trip points: 39 - trip_point_0_temp 40 - trip_point_1_temp 42 User can set any temperature between 0 to TJ-Max temperature. Temperature units [all …]
|
/Linux-v5.10/Documentation/firmware-guide/acpi/ |
D | video_extension.rst | 1 .. SPDX-License-Identifier: GPL-2.0 16 Export a sysfs interface for user space to control backlight level 26 Documentation/ABI/stable/sysfs-class-backlight. 65 The first two levels are for when laptop are on AC or on battery and are 70 as a "brightness level" indicator. Thus from the user space perspective 74 Notify user space about hotkey event 77 There are generally two cases for hotkey event reporting: 79 i) For some laptops, when user presses the hotkey, a scancode will be 80 generated and sent to user space through the input device created by 82 following key code will appear to user space:: [all …]
|
/Linux-v5.10/arch/x86/kernel/ |
D | umip.c | 2 * umip.c Emulation for instruction protected by the User-Mode Instruction 6 * Ricardo Neri <ricardo.neri-calderon@linux.intel.com> 13 #include <asm/insn-eval.h> 19 /** DOC: Emulation for User-Mode Instruction Prevention (UMIP) 21 * User-Mode Instruction Prevention is a security feature present in recent 23 * SIDT, SLDT, SMSW and STR) from being run in user mode by issuing a general 26 * Rather than relaying to the user space the general protection fault caused by 27 * the UMIP-protected instructions (in the form of a SIGSEGV signal), it can be 38 * The instructions protected by UMIP can be split in two groups. Those which 44 * not the actual location of the table. The result is emulated as a hard-coded [all …]
|
/Linux-v5.10/Documentation/admin-guide/nfs/ |
D | nfs-idmapper.rst | 5 Id mapper is used by NFS to translate user and group ids into names, and to 6 translate user and group names into ids. Part of this translation involves 7 performing an upcall to userspace to request the information. There are two 8 ways NFS could obtain this information: placing a call to /sbin/request-key 11 NFS will attempt to call /sbin/request-key first. If this succeeds, the 12 result will be cached using the generic request-key cache. This call should 13 only fail if /etc/request-key.conf is not configured for the id_resolver key 14 type, see the "Configuring" section below if you wish to use the request-key 17 If the call to /sbin/request-key fails (if /etc/request-key.conf is not 26 The file /etc/request-key.conf will need to be modified so /sbin/request-key can [all …]
|
/Linux-v5.10/drivers/usb/gadget/legacy/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 7 # NOTE: Gadget support ** DOES NOT ** depend on host-side CONFIG_USB !! 9 # - Host systems (like PCs) need CONFIG_USB (with "A" jacks). 10 # - Peripherals (like PDAs) need CONFIG_USB_GADGET (with "B" jacks). 11 # - Some systems have both kinds of controllers. 13 # With help from a special transceiver and a "Mini-AB" jack, systems with 14 # both kinds of controller can also support "USB On-the-Go" (CONFIG_USB_OTG). 23 # Gadget drivers are hardware-neutral, or "platform independent", 44 Gadget Zero is a two-configuration device. It either sinks and 47 conformance. The driver needs only two bulk-capable endpoints, so [all …]
|
/Linux-v5.10/drivers/staging/comedi/drivers/ |
D | jr3_pci.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 31 * two-byte words. 42 * Channels 1-6 contain the coupled force data Fx through Mz. Channel 43 * 7 contains the sensor's calibration data. The use of channels 8-15 90 * or the other so that two force vectors or two moment vectors are 93 * have two force vectors, set changeV1 to 1. 139 * was detected in the on-board RAM during the power-up 142 * bit latches, and must be reset by the user. 152 * user. A very fast system using the force data for feedback might 169 * received from the sensor. There are two reasons the CRC may not [all …]
|
/Linux-v5.10/Documentation/driver-api/iio/ |
D | core.rst | 6 many different types of embedded sensors and a standard interface to user space 8 :file:`drivers/iio/industrialio-*` 11 ---------------------- 13 * struct iio_dev - industrial I/O device 14 * iio_device_alloc() - allocate an :c:type:`iio_dev` from a driver 15 * iio_device_free() - free an :c:type:`iio_dev` from a driver 16 * iio_device_register() - register a device with the IIO subsystem 17 * iio_device_unregister() - unregister a device from the IIO 25 There are two ways for a user space application to interact with an IIO driver. 33 :doc:`SPI <../spi>` driver and will create two routines, probe and remove. [all …]
|
/Linux-v5.10/drivers/misc/lkdtm/ |
D | usercopy.c | 1 // SPDX-License-Identifier: GPL-2.0 17 * into choosing the non-const path to make sure we trigger the 28 * Instead of adding -Wno-return-local-addr, just pass the stack address 66 bad_stack -= sizeof(unsigned long); in do_usercopy_stack() 73 pr_warn("Failed to allocate user memory\n"); in do_usercopy_stack() 119 * This checks for whole-object size validation with hardened usercopy, 125 unsigned char *one, *two; in do_usercopy_heap_size() local 131 two = kmalloc(size, GFP_KERNEL); in do_usercopy_heap_size() 132 if (!one || !two) { in do_usercopy_heap_size() 141 pr_warn("Failed to allocate user memory\n"); in do_usercopy_heap_size() [all …]
|
/Linux-v5.10/arch/x86/include/asm/ |
D | segment.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 13 ((((base) & _AC(0xff000000,ULL)) << (56-24)) | \ 15 (((limit) & _AC(0x000f0000,ULL)) << (48-16)) | \ 29 * Bottom two bits of selector give the ring 37 * determine whether the context is user mode or kernel mode with 46 /* User mode is privilege level 3: */ 60 * The layout of the per-CPU GDT under Linux: 62 * 0 - null <=== cacheline #1 63 * 1 - reserved 64 * 2 - reserved [all …]
|
/Linux-v5.10/Documentation/RCU/ |
D | rcu.rst | 6 The basic idea behind RCU (read-copy update) is to split destructive 7 operations into two parts, one that prevents anyone from seeing the data 9 A "grace period" must elapse between the two parts, and this grace period 11 since dropped their references. For example, an RCU-protected deletion 18 -------------------------- 20 - Why would anyone want to use RCU? 22 The advantage of RCU's two-part approach is that RCU readers need 27 in read-mostly situations. The fact that RCU readers need not 28 acquire locks can also greatly simplify deadlock-avoidance code. 30 - How can the updater tell when a grace period has completed [all …]
|
/Linux-v5.10/Documentation/ABI/removed/ |
D | sysfs-kernel-uids | 2 Date: December 2007, finally removed in kernel v2.6.34-rc1 7 to set the cpu bandwidth a user is allowed. This is a 9 are two users logged in, each with an equal number of 11 example would be, if User A has shares = 1024 and user 12 B has shares = 2048, User B will get twice the CPU 13 bandwidth user A will. For more details refer 14 Documentation/scheduler/sched-design-CFS.rst
|
/Linux-v5.10/Documentation/driver-api/usb/ |
D | gadget.rst | 11 This document presents a Linux-USB "Gadget" kernel mode API, for use 17 - Supports USB 2.0, for high speed devices which can stream data at 20 - Handles devices with dozens of endpoints just as well as ones with 21 just two fixed-function ones. Gadget drivers can be written so 24 - Flexible enough to expose more complex USB device capabilities such 28 - USB "On-The-Go" (OTG) support, in conjunction with updates to the 29 Linux-USB host side. 31 - Sharing data structures and API models with the Linux-USB host side 32 API. This helps the OTG support, and looks forward to more-symmetric 36 - Minimalist, so it's easier to support new device controller hardware. [all …]
|