Home
last modified time | relevance | path

Searched full:mechanism (Results 1 – 25 of 1284) sorted by relevance

12345678910>>...52

/linux/Documentation/driver-api/firmware/
H A Dfallback-mechanisms.rst5 A fallback mechanism is supported to allow to overcome failures to do a direct
8 configuration options related to supporting the firmware fallback mechanism are:
11 mechanism. Most distributions enable this option today. If enabled but
13 mechanism is available and for the request_firmware_nowait() call.
15 enable the kobject uevent fallback mechanism on all firmware API calls
18 fallback mechanism: if this kconfig option is enabled and your second
20 informing the kernel that you have a custom fallback mechanism and it will
28 the kobject uevent fallback mechanism will never take effect even
31 Justifying the firmware fallback mechanism
36 fallback mechanism:
[all …]
H A Dfirmware_cache.rst32 userspace for the firmware request through the sysfs fallback mechanism
43 * The timeout for the fallback mechanism is temporarily reduced to 10 seconds
50 cache mechanism but must not use the firmware API on suspend.
/linux/Documentation/filesystems/nfs/
H A Drpc-server-gss.rst24 Authentication for NFS. Although GSSAPI is itself completely mechanism
25 agnostic, in many cases only the KRB5 mechanism is supported by NFS
28 The Linux kernel, at the moment, supports only the KRB5 mechanism, and
46 NFS Server Legacy Upcall Mechanism
49 The classic upcall mechanism uses a custom text based upcall mechanism
53 This upcall mechanism has 2 limitations:
67 NFS Server New RPC Upcall Mechanism
70 The newer upcall mechanism uses RPC over a unix socket to a daemon
76 This upcall mechanism uses the kernel rpc client and connects to the gssproxy
84 legacy mechanism. To switch to the new mechanism, gss-proxy must bind
[all …]
/linux/drivers/base/firmware_loader/
H A DKconfig97 bool "Enable the firmware sysfs fallback mechanism"
102 loading to the kernel through userspace as a fallback mechanism
107 built-in. For details on how to work with the sysfs fallback mechanism
116 this is known as the driver using the custom fallback mechanism.
117 If the custom fallback mechanism is used userspace must always
119 mechanism is disabled, and failed requests will linger forever.
124 can no longer be relied upon as a fallback mechanism. Linux no longer
125 relies on or uses a fallback mechanism in userspace. If you need to
132 mechanism can never be removed from the kernel.
135 require a fallback mechanism and have a userspace mechanism ready to
[all …]
H A Dfallback.c15 * firmware fallback mechanism
68 * fw_load_sysfs_fallback() - load a firmware via the sysfs fallback mechanism
203 * firmware_fallback_sysfs() - use the fallback mechanism to find firmware
209 * @ret: return value from direct lookup which triggered the fallback mechanism
212 * a fallback mechanism through userspace by exposing a sysfs loading
214 * loading interface. This sysfs fallback mechanism may be disabled completely
218 * mechanism. A system may want to enforce the sysfs fallback mechanism at all
H A Dsysfs.h18 * Helps describe and fine tune the fallback mechanism.
20 * @force_sysfs_fallback: force the sysfs fallback mechanism to be used
24 * @ignore_sysfs_fallback: force to disable the sysfs fallback mechanism.
28 * @loading_timeout: the timeout to wait for the fallback mechanism before
H A Dfirmware.h15 * @FW_OPT_UEVENT: Enables the fallback mechanism to send a kobject uevent
19 * @FW_OPT_USERHELPER: Enable the fallback mechanism, in case the direct
27 * firmware caching mechanism.
28 * @FW_OPT_NOFALLBACK_SYSFS: Disable the sysfs fallback mechanism. Takes
/linux/Documentation/admin-guide/
H A Dsyscall-user-dispatch.rst16 filters. Therefore a new mechanism is necessary.
32 configure the mechanism.
39 Since this mechanism is designed to capture syscalls issued by
51 A thread can setup this mechanism on supported kernels by executing the
57 disable the mechanism globally for that thread. When
86 process. It is not a mechanism for sandboxing system calls, and it
87 should not be seen as a security mechanism, since it is trivial for a
88 malicious application to subvert the mechanism by jumping to an allowed
93 Any fork or exec of the existing process resets the mechanism to
H A Dinitrd.rst32 mechanism" section below.
180 with an older mechanism, the following boot command line parameters
325 Obsolete root change mechanism
328 The following mechanism was used before the introduction of pivot_root.
338 In order to use this mechanism, you do not have to specify the boot
348 Note that the mechanism is incompatible with NFS and similar file
351 This old, deprecated mechanism is commonly called ``change_root``, while
352 the new, supported mechanism is called ``pivot_root``.
355 Mixed change_root and pivot_root mechanism
359 mechanism, you may create both ``/linuxrc`` and ``/sbin/init`` in your initrd
H A Ddell_rbu.rst54 The driver supports two types of update mechanism; monolithic and packetized.
55 These update mechanism depends upon the BIOS currently running on the system.
59 In case of packet mechanism the single memory can be broken in smaller chunks
73 In the packet update mechanism, the user needs to create a new file having
/linux/Documentation/admin-guide/hw-vuln/
H A Dl1d_flush.rst6 mechanism to flush the L1D cache on context switch.
8 This mechanism can be used to address e.g. CVE-2020-0550. For applications
9 the mechanism keeps them safe from vulnerabilities, related to leaks
16 mechanism
39 mechanism is used, software fallback for the mitigation, is not supported.
53 By default the mechanism is disabled.
58 The mechanism does not mitigate L1D data leaks between tasks belonging to
H A Dspecial-register-buffer-data-sampling.rst14 to the core through the special register mechanism that is susceptible
62 Mitigation mechanism
86 The microcode updates provide an opt-out mechanism (RNGDS_MITG_DIS) to disable
89 disable the mitigation using this opt-out mechanism, RDRAND and RDSEED do not
91 processors memory accesses. The opt-out mechanism does not affect Intel SGX
/linux/include/linux/sunrpc/
H A Dgss_api.h20 /* The mechanism-independent gss-api context: */
94 /* Each mechanism is described by the following struct: */
101 /* pseudoflavors supported by this mechanism: */
141 /* returns a mechanism descriptor given an OID, and increments the mechanism's
151 /* Returns a reference to a mechanism, given a name like "krb5" etc. */
/linux/Documentation/driver-api/soundwire/
H A Derror_handling.rst8 mechanism (sync loss after two errors) and short CRCs used for the Bulk
13 1. Bus clash or parity errors: This mechanism relies on low-level detectors
25 indication of a bus allocation issue. The interrupt mechanism can also help
60 Note that SoundWire does not provide a mechanism to detect illegal values
63 implementation does not provide a recovery mechanism for such errors, Slave
/linux/Documentation/locking/
H A Drobust-futex-ABI.rst8 Robust_futexes provide a mechanism that is used in addition to normal
23 mechanism, which handles uncontested locking without needing a system
80 lock variable used by the futex mechanism, in conjunction with
83 mechanism to register the address of that 'lock word' with the kernel.
91 that lock using the futex mechanism.
104 robust_futex mechanism doesn't care what else is in that structure, so
118 existing futex mechanism to wait for, and wakeup, locks. The kernels
164 used to the futex mechanism to wait on that address, and
/linux/tools/testing/selftests/firmware/
H A Dfw_fallback.sh3 # This validates that the kernel will fall back to using the fallback mechanism
170 echo "$0: fallback mechanism immediately cancelled"
217 echo "$0: fallback mechanism works"
225 echo "$0: cancelling fallback mechanism works"
248 echo "$0: custom fallback loading mechanism works"
259 echo "$0: custom fallback loading mechanism works"
272 echo "$0: cancelling custom fallback mechanism works"
/linux/drivers/platform/x86/amd/
H A DKconfig26 WBRF(Wifi Band RFI mitigation) mechanism allows Wifi drivers
30 AMD provides an ACPI based mechanism to support WBRF on platform with
33 This mechanism will only be activated on platforms that advertise a
/linux/Documentation/driver-api/i3c/
H A Dprotocol.rst61 The I3C protocol defines a mechanism to automatically discover devices present
65 The discovery mechanism is called DAA (Dynamic Address Assignment), because it
75 Provisioned ID collision, otherwise the discovery mechanism may fail.
83 This mechanism is called IBI for In Band Interrupts, and as stated in the name,
98 The Hot-Join mechanism is similar to USB hotplug. This mechanism allows
106 This mechanism is relying on slave events to inform the master that a new
/linux/net/sunrpc/auth_gss/
H A Dgss_mech_switch.c89 * gss_mech_register - register a GSS mechanism
90 * @gm: GSS mechanism handle
104 dprintk("RPC: registered gss mechanism %s\n", gm->gm_name); in gss_mech_register()
110 * gss_mech_unregister - release a GSS mechanism
111 * @gm: GSS mechanism handle
119 dprintk("RPC: unregistered gss mechanism %s\n", gm->gm_name); in gss_mech_unregister()
230 * @gm: GSS mechanism handle
278 * supported mechanism. Otherwise a negative errno is returned.
/linux/drivers/media/pci/intel/ipu6/
H A Dipu6.h122 * IPU6 must configure correct arbitration mechanism related to the IOSF VC
129 /* Currently chosen arbitration mechanism for VC0 */
133 /* Currently chosen arbitration mechanism for VC1 */
138 * MMU Invalidation HW bug workaround by ZLW mechanism
140 * Old IPU6 MMUV2 has a bug in the invalidation mechanism which might result in
147 * or Zero length write, is pre-fetch mechanism to pre-fetch the pages in
191 * ZLW(Zero Length Write) is a mechanism to enable VT-d pre-fetching on IOMMU.
/linux/tools/perf/pmu-events/arch/x86/knightslanding/
H A Dfrontend.json3 …ront end resteers for any branch as a result of another branch handling mechanism in the front end…
11 …esteers for conditional branches as a result of another branch handling mechanism in the front end…
19 …nt end resteers for RET branches as a result of another branch handling mechanism in the front end…
/linux/arch/arm64/include/asm/
H A Dcpu_ops.h21 * mechanism for doing so, tests whether it is possible to boot
27 * mechanism-specific information.
28 * @cpu_disable: Prepares a cpu to die. May fail for some mechanism-specific
/linux/kernel/irq/
H A DKconfig13 # Enable the generic irq autoprobe mechanism
38 # Alpha specific irq affinity mechanism
42 # Interrupt injection mechanism
/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dspmobj-attributes.c121 bioscfg_drv.spm_data.mechanism = data.state; in update_spm_state()
122 if (bioscfg_drv.spm_data.mechanism) in update_spm_state()
216 spm_mechanism_types[bioscfg_drv.spm_data.mechanism]); in key_mechanism_show()
244 bioscfg_drv.spm_data.mechanism = SIGNING_KEY; in sk_store()
280 bioscfg_drv.spm_data.mechanism = ENDORSEMENT_KEY; in kek_store()
371 bioscfg_drv.spm_data.mechanism = 0; in hp_populate_secure_platform_data()
/linux/include/linux/
H A Dseqlock_types.h12 * This is the raw counting mechanism, without any writer protection.
20 * This mechanism can't be used if the protected data contains pointers,
23 * If the write serialization mechanism is one of the common kernel

12345678910>>...52