Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp623412ybk; Fri, 15 May 2020 09:17:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzhgn0oWLDh3ciXbn4ZDVW4lxrfEnf4PVMrcZwucwbgomCMz8W7WcvFDTG9Ej/diPxjAEk8 X-Received: by 2002:a50:f40e:: with SMTP id r14mr3426766edm.241.1589559458994; Fri, 15 May 2020 09:17:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589559458; cv=none; d=google.com; s=arc-20160816; b=rPt/bNG6pM89Op5seGeoRqpj6XzELj6HJVjJtDWnxEB/Rdnkt9jGzPjo+EVA+2pd7e ejj+iDY6EF/GUl57lSF0XREAuuIfSwfEwHDIz8v0vfSDlL1RqHkALRtVfqvmod3/yOgB D3BrUKPwrNiYRPrEeQFgofs2L2gFV3FisGB8pa8zoWitxAQ5eNXuTMbdApmwfrnzjXF4 fJqiqSfoCSNT7+zkiLG9KtgLWWVc4iHVras5eaSNPKWlGJqzYoeIRHoAsvHAuT41JTOk oyyZ86lSrrtfC9SnTdRaN0t8BW5l3aUo8LZSmbF8tJguedm9gsdKswCnsslHZYK7qPrD cj+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=S1Fa4WwNstMIxkKuNqRwId8I9ppLZWj7UlwxNxiCqxA=; b=cbGAb5oFiMMuZH9P9osQPGc5PY5l1KnF55dmq7tVsfGUVeWLH4Df4RrDw8dkNYrbW7 3fOeBhpue37iGZhlK6SilyT9ESDPOfq4Olx9mhYmr2cIeRk/hY6o7h2dCkREPwZJvK7B gtrrduKi/9m3LPO4g6woifd34KVtci69poKOVhzinj7+bS4f/Gbb7ricfS2p2NfXbL2J e9kDDLTm0K7XrnZ0hA3KbehhCefNEnM20PabnpbcweGgI8olzU3HhSbdkkCvSwh3FVgF IyQqCrkas/OtzAfF75S/Nhbo371ElAlTTkcIu1ZjDQVDMW/r0Qriyuw6v+d0eKKyFOOE rxzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b6si1391719edq.148.2020.05.15.09.17.15; Fri, 15 May 2020 09:17:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726379AbgEOQNN (ORCPT + 99 others); Fri, 15 May 2020 12:13:13 -0400 Received: from 8.mo3.mail-out.ovh.net ([87.98.172.249]:49924 "EHLO 8.mo3.mail-out.ovh.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726183AbgEOQNM (ORCPT ); Fri, 15 May 2020 12:13:12 -0400 Received: from player168.ha.ovh.net (unknown [10.108.35.13]) by mo3.mail-out.ovh.net (Postfix) with ESMTP id EA731250E96 for ; Fri, 15 May 2020 18:04:23 +0200 (CEST) Received: from sk2.org (82-65-25-201.subs.proxad.net [82.65.25.201]) (Authenticated sender: steve@sk2.org) by player168.ha.ovh.net (Postfix) with ESMTPSA id 285AB1262277F; Fri, 15 May 2020 16:04:19 +0000 (UTC) From: Stephen Kitt To: Jonathan Corbet , Mauro Carvalho Chehab , linux-doc@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Stephen Kitt Subject: [PATCH] docs: sysctl/kernel: document unaligned controls Date: Fri, 15 May 2020 18:04:06 +0200 Message-Id: <20200515160406.8649-1-steve@sk2.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Ovh-Tracer-Id: 13656884397983419781 X-VR-SPAMSTATE: OK X-VR-SPAMSCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgeduhedrleekgdelfecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucfqggfjpdevjffgvefmvefgnecuuegrihhlohhuthemucehtddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefhvffufffkofggtgfgsehtkeertdertdejnecuhfhrohhmpefuthgvphhhvghnucfmihhtthcuoehsthgvvhgvsehskhdvrdhorhhgqeenucggtffrrghtthgvrhhnpeeikeethfdtfffgfeevhedujedvieelfeffvddtfeegffffhedukeduueehvdeludenucfkpheptddrtddrtddrtddpkedvrdeihedrvdehrddvtddunecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmohguvgepshhmthhpqdhouhhtpdhhvghlohepphhlrgihvghrudeikedrhhgrrdhovhhhrdhnvghtpdhinhgvtheptddrtddrtddrtddpmhgrihhlfhhrohhmpehsthgvvhgvsehskhdvrdhorhhgpdhrtghpthhtoheplhhinhhugidqkhgvrhhnvghlsehvghgvrhdrkhgvrhhnvghlrdhorhhg Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This documents ignore-unaligned-usertrap, unaligned-dump-stack, and unaligned-trap, based on arch/arc/kernel/unaligned.c, arch/ia64/kernel/unaligned.c, and arch/parisc/kernel/unaligned.c. While we’re at it, integrate unaligned-memory-access.txt into the docs tree. Signed-off-by: Stephen Kitt --- Documentation/admin-guide/sysctl/kernel.rst | 51 +++++++++++++++++++ Documentation/index.rst | 1 + ...access.txt => unaligned-memory-access.rst} | 0 3 files changed, 52 insertions(+) rename Documentation/{unaligned-memory-access.txt => unaligned-memory-access.rst} (100%) diff --git a/Documentation/admin-guide/sysctl/kernel.rst b/Documentation/admin-guide/sysctl/kernel.rst index eb6bc9cc0318..4bb4d55f20ff 100644 --- a/Documentation/admin-guide/sysctl/kernel.rst +++ b/Documentation/admin-guide/sysctl/kernel.rst @@ -402,6 +402,25 @@ Controls whether the panic kmsg data should be reported to Hyper-V. = ========================================================= +ignore-unaligned-usertrap +========================= + +On architectures where unaligned accesses cause traps, and where this +feature is supported (``CONFIG_SYSCTL_ARCH_UNALIGN_NO_WARN``; +currently, ``arc`` and ``ia64``), controls whether all unaligned traps +are logged. + += ============================================================= +0 Log all unaligned accesses. +1 Only warn the first time a process traps. This is the default + setting. += ============================================================= + +See also `unaligned-trap`_ and `unaligned-dump-stack`_. On ``ia64``, +this allows system administrators to override the +``IA64_THREAD_UAC_NOPRINT`` ``prctl`` and avoid logs being flooded. + + kexec_load_disabled =================== @@ -1252,6 +1271,38 @@ See :doc:`/admin-guide/kernel-parameters` and :doc:`/trace/boottime-trace`. +.. _unaligned-dump-stack: + +unaligned-dump-stack (ia64) +=========================== + +When logging unaligned accesses, controls whether the stack is +dumped. + += =================================================== +0 Do not dump the stack. This is the default setting. +1 Dump the stack. += =================================================== + +See also `ignore-unaligned-usertrap`_. + + +unaligned-trap +============== + +On architectures where unaligned accesses cause traps, and where this +feature is supported (``CONFIG_SYSCTL_ARCH_UNALIGN_ALLOW``; currently, +``arc`` and ``parisc``), controls whether unaligned traps are caught +and emulated (instead of failing). + += ======================================================== +0 Do not emulate unaligned accesses. +1 Emulate unaligned accesses. This is the default setting. += ======================================================== + +See also `ignore-unaligned-usertrap`_. + + unknown_nmi_panic ================= diff --git a/Documentation/index.rst b/Documentation/index.rst index 9599c0f3eea8..17c38d899572 100644 --- a/Documentation/index.rst +++ b/Documentation/index.rst @@ -143,6 +143,7 @@ Architecture-agnostic documentation :maxdepth: 2 asm-annotations + unaligned-memory-access Architecture-specific documentation ----------------------------------- diff --git a/Documentation/unaligned-memory-access.txt b/Documentation/unaligned-memory-access.rst similarity index 100% rename from Documentation/unaligned-memory-access.txt rename to Documentation/unaligned-memory-access.rst base-commit: 56b62540782bfde459acc8eb15b949eaf151c881 -- 2.20.1