1============================================ 2Unreliable Guide To Hacking The Linux Kernel 3============================================ 4 5:Author: Rusty Russell 6 7Introduction 8============ 9 10Welcome, gentle reader, to Rusty's Remarkably Unreliable Guide to Linux 11Kernel Hacking. This document describes the common routines and general 12requirements for kernel code: its goal is to serve as a primer for Linux 13kernel development for experienced C programmers. I avoid implementation 14details: that's what the code is for, and I ignore whole tracts of 15useful routines. 16 17Before you read this, please understand that I never wanted to write 18this document, being grossly under-qualified, but I always wanted to 19read it, and this was the only way. I hope it will grow into a 20compendium of best practice, common starting points and random 21information. 22 23The Players 24=========== 25 26At any time each of the CPUs in a system can be: 27 28- not associated with any process, serving a hardware interrupt; 29 30- not associated with any process, serving a softirq or tasklet; 31 32- running in kernel space, associated with a process (user context); 33 34- running a process in user space. 35 36There is an ordering between these. The bottom two can preempt each 37other, but above that is a strict hierarchy: each can only be preempted 38by the ones above it. For example, while a softirq is running on a CPU, 39no other softirq will preempt it, but a hardware interrupt can. However, 40any other CPUs in the system execute independently. 41 42We'll see a number of ways that the user context can block interrupts, 43to become truly non-preemptable. 44 45User Context 46------------ 47 48User context is when you are coming in from a system call or other trap: 49like userspace, you can be preempted by more important tasks and by 50interrupts. You can sleep, by calling :c:func:`schedule()`. 51 52.. note:: 53 54 You are always in user context on module load and unload, and on 55 operations on the block device layer. 56 57In user context, the ``current`` pointer (indicating the task we are 58currently executing) is valid, and :c:func:`in_interrupt()` 59(``include/linux/interrupt.h``) is false. 60 61.. warning:: 62 63 Beware that if you have preemption or softirqs disabled (see below), 64 :c:func:`in_interrupt()` will return a false positive. 65 66Hardware Interrupts (Hard IRQs) 67------------------------------- 68 69Timer ticks, network cards and keyboard are examples of real hardware 70which produce interrupts at any time. The kernel runs interrupt 71handlers, which services the hardware. The kernel guarantees that this 72handler is never re-entered: if the same interrupt arrives, it is queued 73(or dropped). Because it disables interrupts, this handler has to be 74fast: frequently it simply acknowledges the interrupt, marks a 'software 75interrupt' for execution and exits. 76 77You can tell you are in a hardware interrupt, because 78:c:func:`in_irq()` returns true. 79 80.. warning:: 81 82 Beware that this will return a false positive if interrupts are 83 disabled (see below). 84 85Software Interrupt Context: Softirqs and Tasklets 86------------------------------------------------- 87 88Whenever a system call is about to return to userspace, or a hardware 89interrupt handler exits, any 'software interrupts' which are marked 90pending (usually by hardware interrupts) are run (``kernel/softirq.c``). 91 92Much of the real interrupt handling work is done here. Early in the 93transition to SMP, there were only 'bottom halves' (BHs), which didn't 94take advantage of multiple CPUs. Shortly after we switched from wind-up 95computers made of match-sticks and snot, we abandoned this limitation 96and switched to 'softirqs'. 97 98``include/linux/interrupt.h`` lists the different softirqs. A very 99important softirq is the timer softirq (``include/linux/timer.h``): you 100can register to have it call functions for you in a given length of 101time. 102 103Softirqs are often a pain to deal with, since the same softirq will run 104simultaneously on more than one CPU. For this reason, tasklets 105(``include/linux/interrupt.h``) are more often used: they are 106dynamically-registrable (meaning you can have as many as you want), and 107they also guarantee that any tasklet will only run on one CPU at any 108time, although different tasklets can run simultaneously. 109 110.. warning:: 111 112 The name 'tasklet' is misleading: they have nothing to do with 113 'tasks', and probably more to do with some bad vodka Alexey 114 Kuznetsov had at the time. 115 116You can tell you are in a softirq (or tasklet) using the 117:c:func:`in_softirq()` macro (``include/linux/interrupt.h``). 118 119.. warning:: 120 121 Beware that this will return a false positive if a bh lock (see 122 below) is held. 123 124Some Basic Rules 125================ 126 127No memory protection 128 If you corrupt memory, whether in user context or interrupt context, 129 the whole machine will crash. Are you sure you can't do what you 130 want in userspace? 131 132No floating point or MMX 133 The FPU context is not saved; even in user context the FPU state 134 probably won't correspond with the current process: you would mess 135 with some user process' FPU state. If you really want to do this, 136 you would have to explicitly save/restore the full FPU state (and 137 avoid context switches). It is generally a bad idea; use fixed point 138 arithmetic first. 139 140A rigid stack limit 141 Depending on configuration options the kernel stack is about 3K to 142 6K for most 32-bit architectures: it's about 14K on most 64-bit 143 archs, and often shared with interrupts so you can't use it all. 144 Avoid deep recursion and huge local arrays on the stack (allocate 145 them dynamically instead). 146 147The Linux kernel is portable 148 Let's keep it that way. Your code should be 64-bit clean, and 149 endian-independent. You should also minimize CPU specific stuff, 150 e.g. inline assembly should be cleanly encapsulated and minimized to 151 ease porting. Generally it should be restricted to the 152 architecture-dependent part of the kernel tree. 153 154ioctls: Not writing a new system call 155===================================== 156 157A system call generally looks like this 158 159:: 160 161 asmlinkage long sys_mycall(int arg) 162 { 163 return 0; 164 } 165 166 167First, in most cases you don't want to create a new system call. You 168create a character device and implement an appropriate ioctl for it. 169This is much more flexible than system calls, doesn't have to be entered 170in every architecture's ``include/asm/unistd.h`` and 171``arch/kernel/entry.S`` file, and is much more likely to be accepted by 172Linus. 173 174If all your routine does is read or write some parameter, consider 175implementing a :c:func:`sysfs()` interface instead. 176 177Inside the ioctl you're in user context to a process. When a error 178occurs you return a negated errno (see ``include/linux/errno.h``), 179otherwise you return 0. 180 181After you slept you should check if a signal occurred: the Unix/Linux 182way of handling signals is to temporarily exit the system call with the 183``-ERESTARTSYS`` error. The system call entry code will switch back to 184user context, process the signal handler and then your system call will 185be restarted (unless the user disabled that). So you should be prepared 186to process the restart, e.g. if you're in the middle of manipulating 187some data structure. 188 189:: 190 191 if (signal_pending(current)) 192 return -ERESTARTSYS; 193 194 195If you're doing longer computations: first think userspace. If you 196**really** want to do it in kernel you should regularly check if you need 197to give up the CPU (remember there is cooperative multitasking per CPU). 198Idiom: 199 200:: 201 202 cond_resched(); /* Will sleep */ 203 204 205A short note on interface design: the UNIX system call motto is "Provide 206mechanism not policy". 207 208Recipes for Deadlock 209==================== 210 211You cannot call any routines which may sleep, unless: 212 213- You are in user context. 214 215- You do not own any spinlocks. 216 217- You have interrupts enabled (actually, Andi Kleen says that the 218 scheduling code will enable them for you, but that's probably not 219 what you wanted). 220 221Note that some functions may sleep implicitly: common ones are the user 222space access functions (\*_user) and memory allocation functions 223without ``GFP_ATOMIC``. 224 225You should always compile your kernel ``CONFIG_DEBUG_ATOMIC_SLEEP`` on, 226and it will warn you if you break these rules. If you **do** break the 227rules, you will eventually lock up your box. 228 229Really. 230 231Common Routines 232=============== 233 234:c:func:`printk()` ``include/linux/kernel.h`` 235--------------------------------------------- 236 237:c:func:`printk()` feeds kernel messages to the console, dmesg, and 238the syslog daemon. It is useful for debugging and reporting errors, and 239can be used inside interrupt context, but use with caution: a machine 240which has its console flooded with printk messages is unusable. It uses 241a format string mostly compatible with ANSI C printf, and C string 242concatenation to give it a first "priority" argument: 243 244:: 245 246 printk(KERN_INFO "i = %u\n", i); 247 248 249See ``include/linux/kernel.h``; for other ``KERN_`` values; these are 250interpreted by syslog as the level. Special case: for printing an IP 251address use 252 253:: 254 255 __be32 ipaddress; 256 printk(KERN_INFO "my ip: %pI4\n", &ipaddress); 257 258 259:c:func:`printk()` internally uses a 1K buffer and does not catch 260overruns. Make sure that will be enough. 261 262.. note:: 263 264 You will know when you are a real kernel hacker when you start 265 typoing printf as printk in your user programs :) 266 267.. note:: 268 269 Another sidenote: the original Unix Version 6 sources had a comment 270 on top of its printf function: "Printf should not be used for 271 chit-chat". You should follow that advice. 272 273:c:func:`copy_[to/from]_user()` / :c:func:`get_user()` / :c:func:`put_user()` ``include/linux/uaccess.h`` 274--------------------------------------------------------------------------------------------------------- 275 276**[SLEEPS]** 277 278:c:func:`put_user()` and :c:func:`get_user()` are used to get 279and put single values (such as an int, char, or long) from and to 280userspace. A pointer into userspace should never be simply dereferenced: 281data should be copied using these routines. Both return ``-EFAULT`` or 2820. 283 284:c:func:`copy_to_user()` and :c:func:`copy_from_user()` are 285more general: they copy an arbitrary amount of data to and from 286userspace. 287 288.. warning:: 289 290 Unlike :c:func:`put_user()` and :c:func:`get_user()`, they 291 return the amount of uncopied data (ie. 0 still means success). 292 293[Yes, this moronic interface makes me cringe. The flamewar comes up 294every year or so. --RR.] 295 296The functions may sleep implicitly. This should never be called outside 297user context (it makes no sense), with interrupts disabled, or a 298spinlock held. 299 300:c:func:`kmalloc()`/:c:func:`kfree()` ``include/linux/slab.h`` 301-------------------------------------------------------------- 302 303**[MAY SLEEP: SEE BELOW]** 304 305These routines are used to dynamically request pointer-aligned chunks of 306memory, like malloc and free do in userspace, but 307:c:func:`kmalloc()` takes an extra flag word. Important values: 308 309``GFP_KERNEL`` 310 May sleep and swap to free memory. Only allowed in user context, but 311 is the most reliable way to allocate memory. 312 313``GFP_ATOMIC`` 314 Don't sleep. Less reliable than ``GFP_KERNEL``, but may be called 315 from interrupt context. You should **really** have a good 316 out-of-memory error-handling strategy. 317 318``GFP_DMA`` 319 Allocate ISA DMA lower than 16MB. If you don't know what that is you 320 don't need it. Very unreliable. 321 322If you see a sleeping function called from invalid context warning 323message, then maybe you called a sleeping allocation function from 324interrupt context without ``GFP_ATOMIC``. You should really fix that. 325Run, don't walk. 326 327If you are allocating at least ``PAGE_SIZE`` (``include/asm/page.h``) 328bytes, consider using :c:func:`__get_free_pages()` 329(``include/linux/mm.h``). It takes an order argument (0 for page sized, 3301 for double page, 2 for four pages etc.) and the same memory priority 331flag word as above. 332 333If you are allocating more than a page worth of bytes you can use 334:c:func:`vmalloc()`. It'll allocate virtual memory in the kernel 335map. This block is not contiguous in physical memory, but the MMU makes 336it look like it is for you (so it'll only look contiguous to the CPUs, 337not to external device drivers). If you really need large physically 338contiguous memory for some weird device, you have a problem: it is 339poorly supported in Linux because after some time memory fragmentation 340in a running kernel makes it hard. The best way is to allocate the block 341early in the boot process via the :c:func:`alloc_bootmem()` 342routine. 343 344Before inventing your own cache of often-used objects consider using a 345slab cache in ``include/linux/slab.h`` 346 347:c:func:`current()` ``include/asm/current.h`` 348--------------------------------------------- 349 350This global variable (really a macro) contains a pointer to the current 351task structure, so is only valid in user context. For example, when a 352process makes a system call, this will point to the task structure of 353the calling process. It is **not NULL** in interrupt context. 354 355:c:func:`mdelay()`/:c:func:`udelay()` ``include/asm/delay.h`` ``include/linux/delay.h`` 356--------------------------------------------------------------------------------------- 357 358The :c:func:`udelay()` and :c:func:`ndelay()` functions can be 359used for small pauses. Do not use large values with them as you risk 360overflow - the helper function :c:func:`mdelay()` is useful here, or 361consider :c:func:`msleep()`. 362 363:c:func:`cpu_to_be32()`/:c:func:`be32_to_cpu()`/:c:func:`cpu_to_le32()`/:c:func:`le32_to_cpu()` ``include/asm/byteorder.h`` 364--------------------------------------------------------------------------------------------------------------------------- 365 366The :c:func:`cpu_to_be32()` family (where the "32" can be replaced 367by 64 or 16, and the "be" can be replaced by "le") are the general way 368to do endian conversions in the kernel: they return the converted value. 369All variations supply the reverse as well: 370:c:func:`be32_to_cpu()`, etc. 371 372There are two major variations of these functions: the pointer 373variation, such as :c:func:`cpu_to_be32p()`, which take a pointer 374to the given type, and return the converted value. The other variation 375is the "in-situ" family, such as :c:func:`cpu_to_be32s()`, which 376convert value referred to by the pointer, and return void. 377 378:c:func:`local_irq_save()`/:c:func:`local_irq_restore()` ``include/linux/irqflags.h`` 379------------------------------------------------------------------------------------- 380 381These routines disable hard interrupts on the local CPU, and restore 382them. They are reentrant; saving the previous state in their one 383``unsigned long flags`` argument. If you know that interrupts are 384enabled, you can simply use :c:func:`local_irq_disable()` and 385:c:func:`local_irq_enable()`. 386 387:c:func:`local_bh_disable()`/:c:func:`local_bh_enable()` ``include/linux/interrupt.h`` 388-------------------------------------------------------------------------------------- 389 390These routines disable soft interrupts on the local CPU, and restore 391them. They are reentrant; if soft interrupts were disabled before, they 392will still be disabled after this pair of functions has been called. 393They prevent softirqs and tasklets from running on the current CPU. 394 395:c:func:`smp_processor_id()`() ``include/asm/smp.h`` 396---------------------------------------------------- 397 398:c:func:`get_cpu()` disables preemption (so you won't suddenly get 399moved to another CPU) and returns the current processor number, between 4000 and ``NR_CPUS``. Note that the CPU numbers are not necessarily 401continuous. You return it again with :c:func:`put_cpu()` when you 402are done. 403 404If you know you cannot be preempted by another task (ie. you are in 405interrupt context, or have preemption disabled) you can use 406smp_processor_id(). 407 408``__init``/``__exit``/``__initdata`` ``include/linux/init.h`` 409------------------------------------------------------------- 410 411After boot, the kernel frees up a special section; functions marked with 412``__init`` and data structures marked with ``__initdata`` are dropped 413after boot is complete: similarly modules discard this memory after 414initialization. ``__exit`` is used to declare a function which is only 415required on exit: the function will be dropped if this file is not 416compiled as a module. See the header file for use. Note that it makes no 417sense for a function marked with ``__init`` to be exported to modules 418with :c:func:`EXPORT_SYMBOL()` - this will break. 419 420:c:func:`__initcall()`/:c:func:`module_init()` ``include/linux/init.h`` 421----------------------------------------------------------------------- 422 423Many parts of the kernel are well served as a module 424(dynamically-loadable parts of the kernel). Using the 425:c:func:`module_init()` and :c:func:`module_exit()` macros it 426is easy to write code without #ifdefs which can operate both as a module 427or built into the kernel. 428 429The :c:func:`module_init()` macro defines which function is to be 430called at module insertion time (if the file is compiled as a module), 431or at boot time: if the file is not compiled as a module the 432:c:func:`module_init()` macro becomes equivalent to 433:c:func:`__initcall()`, which through linker magic ensures that 434the function is called on boot. 435 436The function can return a negative error number to cause module loading 437to fail (unfortunately, this has no effect if the module is compiled 438into the kernel). This function is called in user context with 439interrupts enabled, so it can sleep. 440 441:c:func:`module_exit()` ``include/linux/init.h`` 442------------------------------------------------ 443 444This macro defines the function to be called at module removal time (or 445never, in the case of the file compiled into the kernel). It will only 446be called if the module usage count has reached zero. This function can 447also sleep, but cannot fail: everything must be cleaned up by the time 448it returns. 449 450Note that this macro is optional: if it is not present, your module will 451not be removable (except for 'rmmod -f'). 452 453:c:func:`try_module_get()`/:c:func:`module_put()` ``include/linux/module.h`` 454---------------------------------------------------------------------------- 455 456These manipulate the module usage count, to protect against removal (a 457module also can't be removed if another module uses one of its exported 458symbols: see below). Before calling into module code, you should call 459:c:func:`try_module_get()` on that module: if it fails, then the 460module is being removed and you should act as if it wasn't there. 461Otherwise, you can safely enter the module, and call 462:c:func:`module_put()` when you're finished. 463 464Most registerable structures have an owner field, such as in the 465:c:type:`struct file_operations <file_operations>` structure. 466Set this field to the macro ``THIS_MODULE``. 467 468Wait Queues ``include/linux/wait.h`` 469==================================== 470 471**[SLEEPS]** 472 473A wait queue is used to wait for someone to wake you up when a certain 474condition is true. They must be used carefully to ensure there is no 475race condition. You declare a ``wait_queue_head_t``, and then processes 476which want to wait for that condition declare a ``wait_queue_t`` 477referring to themselves, and place that in the queue. 478 479Declaring 480--------- 481 482You declare a ``wait_queue_head_t`` using the 483:c:func:`DECLARE_WAIT_QUEUE_HEAD()` macro, or using the 484:c:func:`init_waitqueue_head()` routine in your initialization 485code. 486 487Queuing 488------- 489 490Placing yourself in the waitqueue is fairly complex, because you must 491put yourself in the queue before checking the condition. There is a 492macro to do this: :c:func:`wait_event_interruptible()` 493``include/linux/wait.h`` The first argument is the wait queue head, and 494the second is an expression which is evaluated; the macro returns 0 when 495this expression is true, or -ERESTARTSYS if a signal is received. The 496:c:func:`wait_event()` version ignores signals. 497 498Waking Up Queued Tasks 499---------------------- 500 501Call :c:func:`wake_up()` ``include/linux/wait.h``;, which will wake 502up every process in the queue. The exception is if one has 503``TASK_EXCLUSIVE`` set, in which case the remainder of the queue will 504not be woken. There are other variants of this basic function available 505in the same header. 506 507Atomic Operations 508================= 509 510Certain operations are guaranteed atomic on all platforms. The first 511class of operations work on ``atomic_t`` ``include/asm/atomic.h``; this 512contains a signed integer (at least 32 bits long), and you must use 513these functions to manipulate or read atomic_t variables. 514:c:func:`atomic_read()` and :c:func:`atomic_set()` get and set 515the counter, :c:func:`atomic_add()`, :c:func:`atomic_sub()`, 516:c:func:`atomic_inc()`, :c:func:`atomic_dec()`, and 517:c:func:`atomic_dec_and_test()` (returns true if it was 518decremented to zero). 519 520Yes. It returns true (i.e. != 0) if the atomic variable is zero. 521 522Note that these functions are slower than normal arithmetic, and so 523should not be used unnecessarily. 524 525The second class of atomic operations is atomic bit operations on an 526``unsigned long``, defined in ``include/linux/bitops.h``. These 527operations generally take a pointer to the bit pattern, and a bit 528number: 0 is the least significant bit. :c:func:`set_bit()`, 529:c:func:`clear_bit()` and :c:func:`change_bit()` set, clear, 530and flip the given bit. :c:func:`test_and_set_bit()`, 531:c:func:`test_and_clear_bit()` and 532:c:func:`test_and_change_bit()` do the same thing, except return 533true if the bit was previously set; these are particularly useful for 534atomically setting flags. 535 536It is possible to call these operations with bit indices greater than 537BITS_PER_LONG. The resulting behavior is strange on big-endian 538platforms though so it is a good idea not to do this. 539 540Symbols 541======= 542 543Within the kernel proper, the normal linking rules apply (ie. unless a 544symbol is declared to be file scope with the ``static`` keyword, it can 545be used anywhere in the kernel). However, for modules, a special 546exported symbol table is kept which limits the entry points to the 547kernel proper. Modules can also export symbols. 548 549:c:func:`EXPORT_SYMBOL()` ``include/linux/export.h`` 550---------------------------------------------------- 551 552This is the classic method of exporting a symbol: dynamically loaded 553modules will be able to use the symbol as normal. 554 555:c:func:`EXPORT_SYMBOL_GPL()` ``include/linux/export.h`` 556-------------------------------------------------------- 557 558Similar to :c:func:`EXPORT_SYMBOL()` except that the symbols 559exported by :c:func:`EXPORT_SYMBOL_GPL()` can only be seen by 560modules with a :c:func:`MODULE_LICENSE()` that specifies a GPL 561compatible license. It implies that the function is considered an 562internal implementation issue, and not really an interface. Some 563maintainers and developers may however require EXPORT_SYMBOL_GPL() 564when adding any new APIs or functionality. 565 566Routines and Conventions 567======================== 568 569Double-linked lists ``include/linux/list.h`` 570-------------------------------------------- 571 572There used to be three sets of linked-list routines in the kernel 573headers, but this one is the winner. If you don't have some particular 574pressing need for a single list, it's a good choice. 575 576In particular, :c:func:`list_for_each_entry()` is useful. 577 578Return Conventions 579------------------ 580 581For code called in user context, it's very common to defy C convention, 582and return 0 for success, and a negative error number (eg. -EFAULT) for 583failure. This can be unintuitive at first, but it's fairly widespread in 584the kernel. 585 586Using :c:func:`ERR_PTR()` ``include/linux/err.h``; to encode a 587negative error number into a pointer, and :c:func:`IS_ERR()` and 588:c:func:`PTR_ERR()` to get it back out again: avoids a separate 589pointer parameter for the error number. Icky, but in a good way. 590 591Breaking Compilation 592-------------------- 593 594Linus and the other developers sometimes change function or structure 595names in development kernels; this is not done just to keep everyone on 596their toes: it reflects a fundamental change (eg. can no longer be 597called with interrupts on, or does extra checks, or doesn't do checks 598which were caught before). Usually this is accompanied by a fairly 599complete note to the linux-kernel mailing list; search the archive. 600Simply doing a global replace on the file usually makes things **worse**. 601 602Initializing structure members 603------------------------------ 604 605The preferred method of initializing structures is to use designated 606initialisers, as defined by ISO C99, eg: 607 608:: 609 610 static struct block_device_operations opt_fops = { 611 .open = opt_open, 612 .release = opt_release, 613 .ioctl = opt_ioctl, 614 .check_media_change = opt_media_change, 615 }; 616 617 618This makes it easy to grep for, and makes it clear which structure 619fields are set. You should do this because it looks cool. 620 621GNU Extensions 622-------------- 623 624GNU Extensions are explicitly allowed in the Linux kernel. Note that 625some of the more complex ones are not very well supported, due to lack 626of general use, but the following are considered standard (see the GCC 627info page section "C Extensions" for more details - Yes, really the info 628page, the man page is only a short summary of the stuff in info). 629 630- Inline functions 631 632- Statement expressions (ie. the ({ and }) constructs). 633 634- Declaring attributes of a function / variable / type 635 (__attribute__) 636 637- typeof 638 639- Zero length arrays 640 641- Macro varargs 642 643- Arithmetic on void pointers 644 645- Non-Constant initializers 646 647- Assembler Instructions (not outside arch/ and include/asm/) 648 649- Function names as strings (__func__). 650 651- __builtin_constant_p() 652 653Be wary when using long long in the kernel, the code gcc generates for 654it is horrible and worse: division and multiplication does not work on 655i386 because the GCC runtime functions for it are missing from the 656kernel environment. 657 658C++ 659--- 660 661Using C++ in the kernel is usually a bad idea, because the kernel does 662not provide the necessary runtime environment and the include files are 663not tested for it. It is still possible, but not recommended. If you 664really want to do this, forget about exceptions at least. 665 666NUMif 667----- 668 669It is generally considered cleaner to use macros in header files (or at 670the top of .c files) to abstract away functions rather than using \`#if' 671pre-processor statements throughout the source code. 672 673Putting Your Stuff in the Kernel 674================================ 675 676In order to get your stuff into shape for official inclusion, or even to 677make a neat patch, there's administrative work to be done: 678 679- Figure out whose pond you've been pissing in. Look at the top of the 680 source files, inside the ``MAINTAINERS`` file, and last of all in the 681 ``CREDITS`` file. You should coordinate with this person to make sure 682 you're not duplicating effort, or trying something that's already 683 been rejected. 684 685 Make sure you put your name and EMail address at the top of any files 686 you create or mangle significantly. This is the first place people 687 will look when they find a bug, or when **they** want to make a change. 688 689- Usually you want a configuration option for your kernel hack. Edit 690 ``Kconfig`` in the appropriate directory. The Config language is 691 simple to use by cut and paste, and there's complete documentation in 692 ``Documentation/kbuild/kconfig-language.txt``. 693 694 In your description of the option, make sure you address both the 695 expert user and the user who knows nothing about your feature. 696 Mention incompatibilities and issues here. **Definitely** end your 697 description with “if in doubt, say N” (or, occasionally, \`Y'); this 698 is for people who have no idea what you are talking about. 699 700- Edit the ``Makefile``: the CONFIG variables are exported here so you 701 can usually just add a "obj-$(CONFIG_xxx) += xxx.o" line. The syntax 702 is documented in ``Documentation/kbuild/makefiles.txt``. 703 704- Put yourself in ``CREDITS`` if you've done something noteworthy, 705 usually beyond a single file (your name should be at the top of the 706 source files anyway). ``MAINTAINERS`` means you want to be consulted 707 when changes are made to a subsystem, and hear about bugs; it implies 708 a more-than-passing commitment to some part of the code. 709 710- Finally, don't forget to read 711 ``Documentation/process/submitting-patches.rst`` and possibly 712 ``Documentation/process/submitting-drivers.rst``. 713 714Kernel Cantrips 715=============== 716 717Some favorites from browsing the source. Feel free to add to this list. 718 719``arch/x86/include/asm/delay.h:`` 720 721:: 722 723 #define ndelay(n) (__builtin_constant_p(n) ? \ 724 ((n) > 20000 ? __bad_ndelay() : __const_udelay((n) * 5ul)) : \ 725 __ndelay(n)) 726 727 728``include/linux/fs.h``: 729 730:: 731 732 /* 733 * Kernel pointers have redundant information, so we can use a 734 * scheme where we can return either an error code or a dentry 735 * pointer with the same return value. 736 * 737 * This should be a per-architecture thing, to allow different 738 * error and pointer decisions. 739 */ 740 #define ERR_PTR(err) ((void *)((long)(err))) 741 #define PTR_ERR(ptr) ((long)(ptr)) 742 #define IS_ERR(ptr) ((unsigned long)(ptr) > (unsigned long)(-1000)) 743 744``arch/x86/include/asm/uaccess_32.h:`` 745 746:: 747 748 #define copy_to_user(to,from,n) \ 749 (__builtin_constant_p(n) ? \ 750 __constant_copy_to_user((to),(from),(n)) : \ 751 __generic_copy_to_user((to),(from),(n))) 752 753 754``arch/sparc/kernel/head.S:`` 755 756:: 757 758 /* 759 * Sun people can't spell worth damn. "compatability" indeed. 760 * At least we *know* we can't spell, and use a spell-checker. 761 */ 762 763 /* Uh, actually Linus it is I who cannot spell. Too much murky 764 * Sparc assembly will do this to ya. 765 */ 766 C_LABEL(cputypvar): 767 .asciz "compatibility" 768 769 /* Tested on SS-5, SS-10. Probably someone at Sun applied a spell-checker. */ 770 .align 4 771 C_LABEL(cputypvar_sun4m): 772 .asciz "compatible" 773 774 775``arch/sparc/lib/checksum.S:`` 776 777:: 778 779 /* Sun, you just can't beat me, you just can't. Stop trying, 780 * give up. I'm serious, I am going to kick the living shit 781 * out of you, game over, lights out. 782 */ 783 784 785Thanks 786====== 787 788Thanks to Andi Kleen for the idea, answering my questions, fixing my 789mistakes, filling content, etc. Philipp Rumpf for more spelling and 790clarity fixes, and some excellent non-obvious points. Werner Almesberger 791for giving me a great summary of :c:func:`disable_irq()`, and Jes 792Sorensen and Andrea Arcangeli added caveats. Michael Elizabeth Chastain 793for checking and adding to the Configure section. Telsa Gwynne for 794teaching me DocBook. 795