| /kernel/liteos_m/targets/riscv_nuclei_gd32vf103_soc_gcc/SoC/gd32vf103/Common/Source/Drivers/ |
| D | gd32vf103_dma.c | 46 \param[in] channelx: specify which DMA channel is deinitialized 47 only one parameter can be selected which is shown as below: 92 \param[in] channelx: specify which DMA channel is initialized 93 only one parameter can be selected which is shown as below: 157 \param[in] channelx: specify which DMA channel 158 only one parameter can be selected which is shown as below: 176 \param[in] channelx: specify which DMA channel 177 only one parameter can be selected which is shown as below: 195 \param[in] channelx: specify which DMA channel 196 only one parameter can be selected which is shown as below: [all …]
|
| /kernel/linux/linux-5.10/drivers/staging/greybus/ |
| D | gpio.c | 60 static int gb_gpio_activate_operation(struct gb_gpio_controller *ggc, u8 which) in gb_gpio_activate_operation() argument 70 request.which = which; in gb_gpio_activate_operation() 78 ggc->lines[which].active = true; in gb_gpio_activate_operation() 84 u8 which) in gb_gpio_deactivate_operation() argument 91 request.which = which; in gb_gpio_deactivate_operation() 95 dev_err(dev, "failed to deactivate gpio %u\n", which); in gb_gpio_deactivate_operation() 99 ggc->lines[which].active = false; in gb_gpio_deactivate_operation() 106 u8 which) in gb_gpio_get_direction_operation() argument 114 request.which = which; in gb_gpio_get_direction_operation() 124 which, direction); in gb_gpio_get_direction_operation() [all …]
|
| D | pwm.c | 42 u8 which) in gb_pwm_activate_operation() argument 48 if (which > pwmc->pwm_max) in gb_pwm_activate_operation() 51 request.which = which; in gb_pwm_activate_operation() 67 u8 which) in gb_pwm_deactivate_operation() argument 73 if (which > pwmc->pwm_max) in gb_pwm_deactivate_operation() 76 request.which = which; in gb_pwm_deactivate_operation() 92 u8 which, u32 duty, u32 period) in gb_pwm_config_operation() argument 98 if (which > pwmc->pwm_max) in gb_pwm_config_operation() 101 request.which = which; in gb_pwm_config_operation() 119 u8 which, u8 polarity) in gb_pwm_set_polarity_operation() argument [all …]
|
| /kernel/linux/linux-4.19/drivers/staging/greybus/ |
| D | gpio.c | 65 static int gb_gpio_activate_operation(struct gb_gpio_controller *ggc, u8 which) in gb_gpio_activate_operation() argument 75 request.which = which; in gb_gpio_activate_operation() 83 ggc->lines[which].active = true; in gb_gpio_activate_operation() 89 u8 which) in gb_gpio_deactivate_operation() argument 96 request.which = which; in gb_gpio_deactivate_operation() 100 dev_err(dev, "failed to deactivate gpio %u\n", which); in gb_gpio_deactivate_operation() 104 ggc->lines[which].active = false; in gb_gpio_deactivate_operation() 111 u8 which) in gb_gpio_get_direction_operation() argument 119 request.which = which; in gb_gpio_get_direction_operation() 129 which, direction); in gb_gpio_get_direction_operation() [all …]
|
| D | pwm.c | 42 u8 which) in gb_pwm_activate_operation() argument 48 if (which > pwmc->pwm_max) in gb_pwm_activate_operation() 51 request.which = which; in gb_pwm_activate_operation() 67 u8 which) in gb_pwm_deactivate_operation() argument 73 if (which > pwmc->pwm_max) in gb_pwm_deactivate_operation() 76 request.which = which; in gb_pwm_deactivate_operation() 92 u8 which, u32 duty, u32 period) in gb_pwm_config_operation() argument 98 if (which > pwmc->pwm_max) in gb_pwm_config_operation() 101 request.which = which; in gb_pwm_config_operation() 119 u8 which, u8 polarity) in gb_pwm_set_polarity_operation() argument [all …]
|
| /kernel/linux/linux-5.10/Documentation/process/ |
| D | 4.Coding.rst | 8 code. It is the code which will be examined by other developers and merged 9 (or not) into the mainline tree. So it is the quality of this code which 13 number of ways in which kernel developers can go wrong. Then the focus 14 will shift toward doing things right and the tools which can help in that 28 which does not meet the coding style guidelines. The presence of that code 46 The other trap is to assume that code which is already in the kernel is 56 The coding style document also should not be read as an absolute law which 58 style (a line which becomes far less readable if split to fit within the 81 At a simple level, consider a function which has an argument which is 84 provides. By that time, though, chances are good that the code which [all …]
|
| D | 1.Intro.rst | 27 :ref:`development_coding` is about the coding process; several pitfalls which 30 which can help to ensure that kernel patches are correct. 56 kernel has evolved into a best-of-breed operating system component which 75 offer this kind of openness, which is a characteristic of the free software 84 evolved its own distinct ways of operating which allow it to function 132 - Code which has been merged into the mainline kernel is available to all 133 Linux users. It will automatically be present on all distributions which 148 Code which is in the mainline, instead, does not require this work as the 151 which has been merged into the mainline has significantly lower 154 - Beyond that, code which is in the kernel will often be improved by other [all …]
|
| /kernel/linux/linux-4.19/Documentation/process/ |
| D | 4.Coding.rst | 8 code. It is the code which will be examined by other developers and merged 9 (or not) into the mainline tree. So it is the quality of this code which 13 number of ways in which kernel developers can go wrong. Then the focus 14 will shift toward doing things right and the tools which can help in that 28 which does not meet the coding style guidelines. The presence of that code 46 The other trap is to assume that code which is already in the kernel is 56 The coding style document also should not be read as an absolute law which 58 style (a line which becomes far less readable if split to fit within the 81 At a simple level, consider a function which has an argument which is 84 provides. By that time, though, chances are good that the code which [all …]
|
| D | 1.Intro.rst | 25 :ref:`development_coding` is about the coding process; several pitfalls which 28 which can help to ensure that kernel patches are correct. 54 kernel has evolved into a best-of-breed operating system component which 73 offer this kind of openness, which is a characteristic of the free software 82 evolved its own distinct ways of operating which allow it to function 130 - Code which has been merged into the mainline kernel is available to all 131 Linux users. It will automatically be present on all distributions which 146 Code which is in the mainline, instead, does not require this work as the 149 which has been merged into the mainline has significantly lower 152 - Beyond that, code which is in the kernel will often be improved by other [all …]
|
| D | license-rules.rst | 17 which is required to be compatible with the GPL-2.0:: 30 The User-space API (UAPI) header files, which describe the interface of 33 which does not extend the GPL requirements to any software which uses it to 35 into any source files which create an executable running on the Linux 41 tools which are used in the context of license compliance. 46 under which the content of the file is contributed. SPDX license 62 possible line in a file which can contain a comment. For the majority 63 or files this is the first line, except for scripts which require the 82 appropriate comment mechanism which the tool accepts shall be used. This 86 there are still older assembler tools which cannot handle C++ style [all …]
|
| /kernel/linux/linux-5.10/tools/perf/pmu-events/arch/arm64/arm/cortex-a76-n1/ |
| D | cache.json | 3 …n": "L1 instruction cache refill. This event counts any instruction fetch which misses in the cach… 15 …re operation or page table walk access which causes data to be read from outside the L1, including… 21 …store operation or page table walk access which looks up in the L1 data cache. In particular, any … 33 …or Level 0 Macro-op cache access. This event counts any instruction fetch which accesses the L1 in… 45 …"PublicDescription": "L2 data cache access. This event counts any transaction from L1 which looks … 51 …L2 data cache refill. This event counts any cacheable transaction from L1 which causes data to be … 57 …which return data, regardless of whether they cause an invalidation. Invalidations from the L2 whi… 63 …line write into the L2 cache which does not cause a linefill, including write-backs from L1 to L2 … 69 …: "Level 1 data TLB access. This event counts any load or store operation which accesses the data … 75 … "Level 1 instruction TLB access. This event counts any instruction fetch which accesses the instr… [all …]
|
| /kernel/linux/linux-5.10/tools/testing/kunit/test_data/ |
| D | test_is_test_passed-no_tests_run.log | 39 Using a channel type which is configured out of UML 41 Using a channel type which is configured out of UML 43 Using a channel type which is configured out of UML 45 Using a channel type which is configured out of UML 47 Using a channel type which is configured out of UML 49 Using a channel type which is configured out of UML 51 Using a channel type which is configured out of UML 53 Using a channel type which is configured out of UML 55 Using a channel type which is configured out of UML 57 Using a channel type which is configured out of UML [all …]
|
| D | test_output_isolated_correctly.log | 61 Using a channel type which is configured out of UML 63 Using a channel type which is configured out of UML 65 Using a channel type which is configured out of UML 67 Using a channel type which is configured out of UML 69 Using a channel type which is configured out of UML 71 Using a channel type which is configured out of UML 73 Using a channel type which is configured out of UML 75 Using a channel type which is configured out of UML 77 Using a channel type which is configured out of UML 79 Using a channel type which is configured out of UML [all …]
|
| /kernel/linux/linux-4.19/net/bridge/netfilter/ |
| D | Kconfig | 77 This option adds the among match, which allows matching the MAC source 86 This option adds the ARP match, which allows ARP and RARP header field 94 This option adds the IP match, which allows basic IP header field 103 This option adds the IP6 match, which allows basic IPV6 header field 111 This option adds the limit match, which allows you to control 112 the rate at which a rule can be matched. This match is the 121 This option adds the mark match, which allows matching frames based on 131 This option adds the packet type match, which allows matching on the 141 This option adds the Spanning Tree Protocol match, which 149 This option adds the 802.1Q vlan match, which allows the filtering of [all …]
|
| /kernel/linux/linux-5.10/drivers/mtd/chips/ |
| D | Kconfig | 22 This option enables JEDEC-style probing of flash chips which are not 24 CFI-targeted flash drivers for any chips which are identified which 40 configuration options which allow you to do so. 49 This option defines the way in which the CPU attempts to arrange 51 'NO', which is the default when CONFIG_MTD_CFI_ADV_OPTIONS isn't 77 some other configuration options which would allow you to reduce 80 which are supported by the current code will be enabled. 86 If you wish to support CFI devices on a physical bus which is 93 If you wish to support CFI devices on a physical bus which is 100 If you wish to support CFI devices on a physical bus which is [all …]
|
| /kernel/linux/linux-4.19/drivers/mtd/chips/ |
| D | Kconfig | 21 This option enables JEDEC-style probing of flash chips which are not 23 CFI-targeted flash drivers for any chips which are identified which 39 configuration options which allow you to do so. 48 This option defines the way in which the CPU attempts to arrange 50 'NO', which is the default when CONFIG_MTD_CFI_ADV_OPTIONS isn't 76 some other configuration options which would allow you to reduce 79 which are supported by the current code will be enabled. 85 If you wish to support CFI devices on a physical bus which is 92 If you wish to support CFI devices on a physical bus which is 99 If you wish to support CFI devices on a physical bus which is [all …]
|
| /kernel/linux/linux-4.19/net/netfilter/ipset/ |
| D | Kconfig | 31 This option adds the bitmap:ip set type support, by which one 40 This option adds the bitmap:ip,mac set type support, by which one 49 This option adds the bitmap:port set type support, by which one 58 This option adds the hash:ip set type support, by which one 68 This option adds the hash:ip,mark set type support, by which one 77 This option adds the hash:ip,port set type support, by which one 86 This option adds the hash:ip,port,ip set type support, by which 96 This option adds the hash:ip,port,net set type support, by which 106 This option adds the hash:ip,mac set type support, by which 115 This option adds the hash:mac set type support, by which [all …]
|
| /kernel/linux/linux-4.19/tools/testing/selftests/timers/ |
| D | posix_timers.c | 78 static int check_itimer(int which) in check_itimer() argument 88 if (which == ITIMER_VIRTUAL) in check_itimer() 90 else if (which == ITIMER_PROF) in check_itimer() 92 else if (which == ITIMER_REAL) in check_itimer() 99 if (which == ITIMER_VIRTUAL) in check_itimer() 101 else if (which == ITIMER_PROF) in check_itimer() 103 else if (which == ITIMER_REAL) in check_itimer() 112 err = setitimer(which, &val, NULL); in check_itimer() 118 if (which == ITIMER_VIRTUAL) in check_itimer() 120 else if (which == ITIMER_PROF) in check_itimer() [all …]
|
| /kernel/linux/linux-5.10/net/netfilter/ipset/ |
| D | Kconfig | 32 This option adds the bitmap:ip set type support, by which one 41 This option adds the bitmap:ip,mac set type support, by which one 50 This option adds the bitmap:port set type support, by which one 59 This option adds the hash:ip set type support, by which one 69 This option adds the hash:ip,mark set type support, by which one 78 This option adds the hash:ip,port set type support, by which one 87 This option adds the hash:ip,port,ip set type support, by which 97 This option adds the hash:ip,port,net set type support, by which 107 This option adds the hash:ip,mac set type support, by which 116 This option adds the hash:mac set type support, by which [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/timers/ |
| D | posix_timers.c | 77 static int check_itimer(int which) in check_itimer() argument 87 if (which == ITIMER_VIRTUAL) in check_itimer() 89 else if (which == ITIMER_PROF) in check_itimer() 91 else if (which == ITIMER_REAL) in check_itimer() 98 if (which == ITIMER_VIRTUAL) in check_itimer() 100 else if (which == ITIMER_PROF) in check_itimer() 102 else if (which == ITIMER_REAL) in check_itimer() 111 err = setitimer(which, &val, NULL); in check_itimer() 117 if (which == ITIMER_VIRTUAL) in check_itimer() 119 else if (which == ITIMER_PROF) in check_itimer() [all …]
|
| /kernel/linux/linux-5.10/net/bridge/netfilter/ |
| D | Kconfig | 98 This option adds the among match, which allows matching the MAC source 107 This option adds the ARP match, which allows ARP and RARP header field 115 This option adds the IP match, which allows basic IP header field 124 This option adds the IP6 match, which allows basic IPV6 header field 132 This option adds the limit match, which allows you to control 133 the rate at which a rule can be matched. This match is the 142 This option adds the mark match, which allows matching frames based on 152 This option adds the packet type match, which allows matching on the 162 This option adds the Spanning Tree Protocol match, which 170 This option adds the 802.1Q vlan match, which allows the filtering of [all …]
|
| /kernel/linux/linux-5.10/Documentation/x86/ |
| D | mds.rst | 17 MSBDS leaks Store Buffer Entries which can be speculatively forwarded to a 20 memory address, which can be exploited under certain conditions. Store 23 buffer is repartitioned which can expose data from one thread to the other. 26 L1 miss situations and to hold data which is returned or sent in response 29 deallocated it can retain the stale data of the preceding operations which 30 can then be forwarded to a faulting or assisting load operation, which can 37 contain stale data from a previous operation which can be forwarded to 38 faulting or assisting loads under certain conditions, which again can be 56 - to have a disclosure gadget which exposes the speculatively accessed 59 - to control the pointer through which the disclosure gadget exposes the [all …]
|
| /kernel/linux/linux-4.19/Documentation/x86/ |
| D | mds.rst | 17 MSBDS leaks Store Buffer Entries which can be speculatively forwarded to a 20 memory address, which can be exploited under certain conditions. Store 23 buffer is repartitioned which can expose data from one thread to the other. 26 L1 miss situations and to hold data which is returned or sent in response 29 deallocated it can retain the stale data of the preceding operations which 30 can then be forwarded to a faulting or assisting load operation, which can 37 contain stale data from a previous operation which can be forwarded to 38 faulting or assisting loads under certain conditions, which again can be 56 - to have a disclosure gadget which exposes the speculatively accessed 59 - to control the pointer through which the disclosure gadget exposes the [all …]
|
| /kernel/linux/linux-4.19/Documentation/filesystems/ |
| D | ext2.txt | 45 resuid=n The user ID which may use the reserved blocks. 46 resgid=n The group ID which may use the reserved blocks. 79 which is decided when the filesystem is created. Smaller blocks mean 91 bitmap and the inode usage bitmap which show which blocks and inodes 98 in the same block group as the inode which contains them. 120 and which OS created it. 135 structure contains pointers to the filesystem blocks which contain the 142 There are some reserved fields which are currently unused in the inode 143 structure and several which are overloaded. One field is reserved for the 147 by the HURD to reference the inode of a program which will be used to [all …]
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/ |
| D | cgroup-v2.rst | 111 although there are utility controllers which serve purposes other than 124 processes which belong to the cgroups consisting the inclusive 143 controllers which support v2 and are not bound to a v1 hierarchy are 145 Controllers which are not in active use in the v2 hierarchy can be 209 Initially, only the root cgroup exists to which all processes belong. 216 "cgroup.procs". When read, it lists the PIDs of all processes which 234 A cgroup which doesn't have any children or live processes can be 235 destroyed by removing the directory. Note that a cgroup which doesn't 264 process belong to the same cgroup, which also serves as the resource 265 domain to host resource consumptions which are not specific to a [all …]
|