Home
last modified time | relevance | path

Searched full:which (Results 1 – 25 of 9620) sorted by relevance

12345678910>>...385

/kernel/liteos_m/targets/riscv_nuclei_gd32vf103_soc_gcc/SoC/gd32vf103/Common/Source/Drivers/
Dgd32vf103_dma.c46 \param[in] channelx: specify which DMA channel is deinitialized
47 only one parameter can be selected which is shown as below:
92 \param[in] channelx: specify which DMA channel is initialized
93 only one parameter can be selected which is shown as below:
157 \param[in] channelx: specify which DMA channel
158 only one parameter can be selected which is shown as below:
176 \param[in] channelx: specify which DMA channel
177 only one parameter can be selected which is shown as below:
195 \param[in] channelx: specify which DMA channel
196 only one parameter can be selected which is shown as below:
[all …]
/kernel/linux/linux-5.10/drivers/staging/greybus/
Dgpio.c60 static int gb_gpio_activate_operation(struct gb_gpio_controller *ggc, u8 which) in gb_gpio_activate_operation() argument
70 request.which = which; in gb_gpio_activate_operation()
78 ggc->lines[which].active = true; in gb_gpio_activate_operation()
84 u8 which) in gb_gpio_deactivate_operation() argument
91 request.which = which; in gb_gpio_deactivate_operation()
95 dev_err(dev, "failed to deactivate gpio %u\n", which); in gb_gpio_deactivate_operation()
99 ggc->lines[which].active = false; in gb_gpio_deactivate_operation()
106 u8 which) in gb_gpio_get_direction_operation() argument
114 request.which = which; in gb_gpio_get_direction_operation()
124 which, direction); in gb_gpio_get_direction_operation()
[all …]
Dpwm.c42 u8 which) in gb_pwm_activate_operation() argument
48 if (which > pwmc->pwm_max) in gb_pwm_activate_operation()
51 request.which = which; in gb_pwm_activate_operation()
67 u8 which) in gb_pwm_deactivate_operation() argument
73 if (which > pwmc->pwm_max) in gb_pwm_deactivate_operation()
76 request.which = which; in gb_pwm_deactivate_operation()
92 u8 which, u32 duty, u32 period) in gb_pwm_config_operation() argument
98 if (which > pwmc->pwm_max) in gb_pwm_config_operation()
101 request.which = which; in gb_pwm_config_operation()
119 u8 which, u8 polarity) in gb_pwm_set_polarity_operation() argument
[all …]
/kernel/linux/linux-4.19/drivers/staging/greybus/
Dgpio.c65 static int gb_gpio_activate_operation(struct gb_gpio_controller *ggc, u8 which) in gb_gpio_activate_operation() argument
75 request.which = which; in gb_gpio_activate_operation()
83 ggc->lines[which].active = true; in gb_gpio_activate_operation()
89 u8 which) in gb_gpio_deactivate_operation() argument
96 request.which = which; in gb_gpio_deactivate_operation()
100 dev_err(dev, "failed to deactivate gpio %u\n", which); in gb_gpio_deactivate_operation()
104 ggc->lines[which].active = false; in gb_gpio_deactivate_operation()
111 u8 which) in gb_gpio_get_direction_operation() argument
119 request.which = which; in gb_gpio_get_direction_operation()
129 which, direction); in gb_gpio_get_direction_operation()
[all …]
Dpwm.c42 u8 which) in gb_pwm_activate_operation() argument
48 if (which > pwmc->pwm_max) in gb_pwm_activate_operation()
51 request.which = which; in gb_pwm_activate_operation()
67 u8 which) in gb_pwm_deactivate_operation() argument
73 if (which > pwmc->pwm_max) in gb_pwm_deactivate_operation()
76 request.which = which; in gb_pwm_deactivate_operation()
92 u8 which, u32 duty, u32 period) in gb_pwm_config_operation() argument
98 if (which > pwmc->pwm_max) in gb_pwm_config_operation()
101 request.which = which; in gb_pwm_config_operation()
119 u8 which, u8 polarity) in gb_pwm_set_polarity_operation() argument
[all …]
/kernel/linux/linux-5.10/Documentation/process/
D4.Coding.rst8 code. It is the code which will be examined by other developers and merged
9 (or not) into the mainline tree. So it is the quality of this code which
13 number of ways in which kernel developers can go wrong. Then the focus
14 will shift toward doing things right and the tools which can help in that
28 which does not meet the coding style guidelines. The presence of that code
46 The other trap is to assume that code which is already in the kernel is
56 The coding style document also should not be read as an absolute law which
58 style (a line which becomes far less readable if split to fit within the
81 At a simple level, consider a function which has an argument which is
84 provides. By that time, though, chances are good that the code which
[all …]
D1.Intro.rst27 :ref:`development_coding` is about the coding process; several pitfalls which
30 which can help to ensure that kernel patches are correct.
56 kernel has evolved into a best-of-breed operating system component which
75 offer this kind of openness, which is a characteristic of the free software
84 evolved its own distinct ways of operating which allow it to function
132 - Code which has been merged into the mainline kernel is available to all
133 Linux users. It will automatically be present on all distributions which
148 Code which is in the mainline, instead, does not require this work as the
151 which has been merged into the mainline has significantly lower
154 - Beyond that, code which is in the kernel will often be improved by other
[all …]
/kernel/linux/linux-4.19/Documentation/process/
D4.Coding.rst8 code. It is the code which will be examined by other developers and merged
9 (or not) into the mainline tree. So it is the quality of this code which
13 number of ways in which kernel developers can go wrong. Then the focus
14 will shift toward doing things right and the tools which can help in that
28 which does not meet the coding style guidelines. The presence of that code
46 The other trap is to assume that code which is already in the kernel is
56 The coding style document also should not be read as an absolute law which
58 style (a line which becomes far less readable if split to fit within the
81 At a simple level, consider a function which has an argument which is
84 provides. By that time, though, chances are good that the code which
[all …]
D1.Intro.rst25 :ref:`development_coding` is about the coding process; several pitfalls which
28 which can help to ensure that kernel patches are correct.
54 kernel has evolved into a best-of-breed operating system component which
73 offer this kind of openness, which is a characteristic of the free software
82 evolved its own distinct ways of operating which allow it to function
130 - Code which has been merged into the mainline kernel is available to all
131 Linux users. It will automatically be present on all distributions which
146 Code which is in the mainline, instead, does not require this work as the
149 which has been merged into the mainline has significantly lower
152 - Beyond that, code which is in the kernel will often be improved by other
[all …]
Dlicense-rules.rst17 which is required to be compatible with the GPL-2.0::
30 The User-space API (UAPI) header files, which describe the interface of
33 which does not extend the GPL requirements to any software which uses it to
35 into any source files which create an executable running on the Linux
41 tools which are used in the context of license compliance.
46 under which the content of the file is contributed. SPDX license
62 possible line in a file which can contain a comment. For the majority
63 or files this is the first line, except for scripts which require the
82 appropriate comment mechanism which the tool accepts shall be used. This
86 there are still older assembler tools which cannot handle C++ style
[all …]
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/arm64/arm/cortex-a76-n1/
Dcache.json3 …n": "L1 instruction cache refill. This event counts any instruction fetch which misses in the cach…
15 …re operation or page table walk access which causes data to be read from outside the L1, including…
21 …store operation or page table walk access which looks up in the L1 data cache. In particular, any …
33 …or Level 0 Macro-op cache access. This event counts any instruction fetch which accesses the L1 in…
45 …"PublicDescription": "L2 data cache access. This event counts any transaction from L1 which looks …
51 …L2 data cache refill. This event counts any cacheable transaction from L1 which causes data to be …
57which return data, regardless of whether they cause an invalidation. Invalidations from the L2 whi…
63 …line write into the L2 cache which does not cause a linefill, including write-backs from L1 to L2 …
69 …: "Level 1 data TLB access. This event counts any load or store operation which accesses the data …
75 … "Level 1 instruction TLB access. This event counts any instruction fetch which accesses the instr…
[all …]
/kernel/linux/linux-5.10/tools/testing/kunit/test_data/
Dtest_is_test_passed-no_tests_run.log39 Using a channel type which is configured out of UML
41 Using a channel type which is configured out of UML
43 Using a channel type which is configured out of UML
45 Using a channel type which is configured out of UML
47 Using a channel type which is configured out of UML
49 Using a channel type which is configured out of UML
51 Using a channel type which is configured out of UML
53 Using a channel type which is configured out of UML
55 Using a channel type which is configured out of UML
57 Using a channel type which is configured out of UML
[all …]
Dtest_output_isolated_correctly.log61 Using a channel type which is configured out of UML
63 Using a channel type which is configured out of UML
65 Using a channel type which is configured out of UML
67 Using a channel type which is configured out of UML
69 Using a channel type which is configured out of UML
71 Using a channel type which is configured out of UML
73 Using a channel type which is configured out of UML
75 Using a channel type which is configured out of UML
77 Using a channel type which is configured out of UML
79 Using a channel type which is configured out of UML
[all …]
/kernel/linux/linux-4.19/net/bridge/netfilter/
DKconfig77 This option adds the among match, which allows matching the MAC source
86 This option adds the ARP match, which allows ARP and RARP header field
94 This option adds the IP match, which allows basic IP header field
103 This option adds the IP6 match, which allows basic IPV6 header field
111 This option adds the limit match, which allows you to control
112 the rate at which a rule can be matched. This match is the
121 This option adds the mark match, which allows matching frames based on
131 This option adds the packet type match, which allows matching on the
141 This option adds the Spanning Tree Protocol match, which
149 This option adds the 802.1Q vlan match, which allows the filtering of
[all …]
/kernel/linux/linux-5.10/drivers/mtd/chips/
DKconfig22 This option enables JEDEC-style probing of flash chips which are not
24 CFI-targeted flash drivers for any chips which are identified which
40 configuration options which allow you to do so.
49 This option defines the way in which the CPU attempts to arrange
51 'NO', which is the default when CONFIG_MTD_CFI_ADV_OPTIONS isn't
77 some other configuration options which would allow you to reduce
80 which are supported by the current code will be enabled.
86 If you wish to support CFI devices on a physical bus which is
93 If you wish to support CFI devices on a physical bus which is
100 If you wish to support CFI devices on a physical bus which is
[all …]
/kernel/linux/linux-4.19/drivers/mtd/chips/
DKconfig21 This option enables JEDEC-style probing of flash chips which are not
23 CFI-targeted flash drivers for any chips which are identified which
39 configuration options which allow you to do so.
48 This option defines the way in which the CPU attempts to arrange
50 'NO', which is the default when CONFIG_MTD_CFI_ADV_OPTIONS isn't
76 some other configuration options which would allow you to reduce
79 which are supported by the current code will be enabled.
85 If you wish to support CFI devices on a physical bus which is
92 If you wish to support CFI devices on a physical bus which is
99 If you wish to support CFI devices on a physical bus which is
[all …]
/kernel/linux/linux-4.19/net/netfilter/ipset/
DKconfig31 This option adds the bitmap:ip set type support, by which one
40 This option adds the bitmap:ip,mac set type support, by which one
49 This option adds the bitmap:port set type support, by which one
58 This option adds the hash:ip set type support, by which one
68 This option adds the hash:ip,mark set type support, by which one
77 This option adds the hash:ip,port set type support, by which one
86 This option adds the hash:ip,port,ip set type support, by which
96 This option adds the hash:ip,port,net set type support, by which
106 This option adds the hash:ip,mac set type support, by which
115 This option adds the hash:mac set type support, by which
[all …]
/kernel/linux/linux-4.19/tools/testing/selftests/timers/
Dposix_timers.c78 static int check_itimer(int which) in check_itimer() argument
88 if (which == ITIMER_VIRTUAL) in check_itimer()
90 else if (which == ITIMER_PROF) in check_itimer()
92 else if (which == ITIMER_REAL) in check_itimer()
99 if (which == ITIMER_VIRTUAL) in check_itimer()
101 else if (which == ITIMER_PROF) in check_itimer()
103 else if (which == ITIMER_REAL) in check_itimer()
112 err = setitimer(which, &val, NULL); in check_itimer()
118 if (which == ITIMER_VIRTUAL) in check_itimer()
120 else if (which == ITIMER_PROF) in check_itimer()
[all …]
/kernel/linux/linux-5.10/net/netfilter/ipset/
DKconfig32 This option adds the bitmap:ip set type support, by which one
41 This option adds the bitmap:ip,mac set type support, by which one
50 This option adds the bitmap:port set type support, by which one
59 This option adds the hash:ip set type support, by which one
69 This option adds the hash:ip,mark set type support, by which one
78 This option adds the hash:ip,port set type support, by which one
87 This option adds the hash:ip,port,ip set type support, by which
97 This option adds the hash:ip,port,net set type support, by which
107 This option adds the hash:ip,mac set type support, by which
116 This option adds the hash:mac set type support, by which
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/timers/
Dposix_timers.c77 static int check_itimer(int which) in check_itimer() argument
87 if (which == ITIMER_VIRTUAL) in check_itimer()
89 else if (which == ITIMER_PROF) in check_itimer()
91 else if (which == ITIMER_REAL) in check_itimer()
98 if (which == ITIMER_VIRTUAL) in check_itimer()
100 else if (which == ITIMER_PROF) in check_itimer()
102 else if (which == ITIMER_REAL) in check_itimer()
111 err = setitimer(which, &val, NULL); in check_itimer()
117 if (which == ITIMER_VIRTUAL) in check_itimer()
119 else if (which == ITIMER_PROF) in check_itimer()
[all …]
/kernel/linux/linux-5.10/net/bridge/netfilter/
DKconfig98 This option adds the among match, which allows matching the MAC source
107 This option adds the ARP match, which allows ARP and RARP header field
115 This option adds the IP match, which allows basic IP header field
124 This option adds the IP6 match, which allows basic IPV6 header field
132 This option adds the limit match, which allows you to control
133 the rate at which a rule can be matched. This match is the
142 This option adds the mark match, which allows matching frames based on
152 This option adds the packet type match, which allows matching on the
162 This option adds the Spanning Tree Protocol match, which
170 This option adds the 802.1Q vlan match, which allows the filtering of
[all …]
/kernel/linux/linux-5.10/Documentation/x86/
Dmds.rst17 MSBDS leaks Store Buffer Entries which can be speculatively forwarded to a
20 memory address, which can be exploited under certain conditions. Store
23 buffer is repartitioned which can expose data from one thread to the other.
26 L1 miss situations and to hold data which is returned or sent in response
29 deallocated it can retain the stale data of the preceding operations which
30 can then be forwarded to a faulting or assisting load operation, which can
37 contain stale data from a previous operation which can be forwarded to
38 faulting or assisting loads under certain conditions, which again can be
56 - to have a disclosure gadget which exposes the speculatively accessed
59 - to control the pointer through which the disclosure gadget exposes the
[all …]
/kernel/linux/linux-4.19/Documentation/x86/
Dmds.rst17 MSBDS leaks Store Buffer Entries which can be speculatively forwarded to a
20 memory address, which can be exploited under certain conditions. Store
23 buffer is repartitioned which can expose data from one thread to the other.
26 L1 miss situations and to hold data which is returned or sent in response
29 deallocated it can retain the stale data of the preceding operations which
30 can then be forwarded to a faulting or assisting load operation, which can
37 contain stale data from a previous operation which can be forwarded to
38 faulting or assisting loads under certain conditions, which again can be
56 - to have a disclosure gadget which exposes the speculatively accessed
59 - to control the pointer through which the disclosure gadget exposes the
[all …]
/kernel/linux/linux-4.19/Documentation/filesystems/
Dext2.txt45 resuid=n The user ID which may use the reserved blocks.
46 resgid=n The group ID which may use the reserved blocks.
79 which is decided when the filesystem is created. Smaller blocks mean
91 bitmap and the inode usage bitmap which show which blocks and inodes
98 in the same block group as the inode which contains them.
120 and which OS created it.
135 structure contains pointers to the filesystem blocks which contain the
142 There are some reserved fields which are currently unused in the inode
143 structure and several which are overloaded. One field is reserved for the
147 by the HURD to reference the inode of a program which will be used to
[all …]
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dcgroup-v2.rst111 although there are utility controllers which serve purposes other than
124 processes which belong to the cgroups consisting the inclusive
143 controllers which support v2 and are not bound to a v1 hierarchy are
145 Controllers which are not in active use in the v2 hierarchy can be
209 Initially, only the root cgroup exists to which all processes belong.
216 "cgroup.procs". When read, it lists the PIDs of all processes which
234 A cgroup which doesn't have any children or live processes can be
235 destroyed by removing the directory. Note that a cgroup which doesn't
264 process belong to the same cgroup, which also serves as the resource
265 domain to host resource consumptions which are not specific to a
[all …]

12345678910>>...385