Searched full:schemes (Results 1 – 25 of 84) sorted by relevance
1234
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/mtd/ |
D | gpmc-nand.txt | 113 support ecc-schemes with hardware error-correction (BCHx_HW). However 114 such SoC can use ecc-schemes with software library for error-correction 121 Higher ECC schemes require more OOB/Spare area to store ECC syndrome, 131 '3' for HAM1_xx ecc schemes 132 '7' for BCH4_xx ecc schemes 133 '14' for BCH8_xx ecc schemes 134 '26' for BCH16_xx ecc schemes 141 probably use lower ecc-schemes like BCH8.
|
/kernel/linux/linux-5.10/drivers/net/ethernet/freescale/fman/ |
D | fman_keygen.c | 42 /* Maximum number of KeyGen Schemes */ 228 * schemes sharing between multiple ports is not 257 struct keygen_scheme schemes[FM_KG_MAX_NUM_OF_SCHEMES]; member 258 /* Array of schemes */ 310 * Build Action Register value for port binding to schemes 388 * Write all Schemes Registers with specified values 443 * Return: 0 on success, -EINVAL when the are no available free schemes 450 if (!keygen->schemes[i].used) { in get_free_scheme_id() 472 return &keygen->schemes[scheme_id]; in get_scheme() 477 * Bind the port to schemes [all …]
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/amdzen2/ |
D | floating-point.json | 71 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 77 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 83 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.", 89 …ful for measuring the effectiveness of the Move elimination and Scalar code optimization schemes.",
|
/kernel/linux/linux-5.10/drivers/usb/musb/ |
D | Makefile | 30 # possible I/O schemes will be enabled at a time ... 31 # PIO only, or DMA (several potential schemes).
|
/kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/amdzen1/ |
D | floating-point.json | 172 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of Scalar… 179 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of Ops th… 186 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of SSE Mo… 193 …g the effectiveness of the Move elimination and Scalar code optimization schemes. Number of SSE Mo…
|
/kernel/linux/linux-5.10/Documentation/admin-guide/LSM/ |
D | Smack.rst | 348 Computer systems employ a variety of schemes to constrain how information is 349 shared among the people and services using the machine. Some of these schemes 351 access to pieces of data. These schemes are called discretionary access 353 of the user. Other schemes do not leave the decision regarding what a user or 354 program can access up to users or programs. These schemes are called mandatory 502 be "born" highly classified. To accommodate such schemes Smack includes a 552 schemes and concepts from other systems. Most often, the other systems are 650 of systems that use compatible labeling schemes, and the DOI specified on the
|
/kernel/linux/linux-5.10/Documentation/mips/ |
D | booting.rst | 8 Both schemes are supported; CONFIG_BOOT_RAW=y and CONFIG_NO_EXCEPT_FILL=y,
|
/kernel/linux/linux-5.10/include/linux/ |
D | t10-pi.h | 10 * protection schemes. Currently 0 through 3 are defined:
|
/kernel/linux/linux-5.10/security/smack/ |
D | Kconfig | 13 of other mandatory security schemes.
|
/kernel/linux/linux-5.10/drivers/media/usb/pvrusb2/ |
D | pvrusb2-std.h | 15 // modulation schemes (e.g. "M", "B", "G", etc).
|
D | pvrusb2-devattr.h | 112 PVR2_ROUTING_SCHEME_XXX. Schemes have to be defined as we
|
/kernel/linux/linux-5.10/arch/hexagon/include/asm/ |
D | cacheflush.h | 42 * indexed cache schemes that stale lines belonging to a given ASID aren't
|
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/reset/ |
D | reset.txt | 17 are dictated by the binding of the reset provider, although common schemes
|
/kernel/linux/linux-5.10/fs/f2fs/ |
D | Kconfig | 17 the internal geometry or flash memory management schemes aka FTL, F2FS
|
/kernel/linux/linux-5.10/Documentation/infiniband/ |
D | tag_matching.rst | 25 Implementations frequently use different matching schemes for these two
|
/kernel/linux/linux-5.10/Documentation/driver-api/fpga/ |
D | fpga-region.rst | 19 is intended to be used by other schemes that have other ways of accomplishing
|
/kernel/linux/linux-5.10/Documentation/i2c/ |
D | fault-codes.rst | 13 faults. There may be fancier recovery schemes that are appropriate in
|
/kernel/linux/linux-5.10/drivers/mtd/nand/raw/ |
D | internals.h | 78 /* MLC pairing schemes */
|
/kernel/linux/linux-5.10/Documentation/driver-api/gpio/ |
D | intro.rst | 50 value might be driven, supporting "wire-OR" and similar schemes for the
|
/kernel/linux/linux-5.10/net/mac80211/ |
D | main.c | 816 /* If the driver doesn't have cipher schemes, there's nothing in ieee80211_init_cipher_suites() 838 /* Driver specifies cipher schemes only (but not cipher suites in ieee80211_init_cipher_suites() 839 * including the schemes) in ieee80211_init_cipher_suites() 841 * We start counting ciphers defined by schemes, TKIP, CCMP, in ieee80211_init_cipher_suites()
|
/kernel/linux/linux-5.10/include/linux/mfd/ |
D | db8500-prcmu.h | 51 * enum clk_arm - ARM Cortex A9 clock schemes 67 * enum clk_gen - GEN#0/GEN#1 clock schemes
|
/kernel/linux/linux-5.10/block/partitions/ |
D | Kconfig | 14 the questions about foreign partitioning schemes.
|
/kernel/linux/linux-5.10/drivers/net/wireless/ath/ath9k/ |
D | ar9003_eeprom.h | 58 * schemes. In open loop power control, it is not really needed, but for
|
/kernel/linux/linux-5.10/Documentation/trace/coresight/ |
D | coresight-cpu-debug.rst | 93 schemes and finally this heavily impacts external debug module. So we can
|
/kernel/linux/linux-5.10/net/ipv4/ |
D | Kconfig | 489 bounded TCP-friendliness. The protocol combines two schemes 679 AQM schemes that do not provide a delay signal. It requires the fq
|
1234