| /kernel/linux/linux-6.6/drivers/comedi/drivers/ni_routing/ni_route_values/ |
| D | ni_eseries.c | 40 * Note that for e-series devices, the backplane TRIGGER_LINE(6) is generally 41 * not connected to RTSI(6). 53 [B(NI_PFI(0))] = { 54 [B(NI_AI_StartTrigger)] = I(NI_PFI_OUTPUT_AI_START1), 56 [B(NI_PFI(1))] = { 57 [B(NI_AI_ReferenceTrigger)] = I(NI_PFI_OUTPUT_AI_START2), 59 [B(NI_PFI(2))] = { 60 [B(NI_AI_ConvertClock)] = I(NI_PFI_OUTPUT_AI_CONVERT), 62 [B(NI_PFI(3))] = { 63 [B(NI_CtrSource(1))] = I(NI_PFI_OUTPUT_G_SRC1), [all …]
|
| D | ni_660x.c | 48 [B(NI_PFI(8))] = { 49 [B(NI_CtrInternalOutput(7))] = I(1), 51 [B(NI_PFI(10))] = { 52 [B(NI_CtrGate(7))] = I(1), 54 [B(NI_PFI(11))] = { 55 [B(NI_CtrSource(7))] = I(1), 57 [B(NI_PFI(12))] = { 58 [B(NI_CtrInternalOutput(6))] = I(1), 60 [B(NI_PFI(14))] = { 61 [B(NI_CtrGate(6))] = I(1), [all …]
|
| D | ni_mseries.c | 56 [B(NI_PFI(0))] = { 57 [B(TRIGGER_LINE(0))] = I(18), 58 [B(TRIGGER_LINE(1))] = I(19), 59 [B(TRIGGER_LINE(2))] = I(20), 60 [B(TRIGGER_LINE(3))] = I(21), 61 [B(TRIGGER_LINE(4))] = I(22), 62 [B(TRIGGER_LINE(5))] = I(23), 63 [B(TRIGGER_LINE(6))] = I(24), 64 [B(TRIGGER_LINE(7))] = I(25), 65 [B(NI_CtrSource(0))] = I(9), [all …]
|
| /kernel/linux/linux-5.10/drivers/staging/comedi/drivers/ni_routing/ni_route_values/ |
| D | ni_eseries.c | 41 * Note that for e-series devices, the backplane TRIGGER_LINE(6) is generally 42 * not connected to RTSI(6). 54 [B(NI_PFI(0))] = { 55 [B(NI_AI_StartTrigger)] = I(NI_PFI_OUTPUT_AI_START1), 57 [B(NI_PFI(1))] = { 58 [B(NI_AI_ReferenceTrigger)] = I(NI_PFI_OUTPUT_AI_START2), 60 [B(NI_PFI(2))] = { 61 [B(NI_AI_ConvertClock)] = I(NI_PFI_OUTPUT_AI_CONVERT), 63 [B(NI_PFI(3))] = { 64 [B(NI_CtrSource(1))] = I(NI_PFI_OUTPUT_G_SRC1), [all …]
|
| D | ni_660x.c | 49 [B(NI_PFI(8))] = { 50 [B(NI_CtrInternalOutput(7))] = I(1), 52 [B(NI_PFI(10))] = { 53 [B(NI_CtrGate(7))] = I(1), 55 [B(NI_PFI(11))] = { 56 [B(NI_CtrSource(7))] = I(1), 58 [B(NI_PFI(12))] = { 59 [B(NI_CtrInternalOutput(6))] = I(1), 61 [B(NI_PFI(14))] = { 62 [B(NI_CtrGate(6))] = I(1), [all …]
|
| D | ni_mseries.c | 57 [B(NI_PFI(0))] = { 58 [B(TRIGGER_LINE(0))] = I(18), 59 [B(TRIGGER_LINE(1))] = I(19), 60 [B(TRIGGER_LINE(2))] = I(20), 61 [B(TRIGGER_LINE(3))] = I(21), 62 [B(TRIGGER_LINE(4))] = I(22), 63 [B(TRIGGER_LINE(5))] = I(23), 64 [B(TRIGGER_LINE(6))] = I(24), 65 [B(TRIGGER_LINE(7))] = I(25), 66 [B(NI_CtrSource(0))] = I(9), [all …]
|
| /kernel/linux/linux-5.10/Documentation/userspace-api/media/v4l/ |
| D | pixfmt-rgb.rst | 39 - 6 48 - 6 57 - 6 66 - 6 84 - b\ :sub:`1` 85 - b\ :sub:`0` 96 - b\ :sub:`3` 97 - b\ :sub:`2` 98 - b\ :sub:`1` 99 - b\ :sub:`0` [all …]
|
| D | subdev-formats.rst | 254 - 6 294 - b\ :sub:`3` 295 - b\ :sub:`2` 296 - b\ :sub:`1` 297 - b\ :sub:`0` 366 - b\ :sub:`3` 367 - b\ :sub:`2` 368 - b\ :sub:`1` 369 - b\ :sub:`0` 403 - b\ :sub:`3` [all …]
|
| D | pixfmt-srggb10-ipu3.rst | 19 to 32 bytes leaving 6 most significant bits padding in the last byte. 33 - B\ :sub:`0000low` 36 B\ :sub:`0000high`\ (bits 1--0) 37 - B\ :sub:`0002low`\ (bits 7--4) 40 - G\ :sub:`0003low`\ (bits 7--6) 42 B\ :sub:`0002high`\ (bits 5--0) 45 - B\ :sub:`0004low` 48 B\ :sub:`0004high`\ (bits 1--0) 49 - B\ :sub:`0006low`\ (bits 7--4) 53 - G\ :sub:`0007low`\ (bits 7--6) [all …]
|
| /kernel/linux/linux-5.10/arch/s390/include/asm/ |
| D | alternative-asm.h | 35 * Fill up @bytes with nops. The macro emits 6-byte nop instructions 37 * a 2-byte nop if the size of the area is not divisible by 6. 40 .fill ( \bytes ) / 6, 6, 0xc0040000 41 .fill ( \bytes ) % 6 / 4, 4, 0x47000000 42 .fill ( \bytes ) % 6 % 4 / 2, 2, 0x0700 47 * than 6, emit a jg instruction to branch over all nops, then 48 * fill an area of size (@bytes - 6) with nop instructions. 52 .if ( \bytes > 6 ) 54 alt_pad_fill \bytes - 6 72 773: alt_len_check 770b, 771b [all …]
|
| /kernel/linux/linux-6.6/Documentation/userspace-api/media/v4l/ |
| D | subdev-formats.rst | 258 - 6 298 - b\ :sub:`3` 299 - b\ :sub:`2` 300 - b\ :sub:`1` 301 - b\ :sub:`0` 370 - b\ :sub:`3` 371 - b\ :sub:`2` 372 - b\ :sub:`1` 373 - b\ :sub:`0` 407 - b\ :sub:`3` [all …]
|
| D | pixfmt-srggb10-ipu3.rst | 21 to 32 bytes leaving 6 most significant bits padding in the last byte. 39 - B\ :sub:`0000low` 42 B\ :sub:`0000high`\ (bits 1--0) 43 - B\ :sub:`0002low`\ (bits 7--4) 46 - G\ :sub:`0003low`\ (bits 7--6) 48 B\ :sub:`0002high`\ (bits 5--0) 51 - B\ :sub:`0004low` 54 B\ :sub:`0004high`\ (bits 1--0) 55 - B\ :sub:`0006low`\ (bits 7--4) 59 - G\ :sub:`0007low`\ (bits 7--6) [all …]
|
| D | pixfmt-rgb.rst | 45 - 'r', 'g' and 'b' denote bits of the red, green and blue components 60 G\ :sub:`0` B\ :sub:`4` B\ :sub:`3` B\ :sub:`2` B\ :sub:`1` B\ :sub:`0`], and 63 G\ :sub:`1` G\ :sub:`0` B\ :sub:`4` B\ :sub:`3` B\ :sub:`2` B\ :sub:`1` 64 B\ :sub:`0`]. 88 - 6 97 - 6 106 - 6 115 - 6 133 - b\ :sub:`1` 134 - b\ :sub:`0` [all …]
|
| /kernel/linux/linux-5.10/Documentation/dev-tools/ |
| D | kmemleak.rst | 246 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk 247 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkkkkkkkkkk.
|
| /kernel/linux/linux-6.6/Documentation/dev-tools/ |
| D | kmemleak.rst | 245 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b kkkkkkkkkkkkkkkk 246 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 kkkkkkkkkkkkkkk.
|
| /kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/mlxsw/ |
| D | devlink_trap_control.sh | 98 ip -6 route add default vrf v$h1 nexthop via 2001:db8:1::2 103 ip -6 route del default vrf v$h1 nexthop via 2001:db8:1::2 114 ip -6 route add default vrf v$h2 nexthop via 2001:db8:2::2 119 ip -6 route del default vrf v$h2 nexthop via 2001:db8:2::2 222 $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 223 -A 192.0.2.1 -B 224.0.0.1 -t ip proto=2,p=11 -p 100 -q 230 "igmp_v1_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 231 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=12 -p 100 -q 238 "igmp_v2_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 239 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=16 -p 100 -q [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/drivers/net/mlxsw/ |
| D | devlink_trap_control.sh | 96 ip -6 route add default vrf v$h1 nexthop via 2001:db8:1::2 101 ip -6 route del default vrf v$h1 nexthop via 2001:db8:1::2 112 ip -6 route add default vrf v$h2 nexthop via 2001:db8:2::2 117 ip -6 route del default vrf v$h2 nexthop via 2001:db8:2::2 220 $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 221 -A 192.0.2.1 -B 224.0.0.1 -t ip proto=2,p=11 -p 100 -q 228 "igmp_v1_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 229 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=12 -p 100 -q 236 "igmp_v2_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 237 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=16 -p 100 -q [all …]
|
| /kernel/linux/linux-5.10/arch/m68k/lib/ |
| D | uaccess.c | 21 " jne 1b\n" in __generic_copy_from_user() 27 " jeq 6f\n" in __generic_copy_from_user() 28 "5: "MOVES".b (%1)+,%3\n" in __generic_copy_from_user() 29 " move.b %3,(%2)+\n" in __generic_copy_from_user() 30 "6:\n" in __generic_copy_from_user() 38 " jeq 6b\n" in __generic_copy_from_user() 40 " jra 6b\n" in __generic_copy_from_user() 45 " .long 1b,10b\n" in __generic_copy_from_user() 46 " .long 3b,30b\n" in __generic_copy_from_user() 47 " .long 5b,50b\n" in __generic_copy_from_user() [all …]
|
| /kernel/linux/linux-6.6/arch/m68k/lib/ |
| D | uaccess.c | 21 " jne 1b\n" in __generic_copy_from_user() 27 " jeq 6f\n" in __generic_copy_from_user() 28 "5: "MOVES".b (%1)+,%3\n" in __generic_copy_from_user() 29 " move.b %3,(%2)+\n" in __generic_copy_from_user() 30 "6:\n" in __generic_copy_from_user() 38 " jeq 6b\n" in __generic_copy_from_user() 40 " jra 6b\n" in __generic_copy_from_user() 45 " .long 1b,10b\n" in __generic_copy_from_user() 46 " .long 3b,30b\n" in __generic_copy_from_user() 47 " .long 5b,50b\n" in __generic_copy_from_user() [all …]
|
| /kernel/linux/linux-6.6/arch/microblaze/include/asm/ |
| D | hash.h | 12 * this 6-step solution was found by Yevgen Voronenko's implementation 17 * 6-shift, 6-add sequences for computing x * 0x61C88647. They are all 20 * b = (x << 23) + a; 21 * return (a<<11) + (b<<6) + (c<<3) - b; 35 unsigned int b, c; in __hash_32() local 38 b = a << 23; in __hash_32() 41 b += a; in __hash_32() 43 /* Phase 2: Compute (a << 11) + (b << 6) + (c << 3) - b */ in __hash_32() 45 a += b; /* (a << 5) + b */ in __hash_32() 47 a += c; /* (a << 8) + (b << 3) + c */ in __hash_32() [all …]
|
| /kernel/linux/linux-5.10/arch/microblaze/include/asm/ |
| D | hash.h | 12 * this 6-step solution was found by Yevgen Voronenko's implementation 17 * 6-shift, 6-add sequences for computing x * 0x61C88647. They are all 20 * b = (x << 23) + a; 21 * return (a<<11) + (b<<6) + (c<<3) - b; 35 unsigned int b, c; in __hash_32() local 38 b = a << 23; in __hash_32() 41 b += a; in __hash_32() 43 /* Phase 2: Compute (a << 11) + (b << 6) + (c << 3) - b */ in __hash_32() 45 a += b; /* (a << 5) + b */ in __hash_32() 47 a += c; /* (a << 8) + (b << 3) + c */ in __hash_32() [all …]
|
| /kernel/linux/linux-6.6/arch/s390/lib/ |
| D | uaccess.c | 51 " j 0b\n" in raw_copy_from_user_key() 56 " jnh 6f\n" in raw_copy_from_user_key() 59 " j 6f\n" in raw_copy_from_user_key() 61 "6:\n" in raw_copy_from_user_key() 62 EX_TABLE(0b, 2b) in raw_copy_from_user_key() 63 EX_TABLE(1b, 2b) in raw_copy_from_user_key() 64 EX_TABLE(3b, 6b) in raw_copy_from_user_key() 65 EX_TABLE(4b, 6b) in raw_copy_from_user_key() 113 " j 0b\n" in raw_copy_to_user_key() 118 " jnh 6f\n" in raw_copy_to_user_key() [all …]
|
| /kernel/linux/linux-5.10/arch/powerpc/crypto/ |
| D | aes-tab-4k.S | 25 #define R(a, b, c, d) \ argument 26 0x##a##b##c##d, 0x##d##a##b##c, 0x##c##d##a##b, 0x##b##c##d##a 34 .long R(ee, 77, 77, 99), R(f6, 7b, 7b, 8d) 35 .long R(ff, f2, f2, 0d), R(d6, 6b, 6b, bd) 36 .long R(de, 6f, 6f, b1), R(91, c5, c5, 54) 38 .long R(ce, 67, 67, a9), R(56, 2b, 2b, 7d) 44 .long R(8e, 47, 47, c9), R(fb, f0, f0, 0b) 48 .long R(e4, 72, 72, 96), R(9b, c0, c0, 5b) 50 .long R(3d, 93, 93, ae), R(4c, 26, 26, 6a) 51 .long R(6c, 36, 36, 5a), R(7e, 3f, 3f, 41) [all …]
|
| /kernel/linux/linux-6.6/arch/powerpc/crypto/ |
| D | aes-tab-4k.S | 25 #define R(a, b, c, d) \ argument 26 0x##a##b##c##d, 0x##d##a##b##c, 0x##c##d##a##b, 0x##b##c##d##a 34 .long R(ee, 77, 77, 99), R(f6, 7b, 7b, 8d) 35 .long R(ff, f2, f2, 0d), R(d6, 6b, 6b, bd) 36 .long R(de, 6f, 6f, b1), R(91, c5, c5, 54) 38 .long R(ce, 67, 67, a9), R(56, 2b, 2b, 7d) 44 .long R(8e, 47, 47, c9), R(fb, f0, f0, 0b) 48 .long R(e4, 72, 72, 96), R(9b, c0, c0, 5b) 50 .long R(3d, 93, 93, ae), R(4c, 26, 26, 6a) 51 .long R(6c, 36, 36, 5a), R(7e, 3f, 3f, 41) [all …]
|
| /kernel/linux/linux-5.10/arch/s390/lib/ |
| D | uaccess.c | 113 "6: jz 4f\n" in copy_from_user_mvcos() 117 " j 0b\n" in copy_from_user_mvcos() 128 EX_TABLE(0b,2b) EX_TABLE(3b,5b) EX_TABLE(6b,2b) EX_TABLE(7b,5b) in copy_from_user_mvcos() 150 "8: jnz 1b\n" in copy_from_user_mvcp() 157 " jnh 6f\n" in copy_from_user_mvcp() 160 " j 6f\n" in copy_from_user_mvcp() 162 "6: sacf 768\n" in copy_from_user_mvcp() 163 EX_TABLE(0b,3b) EX_TABLE(2b,3b) EX_TABLE(4b,6b) in copy_from_user_mvcp() 164 EX_TABLE(7b,3b) EX_TABLE(8b,3b) EX_TABLE(9b,6b) in copy_from_user_mvcp() 188 "6: jz 4f\n" in copy_to_user_mvcos() [all …]
|