Home
last modified time | relevance | path

Searched full:are (Results 1 – 25 of 2700) sorted by relevance

12345678910>>...108

/Documentation/input/
Dgamepad.rst12 document defines how gamepads are supposed to report their data.
44 4 buttons in diamonds-shape (on the right side). The buttons are
56 all devices have both or any, but they are present at most times.
59 Triggers are located on the upper-side of the pad in vertical direction.
60 Not all devices provide them, but the upper buttons are normally named
63 Many devices provide force-feedback features. But are mostly just
79 All new gamepads are supposed to comply with this mapping. Please report any
82 There are a lot of less-featured/less-powerful devices out there, which re-use
103 of the labels on the buttons, the codes are sent according to the
106 Please note that 2- and 3-button pads are fairly rare and old. You might
[all …]
/Documentation/fb/
Dapi.rst13 buffer core are not described.
24 Device and driver capabilities are reported in the fixed screen information
39 When supported, formats are configured using a FOURCC instead of manually
46 Pixels are stored in memory in hardware-dependent formats. Applications need
50 Formats are described by frame buffer types and visuals. Some visuals require
51 additional information, which are stored in the variable screen information
55 macropixels. Types describe how macropixels are stored in memory. The following
56 types and visuals are supported.
60 Macropixels are stored contiguously in a single plane. If the number of bits
61 per macropixel is not a multiple of 8, whether macropixels are padded to the
[all …]
/Documentation/networking/
Dipv6.txt2 Options for the ipv6 module are supplied as parameters at load time.
5 or modprobe command, but are usually specified in either
9 The available ipv6 module parameters are listed below. If a parameter
12 The parameters are as follows:
19 IPv6 addresses or operations are desired.
21 The possible values and their effects are:
43 The possible values and their effects are:
59 This might be used when no IPv6 addresses are desired.
61 The possible values and their effects are:
Dtcp-thin.txt6 retransmission mechanisms of the transport protocol are not fully
10 the service quality. Extreme latencies are caused by TCP's
21 In order to reduce application-layer latency when packets are lost,
24 the retransmission mechanisms are modified in the following manner:
29 These enhancements are applied only if the stream is detected as
31 of packets in flight. If there are less than 4 packets in flight,
35 Since these mechanisms are targeted at time-dependent applications,
39 modifications are turned off by default.
/Documentation/media/uapi/v4l/
Dcolorspaces.rst27 the human eye has color receptors that are sensitive to three different
29 color. Be glad you are not a mantis shrimp as those are sensitive to 12
34 color receptors are stimulated. This is based on the Spectral Power
42 those receptors and are perceived as the same color, even though the SPD
50 After some further mathematical transforms these stimuli are known as
52 color as perceived by a human unambiguously. These X, Y and Z values are
63 The x and y values are the chromaticity coordinates and can be used to
66 colors are specified with lower case 'x' and 'y', then the CIE xyY
71 will find reading resources that go into much more detail if you are
78 phosphors used in the displays. These *color primaries* are part of what
[all …]
Dpixfmt-intro.rst20 V4L2 drivers are not limited to these formats, however. Driver-specific
21 formats are possible. In that case the application may depend on a codec
29 Even so, ultimately, some standard formats are needed, so the V4L2
33 The V4L2 standard formats are mainly uncompressed formats. The pixels
34 are always arranged in memory from left to right, and from top to
47 :ref:`four character (FourCC) codes <v4l2-fourcc>` which are also
48 listed below, however they are not the same as those used in the Windows
52 buffers. Those formats are identified by a separate set of FourCC codes
53 and are referred to as "multi-planar formats". For example, a
58 3-planar case. Those sub-buffers are referred to as "*planes*".
/Documentation/
Datomic_bitops.txt5 While our bitmap_{}() functions are non-atomic, we have a number of operations
6 operating on single bits in a bitmap that are atomic.
12 The single bit operations are:
55 - non-RMW operations are unordered;
57 - RMW operations that have no return value are unordered;
59 - RMW operations that have a return value are fully ordered.
61 - RMW operations that are conditional are unordered on FAILURE,
70 the same barriers as for atomic_t are used, see atomic_t.txt.
Datomic_t.txt5 RMW operations between CPUs (atomic operations on MMIO are not supported and
82 The non-RMW ops are (typically) regular LOADs and STOREs and are canonically
86 and are doing it wrong.
142 these are limited to the arithmetic operations because those are
143 reversible. Bitops are irreversible and therefore the modified value
150 - misc; the special purpose operations that are commonly used and would,
152 are time critical and can, (typically) on LL/SC architectures, be more
155 All these operations are SMP atomic; that is, the operations (for a single
165 - non-RMW operations are unordered;
167 - RMW operations that have no return value are unordered;
[all …]
Dthis_cpu_ops.txt8 this_cpu operations are a way of optimizing access to per cpu
18 This means that there are no atomicity issues between the calculation of
24 Read-modify-write operations are of particular interest. Frequently
32 synchronization is not necessary since we are dealing with per cpu
34 processor should be accessing that variable and therefore there are no
37 Please note that accesses by remote processors to a per cpu area are
45 are defined. These operations can be used without worrying about
116 the value of the individual counters for each processor are
120 Per cpu variables are used for performance reasons. Bouncing cache
190 Operations on these fields are straightforward::
[all …]
/Documentation/core-api/
Dtracepoint.rst11 Tracepoints are static probe points that are located in strategic points
13 a callback mechanism. The 'probes' are strictly typed functions that are
17 debug, and understand kernel behavior. There are a number of tools that
21 Tracepoints are defined in a number of header files via various macros.
24 tracepoints are available but also to understand where future
28 ``trace_tracepointname(function parameters)``. These are the tracepoints
29 callbacks that are found throughout the code. Registering and
/Documentation/livepatch/
Dlivepatch.rst28 There are many situations where users are reluctant to reboot a system. It may
39 There are multiple mechanisms in the Linux kernel that are directly related
43 - The kernel probes are the most generic. The code can be redirected by
52 are in any way modified.
56 Most of these problems are solved by using the dynamic ftrace framework as
59 a live patch is called with the help of a custom ftrace handler. But there are
66 Functions are there for a reason. They take some input parameters, get or
73 Most of these changes are self contained and the function presents itself
77 But there are more complex fixes. For example, a patch might change
83 when it is safe to do so, e.g. when the affected locks are released
[all …]
/Documentation/admin-guide/device-mapper/
Dstatistics.rst6 regions of a DM device. If no regions are defined no statistics are
8 devices are currently supported.
14 The I/O statistics counters for each step-sized area of a region are
16 Documentation/admin-guide/iostats.rst). But two extra counters (12 and 13) are
22 The reported times are in milliseconds and the granularity depends on
24 reported times are in nanoseconds.
65 The following optional arguments are supported:
70 used, the resulting times are in nanoseconds instead of
71 milliseconds. Precise timestamps are a little bit slower
75 numbers n1, n2, etc are times that represent the boundaries
[all …]
/Documentation/devicetree/
Dwriting-schema.rst6 Devicetree bindings are written using json-schema vocabulary. Schema files are
16 top-level json-schema properties used are:
46 schema. By default without 'select', nodes are matched against their possible
56 binding. The exact schema syntax depends on whether properties are known,
57 common properties (e.g. 'interrupts') or are binding/vendor specific properties.
65 Optional. Similar to 'properties', but names are regex.
75 Unless noted otherwise, all properties are required.
82 vocabulary for that property. The properties schemas are what is used for
86 binding schema need to be defined such as how many values are valid or what
87 possible values are valid.
[all …]
/Documentation/ABI/
DREADME10 The different levels of stability are:
14 defined to be stable. Userspace programs are free to use these
17 (like syscalls) are expected to never change and always be
21 This directory documents interfaces that are felt to be stable,
25 errors or security problems are found in them. Userspace
28 be marked stable. Programs that use these interfaces are
35 This directory documents interfaces that are still remaining in
36 the kernel, but are marked to be removed at some later point in
55 break in ways that are unacceptable. It is also
57 sure they are working in a proper way and do not need to
[all …]
/Documentation/filesystems/
Dext2.txt8 filesystem in use by Linux. There are also implementations available
14 Most defaults are determined by the filesystem superblock, and can be
15 set using tune2fs(8). Kernel-determined defaults are indicated by (*).
75 compression though these are not yet implemented (some are available as
83 The space in the device or file is split up into blocks. These are
92 Blocks are clustered into block groups in order to reduce fragmentation
96 Two blocks near the start of each group are reserved for the block usage
98 are in use. Since each bitmap is limited to a single block, this means
101 The block(s) following the bitmaps in each block group are designated
102 as the inode table for that block group and the remainder are the data
[all …]
Dsquashfs.txt6 directories. Inodes in the system are very small and all blocks are packed to
7 minimise data overhead. Block sizes greater than 4K are supported up to a
45 directory data are highly compacted, and packed on byte boundaries. Each
94 Compressed data blocks are written to the filesystem as files are read from
97 xattr tables are written.
104 these are stored here.
109 Metadata (inodes and directories) are compressed in 8Kbyte blocks. Each
114 Inodes are packed into the metadata blocks, and are not aligned to block
115 boundaries, therefore inodes overlap compressed blocks. Inodes are identified
120 To maximise compression there are different inodes for each file type
[all …]
Dgfs2-glocks.txt14 are completed.
17 just the holders) associated with the glock. If there are any
19 of the list. Locks are granted in strictly the order that they
20 are queued, except for those marked LM_FLAG_PRIORITY which are
23 There are three lock states that users of the glock layer can request,
36 operations. The glocks are basically a lock plus some routines which deal
46 These rules are implemented using the various glock operations which
47 are defined for each type of glock. Not all types of glocks use
70 prevent a situation where locks are being bounced around the cluster
72 tends to show up most with shared mmaped files which are being written
[all …]
Disofs.txt1 Mount options that are the same as for msdos and vfat partitions.
7 Mount options that are the same as vfat partitions. These are only useful
10 ASCII. Joliet filenames are stored in Unicode format, but
31 'mode' and 'dmode' even though Rock Ridge extensions are
33 nojoliet Ignore Joliet extensions if they are present.
34 norock Ignore Rock Ridge extensions if they are present.
43 Recommended documents about ISO 9660 standard are located at:
/Documentation/driver-api/
Dspi.rst10 another is shifted in on the MISO line. Those bits are assembled into
12 additional chipselect line is usually active-low (nCS); four signals are
18 only "master" side interfaces are supported, where Linux talks to SPI
29 <spi_master>`. SPI devices are children of that master,
32 <spi_board_info>` descriptors which are usually provided by
39 which are processed and completed asynchronously. (There are synchronous
40 wrappers, however.) Messages are built from one or more
43 options are needed, because different chips adopt very different
Ddevice_connection.rst8 Devices often have connections to other devices that are outside of the direct
15 Device connections are generic descriptions of any type of connection between
19 They are only descriptions which are not tied to either of the devices directly.
28 either endpoint device in the description. If the connections are defined in
30 descriptions are "built-in", and need to be added separately.
34 is needed if there are multiple connections between the two devices.
Ddevice-io.rst35 are starting with one. Physical addresses are of type unsigned long.
54 historical accident, these are named byte, word, long and quad accesses.
55 Both read and write accesses are supported; there is no prefetch support
58 The functions are named readb(), readw(), readl(), readq(),
64 :c:func:`memcpy_fromio()` and :c:func:`memset_io()` functions are
65 provided. Do not use memset or memcpy on IO addresses; they are not
68 The read and write functions are defined to be ordered. That is the
73 While the basic functions are defined to be synchronous with respect to
76 are burned by the fact that PCI bus writes are posted asynchronously. A
86 driver would like to ensure the write's effects are visible prior to
[all …]
/Documentation/security/keys/
Dtrusted-encrypted.rst5 Trusted and Encrypted Keys are two new key types added to the existing kernel
6 key ring service. Both of these new types are variable length symmetric keys,
7 and in both cases all keys are created in the kernel, and user space sees,
10 Keys can be used on any system. All user level blobs, are displayed and loaded
11 in hex ascii for convenience, and are integrity verified.
13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
17 (future) PCR values, so keys are easily migrated to new pcr values, such as
18 when the kernel and initramfs are updated. The same key can have many saved
19 blobs under different PCR values, so multiple boots are easily supported.
24 By default, trusted keys are sealed under the SRK, which has the default
[all …]
/Documentation/vm/
Dzswap.rst10 Zswap is a lightweight compressed cache for swap pages. It takes pages that are
14 significant performance improvement if reads from the compressed cache are
46 When zswap is disabled at runtime it will stop storing pages that are
49 pages stored in zswap will remain in the compressed pool until they are
66 pages are freed. The pool is not preallocated. By default, a zpool
90 Once there are no PTEs referencing a swap page stored in zswap (i.e. the count
108 compressed pages are not modified; they are left in their own zpool. When a
110 original compressor. Once all pages are removed from an old zpool, the zpool
111 and its compressor are freed.
113 Some of the pages in zswap are same-value filled pages (i.e. contents of the
[all …]
/Documentation/process/
Dhowto.rst31 are not a good substitute for a solid C education and/or years of
32 experience, the following books are good for, if anything, reference:
39 adheres to the ISO C89 standard, it uses a number of extensions that are
42 portions of the C standard are not supported. Arbitrary long long
43 divisions and floating point are not allowed. It can sometimes be
49 Please remember that you are trying to learn how to work with the
54 possible about these standards ahead of time, as they are well
64 rules and how to use `SPDX <https://spdx.org/>`_ identifiers in source code are
67 not ask on the Linux kernel mailing list. The people on the mailing lists are
78 The Linux kernel source tree has a large range of documents that are
[all …]
/Documentation/ABI/testing/
Dsysfs-driver-typec-displayport6 Valid values are USB, source and sink. Source means DisplayPort
9 All supported configurations are listed as space separated list
30 different pin assignments for USB Type-C connector that are
31 labeled A, B, C, D, E, and F. The supported pin assignments are
45 version 1.0b, pin assignments A, B, and F are deprecated. Only
48 and E are equal, where all channels on the connector are used

12345678910>>...108