Home
last modified time | relevance | path

Searched full:of (Results 1 – 25 of 4406) sorted by relevance

12345678910>>...177

/Documentation/sound/designs/
Dtracepoints.rst12 This subsystem includes two categories of tracepoints; for state of PCM buffer
13 and for processing of PCM hardware parameters. These tracepoints are available
18 Tracepoints for state of PCM buffer
24 Tracepoints for processing of PCM hardware parameters
30 In a design of ALSA PCM core, data transmission is abstracted as PCM substream.
34 interaction between applications and ALSA PCM core. Once decided, runtime of
38 structure includes several types of parameters. Applications set preferable
41 set of parameters. The latter is used for an actual decision of the parameters.
49 Configurable. This type of parameter is described in
50 struct snd_mask and represent mask values. As of PCM protocol
[all …]
/Documentation/process/
Dcode-of-conduct-interpretation.rst3 Linux Kernel Contributor Covenant Code of Conduct Interpretation
7 provide a set of rules for almost any open source community. Every
9 Because of this, this document describes how we in the Linux kernel
14 to "traditional" ways of developing software. Your contributions and
19 the best possible solution for the overall success of Linux. This
22 quality of submission and eventual result to ever decrease.
27 The Code of Conduct uses the term "maintainers" numerous times. In the
35 The Code of Conduct mentions rights and responsibilities for
43 behave in the parts of the community where they are active. That
44 responsibility is upon all of us, and ultimately the Code of Conduct
[all …]
D1.Intro.rst9 The rest of this section covers the scope of the kernel development process
10 and the kinds of frustrations that developers and their employers can
14 influence the direction of kernel development. Code contributed to the
18 release cycle, and the mechanics of the merge window. The various phases in
20 discussion of tools and mailing lists. Developers wanting to get started
29 patches are covered, and there is an introduction to some of the tools
32 :ref:`development_posting` talks about the process of posting patches for
40 of the development process; this section offers a number of tips on how to
44 :ref:`development_advancedtopics` introduces a couple of "advanced" topics:
53 The Linux kernel, at over 8 million lines of code and well over 1000
[all …]
D4.Coding.rst7 process, the proof of any kernel development project is in the resulting
9 (or not) into the mainline tree. So it is the quality of this code which
10 will determine the ultimate success of the project.
13 number of ways in which kernel developers can go wrong. Then the focus
25 :ref:`Documentation/process/coding-style.rst <codingstyle>`. For much of
27 advisory. As a result, there is a substantial amount of code in the kernel
28 which does not meet the coding style guidelines. The presence of that code
31 The first of these is to believe that the kernel coding standards do not
32 matter and are not enforced. The truth of the matter is that adding new
36 requires some uniformity of code to make it possible for developers to
[all …]
Dcode-of-conduct.rst3 Contributor Covenant Code of Conduct
9 In the interest of fostering an open and welcoming environment, we as
11 our community a harassment-free experience for everyone, regardless of age, body
13 expression, level of experience, education, socio-economic status, nationality,
19 Examples of behavior that contributes to creating a positive environment
23 * Being respectful of differing viewpoints and experiences
29 Examples of unacceptable behavior by participants include:
31 * The use of sexualized language or imagery and unwelcome sexual attention or
44 Maintainers are responsible for clarifying the standards of acceptable behavior
46 any instances of unacceptable behavior.
[all …]
/Documentation/admin-guide/
Diostats.rst16 is mounted on ``/sys``, although of course it may be mounted anywhere.
20 Here are examples of these different formats::
38 a choice of ``cat /sys/block/hda/stat`` or ``grep 'hda ' /proc/diskstats``.
40 The advantage of one over the other is that the sysfs choice works well
41 if you are watching a known, small set of disks. ``/proc/diskstats`` may
42 be a better choice if you are watching a large number of disks because
43 you'll avoid the overhead of 50, 100, or 500 or more opens/closes with
44 each snapshot of your disk statistics.
47 the above example, the first field of statistics would be 446216.
51 minor device numbers, and device name. Each of these formats provides
[all …]
/Documentation/devicetree/bindings/net/
Dmicrel-ksz90x1.txt4 to clock delays. You can specify clock delay values in the PHY OF
6 also be added to an Ethernet OF device node.
20 change the driver now because of the many existing device trees that have
21 been created using values that go up in increments of 200.
23 The following table shows the actual skew delay you will get for each of the
48 - rxc-skew-ps : Skew control of RXC pad
49 - rxdv-skew-ps : Skew control of RX CTL pad
50 - txc-skew-ps : Skew control of TXC pad
51 - txen-skew-ps : Skew control of TX CTL pad
52 - rxd0-skew-ps : Skew control of RX data 0 pad
[all …]
/Documentation/userspace-api/media/
Dfdl-appendix.rst15 The purpose of this License is to make a manual, textbook, or other
16 written document “free” in the sense of freedom: to assure everyone the
23 This License is a kind of “copyleft”, which means that derivative works
24 of the document must themselves be free in the same sense. It
32 used for any textual work, regardless of subject matter or whether it is
47 terms of this License. The “Document”, below, refers to any such manual
48 or work. Any member of the public is a licensee, and is addressed as
54 A “Modified Version” of the Document means any work containing the
55 Document or a portion of it, either copied verbatim, or with
61 A “Secondary Section” is a named appendix or a front-matter section of
[all …]
/Documentation/devicetree/bindings/i2c/
Drenesas,i2c.txt5 "renesas,i2c-r8a7742" if the device is a part of a R8A7742 SoC.
6 "renesas,i2c-r8a7743" if the device is a part of a R8A7743 SoC.
7 "renesas,i2c-r8a7744" if the device is a part of a R8A7744 SoC.
8 "renesas,i2c-r8a7745" if the device is a part of a R8A7745 SoC.
9 "renesas,i2c-r8a77470" if the device is a part of a R8A77470 SoC.
10 "renesas,i2c-r8a774a1" if the device is a part of a R8A774A1 SoC.
11 "renesas,i2c-r8a774b1" if the device is a part of a R8A774B1 SoC.
12 "renesas,i2c-r8a774c0" if the device is a part of a R8A774C0 SoC.
13 "renesas,i2c-r8a774e1" if the device is a part of a R8A774E1 SoC.
14 "renesas,i2c-r8a7778" if the device is a part of a R8A7778 SoC.
[all …]
/Documentation/scheduler/
Dsched-stats.rst5 Version 15 of schedstats dropped counters for some sched_yield:
9 Version 14 of schedstats includes support for sched_domains, which hit the
16 In version 14 of schedstat, there is at least one level of domain
21 sometimes balancing only between pairs of cpus. At this time, there
27 of these will need to start with a baseline observation and then calculate
29 which does this for many of the fields is available at
43 1) # of times sched_yield() was called
49 3) # of times schedule() was called
50 4) # of times schedule() left the processor idle
54 5) # of times try_to_wake_up() was called
[all …]
/Documentation/powerpc/
Dassociativity.rst5 Associativity represents the groupings of the various platform resources into
6 domains of substantially similar mean performance relative to resources outside
7 of that domain. Resources subsets of a given domain that exhibit better
9 are represented as being members of a sub-grouping domain. This performance
10 characteristic is presented in terms of NUMA node distance within the Linux kernel.
13 PAPR interface currently supports different ways of communicating these resource
17 Hypervisor indicates the type/form of associativity used via "ibm,architecture-vec-5 property".
18 Bit 0 of byte 5 in the "ibm,architecture-vec-5" property indicates usage of Form 0 or Form 1.
19 A value of 1 indicates the usage of Form 1 associativity. For Form 2 associativity
20 bit 2 of byte 5 in the "ibm,architecture-vec-5" property is used.
[all …]
/Documentation/input/
Dmulti-touch-protocol.rst13 In order to utilize the full power of the new multi-touch and multi-user
17 drivers to report details for an arbitrary number of contacts.
19 The protocol is divided into two types, depending on the capabilities of the
22 devices capable of tracking identifiable contacts (type B), the protocol
32 Contact details are sent sequentially as separate packets of ABS_MT
33 events. Only the ABS_MT events are recognized as part of a contact
35 applications, the MT protocol can be implemented on top of the ST protocol
39 input_mt_sync() at the end of each packet. This generates a SYN_MT_REPORT
44 input_mt_slot(), with a slot as argument, at the beginning of each packet.
46 prepare for updates of the given slot.
[all …]
/Documentation/admin-guide/mm/
Dhugetlbpage.rst10 The intent of this file is to give a brief summary of hugetlbpage support in
11 the Linux kernel. This support is built on top of multiple page size support
15 256M and ppc64 supports 4K and 16M. A TLB is a cache of virtual-to-physical
17 Operating systems try to make best use of limited number of TLB resources.
29 The ``/proc/meminfo`` file provides information about the total number of
31 default huge page size and information about the number of free, reserved
32 and surplus huge pages in the pool of huge pages of default size.
34 size of the arguments to system calls that map huge page regions.
36 The output of ``cat /proc/meminfo`` will include lines like::
48 is the size of the pool of huge pages.
[all …]
/Documentation/admin-guide/pm/
Dintel_idle.rst16 ``intel_idle`` is a part of the
19 Nehalem and later generations of Intel processors, but the level of support for
27 logical CPU executing it is idle and so it may be possible to put some of the
29 arguments (passed in the ``EAX`` and ``ECX`` registers of the target CPU), the
30 first of which, referred to as a *hint*, can be used by the processor to
42 .. _intel-idle-enumeration-of-states:
44 Enumeration of Idle States
50 as C-states (in the ACPI terminology) or idle states. The list of meaningful
51 ``MWAIT`` hint values and idle states (i.e. low-power configurations of the
53 depend on the configuration of the platform.
[all …]
/Documentation/filesystems/ext4/
Dgroup_descr.rst6 Each block group on the filesystem has one of these descriptors
9 standard configuration is for each block group to contain a full copy of
13 Notice how the group descriptor records the location of both bitmaps and
18 of the groups' bitmaps and inode tables into one long run in the first
19 group of the flex group.
36 checksum is the crc16 of the FS UUID, the group number, and the group
38 checksum is the lower 16 bits of the checksum of the FS UUID, the group
56 - Lower 32-bits of location of block bitmap.
60 - Lower 32-bits of location of inode bitmap.
64 - Lower 32-bits of location of inode table.
[all …]
/Documentation/devicetree/bindings/display/
Dst,stih4xx.txt6 - reg: Physical base address of the IP registers and length of memory mapped region.
14 - reg: Physical base address of the IP registers and length of memory mapped region.
16 number of clocks may depend of the SoC type.
18 - clock-names: names of the clocks listed in clocks property in the same
22 This device must be the parent of all the sub-components and is responsible
23 of bind them.
26 - ranges: to allow probing of subdevices
29 must be a child of sti-display-subsystem
32 - reg: Physical base address of the IP registers and length of memory mapped region.
34 number of clocks may depend of the SoC type.
[all …]
/Documentation/security/
Dcredentials.rst18 userspace programs. Linux has a variety of actionable objects, including:
28 As a part of the description of all these objects there is a set of
29 credentials. What's in the set depends on the type of object.
33 Amongst the credentials of most objects, there will be a subset that
34 indicates the ownership of that object. This is used for resource
42 Also amongst the credentials of those objects, there will be a subset that
43 indicates the 'objective context' of that object. This may or may not be
47 The objective context is used as part of the security calculation that is
54 Most of the objects in the system are inactive: they don't act on other
65 A subject has an additional interpretation of its credentials. A subset
[all …]
/Documentation/admin-guide/device-mapper/
Dstatistics.rst5 Device Mapper supports the collection of I/O statistics on user-defined
6 regions of a DM device. If no regions are defined no statistics are
14 The I/O statistics counters for each step-sized area of a region are
19 histogram of latencies. All these counters may be accessed by sending
33 The creation of DM statistics will allocate memory via kmalloc or
34 fallback to using vmalloc space. At most, 1/4 of the overall system
50 a range of <length> 512-byte sectors
59 number of areas.
62 The number of optional arguments
69 instead of the "jiffies" variable. When this argument is
[all …]
Ddm-zoned.rst9 doing raw block device accesses) the sequential write constraints of
14 For a more detailed description of the zoned block device models and
38 write accesses to the sequential zones of a zoned block device.
43 placed in front of the zones from the zoned block device and will be handled
46 The zones of the device(s) are separated into 2 types:
51 2) Data zones: all remaining zones, the vast majority of which will be
53 zones of the device may be used also for buffering user random writes.
58 dm-zoned exposes a logical device with a sector size of 4096 bytes,
59 irrespective of the physical sector size of the backend zoned block
60 device being used. This allows reducing the amount of metadata needed to
[all …]
Dverity.rst5 Device-Mapper's "verity" target provides transparent integrity checking of
21 This is the type of the on-disk hash format.
25 the rest of the block is padded with zeroes.
29 padded with zeroes to the power of two.
32 This is the device containing data, the integrity of which needs to be
47 The size of a hash block in bytes.
50 The number of data blocks on the data device. Additional blocks are
55 This is the offset, in <hash_block_size>-blocks, from the start of hash_dev
56 to the root block of the hash tree.
60 be the name of the algorithm, like "sha1".
[all …]
/Documentation/ABI/testing/
Dconfigfs-most27 configure number of buffers used for this
31 configure type of data that will travel over
43 configure the number of packets that will be
49 name of the device the link is to be attached to
52 name of the channel the link is to be attached to
59 creation of the link. In case of speculative
82 configure number of buffers used for this
86 configure type of data that will travel over
98 configure the number of packets that will be
104 name of the device the link is to be attached to
[all …]
/Documentation/admin-guide/cgroup-v1/
Dblkio-controller.rst8 a need of various kinds of IO control policies (like proportional BW, max BW)
39 Above will put a limit of 1MB/second on reads happening for root group
44 # dd iflag=direct if=/mnt/common/zerofile of=/dev/null bs=4K count=1024
92 Details of cgroup files
97 - Specifies per cgroup weight. This is default weight of the group
100 Currently allowed range of weights is from 10 to 1000.
104 These rules override the default value of group weight as specified
135 two fields specify the major and minor number of the device and
140 - number of sectors transferred to/from disk by the group. First
141 two fields specify the major and minor number of the device and
[all …]
/Documentation/devicetree/bindings/gpio/
Dnvidia,tegra186-gpio.txt9 The Tegra186 GPIO controller allows software to set the IO direction of, and
10 read/write the value of, numerous GPIO signals. Routing of GPIO signals to
11 package balls is under the control of a separate pin controller HW block. Two
12 major sets of registers exist:
14 a) Security registers, which allow configuration of allowed access to the GPIO
15 register set. These registers exist in a single contiguous block of physical
16 address space. The size of this block, and the security features available,
19 Access to this set of registers is not necessary in all circumstances. Code
24 b) GPIO registers, which allow manipulation of the GPIO signals. In some GPIO
26 address space, each of which access the same underlying state. See the hardware
[all …]
/Documentation/pcmcia/
Ddriver-changes.rst7 * pcmcia_loop_config() and autoconfiguration (as of 2.6.36)
20 * pcmcia_request_configuration -> pcmcia_enable_device (as of 2.6.36)
26 * pcmcia_request_window changes (as of 2.6.36)
27 Instead of win_req_t, drivers are now requested to fill out
33 * pcmcia_request_io changes (as of 2.6.36)
34 Instead of io_req_t, drivers are now requested to fill out
40 * No dev_info_t, no cs_types.h (as of 2.6.36)
45 * No dev_node_t (as of 2.6.35)
48 * New IRQ request rules (as of 2.6.35)
49 Instead of the old pcmcia_request_irq() interface, drivers may now
[all …]
/Documentation/gpu/
Dmsm-crash-dump.rst12 and all the contents of a section will be indented two spaces from the header.
13 Each section might have multiple array entries the start of which is designated
35 ID of the GPU that generated the crash formatted as
39 The current value of RBBM_STATUS which shows what top level GPU
40 components are in use at the time of crash.
43 Section containing the contents of each ringbuffer. Each ringbuffer is
50 GPU address of the ringbuffer.
65 Maximum size of the ringbuffer programmed in the hardware.
68 The contents of the ring encoded as ascii85. Only the used
69 portions of the ring will be printed.
[all …]

12345678910>>...177