Searched +full:bit +full:- +full:manipulation (Results 1 – 22 of 22) sorted by relevance
| /Documentation/devicetree/bindings/riscv/ |
| D | extensions.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR MIT) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: RISC-V ISA extensions 10 - Paul Walmsley <paul.walmsley@sifive.com> 11 - Palmer Dabbelt <palmer@sifive.com> 12 - Conor Dooley <conor@kernel.org> 15 RISC-V has a large number of extensions, some of which are "standard" 16 extensions, meaning they are ratified by RISC-V International, and others 36 Identifies the specific RISC-V instruction set architecture [all …]
|
| /Documentation/arch/riscv/ |
| D | hwprobe.rst | 1 .. SPDX-License-Identifier: GPL-2.0 3 RISC-V Hardware Probing Interface 4 --------------------------------- 6 The RISC-V hardware probing interface is based around a single syscall, which 18 The arguments are split into three groups: an array of key-value pairs, a CPU 19 set, and some flags. The key-value pairs are supplied with a count. Userspace 22 will be cleared to -1, and its value set to 0. The CPU set is defined by 23 CPU_SET(3) with size ``cpusetsize`` bytes. For value-like keys (eg. vendor, 25 have the same value. Otherwise -1 will be returned. For boolean-like keys, the 33 by sys_riscv_hwprobe() to only those which match each of the key-value pairs. [all …]
|
| /Documentation/networking/ |
| D | fib_trie.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 LC-trie implementation notes 8 ---------- 19 ------------------------ 22 child array - the "child index". See Level Compression. 46 in order to avoid ever-increasing child arrays. 61 --------- 71 Inserts a new leaf node in the trie. This is bit more complicated than 94 Halves the size of the child array within a tnode - the inverse of 98 The route manipulation functions. Should conform pretty closely to the [all …]
|
| D | switchdev.rst | 1 .. SPDX-License-Identifier: GPL-2.0 11 Copyright |copy| 2014-2015 Scott Feldman <sfeldma@gmail.com> 14 The Ethernet switch device driver model (switchdev) is an in-kernel driver 19 an example setup using a data-center-class switch ASIC chip. Other setups 20 with SR-IOV or soft switches, such as OVS, are possible. 25 User-space tools 28 +-------------------------------------------------------------------+ 31 +--------------+-------------------------------+ 35 +----------------------------------------------+ 41 +--+----+----+----+----+----+---+ +-----+-----+ [all …]
|
| /Documentation/arch/x86/ |
| D | pti.rst | 1 .. SPDX-License-Identifier: GPL-2.0 27 This approach helps to ensure that side-channel attacks leveraging 30 time. Once enabled at compile-time, it can be disabled at boot with 31 the 'nopti' or 'pti=' kernel parameters (see kernel-parameters.txt). 42 crippled by setting the NX bit in the top level. This ensures 43 that any missed kernel->user CR3 switch will immediately crash 49 each CPU's copy of the area a compile-time-fixed virtual address. 65 Protection against side-channel attacks is important. But, 70 a. Each process now needs an order-1 PGD instead of order-0. 79 a. CR3 manipulation to switch between the page table copies [all …]
|
| /Documentation/devicetree/bindings/gpio/ |
| D | nvidia,tegra186-gpio.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/gpio/nvidia,tegra186-gpio.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Thierry Reding <thierry.reding@gmail.com> 11 - Jon Hunter <jonathanh@nvidia.com> 35 b) GPIO registers, which allow manipulation of the GPIO signals. In some 53 controller, are both extremely non-linear. The header file 54 <dt-bindings/gpio/tegra186-gpio.h> describes the port-level mapping. In 65 module and the sets-of-ports as "controllers". [all …]
|
| /Documentation/core-api/ |
| D | pin_user_pages.rst | 1 .. SPDX-License-Identifier: GPL-2.0 35 In other words, use pin_user_pages*() for DMA-pinned pages, and 54 flags the caller provides. The caller is required to pass in a non-null struct 72 -------- 79 but the caller passed in a non-null struct pages* array, then the function 84 -------- 89 Tracking dma-pinned pages 92 Some of the key design constraints, and solutions, for tracking dma-pinned 98 * False positives (reporting that a page is dma-pinned, when in fact it is not) 104 * Given the above, we can overload the page->_refcount field by using, sort of, [all …]
|
| D | assoc_array.rst | 16 Pointers to objects _must_ be zero in the least significant bit. 48 The implementation uses a tree of 16-pointer nodes internally that are indexed 51 what would otherwise be a series of single-occupancy nodes. Further, nodes 68 ./script/config -e ASSOCIATIVE_ARRAY 72 ----------- 82 after an RCU grace period has passed - thus allowing access functions to 112 ---------------- 126 This should return a chunk of caller-supplied index key starting at the 127 *bit* position given by the level argument. The level argument will be a 137 rather than from a caller-supplied index key. [all …]
|
| D | kernel-api.rst | 9 .. kernel-doc:: include/linux/list.h 22 ------------------ 24 .. kernel-doc:: lib/vsprintf.c 27 .. kernel-doc:: include/linux/kstrtox.h 30 .. kernel-doc:: lib/kstrtox.c 33 .. kernel-doc:: lib/string_helpers.c 36 String Manipulation 37 ------------------- 39 .. kernel-doc:: include/linux/fortify-string.h 42 .. kernel-doc:: lib/string.c [all …]
|
| /Documentation/crypto/ |
| D | descore-readme.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 ------------------------------------------------------------------------------ 15 des - fast & portable DES encryption & decryption. 42 2. PORTABILITY to any byte-addressable host with a 32bit unsigned C type 43 3. Plug-compatible replacement for KERBEROS's low-level routines. 46 register-starved machines. My discussions with Richard Outerbridge, 51 up in a parameterized fashion so it can easily be modified by speed-daemon 58 compile on a SPARCStation 1 (cc -O4, gcc -O2): 60 this code (byte-order independent): 62 - 30us per encryption (options: 64k tables, no IP/FP) [all …]
|
| /Documentation/arch/loongarch/ |
| D | introduction.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 LoongArch is a new RISC ISA, which is a bit like MIPS or RISC-V. There are 8 currently 3 variants: a reduced 32-bit version (LA32R), a standard 32-bit 9 version (LA32S) and a 64-bit version (LA64). There are 4 privilege levels 22 ---- 24 LoongArch has 32 GPRs ( ``$r0`` ~ ``$r31`` ); each one is 32-bit wide in LA32 25 and 64-bit wide in LA64. ``$r0`` is hard-wired to zero, and the other registers 26 are not architecturally special. (Except ``$r1``, which is hard-wired as the 30 the LoongArch ELF psABI spec, in :ref:`References <loongarch-references>`: 40 ``$r4``-``$r11`` ``$a0``-``$a7`` Argument registers No [all …]
|
| /Documentation/admin-guide/media/ |
| D | imx7.rst | 1 .. SPDX-License-Identifier: GPL-2.0 7 ------------ 11 manipulation of the capture frames are less feature rich. 14 - CMOS Sensor Interface (CSI) 15 - Video Multiplexer 16 - MIPI CSI-2 Receiver 18 .. code-block:: none 20 MIPI Camera Input ---> MIPI CSI-2 --- > |\ 24 | U | ------> CSI ---> Capture 27 Parallel Camera Input ----------------> | / [all …]
|
| /Documentation/gpu/amdgpu/display/ |
| D | dcn-overview.rst | 10 .. kernel-figure:: dc_pipeline_overview.svg 17 arbitration, rotation, and cursor manipulation. 19 * **Display Pipe and Plane (DPP)**: This block provides pre-blend pixel 24 multiple planes, using global or per-pixel alpha. 38 * **Multi-Media HUB (MMHUBBUB)**: Memory controller interface for DMCUB and DWB 43 the Display Micro-Controller Unit - version B (DMCUB), which is handled via 84 ---------------------- 100 a one-to-one mapping of the link encoder to PHY, but we can configure the DCN 106 --------- 114 representation and convert them to a DCN specific floating-point format (i.e., [all …]
|
| /Documentation/scsi/ |
| D | scsi_eh.rst | 1 .. SPDX-License-Identifier: GPL-2.0 14 [1-1] struct scsi_cmnd 15 [1-2] How do scmd's get completed? 16 [1-2-1] Completing a scmd w/ scsi_done 17 [1-2-2] Completing a scmd w/ timeout 18 [1-3] How EH takes over 20 [2-1] EH through fine-grained callbacks 21 [2-1-1] Overview 22 [2-1-2] Flow of scmds through EH 23 [2-1-3] Flow of control [all …]
|
| D | ChangeLog.lpfc | 2 * Please read the associated RELEASE-NOTES file !!! 8 * Fixed build warning for 2.6.12-rc2 kernels: mempool_alloc now 19 * Removed FC_TRANSPORT_PATCHESxxx defines. They're in 2.6.12-rc1. 26 * Added PCI ID for LP10000-S. 31 * Zero-out response sense length in lpfc_scsi_prep_cmnd to prevent 33 - was causing spurious 0710 messages. 55 - stop using volatile. if you need special ordering use memory 57 - switch lpfc_sli_pcimem_bcopy to take void * arguments. 58 - remove typecast for constants - a U postfix marks them 60 - add a MAILBOX_CMD_SIZE macro, as most users of [all …]
|
| /Documentation/dev-tools/ |
| D | kmsan.rst | 1 .. SPDX-License-Identifier: GPL-2.0 19 ------------------- 27 -------------- 32 BUG: KMSAN: uninit-value in test_uninit_kmsan_check_memory+0x1be/0x380 [kmsan_test] 36 kunit_generic_run_threadfn_adapter+0x6d/0xc0 lib/kunit/try-catch.c:28 45 kunit_generic_run_threadfn_adapter+0x6d/0xc0 lib/kunit/try-catch.c:28 53 Bytes 4-7 of 8 are uninitialized 56 CPU: 0 PID: 6731 Comm: kunit_try_catch Tainted: G B E 5.16.0-rc3+ #104 57 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 71 - in a condition, e.g. ``if (v) { ... }``; [all …]
|
| /Documentation/bpf/ |
| D | btf.rst | 35 The file ``include/uapi/linux/btf.h`` provides high-level definition of how 54 endian systems, and can be used to test whether BTF is generated for big- or 55 little-endian target. The ``btf_header`` is designed to be extensible with 60 ------------------- 63 string table is a concatenation of other null-terminated strings. 66 ----------------- 77 #define BTF_KIND_ENUM 6 /* Enumeration up to 32-bit values */ 90 #define BTF_KIND_ENUM64 19 /* Enumeration up to 64-bit values */ 100 * bits 0-15: vlen (e.g. # of struct's members) 101 * bits 16-23: unused [all …]
|
| /Documentation/mm/damon/ |
| D | design.rst | 1 .. SPDX-License-Identifier: GPL-2.0 13 The monitoring-related information including the monitoring request 14 specification and DAMON-based operation schemes are stored in a data structure 19 To know how user-space can do the configurations and start/stop DAMON, refer to 28 - :ref:`Operations Set <damon_operations_set>`: Implements fundamental 30 address-space and available set of software/hardware primitives, 31 - :ref:`Core <damon_core_logic>`: Implements core logics including monitoring 32 overhead/accuracy control and access-aware system operations on top of the 34 - :ref:`Modules <damon_modules>`: Implements kernel modules for various 49 monitoring are address-space dependent. [all …]
|
| /Documentation/RCU/Design/Data-Structures/ |
| D | Data-Structures.rst | 15 Data-Structure Relationships 25 .. kernel-figure:: BigTreeClassicRCU.svg 34 which results in a three-level ``rcu_node`` tree. 38 The purpose of this combining tree is to allow per-CPU events 39 such as quiescent states, dyntick-idle transitions, 42 Quiescent states are recorded by the per-CPU ``rcu_data`` structures, 43 and other events are recorded by the leaf-level ``rcu_node`` 54 As can be seen from the diagram, on a 64-bit system 55 a two-level tree with 64 leaves can accommodate 1,024 CPUs, with a fanout 58 +-----------------------------------------------------------------------+ [all …]
|
| /Documentation/RCU/ |
| D | whatisRCU.rst | 3 What is RCU? -- "Read, Copy, Update" 21 …ries: Fundamentals https://www.linuxfoundation.org/webinars/unraveling-rcu-usage-mysteries 22 …Cases https://www.linuxfoundation.org/webinars/unraveling-rcu-usage-mysteries-additional-use-cases 28 during the 2.5 development effort that is optimized for read-mostly 47 :ref:`6. ANALOGY WITH READER-WRITER LOCKING <6_whatisRCU>` 67 everything, feel free to read the whole thing -- but if you are really 69 never need this document anyway. ;-) 74 ---------------- 103 b. Wait for all previous readers to complete their RCU read-side 112 use much lighter-weight synchronization, in some cases, absolutely no [all …]
|
| D | RTFP.txt | 4 This document describes RCU-related publications, and is followed by 19 with short-lived threads, such as the K42 research operating system. 20 However, Linux has long-lived tasks, so more is needed. 23 serialization, which is an RCU-like mechanism that relies on the presence 27 that these overheads were not so expensive in the mid-80s. Nonetheless, 28 passive serialization appears to be the first deferred-destruction 30 has lapsed, so this approach may be used in non-GPL software, if desired. 34 In 1987, Rashid et al. described lazy TLB-flush [RichardRashid87a]. 36 this paper helped inspire the update-side batching used in the later 38 a description of Argus that noted that use of out-of-date values can [all …]
|
| /Documentation/kbuild/ |
| D | makefiles.rst | 29 architecture-specific information to the top Makefile. 34 any built-in or modular targets. 80 ---------------- 90 obj-y += foo.o 95 If foo.o shall be built as a module, the variable obj-m is used. 100 obj-$(CONFIG_FOO) += foo.o 102 $(CONFIG_FOO) evaluates to either y (for built-in) or m (for module). 106 Built-in object goals - obj-y 107 ----------------------------- 110 in the $(obj-y) lists. These lists depend on the kernel [all …]
|