Home
last modified time | relevance | path

Searched +full:6 +full:a (Results 1 – 25 of 1604) sorted by relevance

12345678910>>...65

/Linux-v6.6/tools/perf/pmu-events/arch/x86/
Dmapfile.csv2 GenuineIntel-6-(97|9A|B7|BA|BF),v1.21,alderlake,core
3 GenuineIntel-6-BE,v1.21,alderlaken,core
4 GenuineIntel-6-(1C|26|27|35|36),v4,bonnell,core
5 GenuineIntel-6-(3D|47),v28,broadwell,core
6 GenuineIntel-6-56,v10,broadwellde,core
7 GenuineIntel-6-4F,v21,broadwellx,core
8 GenuineIntel-6-55-[56789ABCDEF],v1.19,cascadelakex,core
9 GenuineIntel-6-9[6C],v1.04,elkhartlake,core
10 GenuineIntel-6-5[CF],v13,goldmont,core
11 GenuineIntel-6-7A,v1.01,goldmontplus,core
[all …]
/Linux-v6.6/Documentation/networking/
D6pack.rst4 6pack Protocol
7 This is the 6pack-mini-HOWTO, written by
17 1. What is 6pack, and what are the advantages to KISS?
20 6pack is a transmission protocol for data exchange between the PC and
21 the TNC over a serial line. It can be used as an alternative to KISS.
23 6pack has two major advantages:
27 that the PC knows at any time if the TNC is receiving data, if a TNC
29 set and so on. This control data is processed at a higher priority than
30 normal data, so a data stream can be interrupted at any time to issue an
36 TNCs that are connected between each other and the PC by a daisy chain
[all …]
/Linux-v6.6/tools/testing/selftests/net/
Dfcnal-test.sh13 # 6. VRF and non-VRF permutations
16 # ns-A | ns-B
23 # ns-A:
35 # ns-A to ns-C connection - only for VRF and same config
36 # as ns-A to ns-B
38 # server / client nomenclature relative to ns-A
85 NSA=ns-A
122 read a
123 [ "$a" = "q" ] && exit 1
130 read a
[all …]
Dpmtu.sh10 # Set up two namespaces, A and B, with two paths between them over routers
15 # A B a_r2: 2000
21 # A to R1, checking that route exception PMTU changes accordingly over
23 # message advertising a PMTU smaller than net.ipv4.route.min_pmtu is
31 # routing table in A. A fib-rule is used to jump to this routing table
39 # Set up the same network topology as pmtu_ipv4, create a VXLAN tunnel
40 # over IPv4 between A and B, routed via R1. On the link between R1 and B,
41 # set a MTU lower than the VXLAN MTU and the MTU on the link between A and
43 # from A to B and check that the PMTU exception is created with the right
44 # value on A
[all …]
/Linux-v6.6/Documentation/dev-tools/
Dkmemleak.rst4 Kmemleak provides a way of detecting possible kernel memory leaks in a
5 way similar to a `tracing garbage collector
8 reported via /sys/kernel/debug/kmemleak. A similar method is used by the
15 CONFIG_DEBUG_KMEMLEAK in "Kernel hacking" has to be enabled. A kernel
58 trigger a memory scan
86 information like size and stack trace, are stored in a rbtree.
94 block to a freeing function and therefore the block is considered a
103 a pointer to a white object is found, the object is added to the
115 block is not considered a leak. One example is __vmalloc().
124 /sys/kernel/debug/kmemleak output. By issuing a 'scan' after a 'clear'
[all …]
/Linux-v6.6/Documentation/userspace-api/media/rc/
Drc-protos.rst9 IR is encoded as a series of pulses and spaces, using a protocol. These
10 protocols can encode e.g. an address (which device should respond) and a
12 across different devices for a given protocol.
14 Therefore out the output of the IR decoder is a scancode; a single u32
17 Other things can be encoded too. Some IR protocols encode a toggle bit; this
22 Some remotes have a pointer-type device which can used to control the
32 This IR protocol uses manchester encoding to encode 14 bits. There is a
55 - 6 (inverted)
57 - 2nd start bit in rc5, re-used as 6th command bit
71 * - 6
[all …]
/Linux-v6.6/Documentation/input/devices/
Delantech.rst24 5.2 Native absolute mode 6 byte packet format
28 6. Hardware version 3
30 6.2 Native absolute mode 6 byte packet format
35 7.2 Native absolute mode 6 byte packet format
41 8.2 Native relative mode 6 byte packet format
52 packet. Version 2 seems to be introduced with the EeePC and uses 6 bytes
54 and width of the touch. Hardware version 3 uses 6 bytes per packet (and
55 for 2 fingers the concatenation of two 6 bytes packets) and allows tracking
56 of up to 3 fingers. Hardware version 4 uses 6 bytes per packet, and can
57 combine a status packet with multiple head or motion packets. Hardware version
[all …]
/Linux-v6.6/tools/testing/selftests/drivers/net/mlxsw/
Ddevlink_trap_control.sh98 ip -6 route add default vrf v$h1 nexthop via 2001:db8:1::2
103 ip -6 route del default vrf v$h1 nexthop via 2001:db8:1::2
114 ip -6 route add default vrf v$h2 nexthop via 2001:db8:2::2
119 ip -6 route del default vrf v$h2 nexthop via 2001:db8:2::2
222 $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \
223 -A 192.0.2.1 -B 224.0.0.1 -t ip proto=2,p=11 -p 100 -q
230 "igmp_v1_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \
231 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=12 -p 100 -q
238 "igmp_v2_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \
239 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=16 -p 100 -q
[all …]
Dfib_offload.sh65 num=$(ip -6 route show match ${pfx} | grep "offload" | wc -l)
78 # Add a prefix route and check that it is offloaded.
79 ip -6 route add 2001:db8:3::/64 dev $spine_p1 metric 100
85 ip -6 route append 2001:db8:3::/64 dev $spine_p1 metric 200
93 ip -6 route append 2001:db8:3::/64 dev $spine_p1 metric 10
101 # Delete the routes and add the same route with a different nexthop
103 ip -6 route flush 2001:db8:3::/64 dev $spine_p1
104 ip -6 route add 2001:db8:3::/64 dev $spine_p2
109 ip -6 route flush 2001:db8:3::/64
116 # Add a multipath route and check that it is offloaded.
[all …]
Drtnetlink.sh63 # Test that it is possible to set an IP address on a VRF upper despite
72 ip -6 address add 2001:db8:1::1/64 dev vrf-test
90 # Create a FID RIF
97 # Prepare a device with a low MAC address
104 check_err $? "Could not attach a device with low MAC to a bridge with RIF"
106 # Port MAC address change should be allowed for a bridge with set MAC.
120 # Test that when a VLAN interface is deleted, its associated router
130 ip -6 address add 2001:db8:1::1/64 dev br0.10
133 # If we leaked the previous RIF, then this should produce a trace
135 ip -6 address add 2001:db8:1::1/64 dev br0.20
[all …]
/Linux-v6.6/arch/x86/crypto/
Dsha256-avx-asm.S11 # This software is available to you under a choice of one of two
32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
47 # This code schedules 1 block at a time, with 4 lanes per block
107 a = %eax define
141 # Rotate values of symbols a...h
150 b = a
151 a = TMP_ define
155 ## compute s0 four at a time and s1 two at a time
156 ## compute W[-16] + W[-7] 4 at a time
160 mov a, y1 # y1 = a
[all …]
Dsha256-ssse3-asm.S11 # This software is available to you under a choice of one of two
32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
100 a = %eax define
135 # Rotate values of symbols a...h
144 b = a
145 a = TMP_ define
149 ## compute s0 four at a time and s1 two at a time
150 ## compute W[-16] + W[-7] 4 at a time
154 mov a, y1 # y1 = a
156 ror $(22-13), y1 # y1 = a >> (22-13)
[all …]
/Linux-v6.6/tools/thermal/tmon/
Dtmon.84 \fBtmon\fP - A monitoring and testing tool for Linux kernel thermal subsystem
32 - with a built-in Proportional Integral Derivative (\fBPID\fP)
33 controller, user can pair a cooling device to a thermal sensor for
46 The \fB-c --control\fP option sets a cooling device type to control temperature
47 of a thermal zone
70 \fBA \fP active cooling trip point type (fan)
72 \fBA \fP hot trip point type
89 \fBTAB\fP shows tuning pop up panel, choose a letter to modify
115 LCD14 intel_powerclamp15 1 65.0 65 65 0 0 0 0 0 0 0 0 0 0 0 0 0 0 6 0 2
116 65.0 66 65 0 0 0 0 0 0 0 0 0 0 4 4 4 4 6 0 3 65.0 60 54 0 0 0 0 0 0 0 0
[all …]
/Linux-v6.6/arch/microblaze/include/asm/
Dhash.h8 * a supported configuration.
10 * With just a barrel shifter, we can implement an efficient constant
11 * multiply using shifts and adds. GCC can find a 9-step solution, but
12 * this 6-step solution was found by Yevgen Voronenko's implementation
15 * That software is really not designed for a single multiplier this large,
17 * 6-shift, 6-add sequences for computing x * 0x61C88647. They are all
19 * a = (x << 9) + c;
20 * b = (x << 23) + a;
21 * return (a<<11) + (b<<6) + (c<<3) - b;
24 * Without even a shifter, it's hopless; any hash function will suck.
[all …]
/Linux-v6.6/arch/powerpc/crypto/
Daes-tab-4k.S10 * crypto/aes_generic.c and are designed to be simply accessed by a combination
11 * of rlwimi/lwz instructions with a minimum of table registers (usually only
19 * This is a quite good tradeoff for low power devices (e.g. routers) without
25 #define R(a, b, c, d) \ argument
26 0x##a##b##c##d, 0x##d##a##b##c, 0x##c##d##a##b, 0x##b##c##d##a
35 .long R(ff, f2, f2, 0d), R(d6, 6b, 6b, bd)
36 .long R(de, 6f, 6f, b1), R(91, c5, c5, 54)
40 .long R(4d, ab, ab, e6), R(ec, 76, 76, 9a)
50 .long R(3d, 93, 93, ae), R(4c, 26, 26, 6a)
51 .long R(6c, 36, 36, 5a), R(7e, 3f, 3f, 41)
[all …]
/Linux-v6.6/arch/m68k/fpsp040/
Dtbldo.S10 | index with a 10-bit index, with the first
55 .long smovcr |$00-6 fmovecr all
64 .long serror |$01-6 fint ERROR
73 .long serror |$02-6 fsinh ERROR
82 .long serror |$03-6 fintrz ERROR
91 .long serror |$04-6 ERROR - illegal extension
100 .long serror |$05-6 ERROR - illegal extension
109 .long serror |$06-6 flognp1 ERROR
118 .long serror |$07-6 ERROR - illegal extension
127 .long serror |$08-6 fetoxm1 ERROR
[all …]
/Linux-v6.6/arch/s390/lib/
Duaccess.c41 .oac2.a = 1, in raw_copy_from_user_key()
56 " jnh 6f\n" in raw_copy_from_user_key()
59 " j 6f\n" in raw_copy_from_user_key()
61 "6:\n" in raw_copy_from_user_key()
64 EX_TABLE(3b, 6b) in raw_copy_from_user_key()
65 EX_TABLE(4b, 6b) in raw_copy_from_user_key()
66 : [size] "+&a" (size), [from] "+&a" (from), [to] "+&a" (to), [rem] "=&a" (rem) in raw_copy_from_user_key()
67 : [val] "a" (-4096UL), [spec] "d" (spec.val) in raw_copy_from_user_key()
103 .oac1.a = 1, in raw_copy_to_user_key()
118 " jnh 6f\n" in raw_copy_to_user_key()
[all …]
/Linux-v6.6/drivers/ata/pata_parport/
Dkbic.c5 * This is a low-level driver for the KBIC-951A and KBIC-971A
9 * required for the 971A interferes with the correct operation of
10 * the 951A, so this driver registers itself twice, once for
25 #define j44(a, b) ((((a >> 4) & 0x0f) | (b & 0xf0)) ^ 0x88) argument
37 int a, b, s; in kbic_read_regr() local
43 w0(regr | 0x18 | s); w2(4); w2(6); w2(4); w2(1); w0(8); in kbic_read_regr()
44 a = r1(); w0(0x28); b = r1(); w2(4); in kbic_read_regr()
45 return j44(a, b); in kbic_read_regr()
47 w0(regr|0x38 | s); w2(4); w2(6); w2(4); w2(5); w0(8); in kbic_read_regr()
48 a = r12w(); w2(4); in kbic_read_regr()
[all …]
Daten.c5 * aten.c is a low-level protocol driver for the ATEN EH-100
20 #define j44(a,b) ((((a>>4)&0x0f)|(b&0xf0))^0x88) argument
32 w0(r); w2(0xe); w2(6); w0(val); w2(7); w2(6); w2(0xc); in aten_write_regr()
37 int a, b, r; in aten_read_regr() local
44 w0(r); w2(0xe); w2(6); in aten_read_regr()
45 w2(7); w2(6); w2(0); in aten_read_regr()
46 a = r1(); w0(0x10); b = r1(); w2(0xc); in aten_read_regr()
47 return j44(a,b); in aten_read_regr()
51 w0(r); w2(0xe); w2(6); w0(0xff); in aten_read_regr()
53 a = r0(); in aten_read_regr()
[all …]
/Linux-v6.6/arch/mips/include/asm/
Dcpu-features.h25 * Note that these should only be used in cases where a kernel built for an
26 * older ISA *cannot* run on a CPU which supports the feature in question. For
27 * example this may be used for features introduced with MIPSr6, since a kernel
28 * built for an older ISA cannot run on a MIPSr6 CPU. This should not be used
29 * for MIPSr2 features however, since a MIPSr1 or earlier kernel might run on a
39 * These are for use with features that are optional up until a particular ISA
49 * These are for use with features that are optional up until a particular ISA
71 * SMP assumption: Options of CPU 0 are a superset of all processors.
96 #define cpu_has_rixiex __isa_ge_or_opt(6, MIPS_CPU_RIXIEX)
102 #define cpu_has_rw_llb __isa_ge_or_opt(6, MIPS_CPU_RW_LLB)
[all …]
/Linux-v6.6/arch/arm/mach-omap1/
Dmux.c40 MUX_CFG("UART3_TX", 6, 0, 1, 0, 30, 0, NA, 0, 0)
41 MUX_CFG("UART3_RX", 6, 3, 0, 0, 31, 1, NA, 0, 0)
45 MUX_CFG("UART3_BCLK", A, 0, 0, 2, 6, 0, NA, 0, 0)
46 MUX_CFG("Y15_1610_UART3_RTS", A, 0, 1, 2, 6, 0, NA, 0, 0)
49 MUX_CFG("PWT", 6, 0, 2, 0, 30, 0, NA, 0, 0)
50 MUX_CFG("PWL", 6, 3, 1, 0, 31, 1, NA, 0, 0)
67 MUX_CFG("USB1_VP", A, 3, 1, 2, 7, 0, NA, 0, 1)
68 MUX_CFG("USB1_VM", A, 6, 1, 2, 8, 0, NA, 0, 1)
69 MUX_CFG("USB1_RCV", A, 9, 1, 2, 9, 0, NA, 0, 1)
70 MUX_CFG("USB1_SPEED", A, 12, 2, 2, 10, 0, NA, 0, 1)
[all …]
/Linux-v6.6/Documentation/core-api/
Dpacking.rst10 One can memory-map a pointer to a carefully crafted struct over the hardware
20 A more robust alternative to struct field definitions would be to extract the
34 - Packing a CPU-usable number into a memory buffer (with hardware
36 - Unpacking a memory buffer (which has hardware constraints/quirks)
37 into a CPU-usable number.
47 The following examples cover the memory layout of a packed u64 field.
56 7 6 5 4
57 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
72 7 6 5 4
73 24 25 26 27 28 29 30 31 16 17 18 19 20 21 22 23 8 9 10 11 12 13 14 15 0 1 2 3 4 5 6 7
[all …]
/Linux-v6.6/Documentation/ABI/stable/
Dsysfs-class-tpm5 Description: The device/ directory under a specific TPM instance exposes
13 Description: The "active" property prints a '1' if the TPM chip is accepting
16 visible to the OS, but will only accept a restricted set of
41 Manufacturer is a hex dump of the 4 byte manufacturer info
42 space in a TPM. TCG version shows the TCG TPM spec level that
51 used to wait for a short, medium and long TPM command. All
54 any longer than necessary before starting to poll for a
64 Durations can be modified in the case where a buggy chip
73 Description: The "enabled" property prints a '1' if the TPM chip is enabled,
75 may be visible but produce a '0' after some operation that
[all …]
/Linux-v6.6/tools/testing/selftests/bpf/
Dtest_lwt_seg6local.sh2 # Connects 6 network namespaces through veths.
5 # fb00::1 fd00::1 fd00::2 fd00::3 fb00::6
8 # All IPv6 packets going to fb00::/16 through NS2 will be encapsulated in a
9 # IPv6 header with a Segment Routing Header, with segments :
13 # - fd00::1 : add a TLV, change the flags and apply a End.X action to fc42::1
14 # - fd00::2 : remove the TLV, change the flags, add a tag
17 # fd00::4 is a simple Segment Routing node decapsulating the inner IPv6 packet.
21 # An UDP datagram is sent from fb00::1 to fb00::6. The test succeeds if this
22 # datagram can be read on NS6 when binding to fb00::6.
69 trap cleanup 0 2 3 6 9
[all …]
/Linux-v6.6/net/ipv6/
DKconfig6 # IPv6 as module will cause a CRASH if you try to unload it
12 Support for IP version 6 (IPv6).
20 To compile this protocol support as a module, choose M here: the
31 are placed in a multi-homed network.
89 with high throughput. A typical desktop system does not
132 ILA is a mechanism to do network virtualization without
134 IPv6 address into a 64 bit locator and 64 bit identifier. The
140 "ip -6 route" command. ILA is described in
161 another protocol and sending it over a channel that understands the
163 the notion of a secure tunnel for IPSEC and then use routing protocol
[all …]

12345678910>>...65