/Linux-v6.6/tools/perf/pmu-events/arch/x86/ |
D | mapfile.csv | 2 GenuineIntel-6-(97|9A|B7|BA|BF),v1.21,alderlake,core 3 GenuineIntel-6-BE,v1.21,alderlaken,core 4 GenuineIntel-6-(1C|26|27|35|36),v4,bonnell,core 5 GenuineIntel-6-(3D|47),v28,broadwell,core 6 GenuineIntel-6-56,v10,broadwellde,core 7 GenuineIntel-6-4F,v21,broadwellx,core 8 GenuineIntel-6-55-[56789ABCDEF],v1.19,cascadelakex,core 9 GenuineIntel-6-9[6C],v1.04,elkhartlake,core 10 GenuineIntel-6-5[CF],v13,goldmont,core 11 GenuineIntel-6-7A,v1.01,goldmontplus,core [all …]
|
/Linux-v6.6/Documentation/networking/ |
D | 6pack.rst | 4 6pack Protocol 7 This is the 6pack-mini-HOWTO, written by 17 1. What is 6pack, and what are the advantages to KISS? 20 6pack is a transmission protocol for data exchange between the PC and 21 the TNC over a serial line. It can be used as an alternative to KISS. 23 6pack has two major advantages: 27 that the PC knows at any time if the TNC is receiving data, if a TNC 29 set and so on. This control data is processed at a higher priority than 30 normal data, so a data stream can be interrupted at any time to issue an 36 TNCs that are connected between each other and the PC by a daisy chain [all …]
|
/Linux-v6.6/tools/testing/selftests/net/ |
D | fcnal-test.sh | 13 # 6. VRF and non-VRF permutations 16 # ns-A | ns-B 23 # ns-A: 35 # ns-A to ns-C connection - only for VRF and same config 36 # as ns-A to ns-B 38 # server / client nomenclature relative to ns-A 85 NSA=ns-A 122 read a 123 [ "$a" = "q" ] && exit 1 130 read a [all …]
|
D | pmtu.sh | 10 # Set up two namespaces, A and B, with two paths between them over routers 15 # A B a_r2: 2000 21 # A to R1, checking that route exception PMTU changes accordingly over 23 # message advertising a PMTU smaller than net.ipv4.route.min_pmtu is 31 # routing table in A. A fib-rule is used to jump to this routing table 39 # Set up the same network topology as pmtu_ipv4, create a VXLAN tunnel 40 # over IPv4 between A and B, routed via R1. On the link between R1 and B, 41 # set a MTU lower than the VXLAN MTU and the MTU on the link between A and 43 # from A to B and check that the PMTU exception is created with the right 44 # value on A [all …]
|
/Linux-v6.6/Documentation/dev-tools/ |
D | kmemleak.rst | 4 Kmemleak provides a way of detecting possible kernel memory leaks in a 5 way similar to a `tracing garbage collector 8 reported via /sys/kernel/debug/kmemleak. A similar method is used by the 15 CONFIG_DEBUG_KMEMLEAK in "Kernel hacking" has to be enabled. A kernel 58 trigger a memory scan 86 information like size and stack trace, are stored in a rbtree. 94 block to a freeing function and therefore the block is considered a 103 a pointer to a white object is found, the object is added to the 115 block is not considered a leak. One example is __vmalloc(). 124 /sys/kernel/debug/kmemleak output. By issuing a 'scan' after a 'clear' [all …]
|
/Linux-v6.6/Documentation/userspace-api/media/rc/ |
D | rc-protos.rst | 9 IR is encoded as a series of pulses and spaces, using a protocol. These 10 protocols can encode e.g. an address (which device should respond) and a 12 across different devices for a given protocol. 14 Therefore out the output of the IR decoder is a scancode; a single u32 17 Other things can be encoded too. Some IR protocols encode a toggle bit; this 22 Some remotes have a pointer-type device which can used to control the 32 This IR protocol uses manchester encoding to encode 14 bits. There is a 55 - 6 (inverted) 57 - 2nd start bit in rc5, re-used as 6th command bit 71 * - 6 [all …]
|
/Linux-v6.6/Documentation/input/devices/ |
D | elantech.rst | 24 5.2 Native absolute mode 6 byte packet format 28 6. Hardware version 3 30 6.2 Native absolute mode 6 byte packet format 35 7.2 Native absolute mode 6 byte packet format 41 8.2 Native relative mode 6 byte packet format 52 packet. Version 2 seems to be introduced with the EeePC and uses 6 bytes 54 and width of the touch. Hardware version 3 uses 6 bytes per packet (and 55 for 2 fingers the concatenation of two 6 bytes packets) and allows tracking 56 of up to 3 fingers. Hardware version 4 uses 6 bytes per packet, and can 57 combine a status packet with multiple head or motion packets. Hardware version [all …]
|
/Linux-v6.6/tools/testing/selftests/drivers/net/mlxsw/ |
D | devlink_trap_control.sh | 98 ip -6 route add default vrf v$h1 nexthop via 2001:db8:1::2 103 ip -6 route del default vrf v$h1 nexthop via 2001:db8:1::2 114 ip -6 route add default vrf v$h2 nexthop via 2001:db8:2::2 119 ip -6 route del default vrf v$h2 nexthop via 2001:db8:2::2 222 $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 223 -A 192.0.2.1 -B 224.0.0.1 -t ip proto=2,p=11 -p 100 -q 230 "igmp_v1_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 231 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=12 -p 100 -q 238 "igmp_v2_report" $MZ $h1 -c 1 -a own -b 01:00:5E:00:00:01 \ 239 -A 192.0.2.1 -B 244.0.0.1 -t ip proto=2,p=16 -p 100 -q [all …]
|
D | fib_offload.sh | 65 num=$(ip -6 route show match ${pfx} | grep "offload" | wc -l) 78 # Add a prefix route and check that it is offloaded. 79 ip -6 route add 2001:db8:3::/64 dev $spine_p1 metric 100 85 ip -6 route append 2001:db8:3::/64 dev $spine_p1 metric 200 93 ip -6 route append 2001:db8:3::/64 dev $spine_p1 metric 10 101 # Delete the routes and add the same route with a different nexthop 103 ip -6 route flush 2001:db8:3::/64 dev $spine_p1 104 ip -6 route add 2001:db8:3::/64 dev $spine_p2 109 ip -6 route flush 2001:db8:3::/64 116 # Add a multipath route and check that it is offloaded. [all …]
|
D | rtnetlink.sh | 63 # Test that it is possible to set an IP address on a VRF upper despite 72 ip -6 address add 2001:db8:1::1/64 dev vrf-test 90 # Create a FID RIF 97 # Prepare a device with a low MAC address 104 check_err $? "Could not attach a device with low MAC to a bridge with RIF" 106 # Port MAC address change should be allowed for a bridge with set MAC. 120 # Test that when a VLAN interface is deleted, its associated router 130 ip -6 address add 2001:db8:1::1/64 dev br0.10 133 # If we leaked the previous RIF, then this should produce a trace 135 ip -6 address add 2001:db8:1::1/64 dev br0.20 [all …]
|
/Linux-v6.6/arch/x86/crypto/ |
D | sha256-avx-asm.S | 11 # This software is available to you under a choice of one of two 32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 47 # This code schedules 1 block at a time, with 4 lanes per block 107 a = %eax define 141 # Rotate values of symbols a...h 150 b = a 151 a = TMP_ define 155 ## compute s0 four at a time and s1 two at a time 156 ## compute W[-16] + W[-7] 4 at a time 160 mov a, y1 # y1 = a [all …]
|
D | sha256-ssse3-asm.S | 11 # This software is available to you under a choice of one of two 32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 100 a = %eax define 135 # Rotate values of symbols a...h 144 b = a 145 a = TMP_ define 149 ## compute s0 four at a time and s1 two at a time 150 ## compute W[-16] + W[-7] 4 at a time 154 mov a, y1 # y1 = a 156 ror $(22-13), y1 # y1 = a >> (22-13) [all …]
|
/Linux-v6.6/tools/thermal/tmon/ |
D | tmon.8 | 4 \fBtmon\fP - A monitoring and testing tool for Linux kernel thermal subsystem 32 - with a built-in Proportional Integral Derivative (\fBPID\fP) 33 controller, user can pair a cooling device to a thermal sensor for 46 The \fB-c --control\fP option sets a cooling device type to control temperature 47 of a thermal zone 70 \fBA \fP active cooling trip point type (fan) 72 \fBA \fP hot trip point type 89 \fBTAB\fP shows tuning pop up panel, choose a letter to modify 115 LCD14 intel_powerclamp15 1 65.0 65 65 0 0 0 0 0 0 0 0 0 0 0 0 0 0 6 0 2 116 65.0 66 65 0 0 0 0 0 0 0 0 0 0 4 4 4 4 6 0 3 65.0 60 54 0 0 0 0 0 0 0 0 [all …]
|
/Linux-v6.6/arch/microblaze/include/asm/ |
D | hash.h | 8 * a supported configuration. 10 * With just a barrel shifter, we can implement an efficient constant 11 * multiply using shifts and adds. GCC can find a 9-step solution, but 12 * this 6-step solution was found by Yevgen Voronenko's implementation 15 * That software is really not designed for a single multiplier this large, 17 * 6-shift, 6-add sequences for computing x * 0x61C88647. They are all 19 * a = (x << 9) + c; 20 * b = (x << 23) + a; 21 * return (a<<11) + (b<<6) + (c<<3) - b; 24 * Without even a shifter, it's hopless; any hash function will suck. [all …]
|
/Linux-v6.6/arch/powerpc/crypto/ |
D | aes-tab-4k.S | 10 * crypto/aes_generic.c and are designed to be simply accessed by a combination 11 * of rlwimi/lwz instructions with a minimum of table registers (usually only 19 * This is a quite good tradeoff for low power devices (e.g. routers) without 25 #define R(a, b, c, d) \ argument 26 0x##a##b##c##d, 0x##d##a##b##c, 0x##c##d##a##b, 0x##b##c##d##a 35 .long R(ff, f2, f2, 0d), R(d6, 6b, 6b, bd) 36 .long R(de, 6f, 6f, b1), R(91, c5, c5, 54) 40 .long R(4d, ab, ab, e6), R(ec, 76, 76, 9a) 50 .long R(3d, 93, 93, ae), R(4c, 26, 26, 6a) 51 .long R(6c, 36, 36, 5a), R(7e, 3f, 3f, 41) [all …]
|
/Linux-v6.6/arch/m68k/fpsp040/ |
D | tbldo.S | 10 | index with a 10-bit index, with the first 55 .long smovcr |$00-6 fmovecr all 64 .long serror |$01-6 fint ERROR 73 .long serror |$02-6 fsinh ERROR 82 .long serror |$03-6 fintrz ERROR 91 .long serror |$04-6 ERROR - illegal extension 100 .long serror |$05-6 ERROR - illegal extension 109 .long serror |$06-6 flognp1 ERROR 118 .long serror |$07-6 ERROR - illegal extension 127 .long serror |$08-6 fetoxm1 ERROR [all …]
|
/Linux-v6.6/arch/s390/lib/ |
D | uaccess.c | 41 .oac2.a = 1, in raw_copy_from_user_key() 56 " jnh 6f\n" in raw_copy_from_user_key() 59 " j 6f\n" in raw_copy_from_user_key() 61 "6:\n" in raw_copy_from_user_key() 64 EX_TABLE(3b, 6b) in raw_copy_from_user_key() 65 EX_TABLE(4b, 6b) in raw_copy_from_user_key() 66 : [size] "+&a" (size), [from] "+&a" (from), [to] "+&a" (to), [rem] "=&a" (rem) in raw_copy_from_user_key() 67 : [val] "a" (-4096UL), [spec] "d" (spec.val) in raw_copy_from_user_key() 103 .oac1.a = 1, in raw_copy_to_user_key() 118 " jnh 6f\n" in raw_copy_to_user_key() [all …]
|
/Linux-v6.6/drivers/ata/pata_parport/ |
D | kbic.c | 5 * This is a low-level driver for the KBIC-951A and KBIC-971A 9 * required for the 971A interferes with the correct operation of 10 * the 951A, so this driver registers itself twice, once for 25 #define j44(a, b) ((((a >> 4) & 0x0f) | (b & 0xf0)) ^ 0x88) argument 37 int a, b, s; in kbic_read_regr() local 43 w0(regr | 0x18 | s); w2(4); w2(6); w2(4); w2(1); w0(8); in kbic_read_regr() 44 a = r1(); w0(0x28); b = r1(); w2(4); in kbic_read_regr() 45 return j44(a, b); in kbic_read_regr() 47 w0(regr|0x38 | s); w2(4); w2(6); w2(4); w2(5); w0(8); in kbic_read_regr() 48 a = r12w(); w2(4); in kbic_read_regr() [all …]
|
D | aten.c | 5 * aten.c is a low-level protocol driver for the ATEN EH-100 20 #define j44(a,b) ((((a>>4)&0x0f)|(b&0xf0))^0x88) argument 32 w0(r); w2(0xe); w2(6); w0(val); w2(7); w2(6); w2(0xc); in aten_write_regr() 37 int a, b, r; in aten_read_regr() local 44 w0(r); w2(0xe); w2(6); in aten_read_regr() 45 w2(7); w2(6); w2(0); in aten_read_regr() 46 a = r1(); w0(0x10); b = r1(); w2(0xc); in aten_read_regr() 47 return j44(a,b); in aten_read_regr() 51 w0(r); w2(0xe); w2(6); w0(0xff); in aten_read_regr() 53 a = r0(); in aten_read_regr() [all …]
|
/Linux-v6.6/arch/mips/include/asm/ |
D | cpu-features.h | 25 * Note that these should only be used in cases where a kernel built for an 26 * older ISA *cannot* run on a CPU which supports the feature in question. For 27 * example this may be used for features introduced with MIPSr6, since a kernel 28 * built for an older ISA cannot run on a MIPSr6 CPU. This should not be used 29 * for MIPSr2 features however, since a MIPSr1 or earlier kernel might run on a 39 * These are for use with features that are optional up until a particular ISA 49 * These are for use with features that are optional up until a particular ISA 71 * SMP assumption: Options of CPU 0 are a superset of all processors. 96 #define cpu_has_rixiex __isa_ge_or_opt(6, MIPS_CPU_RIXIEX) 102 #define cpu_has_rw_llb __isa_ge_or_opt(6, MIPS_CPU_RW_LLB) [all …]
|
/Linux-v6.6/arch/arm/mach-omap1/ |
D | mux.c | 40 MUX_CFG("UART3_TX", 6, 0, 1, 0, 30, 0, NA, 0, 0) 41 MUX_CFG("UART3_RX", 6, 3, 0, 0, 31, 1, NA, 0, 0) 45 MUX_CFG("UART3_BCLK", A, 0, 0, 2, 6, 0, NA, 0, 0) 46 MUX_CFG("Y15_1610_UART3_RTS", A, 0, 1, 2, 6, 0, NA, 0, 0) 49 MUX_CFG("PWT", 6, 0, 2, 0, 30, 0, NA, 0, 0) 50 MUX_CFG("PWL", 6, 3, 1, 0, 31, 1, NA, 0, 0) 67 MUX_CFG("USB1_VP", A, 3, 1, 2, 7, 0, NA, 0, 1) 68 MUX_CFG("USB1_VM", A, 6, 1, 2, 8, 0, NA, 0, 1) 69 MUX_CFG("USB1_RCV", A, 9, 1, 2, 9, 0, NA, 0, 1) 70 MUX_CFG("USB1_SPEED", A, 12, 2, 2, 10, 0, NA, 0, 1) [all …]
|
/Linux-v6.6/Documentation/core-api/ |
D | packing.rst | 10 One can memory-map a pointer to a carefully crafted struct over the hardware 20 A more robust alternative to struct field definitions would be to extract the 34 - Packing a CPU-usable number into a memory buffer (with hardware 36 - Unpacking a memory buffer (which has hardware constraints/quirks) 37 into a CPU-usable number. 47 The following examples cover the memory layout of a packed u64 field. 56 7 6 5 4 57 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 72 7 6 5 4 73 24 25 26 27 28 29 30 31 16 17 18 19 20 21 22 23 8 9 10 11 12 13 14 15 0 1 2 3 4 5 6 7 [all …]
|
/Linux-v6.6/Documentation/ABI/stable/ |
D | sysfs-class-tpm | 5 Description: The device/ directory under a specific TPM instance exposes 13 Description: The "active" property prints a '1' if the TPM chip is accepting 16 visible to the OS, but will only accept a restricted set of 41 Manufacturer is a hex dump of the 4 byte manufacturer info 42 space in a TPM. TCG version shows the TCG TPM spec level that 51 used to wait for a short, medium and long TPM command. All 54 any longer than necessary before starting to poll for a 64 Durations can be modified in the case where a buggy chip 73 Description: The "enabled" property prints a '1' if the TPM chip is enabled, 75 may be visible but produce a '0' after some operation that [all …]
|
/Linux-v6.6/tools/testing/selftests/bpf/ |
D | test_lwt_seg6local.sh | 2 # Connects 6 network namespaces through veths. 5 # fb00::1 fd00::1 fd00::2 fd00::3 fb00::6 8 # All IPv6 packets going to fb00::/16 through NS2 will be encapsulated in a 9 # IPv6 header with a Segment Routing Header, with segments : 13 # - fd00::1 : add a TLV, change the flags and apply a End.X action to fc42::1 14 # - fd00::2 : remove the TLV, change the flags, add a tag 17 # fd00::4 is a simple Segment Routing node decapsulating the inner IPv6 packet. 21 # An UDP datagram is sent from fb00::1 to fb00::6. The test succeeds if this 22 # datagram can be read on NS6 when binding to fb00::6. 69 trap cleanup 0 2 3 6 9 [all …]
|
/Linux-v6.6/net/ipv6/ |
D | Kconfig | 6 # IPv6 as module will cause a CRASH if you try to unload it 12 Support for IP version 6 (IPv6). 20 To compile this protocol support as a module, choose M here: the 31 are placed in a multi-homed network. 89 with high throughput. A typical desktop system does not 132 ILA is a mechanism to do network virtualization without 134 IPv6 address into a 64 bit locator and 64 bit identifier. The 140 "ip -6 route" command. ILA is described in 161 another protocol and sending it over a channel that understands the 163 the notion of a secure tunnel for IPSEC and then use routing protocol [all …]
|