Home
last modified time | relevance | path

Searched full:are (Results 1 – 25 of 10726) sorted by relevance

12345678910>>...430

/Linux-v5.10/Documentation/input/
Dgamepad.rst12 document defines how gamepads are supposed to report their data.
44 4 buttons in diamonds-shape (on the right side). The buttons are
56 all devices have both or any, but they are present at most times.
59 Triggers are located on the upper-side of the pad in vertical direction.
60 Not all devices provide them, but the upper buttons are normally named
63 Many devices provide force-feedback features. But are mostly just
79 All new gamepads are supposed to comply with this mapping. Please report any
82 There are a lot of less-featured/less-powerful devices out there, which re-use
103 of the labels on the buttons, the codes are sent according to the
106 Please note that 2- and 3-button pads are fairly rare and old. You might
[all …]
/Linux-v5.10/Documentation/fb/
Dapi.rst13 buffer core are not described.
24 Device and driver capabilities are reported in the fixed screen information
39 When supported, formats are configured using a FOURCC instead of manually
46 Pixels are stored in memory in hardware-dependent formats. Applications need
50 Formats are described by frame buffer types and visuals. Some visuals require
51 additional information, which are stored in the variable screen information
55 macropixels. Types describe how macropixels are stored in memory. The following
56 types and visuals are supported.
60 Macropixels are stored contiguously in a single plane. If the number of bits
61 per macropixel is not a multiple of 8, whether macropixels are padded to the
[all …]
/Linux-v5.10/sound/pci/cs46xx/
Dcs46xx.h173 * The following defines are for the flags in the host interrupt status
208 * The following defines are for the flags in the host signal register 0.
245 * The following defines are for the flags in the host interrupt control
252 * The following defines are for the flags in the DMA status register.
260 * The following defines are for the flags in the host DMA source address
275 * The following defines are for the flags in the host DMA destination address
290 * The following defines are for the flags in the host DMA control register.
299 * The following defines are for the flags in the host DMA control register.
329 * The following defines are for the flags in the performance monitor control
356 * The following defines are for the flags in the performance counter value 1
[all …]
/Linux-v5.10/Documentation/userspace-api/media/v4l/
Dcolorspaces.rst20 the human eye has color receptors that are sensitive to three different
22 color. Be glad you are not a mantis shrimp as those are sensitive to 12
27 color receptors are stimulated. This is based on the Spectral Power
35 those receptors and are perceived as the same color, even though the SPD
43 After some further mathematical transforms these stimuli are known as
45 color as perceived by a human unambiguously. These X, Y and Z values are
56 The x and y values are the chromaticity coordinates and can be used to
59 colors are specified with lower case 'x' and 'y', then the CIE xyY
64 will find reading resources that go into much more detail if you are
71 phosphors used in the displays. These *color primaries* are part of what
[all …]
/Linux-v5.10/Documentation/livepatch/
Dlivepatch.rst28 There are many situations where users are reluctant to reboot a system. It may
39 There are multiple mechanisms in the Linux kernel that are directly related
43 - The kernel probes are the most generic. The code can be redirected by
52 are in any way modified.
56 Most of these problems are solved by using the dynamic ftrace framework as
59 a live patch is called with the help of a custom ftrace handler. But there are
66 Functions are there for a reason. They take some input parameters, get or
73 Most of these changes are self contained and the function presents itself
77 But there are more complex fixes. For example, a patch might change
83 when it is safe to do so, e.g. when the affected locks are released
[all …]
/Linux-v5.10/Documentation/
Datomic_t.txt5 RMW operations between CPUs (atomic operations on MMIO are not supported and
82 The non-RMW ops are (typically) regular LOADs and STOREs and are canonically
86 and are doing it wrong.
91 C Atomic-RMW-ops-are-atomic-WRT-atomic_set
142 these are limited to the arithmetic operations because those are
143 reversible. Bitops are irreversible and therefore the modified value
150 - misc; the special purpose operations that are commonly used and would,
152 are time critical and can, (typically) on LL/SC architectures, be more
155 All these operations are SMP atomic; that is, the operations (for a single
165 - non-RMW operations are unordered;
[all …]
/Linux-v5.10/Documentation/admin-guide/pm/
Dsuspend-flows.rst26 different sleep states of the system are quite similar, but there are some
36 states are mostly identical, so they both together will be referred to as
45 The following steps are taken in order to transition the system from the working
58 Tasks are frozen primarily in order to avoid unchecked hardware accesses
64 All user space tasks are intercepted as though they were sent a signal and
69 specific reasons are frozen subsequently, but they are not intercepted.
70 Instead, they are expected to periodically check whether or not they need
79 Devices are suspended in four phases called *prepare*, *suspend*,
87 phase and high-level ("action") interrupt handlers are prevented from being
90 Interrupts are still handled after that, but they are only acknowledged to
[all …]
/Linux-v5.10/Documentation/process/
Dhowto.rst31 are not a good substitute for a solid C education and/or years of
32 experience, the following books are good for, if anything, reference:
39 adheres to the ISO C89 standard, it uses a number of extensions that are
42 portions of the C standard are not supported. Arbitrary long long
43 divisions and floating point are not allowed. It can sometimes be
49 Please remember that you are trying to learn how to work with the
54 possible about these standards ahead of time, as they are well
64 rules and how to use `SPDX <https://spdx.org/>`_ identifiers in source code are
67 not ask on the Linux kernel mailing list. The people on the mailing lists are
78 The Linux kernel source tree has a large range of documents that are
[all …]
/Linux-v5.10/Documentation/vm/
Dhugetlbfs_reserv.rst10 Huge pages as described at :ref:`hugetlbpage` are typically
11 preallocated for application use. These huge pages are instantiated in a
12 task's address space at page fault time if the VMA indicates huge pages are
28 This description is primarily targeted at kernel developers who are modifying
37 huge pages are only available to the task which reserved them.
62 The 'from' and 'to' fields of the file region structure are huge page
67 These are stored in the bottom bits of the reservation map pointer.
89 of mappings. Location differences are:
95 inode->i_mapping->private_data. Since shared mappings are always backed
103 Reservations are created when a huge page backed shared memory segment is
[all …]
/Linux-v5.10/Documentation/admin-guide/device-mapper/
Dstatistics.rst6 regions of a DM device. If no regions are defined no statistics are
8 devices are currently supported.
14 The I/O statistics counters for each step-sized area of a region are
16 Documentation/admin-guide/iostats.rst). But two extra counters (12 and 13) are
22 The reported times are in milliseconds and the granularity depends on
24 reported times are in nanoseconds.
65 The following optional arguments are supported:
70 used, the resulting times are in nanoseconds instead of
71 milliseconds. Precise timestamps are a little bit slower
75 numbers n1, n2, etc are times that represent the boundaries
[all …]
/Linux-v5.10/Documentation/admin-guide/LSM/
DSmack.rst15 are encouraged to compare Smack with the other mechanisms
22 - Basic utilities, which are helpful but not required
32 configurations are intolerant of IP options and can impede
44 There are five commands included in smackutil:
56 These two commands are obsolete with the introduction of
78 objects. The attributes are stored in the extended attribute security
82 The extended attributes that Smack uses are:
118 There are multiple ways to set a Smack label on a file::
177 The following numbers are the categories::
189 The following numbers are the categories::
[all …]
/Linux-v5.10/Documentation/filesystems/
Dext2.rst10 filesystem in use by Linux. There are also implementations available
16 Most defaults are determined by the filesystem superblock, and can be
17 set using tune2fs(8). Kernel-determined defaults are indicated by (*).
79 compression though these are not yet implemented (some are available as
87 The space in the device or file is split up into blocks. These are
96 Blocks are clustered into block groups in order to reduce fragmentation
100 Two blocks near the start of each group are reserved for the block usage
102 are in use. Since each bitmap is limited to a single block, this means
105 The block(s) following the bitmaps in each block group are designated
106 as the inode table for that block group and the remainder are the data
[all …]
Dsquashfs.rst10 directories. Inodes in the system are very small and all blocks are packed to
11 minimise data overhead. Block sizes greater than 4K are supported up to a
51 directory data are highly compacted, and packed on byte boundaries. Each
100 Compressed data blocks are written to the filesystem as files are read from
103 xattr tables are written.
110 these are stored here.
115 Metadata (inodes and directories) are compressed in 8Kbyte blocks. Each
120 Inodes are packed into the metadata blocks, and are not aligned to block
121 boundaries, therefore inodes overlap compressed blocks. Inodes are identified
126 To maximise compression there are different inodes for each file type
[all …]
/Linux-v5.10/net/netlabel/
Dnetlabel_mgmt.h23 * The following NetLabel payloads are supported by the management interface.
33 * If IPv4 is specified the following attributes are required:
38 * If IPv6 is specified the following attributes are required:
43 * If using NETLBL_NLTYPE_CIPSOV4 the following attributes are required:
47 * If using NETLBL_NLTYPE_UNLABELED no other attributes are required,
71 * If the IP address selectors are not used the following attribute is
76 * If the IP address selectors are used then the following attritbute is
82 * attributes are required:
87 * attributes are required.
97 * If using NETLBL_NLTYPE_CIPSOV4 the following attributes are required:
[all …]
/Linux-v5.10/Documentation/hid/
Dhid-transport.rst15 drivers on top of it. The transport drivers are responsible of raw data
18 and quirks are handled by all layers depending on the quirk.
62 drivers are not required to register themselves with HID core. HID core is never
63 aware of which transport drivers are available and is not interested in it. It
68 this struct are used by HID core to communicate with the device.
70 Transport drivers are responsible of detecting device failures and unplugging.
100 reports. No management commands or data acknowledgements are sent on this
103 send their input events on this channel. Outgoing events are normally
107 channel and are normally ignored. Instead, devices only send management
111 Outgoing reports are usually sent on the ctrl channel via synchronous
[all …]
/Linux-v5.10/Documentation/driver-api/media/
Dcamera-sensor.rst16 input parameters that are specific to the hardware:: the external clock frequency
17 and the link frequency. The two parameters generally are obtained from system
20 The reason why the clock frequencies are so important is that the clock signals
23 elsewhere. Therefore only the pre-determined frequencies are configurable by the
29 There are two distinct ways to configure the frame size produced by camera
46 they control based on user requests, are limited to a number of preset
48 level are independent. How a driver picks such configuration is based on the
51 Most sensor drivers are implemented this way, see e.g.
57 There are two different methods for obtaining possibilities for different frame
78 Horizontal and vertical blanking are specified by ``V4L2_CID_HBLANK`` and
[all …]
/Linux-v5.10/Documentation/devicetree/
Dwriting-schema.rst6 Devicetree bindings are written using json-schema vocabulary. Schema files are
16 top-level json-schema properties used are:
46 schema. By default without 'select', nodes are matched against their possible
56 binding. The exact schema syntax depends on whether properties are known,
57 common properties (e.g. 'interrupts') or are binding/vendor specific properties.
65 Optional. Similar to 'properties', but names are regex.
75 Unless noted otherwise, all properties are required.
82 vocabulary for that property. The properties schemas are what is used for
86 binding schema need to be defined such as how many values are valid or what
87 possible values are valid.
[all …]
/Linux-v5.10/arch/arm/mach-s3c/
DKconfig.s3c24xx97 Common power management code for systems that are
179 Say Y here if you are using the American Microsystems M5900 Series
195 Say Y here if you are using the Simtec Electronics EB2410ITX
213 Say Y here if you are using the HP IPAQ H1940
236 Say Y here if you are using the Nex Vision OTOM board
243 Say Y here if you are using the Armzone QT2410
250 Say Y here if you are using the SMDK2410 or the derived module A9M2410
257 Say Y here if you are using the TinCanTools Hammer Board
269 Say Y here if you are using the Thorcom VR1000 board.
307 Say Y here if you are using the Logitech Jive.
[all …]
/Linux-v5.10/Documentation/core-api/
Dthis_cpu_ops.rst8 this_cpu operations are a way of optimizing access to per cpu
18 This means that there are no atomicity issues between the calculation of
24 Read-modify-write operations are of particular interest. Frequently
32 synchronization is not necessary since we are dealing with per cpu
34 processor should be accessing that variable and therefore there are no
37 Please note that accesses by remote processors to a per cpu area are
45 are defined. These operations can be used without worrying about
116 the value of the individual counters for each processor are
120 Per cpu variables are used for performance reasons. Bouncing cache
190 Operations on these fields are straightforward::
[all …]
Dworkqueue.rst13 There are many cases where an asynchronous process execution context
22 While there are work items on the workqueue the worker executes the
82 worker threads become idle. These worker threads are managed in so
89 There are two worker-pools, one for normal work items and the other
96 aspects of the way the work items are executed by setting flags on the
97 workqueue they are putting the work item on. These flags include
110 (how many execution contexts are active) is an important issue. cmwq
118 number of the currently runnable workers. Generally, work items are
121 stalling should be optimal. As long as there are one or more runnable
125 are pending work items. This allows using a minimal number of workers
[all …]
/Linux-v5.10/Documentation/virt/kvm/
Dvcpu-requests.rst12 /* Check if any requests are pending for VCPU @vcpu. */
39 (kvm_make_request() calls) are followed by a call to kvm_vcpu_kick(),
50 thread, there are two other actions a kick may take. All three actions
51 are listed below:
54 2) Waking a sleeping VCPU. Sleeping VCPUs are VCPU threads outside guest
67 ensure VCPU requests are seen by VCPUs (see "Ensuring Requests Are Seen"),
69 even to ensure IPI acknowledgements are waited upon (see "Waiting for
70 Acknowledgements"). The following modes are defined:
94 VCPU requests are simply bit indices of the ``vcpu->requests`` bitmap.
101 break the abstraction. The first 8 bits are reserved for architecture
[all …]
/Linux-v5.10/Documentation/driver-api/
Ddevice_link.rst8 that are borne out of a parent/child relationship within the device
10 are ordered based on this relationship, i.e. children are always suspended
30 presence on the supplier. The consumer devices are not probed before the
77 to deletion. Device links managed by the driver core are deleted automatically
86 Two other flags are specifically targeted at use cases where the device
104 ``DL_FLAG_STATELESS`` are invalid and cannot be used.
116 Moreover, managed device links cannot be deleted directly. They are deleted
117 by the driver core when they are not necessary any more in accordance with the
120 set) are expected to be removed by whoever called :c:func:`device_link_add()`
138 Sometimes drivers depend on optional resources. They are able to operate
[all …]
/Linux-v5.10/Documentation/scsi/
Dst.rst49 above. Additional modes are dormant until they are defined by the
58 parameters are reset when a new tape is loaded).
73 non-rewind devices (minor is 128 + device number) are implemented.
98 are caught at that point, but this takes time. In some applications, several
109 The compile options are defined in the file linux/drivers/scsi/st_options.h.
124 each drive are used.
132 byte). The bits defining the mode are below the non-rewind bit. The
142 directories corresponding to the existing tape devices. There are autorewind
143 and non-rewind entries for each mode. The names are stxy and nstxy, where x
145 a). For example, the directories for the first tape device are (assuming four
[all …]
/Linux-v5.10/sound/firewire/dice/
Ddice-interface.h12 * Writes are not allowed except where noted; quadlet-sized registers must be
15 * All values are in big endian. The DICE firmware runs on a little-endian CPU
21 * Streaming is handled by the "DICE driver" interface. Its registers are
27 * The registers are organized in several sections, which are organized
31 * The section offset values are relative to DICE_PRIVATE_SPACE; the offset/
32 * size values are measured in quadlets. Read-only.
61 * the bits of previous events are cleared, and the value of this register is
78 * bytes. Quadlets are byte-swapped. The encoding is whatever the host driver
88 * register can be changed even while streams are running.
216 * Names of all clock sources; read-only. Quadlets are byte-swapped. Names
[all …]
/Linux-v5.10/Documentation/security/keys/
Dtrusted-encrypted.rst5 Trusted and Encrypted Keys are two new key types added to the existing kernel
6 key ring service. Both of these new types are variable length symmetric keys,
7 and in both cases all keys are created in the kernel, and user space sees,
10 Keys can be used on any system. All user level blobs, are displayed and loaded
11 in hex ascii for convenience, and are integrity verified.
13 Trusted Keys use a TPM both to generate and to seal the keys. Keys are sealed
17 (future) PCR values, so keys are easily migrated to new pcr values, such as
18 when the kernel and initramfs are updated. The same key can have many saved
19 blobs under different PCR values, so multiple boots are easily supported.
24 By default, trusted keys are sealed under the SRK, which has the default
[all …]

12345678910>>...430