Searched refs:schemes (Results 1 – 25 of 31) sorted by relevance
12
/Linux-v4.19/Documentation/devicetree/bindings/mtd/ |
D | gpmc-nand.txt | 113 support ecc-schemes with hardware error-correction (BCHx_HW). However 114 such SoC can use ecc-schemes with software library for error-correction 121 Higher ECC schemes require more OOB/Spare area to store ECC syndrome, 131 '3' for HAM1_xx ecc schemes 132 '7' for BCH4_xx ecc schemes 133 '14' for BCH8_xx ecc schemes 134 '26' for BCH16_xx ecc schemes 141 probably use lower ecc-schemes like BCH8.
|
/Linux-v4.19/drivers/net/ethernet/freescale/fman/ |
D | fman_keygen.c | 256 struct keygen_scheme schemes[FM_KG_MAX_NUM_OF_SCHEMES]; member 449 if (!keygen->schemes[i].used) { in get_free_scheme_id() 471 return &keygen->schemes[scheme_id]; in get_scheme()
|
/Linux-v4.19/security/smack/ |
D | Kconfig | 12 of other mandatory security schemes.
|
/Linux-v4.19/Documentation/driver-api/fpga/ |
D | fpga-region.rst | 19 is intended to be used by other schemes that have other ways of accomplishing
|
/Linux-v4.19/fs/f2fs/ |
D | Kconfig | 13 the internal geometry or flash memory management schemes aka FTL, F2FS
|
/Linux-v4.19/Documentation/admin-guide/LSM/ |
D | Smack.rst | 348 Computer systems employ a variety of schemes to constrain how information is 349 shared among the people and services using the machine. Some of these schemes 351 access to pieces of data. These schemes are called discretionary access 353 of the user. Other schemes do not leave the decision regarding what a user or 354 program can access up to users or programs. These schemes are called mandatory 502 be "born" highly classified. To accommodate such schemes Smack includes a 552 schemes and concepts from other systems. Most often, the other systems are 650 of systems that use compatible labeling schemes, and the DOI specified on the
|
/Linux-v4.19/Documentation/devicetree/bindings/reset/ |
D | reset.txt | 17 are dictated by the binding of the reset provider, although common schemes
|
/Linux-v4.19/Documentation/infiniband/ |
D | tag_matching.txt | 21 Implementations frequently use different matching schemes for these two
|
/Linux-v4.19/Documentation/i2c/ |
D | fault-codes | 9 faults. There may be fancier recovery schemes that are appropriate in
|
/Linux-v4.19/Documentation/driver-api/gpio/ |
D | intro.rst | 50 value might be driven, supporting "wire-OR" and similar schemes for the
|
/Linux-v4.19/Documentation/trace/ |
D | coresight-cpu-debug.txt | 91 schemes and finally this heavily impacts external debug module. So we can
|
/Linux-v4.19/Documentation/ABI/obsolete/ |
D | sysfs-driver-hid-roccat-isku | 149 Description: When written, this file lets one trigger temporary color schemes
|
/Linux-v4.19/Documentation/driver-api/ |
D | mtdnand.rst | 609 has built in default placement schemes for the various chiptypes. If due 616 Placement schemes are defined by a nand_oobinfo structure 688 Spare area autoplacement default schemes
|
/Linux-v4.19/block/partitions/ |
D | Kconfig | 14 the questions about foreign partitioning schemes.
|
/Linux-v4.19/Documentation/block/ |
D | data-integrity.txt | 18 for some protection schemes also that the I/O is written to the right
|
/Linux-v4.19/net/ipv4/ |
D | Kconfig | 490 bounded TCP-friendliness. The protocol combines two schemes 680 bufferbloat, policers, or AQM schemes that do not provide a delay
|
/Linux-v4.19/drivers/md/ |
D | Kconfig | 267 Some bio locking schemes used by other device-mapper targets
|
/Linux-v4.19/Documentation/devicetree/bindings/arm/ |
D | idle-states.txt | 26 top of which ARM platforms implement power management schemes that allow an OS
|
/Linux-v4.19/Documentation/filesystems/ |
D | relay.txt | 263 easily implement random-access-on-buffer-boundary schemes, which can
|
D | f2fs.txt | 615 LFS has two schemes for free space management: threaded log and copy-and-compac-
|
/Linux-v4.19/drivers/leds/ |
D | Kconfig | 369 And register layout and engine program schemes are different.
|
/Linux-v4.19/Documentation/admin-guide/ |
D | cgroup-v2.rst | 560 cgroup controllers implement several resource distribution schemes 562 describes major schemes in use along with their expected behaviors. 2061 control used widely differing naming schemes and formats. Statistics
|
/Linux-v4.19/Documentation/networking/ |
D | arcnet.txt | 433 schemes that rely completely on the netmask and a 'default gateway' to
|
/Linux-v4.19/Documentation/arm64/ |
D | arm-acpi.txt | 116 of booting with either scheme (in kernels with both schemes enabled at compile
|
/Linux-v4.19/Documentation/blockdev/ |
D | README.DAC960 | 76 through the normal Linux and PC disk partitioning schemes. Logical Drives are
|
12