Home
last modified time | relevance | path

Searched refs:then (Results 1 – 200 of 1053) sorted by relevance

123456

/linux-4.1.27/tools/power/cpupower/bench/
Dbenchmark.c48 long long now, then; in calculate_timespace() local
59 then = get_time(); in calculate_timespace()
61 timed = (unsigned int)(then - now); in calculate_timespace()
70 then = get_time(); in calculate_timespace()
72 timed = (unsigned int)(then - now); in calculate_timespace()
94 long long now, then; in start_benchmark() local
142 then = get_time(); in start_benchmark()
143 performance_time += then - now - sleep_time; in start_benchmark()
148 (long)(then - now), sleep_time, in start_benchmark()
168 then = get_time(); in start_benchmark()
[all …]
/linux-4.1.27/tools/power/cpupower/debug/kernel/
Dcpufreq-test_tsc.c55 u32 now, then, diff; in cpufreq_test_tsc() local
83 then = read_pmtmr(); in cpufreq_test_tsc()
89 diff = (now - then) & 0xFFFFFF; in cpufreq_test_tsc()
91 …printk(KERN_DEBUG "t1: %08u t2: %08u diff_pmtmr: %08u diff_tsc: %016llu\n", then, now, diff, diff_… in cpufreq_test_tsc()
92 then = now; in cpufreq_test_tsc()
/linux-4.1.27/Documentation/frv/
Dbooting.txt15 the target board can reach. This directory should then be NFS exported
22 similar program and then downloaded and stored into flash by RedBoot.
36 RedBoot documentation) and then load it back into RAM. RedBoot keeps
42 The image is then ready to be executed.
51 The image is then ready to be executed.
60 The serial client (such as minicom) must then be told to transmit the
63 When finished, the image will then be ready to be executed.
79 then the kernel will immediately wait for GDB to connect over serial before
132 Configure the network interface. If <cfg> is "off" then <ip> should
136 If <cfg> is "bootp" or "dhcp", then all of these parameters will be
[all …]
Dkernel-ABI.txt16 in a register and then used, requiring two extra instructions.
173 then do take an interrupt, we note the flag, really disable interrupts, set
206 (4) If interrupts were then re-enabled (local_irq_enable):
213 kernel would then be back to state (1).
218 and then it clears ICC2.C.
220 (6) If interrupts were then saved and disabled again (local_irq_save):
225 ICC2.Z would then be set to 1 (thus unchanged), and ICC2.C would be
228 (7) If interrupts were then restored from state (6) (local_irq_restore):
239 (8) If interrupts were then enabled (local_irq_enable):
245 then trap as both Z==0 [interrupts virtually enabled] and C==0
[all …]
Dgdbstub.txt55 GDB (which then prints them on its standard output). This is useful when
60 "Immediate activation" was selected, then the kernel will wait for GDB to
61 attach. If not, then the kernel will boot immediately and GDB will have to
103 then be debugged almost as if it's any other program.
122 desired location which the GDB stub then traps the exception for.
Dmmu-layout.txt88 the kernel calls kmap(), does the access and then calls kunmap(); or it calls kmap_atomic(), does
89 the access and then calls kunmap_atomic().
92 addresses by installing a PTE in a special page table. The kernel can then access this page as it
108 (2) kmap_atomic() uses a slot in the secondary frame (determined by the type parameter), and then
176 support is then trivial.
201 are cached by the TLB handler. The lower mmap space is filled first, and then the upper mmap space
/linux-4.1.27/Documentation/laptops/
Dlaptop-mode.txt62 * If you mount some of your ext3/reiserfs filesystems with the -n option, then
67 * If you have your filesystems listed as type "auto" in fstab, like I did, then
100 a cache miss. The disk can then be spun down in the periods of inactivity.
204 once, and will then spin down while the MP3 is playing. (Thanks to Bartek
248 # will read a complete MP3 at once, and will then spin down while the MP3/OGG is
265 # exceeded, the kernel will wake flusher threads which will then reduce the
341 if [ -f /etc/default/laptop-mode ] ; then
344 elif [ -f /etc/sysconfig/laptop-mode ] ; then
387 # exceeded, the kernel will wake flusher threads which will then reduce the
427 if [ ! -e /proc/sys/vm/laptop_mode ] ; then
[all …]
/linux-4.1.27/Documentation/arm/nwfpe/
DNOTES12 then made a function call. Upon return from the function call the number in
16 converted to extended, then stored. If an lfm/sfm combination had been used,
17 then no conversion would occur. This has performance considerations. The
20 extended, then does the multiply in extended precision.
27 The result of log(x) (a double) will be calculated, returned in f0, then
/linux-4.1.27/Documentation/devicetree/bindings/regulator/
Dtps62360-regulator.txt15 If this property is missing, then assume that there is no GPIO
18 If this property is missing, then assume that there is no GPIO
21 If this property is missing, then assume the state as low (0).
23 If this property is missing, then assume the state as low (0).
Dpalmas-pmic.txt35 the rail from desired external control. If there is no argument then
38 ENABLE1 then 1,
39 ENABLE2 then 2 or
40 NSLEEP then 3.
Dtps65090.txt18 If DCDCs are externally controlled then this property should be there.
20 If DCDCs are externally controlled and if it is from GPIO then GPIO
22 entry then driver will just configure this rails as external control
Dfixed-regulator.txt12 If this property is missing then default assumption is false.
/linux-4.1.27/Documentation/devicetree/bindings/sound/
Dcs42l52.txt21 - cirrus,mica-differential-cfg : boolean, If present, then the MICA input is configured
22 as a differential input. If not present then the MICA input is configured as
25 - cirrus,micb-differential-cfg : boolean, If present, then the MICB input is configured
26 as a differential input. If not present then the MICB input is configured as
Dsgtl5000.txt13 If this node is not mentioned or if the value is unknown, then
18 If this node is not mentionned or the value is unknown, then
Dwm8994.txt24 connected to. This is optional, if it is not connected then none
41 over 0xffff then the register will be left as default. If present 11
Dst,sta32x.txt46 If present, then fault recovery will be enabled.
56 If present, then MPCC bits are used for MPC coefficients,
/linux-4.1.27/net/bridge/
DKconfig11 If you say Y here, then your Linux box will be able to act as an
24 If you enable iptables support along with the bridge support then you
26 iptables will then see the IP packets being bridged, so you need to
42 If you say Y here, then the Ethernet bridge will be able selectively
56 If you say Y here, then the Ethernet bridge will be able selectively
/linux-4.1.27/drivers/char/mwave/
DREADME19 thinkpad configuration utility then this parameter allows the
24 thinkpad configuration utility then this parameter allows the
29 thinkpad configuration utility then this parameter allows the
34 thinkpad configuration utility then this parameter allows the
/linux-4.1.27/Documentation/
Djava.txt64 if [ -z "$1" ]; then
86 if [ "`basename $CLASS .class`" == "$FQCLASSN" ]; then
91 if echo $CLASSDIR | grep -q "$FQCLASSP$"; then
99 if echo $CLASSDIR | grep -q "$FQCLASSP$"; then
104 if [ ! -L $CLASS ]; then
112 if [ ! -L $CLASS ]; then break; fi
115 if [ $LINKLEVEL -gt 5 ]; then
124 if [ -z "$CLASSBASE" ]; then
125 if [ -z "$FQCLASSP" ]; then
136 if ! echo $CLASSPATH | grep -q "^\(.*:\)*$CLASSBASE\(:.*\)*"; then
[all …]
Demail-clients.txt10 If you are new to git then send your first patch to yourself. Save it
12 then review the changelog with `git log`. When that works then send
19 attachments, but then the attachments should have content-type
76 should appear, and then pressing CTRL-R let you specify the patch file
103 You can also "diff -Nru old.c new.c | xclip", select Preformat, then
117 way around this is to compose your email with word wrap enabled, then save
216 "external editor" extension and then just use your favorite $EDITOR
218 and install the extension, then add a button for it using
225 editor. Most notably if you are using gvim then you must pass the -f
228 are using some other editor then please read its manual to find out how
DIRQ-affinity.txt11 IRQ affinity then the value will not change from the default of all cpus.
15 will be set to the default mask. It can then be changed as described above.
18 Here is an example of restricting IRQ44 (eth1) to CPU0-3 then restricting
Dapplying-patches.txt44 source directory and then strip the first element of the path from filenames
64 know of more than one way to use patch, then you can stop reading this
72 uncompress it before applying it, then you can feed it to patch like this
78 (what I assume you've done in the examples below), then you simply run
126 and have made no modifications yourself to the source files, then you should
128 anyway, then there's a high risk that either your local source tree or the
130 re-downloading the patch and if things are still not OK then you'd be advised
135 If patch stops and presents a "File to patch:" prompt, then patch could not
139 this is the case -- if so, then this is an error by the person who created
143 message similar to that, then it means that patch had to adjust the location
[all …]
Dthis_cpu_ops.txt65 per cpu area. It is then possible to simply use the segment override
81 instead of a sequence of calculation of the address and then a fetch
137 preemption has been disabled. The pointer is then used to
213 replaced by code that disables interrupts, then does the operations
214 that are guaranteed to be atomic and then re-enable interrupts. Doing
216 change the processor we are executing on then there is no reason to
222 and the scheduler cannot preempt, then they are safe. If any interrupts
224 modifies the variable, then RMW actions can not be guaranteed to be
253 The first operation takes the offset and forms an address and then
257 The second one first adds the two offsets and then does the
DSM501.txt23 be specified by the platform data) and then exports the selected
68 must be sourced from the same PLL, although they can then
69 be divided down individually. If this is not set, then SM501 may
Dintel_txt.txt103 tboot then verifies certain aspects of the environment (e.g. TPM NV
112 VMEXITs, and then disable VT and jump to the SIPI vector. This
115 o Tboot then applies an (optional) user-defined launch policy to
121 then any kernel will be launched.
153 - Tboot will clean up the environment and disable TXT, then use the
159 has been restored, it will restore the TPM PCRs and then
165 authentication code) over and then seal with the TPM. On resume
DSubmitChecklist12 1: If you use a facility then #include the file that defines/declares
98 25: If any ioctl's are added by the patch, then also update
103 then test multiple builds with the related kconfig symbols disabled
Drpmsg.txt33 with remote processors available on the system. In turn, drivers could then
83 The message will then be sent to the remote processor to which the
101 The message will then be sent to the remote processor to which the
130 The message will then be sent to the remote processor to which the
145 The message will then be sent to the remote processor to which the
183 callback. If addr is RPMSG_ADDR_ANY, then rpmsg_create_ept will
287 This message is then handled by the rpmsg bus, which in turn dynamically
290 by the bus, and can then start sending messages to the remote service.
Dirqflags-tracing.txt27 and then a couple of functional changes are needed as well to implement
40 - if the architecture has non-maskable interrupts then those need to be
Dpi-futex.txt90 TID fails], then FUTEX_LOCK_PI is called. The kernel does all the
92 yet then the code looks up the task that owns the futex [it has put its
104 TID -> 0 atomic transition of the futex value], then no kernel work is
108 then FUTEX_UNLOCK_PI is called, and the kernel unlocks the futex on the
Dmono.txt37 if [ ! -e /proc/sys/fs/binfmt_misc/register ]; then
49 if [ -e /proc/sys/fs/binfmt_misc/register ]; then
Dramoops.txt52 and then use the reserved memory for ramoops. For example, assuming a machine
57 2. Use a platform device and set the platform data. The parameters can then
99 timestamp and a new line. The dump then continues with the actual data.
Dremoteproc.txt20 handlers, and then all rpmsg drivers will then just work
24 just need to publish what kind of virtio devices do they support, and then
43 In case @rproc is still being used by an additional user(s), then
93 implementations should then call rproc_add() to complete
157 handlers. If rpmsg/virtio functionality is also desired, then the ->kick handler
160 The ->start() handler takes an rproc handle and should then power on the
DSubmittingDrivers22 If you don't use assigned numbers then when your device is submitted it will
36 If the code area has a general maintainer then please submit it to
39 maintainer then please contact Willy Tarreau <w@1wt.eu>.
105 the author then patches will be redirected to them unless
Dinit.txt41 which needs to be made as painless as possible), then submit patch to LKML.
44 which can then store the kernel_execve() result value and on failure
Dgcov.txt172 must then be called with the -o option pointing to that directory.
213 if [ -z "$KSRC" ] || [ -z "$KOBJ" ] || [ -z "$DEST" ]; then
224 if [ $? -eq 0 ] ; then
243 if [ -z "$DEST" ] ; then
DDMA-ISA-LPC.txt61 been fixed. If your arch has problems then fix the DMA API instead of
96 (and everyone else) uses the locking functions then you only need to
150 controller being in a certain state then you have to restore these
/linux-4.1.27/Documentation/devicetree/bindings/video/
Dsimple-framebuffer.txt11 then the simplefb node must contain a property called "display", which
18 things. If display# aliases are used, then if the simplefb node contains a
19 "display" property then the /aliases/display# path must point to the display
24 then the chosen node's stdout-path property should point to it, or to the
26 used then it should be set to the alias instead.
86 nodes found under chosen and then check for other compatible nodes.
/linux-4.1.27/Documentation/power/
Dswsusp-dmcrypt.txt24 up dm-crypt and then asks swsusp to resume from the encrypted
76 then
84 then
88 then
99 then
101 then
126 then attempts to resume from the first device mapper device.
135 What then follows is the well known process to change the root
Dswsusp.txt36 . If you would like to write hibernation image to swap and then suspend
54 if found, it then checks the contents for the hibernation image signature.
83 swsusp saves the state of the machine into active swaps and then reboots or
128 Instead, we load the image into unused memory and then atomically copy
135 read "new" data onto free spots, then cli and copy
172 shutdown: save state in linux, then tell bios to powerdown
174 platform: save state in linux, then tell bios to powerdown and blink
284 your sensitive data are then stored in plaintext on disk. This means
296 means that all data written to disk during suspend are then
298 you must then take care of is that you call 'mkswap' for the swap
[all …]
Druntime_pm.txt109 device, then ->runtime_suspend() should return -EBUSY. On the other hand, if
125 I/O operations as needed. The runtime PM status of the device is then
149 0, then the PM core will attempt to carry out a runtime suspend of the device,
314 then run pm_runtime_autosuspend(dev) and return its result
326 not yet expired then an autosuspend is scheduled for the appropriate time
345 expired then the work item is queued up immediately
378 - decrement the device's usage counter; if the result is 0 then run
382 - decrement the device's usage counter; if the result is 0 then run
386 - decrement the device's usage counter; if the result is 0 then run
390 - decrement the device's usage counter; if the result is 0 then run
[all …]
/linux-4.1.27/drivers/media/pci/ivtv/
Divtv-mailbox.c162 unsigned long then = jiffies; in get_mailbox() local
181 then + msecs_to_jiffies(10*retries))) in get_mailbox()
220 unsigned long then; in ivtv_api_call() local
295 then = jiffies; in ivtv_api_call()
305 if (time_after(jiffies, then + api_timeout)) { in ivtv_api_call()
317 if (time_after(jiffies, then + msecs_to_jiffies(100))) in ivtv_api_call()
320 jiffies_to_msecs(jiffies - then)); in ivtv_api_call()
/linux-4.1.27/tools/testing/selftests/timers/
Dinconsistency-check.c109 long now, then; in consistency_test() local
114 now = then = list[0].tv_sec; in consistency_test()
120 while (seconds == -1 || now - then < seconds) { in consistency_test()
/linux-4.1.27/Documentation/fb/
Dep93xx-fb.txt6 embedded LCD displays. If you have a standard desktop monitor then you
14 If you have an embedded LCD display then you need to define a video
108 If the EP93xx video driver is built-in then the video mode is set on
113 If the EP93xx video driver is built as a module then the video mode is
128 address has bit 27 set. If it does, then the memory is freed and an
Dfbcon.txt42 fortunate to have a driver that does not alter the graphics chip, then you
175 then unbind the fbdev drivers from fbcon. Fortunately, unbinding fbcon from
184 driver. So assuming vtcon1 represents fbcon, then:
295 if test -x /sys/class/vtconsole/vtcon$i; then
297 = 1 ]; then
298 if test -x $VBETOOL/vbetool; then
313 if test -x /sys/class/vtconsole/vtcon$i; then
315 = 1 ]; then
Ddeferred_io.txt18 - the workqueue task comes in and mkcleans the pages on the list, then
38 say diagonally shifting RGB, this may then be a mechanism for you to allow
/linux-4.1.27/Documentation/RCU/
DUP.txt20 which deletes element B, and then invokes call_rcu() to free element B
23 Now, if call_rcu() were to directly invoke its arguments, then upon return
41 deletes element B from the list, then passes it to call_rcu() for deferred
65 the same critical section, then the code would need to create
66 a list of them, then traverse the list once the lock was
112 RCU callback, then a process-context acquisition of this
117 then, since RCU callbacks can be invoked from softirq context,
Drcubarrier.txt35 context might then be as follows:
66 heavy RCU-callback load, then some of the callbacks might be deferred
89 uses multiple flavors of call_rcu(), then it must also use multiple
92 srcu_struct_2(), then the following three lines of code will be required
178 then return, permitting the module-unload operation to be completed.
185 the timers, and only then invoke rcu_barrier() to wait for any remaining
192 call_rcu_sched(), then you will need to invoke each of rcu_barrier(),
201 callback queues, and then waits until they have all started executing, at
224 before on_each_cpu() returns. Line 9 then waits for the completion.
247 by the callback. Line 9 then registers the rcu_barrier_callback() on
DlistRCU.txt187 The RCU version creates a copy, updates the copy, then replaces the old
300 a copy, updating the copy, then replacing the original with the copy.
301 If stale data cannot be tolerated, then a "deleted" flag may be used
311 then the caller will be processing stale data in any case. If it
312 is really OK to be processing stale data, then you don't need a
314 then you need to hold the per-entry lock across all of the code
Dchecklist.txt11 structure is updated more than about 10% of the time, then you
201 7. If the updater uses call_rcu() or synchronize_rcu(), then the
204 synchronize_rcu_bh(), then the corresponding readers must
206 updater uses call_rcu_sched() or synchronize_sched(), then
209 If the updater uses synchronize_srcu() or call_srcu(), then
235 are delayed for whatever reason, then the synchronize_rcu()
263 once per hour, then no explicit rate limiting is
269 superuser or some other trusted user, then it might not
354 CPU goes offline while having an RCU callback pending, then that
403 destructive operation, and -only- -then- invoke call_rcu(),
/linux-4.1.27/Documentation/filesystems/
Dadfs.txt35 These are then masked by ownmask, eg 700 -> -rwx------
41 These are then masked by othmask, eg 077 -> ----rwxrwx
45 not a UnixExec filetype, then the permissions will be:
49 However, if the masks were ownmask=0770,othmask=0007, then this would
Dafs.txt101 The name of the cell is optional, and if not given during a mount, then the
122 culled first. If all are culled, then the requested volume will also be
189 And then run as:
207 not acquired then all operations will be governed by the anonymous user parts
210 If a key is acquired, then all AFS operations, including mounts and automounts,
213 If a file is opened with a particular key and then the file descriptor is
215 socket), then the operations on the file will be made with key that was used to
Dpath-lookup.txt8 then finding the child of that dentry, which is named the next component in the
66 Path walking then must, broadly, do several particular things:
81 in that bucket is then walked, and we do a full comparison of each entry
101 will happen to an object is insertion, and then eventually removal from the
178 the dentry, stabilising it while comparing its name and parent and then
179 taking a reference count (the reference count then gives a stable place to
185 looks like (its name, parent, and inode). That snapshot is then used to start
240 So when vi wants to open("/home/npiggin/test.c", O_RDWR), then it will
247 | name: "/" | inode's permission, and then look up the next
254 | name: "home" | hash lookup, then note d_seq and compare name
[all …]
Dgfs2-uevents.txt16 then a REMOVE uevent will follow.
35 This is used as a signal by gfs_controld that it is then ok for other
90 assigned for spectator mounts) then this will give the
Decryptfs.txt32 then copy the files back into the new eCryptfs mount to migrate the
70 then behavior is undefined. Do not run eCryptfs in higher verbosity
Dautomount-support.txt32 If the mountpoint will be automatically expired, then do_add_mount()
50 And then if you look in the mountpoint catalogue, you'll see something like:
79 (it's only referenced by its parent vfsmount), then it will be deleted
Dvfs.txt42 the way, and then loading the inode. This is done by looking up the
74 These are taken from the inode data. The open() file method is then
81 file structure, and then calling the required file structure method to
291 clear_inode: called then the VFS clears the inode. Optional
388 If you wish to overload the dentry methods then you should
421 If no flags are supported by the filesystem then this method
422 need not be implemented. If some flags are supported then the
550 Data is written into the address space by the application, and then
627 some reason, it can do so, and then return AOP_TRUNCATED_PAGE.
632 address_space object. If wbc->sync_mode is WBC_SYNC_ALL, then
[all …]
Dfuse.txt137 no filesystem activity and 'waiting' is non-zero, then the
155 fatal (SIGKILL or unhandled fatal signal), then the request is
159 fatal, then an 'interrupted' flag is set for the request. When
163 3) If the request is already sent to userspace, then an INTERRUPT
242 1) creating a filesystem containing a device file, then opening
246 then executing this application
280 system file, and then accessing a file on the mount owner's
Ddnotify.txt24 if DN_MULTISHOT is or'ed with the event mask, then the registration will
49 exists in two directories (a and b) then a change to the file using the
Doverlayfs.txt58 then the lower object is hidden - the name refers only to the upper
106 obvious way (upper is read first, then lower - entries that already
150 necessary. It then creates the object with the same metadata (owner,
151 mode, mtime, symlink-target etc.) and then if the object is a file, the
192 If a file with multiple hard links is copied up, then this will
Dntfs.txt66 partition by creating a large file while in Windows and then loopback
180 bad so it is no longer accessed, and then
198 other space is used up, then the MFT zone will be
203 files then use a higher value. The values have the
290 section). You can then find these Disk Ids in the VBLK DATABASE section in the
297 would then use those devices (for /dev/hda they would be /dev/hda1, 2, 3, etc)
301 /dev/hda) and then using the offsets of the LDM partitions into this device as
351 and the Device-Mapper driver will then copy the entirety of the "Source Device"
363 which you can then just use as an argument to the mount command as usual to
450 Even better is to simply use the Device-Mapper for linear raid and then you do
/linux-4.1.27/net/caif/
DKconfig17 If you select to build it as module then CAIF_NETDEV also needs to be
40 If you select to build it as a built-in then the main CAIF device must
51 If you select to build it as a built-in then the main CAIF device must
/linux-4.1.27/Documentation/ABI/testing/
Dsysfs-memory-page-offline8 physical address of the page. The kernel will then attempt
10 dropping it if possible. The kernel will then be placed
31 kernel will then attempt to hard-offline the page, by
Dsysfs-class-rc44 If the hardware supports it then scancodes which do not match
59 If the hardware supports it then scancodes which do not match
92 If the hardware supports it and wakeup_filter_mask is not 0 then
107 If the hardware supports it and wakeup_filter_mask is not 0 then
Dsysfs-platform-chipidea-usb-otg25 the bus, and is 0 otherwise, When a_bus_drop is 1, then
54 vbus error, then A-device will power down the bus.
Dsysfs-bus-fcoe10 fcoe_ctlr_device (ctlr_X). The user can then configure any
41 is started in 'Fabric' mode then FIP FCF discovery is
43 If a FCoE Controller is started in 'VN2VN' mode then
Dsysfs-driver-hid-multitouch8 When written this attribute change on the fly the quirks, then
Dsysfs-driver-pciback6 If the permissive attribute is set, then writing a string in
Dsysfs-kernel-uids10 shares, then they will get equal CPU bandwidth. Another
Dsysfs-bus-rpmsg27 of this channel. If it contains 0xffffffff, then an address
45 of this channel. If it contains 0xffffffff, then an address
/linux-4.1.27/Documentation/security/
Dkeys-request-key.txt66 own upcall mechanisms. If they do, then those should be substituted for the
93 (4) request_key() then forks and executes /sbin/request-key with a new session
105 This will permit it to then search the keyrings of process A with the
109 (8) The program then does what it must to get the data with which to
111 Kerberos server using the TGT) and then instantiates key U.
116 (10) The program then exits 0 and request_key() deletes key V and returns key
164 (3) It then considers all the keyring-type keys in the keyring it's currently
183 authorisation key then:
Dcredentials.txt227 Some work by labelling the objects in a system and then applying sets of
301 adhered to. First take a copy, then alter the copy and then use RCU to change
412 time, and possibly to sleep whilst doing so, then the caller should get a
429 If the caller is holding the RCU read lock at the time anyway, then:
436 result stored in a temporary pointer and then the credential aspects called
441 accessed, then this can be used:
466 this locks current->cred_replace_mutex and then allocates and constructs a
486 LSM a chance to do likewise, then it will use rcu_assign_pointer() to actually
502 has been called, then the following function should be invoked:
507 and then releases the new credentials.
Dkeys.txt87 called with a blob of data, and that then creates the key's payload in
265 security context, then the key will be assigned that context. Otherwise, the
447 If a key cannot be found, and if callout_info is not NULL, then
544 than requested to userspace. If the buffer pointer is NULL then no copy
764 If the specified key is 0, then any assumed authority will be divested.
779 than requested to userspace. If the buffer pointer is NULL then no copy
784 in force then an empty string will be returned.
814 This function marks a key as being invalidated and then wakes up the
835 registers its type, then it searches for a key of that type. It should retain
836 the key as long as it has need of it, and then it should release it. For a
[all …]
/linux-4.1.27/net/openvswitch/
DKconfig40 If you say Y here, then the Open vSwitch will be able create GRE
53 If you say Y here, then the Open vSwitch will be able create vxlan vport.
65 If you say Y here, then the Open vSwitch will be able create geneve vport.
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/linux/
Dlinux-tcpip.c257 unsigned long then; in libcfs_sock_write() local
288 then = jiffies; in libcfs_sock_write()
290 ticks -= jiffies - then; in libcfs_sock_write()
319 unsigned long then; in libcfs_sock_read() local
347 then = jiffies; in libcfs_sock_read()
349 ticks -= jiffies - then; in libcfs_sock_read()
/linux-4.1.27/Documentation/video4linux/
Dv4l2-framework.txt103 If v4l2_dev->name is empty then it will be set to a value derived from dev
105 calling v4l2_device_register then it will be untouched. If dev is NULL, then
110 etc. If the name ends with a digit, then it will insert a dash: cx18-0,
130 If you have a hotpluggable device (e.g. a USB device), then when a disconnect
139 then there is no need to call v4l2_device_disconnect().
186 If you have multiple device nodes then it can be difficult to know when it is
190 is released. When the refcount reaches zero, then the v4l2_device release()
193 If other device nodes (e.g. ALSA) are created, then you can increase and
391 errors (except -ENOIOCTLCMD) occurred, then 0 is returned.
393 The second argument to both calls is a group ID. If 0, then all subdevs are
[all …]
Dv4l2-controls.txt187 then there is no need to store it.
197 and instead of a step there is a skip_mask argument: if bit X is 1, then menu
215 set, then it will just return and do nothing. This is also true for
278 and v4l2_device are set, then the controls of the subdev will become
280 contains controls that already exist in the V4L2 driver, then those will be
313 If the control has a simple s32 type type, then:
361 If s_ctrl returns 0 (OK), then the control framework will copy the new final
366 the value of controls owned by other handlers, then you have to be very careful
435 If the name field is not set, then the framework will assume this is a standard
442 If you get more complex relationships between controls, then you may have to
[all …]
Dcx18.txt14 then post to the video4linux or ivtv-users mailing list.
/linux-4.1.27/drivers/misc/mic/
DKconfig12 then say M (recommended) or Y, else say N. If unsure say N.
31 If you are building a host kernel with an Intel MIC device then
50 If you are building a card kernel for an Intel MIC device then
/linux-4.1.27/drivers/staging/iio/Documentation/
Dinkernel.txt21 This are then used to find the channel mapping from the consumer device (see
27 An array of these structures is then passed to the IIO driver.
47 There are then a number of functions that can be used to get information
Dsysfs-bus-iio-light42 in proximity mode. When this is enabled, then the device should
55 but if it is not, then it should include _raw.
64 value is not in SI units, then it should include _raw.
96 value is not in SI units (irradiance, uW/mm^2), then it should
/linux-4.1.27/Documentation/networking/
Dnetdev-FAQ.txt82 in the dev cycle. If it was tagged rc7 a week ago, then a release
93 bug-fix net content. If you don't use git, then note the only magic in
119 networking subsystem, and then hands them off to Greg.
125 off to Greg. If Greg already has the patch, then it will be here:
129 to simply clone the repo, and then git grep the mainline commit ID, e.g.
142 if it is already queued. If not, then send a mail to netdev, listing
160 stable, then ensure you write a decent commit log that describes who
162 bug was introduced. If you do that properly, then the commit will
167 stable that does _not_ belong in the commit log, then use the three
198 that, then perhaps consider mailing "security@kernel.org" or reading about
[all …]
Drxrpc.txt59 (2) A two-phase protocol. The client transmits a blob (the request) and then
60 receives a blob (the reply), and the server receives the request and then
127 which the service receives; then the service transmits the reply data
139 requested, the server then issues a "challenge" and then the client
232 client resources. A new call can then be initiated with the same tag
235 (*) In the server, a request is received with one or more recvmsgs, then the
236 the reply is transmitted with one or more sendmsgs, and then the final ACK
269 application then uses sendmsg to assign a tag to the new call. Once that
275 in the keyring and then sends a challenge packet to the client and
276 receives a response packet. The kernel then checks the authorisation of
[all …]
Dtc-actions-env-rules.txt8 or intentionally branches by redirecting a packet, then you need to
27 returned, then all is great and you don't need to do anything.
Dtcp.txt56 build with the defaults from Kconfig, then CUBIC will be builtin (not a
59 If you really want a particular default value then you will need
62 unknown congestion method, then the sysctl attempt will fail.
64 If you remove a tcp congestion control module, then you will get the next
Ddecnet.txt32 want to configure an endnode, then the simplified procedure is as follows:
57 interface then you won't see any entries in /proc/net/neigh for the local
82 address of the node in order for it to be autoconfigured (and then appear in
104 If you don't set the default device, then it will default to the first
161 - If this seems to work, then try talking to a node on your local
167 If you've found a bug and want to report it, then there are several things
207 then your computer will be doing more work than required. Some cards
218 about configuration, or even just report bugs, then there is a mailing
Dspider_net.txt52 descr. The OS will process this descr, and then mark it "not-in-use",
56 flowing, then the tail pointer can catch up to the hardware pointer.
57 The OS will then note that the current tail is "empty", and halt
61 When traffic is flowing, then the head pointer will be pointing at
65 then mark the descr as "empty", ready to receive data. Thus, when there
68 RX traffic is flowing, then the head pointer can catch up to the tail
171 of the RX chain seems to show it is empty, then it is probable that
196 interrupt wakes up the netdev, which can then refill the queue.
Dopenvswitch.txt40 flow key that it parsed from the packet. Userspace then extracts its
45 kernel's, then nothing special is necessary.
50 does not understand IPv6), then again nothing special is
56 the kernel stopped at the Ethernet type, then userspace can
62 forwarding behavior, then it could set up a flow anyway.)
142 setup in addition to the flow, then refer to the flow using the UFID for all
165 the 802.1Q TPID (0x8100) as the Ethertype then stopped parsing the
172 key attribute to contain the VLAN tag, then continue to decode the
Dipvs-sysctl.txt100 drop_entry procedure can be activated every second, then it
116 before forwarding them to real servers. If the rate is 1, then
139 destination server is not available, then the client program
197 If policy routing is in effect then it is possible that the route
201 If policy routing is not in effect then the recalculated route will
Ddns_resolver.txt78 may then be cached. The key description is constructed as a string of the
135 routine. This then passes the data to dns_resolver_instantiate() which strips
136 off and processes any options included in the data, and then attaches the
Dregulatory.txt58 the specificied alpha2. The kernel in turn will then ask userspace
128 Lastly, you can then hint to the core of your discovered alpha2, if a match
145 structure and you should then fill it with your data. Finally you simply
214 CONFIG_CFG80211_INTERNAL_REGDB then _DO_NOT_USE_IT_.
/linux-4.1.27/Documentation/x86/
Dentry_64.txt51 kernel mode and then when returning to user-space, and precisely
81 If we are at an interrupt or user-trap/gate-alike boundary then we can
84 entry interrupting kernel mode execution, then we know that the GS
86 user-space execution then we must do the SWAPGS.
90 stack but before we executed SWAPGS, then the only safe way to check
/linux-4.1.27/Documentation/x86/x86_64/
Dkernel-stacks19 hardware interrupt (i.e. not a nested hardware interrupt) then the
42 pointer based on the IST value, then invokes the interrupt handler. If
43 the interrupt came from user mode, then the interrupt handler prologue
45 nested IST interrupts then the handler must adjust the IST values on
55 If that assumption is ever broken then the stacks will become corrupt.
/linux-4.1.27/arch/arm/include/debug/
Dsa1100.S36 @ if Ser3 is inactive, then try Ser1
41 @ if Ser1 is inactive, then try Ser2
/linux-4.1.27/Documentation/powerpc/
Dmpc52xx.txt14 then, on U-boot:
27 then in DBug:
Dpmu-ebb.txt38 and attach an EBB event to the process, which will then cause EBBs to be
54 If an EBB event and a regular event are both pinned, then whichever is enabled
96 read() returns EOF, then the event has not been scheduled and EBBs are not
102 pinned on the PMU then the enable will not be successful.
Deeh-pci-error-recovery.txt90 this is the case. If so, then the device driver should put itself
174 It saves the device BAR's and then calls rpaphp_unconfig_pci_adapter().
178 for ethernet cards, and so on. This handler then sleeps for 5 seconds,
180 It then resets the PCI card, reconfigures the device BAR's, and
181 any bridges underneath. It then calls rpaphp_enable_pci_slot(),
250 which then does the appropriate shutdown.
281 then kobject_uevent() sends a netlink uevent to userspace
288 kobject_del() then calls sysfs_remove_dir(), which would
Dfirmware-assisted-dump.txt65 *not* clear the RAM. It will then launch the bootloader, as
97 this feature on that particular machine. If it does, then
99 then everything but boot memory size of RAM is reserved during
102 that are run. If there is dump data, then the
106 If there is no waiting dump data, then only the memory required
165 NOTE: If firmware-assisted dump fails to reserve memory then it will
Dcxl.txt56 that address to the PSL, the PSL then translates it, fetches the
156 left. If 1 IRQ is needed per context, then only 2037
158 then only 2037/4 = 509 contexts can be allocated.
293 If the event type is CXL_EVENT_AFU_INTERRUPT then the event
312 If the event type is CXL_EVENT_DATA_STORAGE then the event
342 If the event type is CXL_EVENT_AFU_ERROR then the event structure
/linux-4.1.27/drivers/gpu/drm/via/
Dvia_irq.c91 static unsigned time_diff(struct timeval *now, struct timeval *then) in time_diff() argument
93 return (now->tv_usec >= then->tv_usec) ? in time_diff()
94 now->tv_usec - then->tv_usec : in time_diff()
95 1000000 - (then->tv_usec - now->tv_usec); in time_diff()
/linux-4.1.27/arch/arm/lib/
Dfindbit.S56 orr r2, r2, #7 @ if zero, then no bits here
96 orr r2, r2, #7 @ if zero, then no bits here
132 orr r2, r2, #7 @ if zero, then no bits here
165 orr r2, r2, #7 @ if zero, then no bits here
Ddiv64.S119 @ Otherwise, if lower part is also null then we are done.
144 @ If no bit position left then we are done.
151 @ then simply shift values around
/linux-4.1.27/arch/m68k/fpsp040/
Dget_op.S40 | then an frestore is done to restore the instruction back into
41 | the '040. The '040 then re-executes the fadd.x fpm,fpn with
50 | norm. The instruction is then restored back into the '040
622 | if (ete =$7fff) then INF or NAN
623 | if (etemp = $x.0----0) then
628 | if (ete = $0000) then
Dround.S46 | If g=r=s=0 then result is exact and round is done, else set
78 | If sign of fp number = 0 (positive), then add 1 to l.
83 bmi truncate |if positive then truncate
112 | If (g=1), then add 1 to l and if (r=s=0), then clear l
118 bcc truncate |if (g=1) then
330 lsrl %d5,%d6 |by the number in the exp, then
345 bmis greater |then branch
414 | is then loaded with the denormalized exponent threshold for the
425 cmpib #0,%d0 |if 0 then extended precision
436 cmpil #1,%d0 |if 1 then single precision
[all …]
Dx_ovfl.S14 | If the instruction is move_out, then garbage is stored in the
15 | destination. If the instruction is not move_out, then the
Dutil.S98 | precision instruction, the rounding precision is then set to the force
329 | *case RndPr(from cmdreg3b{6:5} = 11 then RND_PREC = DBL
330 | *case RndPr(from cmdreg3b{6:5} = 10 then RND_PREC = SGL
333 | case 00 then RND_PREC = EXT
334 | case 01 then RND_PREC = SGL
335 | case 10 then RND_PREC = DBL
338 | case 00 then RND_PREC = EXT
339 | case 01 then RND_PREC = SGL
340 | case 10 then RND_PREC = DBL
Dsto_res.S6 | users destination register then fp0 is moved to the
8 | are then restored to the original contents.
Dsgetem.S90 | then load the exponent with +/1 $3fff.
112 bnes upper |then branch
115 bnes cont |if set then continue
Dsrem_mod.S29 | If (L < 0) then
37 | 3.2 If R > Y, then { R := R - Y, Q := Q + 1}
47 | 5.1 If R < Y/2, then R = MOD(X,Y) = REM(X,Y). Go to
49 | 5.2 If R > Y/2, then { set Last_Subtract := true,
52 | then { Q := Q + 1, signX := -signX }.
240 |..If Carry is set, then Y < (Carry,D1,D2) < 2Y. Otherwise, Carry = 0
Dx_snan.S10 | If the dest data format is s, d, or x, then the SNAN bit in the NAN
13 | or l, then garbage is written to the dest (actually the upper 32 bits
17 | If the inst is move_out, then the results are the same as for trap
53 bnes ena |If enabled, then branch
Dx_unfl.S8 | result, then store the result. Denormalization is accomplished
117 beqs e1_set |if set then branch
159 | Test for fsgldiv and fsglmul. If the inst was one of these, then
Dskeleton.S9 | before the jump instruction. If there no handling necessary, then
12 | exception is one that must be reported then there will be a
20 | If the exception was completely handled by the package, then
405 | then just do a dumb (and slow) memory move. In a UNIX environment
/linux-4.1.27/Documentation/PCI/
Dpci-error-recovery.txt25 of a bus disconnection, and then performing error recovery.
47 again notified, so that they may then perform any device setup/config
105 For example, if mmio_enabled() and resume() aren't there, then it
154 then the platform should re-enable IOs on the slot (or do nothing in
159 then recovery proceeds to STEP 4 (Slot Reset).
178 >>> and prints an error to syslog. A reboot is then required to
184 DMA), and then calls the mmio_enabled() callback on all affected
227 If all drivers returned PCI_ERS_RESULT_RECOVERED, then the platform
230 If any driver returned PCI_ERS_RESULT_NEED_RESET, then the platform
235 The platform resets the link, and then calls the link_reset() callback
[all …]
/linux-4.1.27/Documentation/vm/
Dslub.txt15 Typically one would then use the "slabinfo" command to get statistical
30 Parameters may be given to slub_debug. If none is specified then full
81 not contain objects. If the slab already contains objects then sanity checks
91 If no debug options are specified then SLUB may merge similar slabs together
183 to be booted with slub_debug) then the following output will be dumped
215 The bytes of the object. If the object is inactive then the bytes
222 value. If there is any deviation then it is due to a write after
252 tells us that SLUB has restored the Redzone to its proper value and then
277 If the corruption occurs by writing after the end of the object then it
Dpage_migration43 a new cpuset then also all its pages are moved with it so that the
57 and then a low level description of how the low level details work.
105 mapcount is not zero then we do not migrate the page.
116 page then we back out because someone else modified the radix tree.
137 16. If migration entries were page then replace them with real ptes. Doing
/linux-4.1.27/Documentation/misc-devices/
Dspear-pcie-gadget.txt25 and then program its various registers to configure it as a particular device
67 to the PCIe host, then host sees this device as 1MB RAM.
87 as BAR0 address then when this device will be connected to a host, it will be
97 It will have to be insured that, once link up is done on gadget, then only host
Dmax687522 registers. The chip then begins to operate according to the values in the
92 Use i2c_smbus_write_byte_data() to set the read address and then
99 And then read the data
/linux-4.1.27/Documentation/usb/
Dauthorization.txt13 then it be possible to use it.
58 then
77 then
Dpersist.txt16 If a USB device's power session is interrupted then the system is
24 controller loses power during a system suspend, then when the system
74 reset or otherwise had lost power) then it applies a persistence check
78 port reset and then re-enumerates the device. (This is exactly the
81 same descriptors as before, including the Vendor and Product IDs, then
87 but a USB device was unplugged and then replugged, or if a USB device
91 different from what the kernel remembers, then the treatment is what
/linux-4.1.27/Documentation/devicetree/bindings/clock/st/
Dst,quadfs.txt31 an empty string then no clock will be created for the
33 4 strings are provided then no clocks will be created
Dst,clkgen-vcc.txt28 an empty string then no clock will be created for the
30 16 strings are provided then no clocks will be created
/linux-4.1.27/fs/jbd/
DKconfig10 If you are not using ext3 then you will probably want to say N.
26 If you select Y here, then you will be able to turn on debugging
/linux-4.1.27/scripts/
Dmkversion2 then
/linux-4.1.27/Documentation/watchdog/
Dwatchdog-kernel-api.txt11 with a WatchDog Timer. If you want to know this then please read the following
18 a watchdog timer driver then only needs to provide the different routines
164 * ioctl: if this routine is present then it will be called first before we do
172 is active or not. When the watchdog is active after booting, then you should
174 this bit set, then opening /dev/watchdog will skip the start operation)
182 If this bit is set then the watchdog timer will not be able to stop.
184 after calling watchdog_unregister_device, and then checked before calling
185 any watchdog_ops, so that you can be sure that no operations (other then
225 then use this function to set the user "preferred" timeout value.
Dhpwdt.txt31 enable NMI sourcing then reload the hpwdt driver with
47 confused" message in the logs or if the system gets into a hung state, then
51 1. If the kernel has not been booted with nmi_watchdog turned off then
/linux-4.1.27/drivers/media/radio/
DKconfig253 Choose Y here if you have one of these AM/FM radio cards, and then
264 Choose Y here if you have one of these FM radio cards, and then fill
295 Choose Y here if you have this FM radio card, and then fill in the
299 of hardware. If you have this hardware, then please contact the
318 Choose Y here if you have one of these FM radio cards, and then fill
338 Choose Y here if you have this FM radio card, and then fill in the
414 of hardware. If you have this hardware, then please contact the
429 of hardware. If you have this hardware, then please contact the
448 Choose Y here if you have one of these FM radio cards, and then fill
452 of hardware. If you have this hardware, then please contact the
[all …]
/linux-4.1.27/arch/cris/arch-v32/mach-a3/
DKconfig55 connected to port PA, then they are usually connected to bits 2-4
75 connected to port PA, then they are usually connected to bits 2-4
95 connected to port PA, then they are usually connected to bits 2-4
/linux-4.1.27/Documentation/driver-model/
Ddevice.txt85 This array of groups can then be associated with a device by setting the
100 device is registered, then userspace won't get notified and userspace will
105 calls device_create_file() on the device structure passed to it, then
/linux-4.1.27/fs/jbd2/
DKconfig14 If you are not using ext4 or OCFS2 then you will
31 If you select Y here, then you will be able to turn on debugging
/linux-4.1.27/arch/unicore32/lib/
Dfindbit.S48 or r2, r2, #7 @ if zero, then no bits here
85 or r2, r2, #7 @ if zero, then no bits here
/linux-4.1.27/Documentation/x86/i386/
DIO-APIC.txt13 not boot Linux, then consult the linux-smp mailing list archives first.
15 If your box boots fine with enabled IO-APIC IRQs, then your
81 Slot2, then you'll have to specify this pirq= line:
105 If you have 2 PCI buses, then you can use up to 8 pirq values, although such
/linux-4.1.27/Documentation/cgroups/
Dcpusets.txt310 If the per-cpuset boolean flag file 'cpuset.memory_spread_page' is set, then
316 then the kernel will spread some file system related slab caches,
337 is turned off, then the currently specified NUMA mempolicy once again
342 for that cpuset. If a "1" is written to that file, then that turns
415 When the per-cpuset flag "cpuset.sched_load_balance" is disabled, then the
421 enabled, then the scheduler will have one sched domain covering all
448 overlapping cpusets enables the flag 'cpuset.sched_load_balance', then we
461 one of them has this flag enabled, then the other may find its
484 then they will be (must be) both in the same sched domain.
487 then by the above that means there is a single sched domain covering
[all …]
/linux-4.1.27/Documentation/devicetree/bindings/input/
Dti,drv260x.txt31 If this is not set then the value will be defaulted to
34 If this is not set then the value will be defaulted to
/linux-4.1.27/Documentation/devicetree/bindings/mtd/
Dgpio-control-nand.txt21 read registers (tR). If not present then a default of 20us is used.
24 the GPIO's and the NAND flash data bus. If present, then after changing
/linux-4.1.27/Documentation/devicetree/bindings/power/
Drockchip-io-domain.txt9 - If the regulator hooked up to a pin like SDMMC0_VDD is 3.3V then
11 that same pin is 1.8V then bit 7 of GRF_IO_VSEL needs to be 1.
24 driver. When that other software adjusted a regulator's voltage then
/linux-4.1.27/Documentation/devicetree/
Dof_unittest.txt35 When the kernel is build with OF_SELFTEST enabled, then the following make rule
111 then it attaches the unflattened test data tree to the live tree, else it
134 given parent in live tree. But, if parent already has a child then the new node
182 already present in the live tree), then the node isn't attached rather its
191 detached and then moving up the parent nodes are removed, and eventually the
Dusage-model.txt72 then go read it now. It's okay, I'll wait....
147 If one does, then that machine_desc is a candidate for driving the
151 against. If no matching machine_desc is found, then it returns NULL.
168 that required special workaround code during early boot, then a new
218 has been parsed, then kernel initialization can proceed in the normal
231 If a DT is provided, then both .init_early() and .init_irq() are able
240 registering it en-masse in .init_machine(). When DT is used, then
350 tree. Therefore, if a DT node is at the root of the tree, then it
413 be too invasive. If a node is compatible with "arm,amba-primecell", then
/linux-4.1.27/Documentation/device-mapper/
Ddm-flakey.txt9 <up interval> seconds, then exhibits unreliable behaviour for <down
10 interval> seconds, and then this cycle repeats.
Dlog-writes.txt23 the FLUSH request completes we log all of the WRITEs and then the FLUSH. Only
42 have all the DISCARD requests, and then the WRITE requests and then the FLUSH
85 then replay from that point on doing the fsck check in the
Dthin-provisioning.txt112 free space on the data device drops below this level then a dm event
127 If no such requests are made then commits will occur every second. This
287 should register for the event and then check the target's status.
307 should then be used.
379 then you'll have no access to blocks mapped beyond the end. If you
380 load a target that is bigger than before, then extra blocks will be
389 tools should then be used.
Dstatistics.txt134 Atomically print and then clear all the counters except the
144 If omitted, all lines are printed and then cleared.
148 If omitted, all lines are printed and then cleared.
/linux-4.1.27/Documentation/filesystems/nfs/
Didmapper.txt18 configured with the id_resolver key type), then the idmapper will ask the
45 program. If you would like to use your own program for a uid lookup then you
68 then passed as an argument to keyctl_instantiate (both are part of keyutils.h).
/linux-4.1.27/Documentation/arm/
DSetup24 the memory is banked, then this should contain the total number
54 the equivalent character size of your fbcon display. This then allows
121 then a value of 50 Mhz is the default on 21285 architectures.
/linux-4.1.27/arch/m68k/ifpsp060/
Diskeleton.S86 | and the operand was out of bounds, then _isp_unimp() creates
121 | integer divide where the source operand is a zero, then the _isp_unimp()
127 | then it create a Trace exception stack frame from the "chk" exception
163 | then this routine simply re-enters the package through _isp_cas.
174 | then this routine simply re-enters the package through _isp_cas2.
Dilsp.doc49 then converting the resulting binary output image into an
72 within the package will then enter the correct emulation code routine.
111 register value. If this is important, then the caller of the library
129 operand is a zero, then the library routine, as its last
Dfplsp.doc50 then converting the resulting binary output image into an
73 within the package will then enter the correct emulation code routine.
109 entry. If an exception should be reported, then the package forces
112 floating-point Operand Error exception, then the library routine
Disp.doc54 then converting the resulting binary output image into an
183 host system (see isp.s source code), then these "Call-out"s should be
192 actions which are too system-specific, then the system integrator must
195 code has completed, then it should re-enter the 060ISP package through the
/linux-4.1.27/Documentation/connector/
Dconnector.txt89 If port and __group is zero, then appropriate group will
93 If __group is not zero, then message will be delivered
114 If you expect a reply to the message, then the sequence number in the
119 are expecting, then it is a new message. If we receive a message and
122 message + 1, then it is a new message.
/linux-4.1.27/arch/cris/arch-v32/mach-fs/
DKconfig93 connected to port PA, then they are usually connected to bits 2-4
115 connected to port PA, then they are usually connected to bits 2-4
137 connected to port PA, then they are usually connected to bits 2-4
159 connected to port PA, then they are usually connected to bits 2-4
181 connected to port PA, then they are usually connected to bits 2-4
/linux-4.1.27/Documentation/filesystems/caching/
Dbackend-api.txt6 FS-Cache for it to then serve out to network filesystems and other interested
38 The cache should then be registered with FS-Cache by passing a pointer to the
186 allocation requests made by the netfs. This struct is then passed to the
257 object is found to exist and the netfs indicates that it is valid then
417 If there's no page in the cache, then -ENODATA should be returned if the
421 If there is suitable data in the cache, then a read operation should be
462 If there was an error such as -ENOMEM, then that should be returned; else
463 if one or more pages couldn't be read or allocated, then -ENOBUFS should
464 be returned; else if one or more pages couldn't be read, then -ENODATA
465 should be returned. If all the pages are dispatched then 0 should be
[all …]
Dnetfs-api.txt188 If this function is not supplied or if it returns NULL then the first
243 The cache read/write functions are passed a context which is then passed
250 scope, then these functions are not required. These functions are not
377 And then a particular flavour of volume (R/O for example) could be added to
551 initial download or if a user performs a write), then the page should be
566 If the cookie indicates the inode is not cached then:
612 (3) If there was an general error, then that error will be returned.
614 Else if some pages couldn't be allocated or read, then -ENOBUFS will be
617 Else if some pages couldn't be read but were allocated, then -ENODATA will
620 Otherwise, if all pages had reads dispatched, then 0 will be returned, the
[all …]
/linux-4.1.27/Documentation/mtd/
Dnand_ecc.txt69 (so handle two bytes, then skip 2 bytes).
75 rp6 covers 8 bytes then skips 8 etc
76 rp7 skips 8 bytes then covers 8 etc
77 rp8 covers 16 bytes then skips 16 etc
78 rp9 skips 16 bytes then covers 16 etc
79 rp10 covers 32 bytes then skips 32 etc
80 rp11 skips 32 bytes then covers 32 etc
81 rp12 covers 64 bytes then skips 64 etc
82 rp13 skips 64 bytes then covers 64 etc
83 rp14 covers 128 bytes then skips 128
[all …]
/linux-4.1.27/Documentation/devicetree/bindings/
DABI.txt12 then default to the previous behaviour if it is missing. If a binding
13 truly needs an incompatible change, then change the compatible string
/linux-4.1.27/Documentation/scsi/
Dbfa.txt38 and then click following respective util package link:
53 and then click following respective util pacakge link
/linux-4.1.27/Documentation/mn10300/
DABI.txt24 If 64-bit arguments are being passed, then they are never split between
75 array, then a hidden first argument will be passed to the callee by the caller:
113 If CONFIG_MN10300_CURRENT_IN_E2 is defined, then the current task pointer
/linux-4.1.27/Documentation/devicetree/bindings/arm/calxeda/
Dl2ecc.txt6 - interrupts : Should be single bit error interrupt, then double bit error
/linux-4.1.27/Documentation/sound/oss/
DSoundPro35 up both ad1848 and sb then use one for playback and the other for
53 WSS. Assuming you've got isapnp all happy, then you should be able to
61 -then-
67 error message while trying to insert the module(s), then make
/linux-4.1.27/drivers/net/wireless/libertas/
DREADME49 device. When raw is enabled, then it dumps the raw EEPROM data
129 If it is set to 0, then the event is reported only once, and then
130 automatically unsubscribed. If it is set to 1, then the event is
131 reported every time it occurs. If it is set to N, then the event is
/linux-4.1.27/tools/usb/usbip/
Dconfigure.ac59 [if test "$withval" = "yes"; then
99 [if test "$withval" = "yes"; then
/linux-4.1.27/tools/perf/Documentation/
Dperf-annotate.txt16 code. If the object file has debug symbols then the source code will be
19 If there is no debug info in the object, then annotated assembly is displayed.
Dperf-help.txt19 If the option '--all' or '-a' is given, then all available commands are
/linux-4.1.27/Documentation/leds/
Dleds-lp5523.txt18 To make specific channel name, then use 'name' platform data.
23 For one device name with channel number, then use 'label'.
Dledtrig-oneshot.txt35 ms, then blink off for delay_off ms, leaving the LED normally off. If
36 set to 1, blink off for delay_off ms, then blink on for delay_on ms,
/linux-4.1.27/Documentation/w1/slaves/
Dw1_therm22 read sequence will initiate a temperature conversion then provide two
32 time and then go back to read individual sensors. That isn't
/linux-4.1.27/Documentation/console/
Dconsole.txt72 When unbinding, the modular driver is detached first, and then the system
82 NOTE2: If any of the virtual consoles are in KD_GRAPHICS mode, then binding or
126 false(), then it's safe to release the resources. This balance has to be
131 condition is satisfied, then the driver must call do_unregister_con_driver()
/linux-4.1.27/Documentation/devicetree/bindings/timer/
Dstericsson-u300-apptimer.txt10 then GP1 and GP2, which are general-purpose timers.
/linux-4.1.27/Documentation/devicetree/bindings/serial/
Dsnps-dw-apb-uart.txt20 not present then the register offsets are not shifted.
22 performed on the device. If this property is not present then single byte
/linux-4.1.27/Documentation/devicetree/bindings/watchdog/
Dcadence-wdt.txt11 - reset-on-timeout : If this property exists, then a reset is done
/linux-4.1.27/drivers/isdn/hysdn/
DKconfig6 Champ, Ergo and Metro. You will then get a module called hysdn.
/linux-4.1.27/drivers/mtd/chips/
DKconfig123 flash chip addressed by each bus cycle, then say 'Y'.
130 flash chips addressed by each bus cycle, then say 'Y'.
137 flash chips addressed by each bus cycle, then say 'Y'.
144 flash chips addressed by each bus cycle, then say 'Y'.
232 then say N.
/linux-4.1.27/Documentation/scheduler/
Dsched-deadline.txt48 consistent with the guarantee (using the CBS[2,3] algorithm). Tasks are then
79 then, if the scheduling deadline is smaller than the current time, or
145 to the number of CPUs), then the scheduler is unable to respect all the
151 Moreover, if the total utilisation is larger than M, then we risk starving
153 If, instead, the total utilisation is smaller than M, then non real-time
168 If D_i = P_i for all tasks, then EDF is able to respect all the deadlines
171 If D_i != P_i for some task, then it is possible to define the density of
193 IOW, if runtime >= WCET and if period is >= P, then the scheduling deadlines
217 This is usually called "admission control" and if it is not performed, then
242 sched_setattr()). Scheduling is then performed considering actual tasks'
[all …]
Dsched-arch.txt25 be enabled to call schedule() then disabled again.
55 an interrupt sleep, it needs to be cleared then a memory
/linux-4.1.27/Documentation/kdump/
Dkdump.txt38 with the region [0, crashkernel region size] and then the kdump kernel
181 (If CONFIG_SMP=y, then specify maxcpus=1 on the kernel command line
241 kernel will be aligned to 64Mb, so if the start address is not then
278 1) if the RAM is smaller than 512M, then don't reserve anything
280 2) if the RAM size is between 512M and 2G (exclusive), then reserve 64M
281 3) if the RAM size is larger than 2G, then reserve 128M
311 will be aligned to 128MiB (0x08000000), so if the start address is not then
338 If you are using a uncompressed vmlinux image then use following command
345 If you are using a compressed bzImage/vmlinuz, then use following command
352 If you are using a compressed zImage, then use following command
/linux-4.1.27/arch/arm/mach-lpc32xx/
Dsuspend.S53 @ Wait for SDRAM busy status to go busy and then idle
/linux-4.1.27/fs/qnx4/
DKconfig13 If you don't know whether you need it, then you don't need it:
/linux-4.1.27/drivers/usb/gadget/udc/bdc/
DKconfig7 then select this driver.
/linux-4.1.27/arch/cris/arch-v32/
DKconfig197 connected to port PA, then they are usually connected to bits 2-4
219 connected to port PA, then they are usually connected to bits 2-4
241 connected to port PA, then they are usually connected to bits 2-4
263 connected to port PA, then they are usually connected to bits 2-4
285 connected to port PA, then they are usually connected to bits 2-4
/linux-4.1.27/Documentation/thermal/
Dnouveau_thermal18 interface is likely not to work. This document may then not cover your situation
51 Not all cards have a drivable fan. If you do, then the following HWMON
/linux-4.1.27/net/bluetooth/
DKconfig75 When the Bluetooth subsystem is built as module, then the test
77 subsystem is compiled into the kernel image, then the test cases
/linux-4.1.27/Documentation/ABI/stable/
Dsysfs-bus-usb35 If CONFIG_PM is enabled, then this file is present. When read,
47 If CONFIG_PM is enabled, then this file is present. When read,
106 configuration, rather then unconfigure the device.
/linux-4.1.27/Documentation/s390/
DCommonIO74 ignored, there will be no effect on then. However, if such a device
75 disappears and then reappears, it will then be ignored. To make
/linux-4.1.27/drivers/rtc/
Drtc-dev.c307 time64_t now, then; in rtc_dev_ioctl() local
320 then = rtc_tm_to_time64(&alarm.time); in rtc_dev_ioctl()
323 if (then < now) { in rtc_dev_ioctl()
/linux-4.1.27/net/wireless/
Ddb.txt10 # If you _really_ intend to use CONFIG_CFG80211_INTERNAL_REGDB then you will
/linux-4.1.27/Documentation/dmaengine/
Dclient.txt56 If some DMA controllers have more parameters to be sent then they
115 added and the descriptor must then be submitted. Some DMA engine
157 issue_pending API. If channel is idle then the first transaction in
161 a tasklet triggered. The tasklet will then call the client driver
/linux-4.1.27/Documentation/spi/
Dpxa2xx221 if !enable_dma then
224 if spi_message.len > 8191 then
228 if spi_message.is_dma_mapped and rx_dma_buf != 0 and tx_dma_buf != 0 then
231 if rx_buf and tx_buf are aligned on 8 byte boundary then
/linux-4.1.27/Documentation/power/regulator/
Dconsumer.txt16 then finds the correct regulator by consulting a machine specific lookup table.
17 If the lookup is successful then this call will return a pointer to the struct
83 when enabled, then the voltage changes instantly, otherwise the voltage
113 when enabled, then the current limit changes instantly, otherwise the current
/linux-4.1.27/Documentation/crypto/
Dasymmetric-keys.txt31 operations using that key. In such a case, the asymmetric key would then
52 This can then be used to refer to the key, either by complete match or by
55 The asymmetric key type's match function can then perform a wider range of
59 (1) If the criterion string is of the form "id:<hexdigits>" then the match
69 (2) If the criterion string is of the form "<subtype>:<hexdigits>" then the
128 The caller must have already obtained the key from some source and can then use
/linux-4.1.27/Documentation/devicetree/bindings/i2c/
Di2c-arb-gpio-challenge.txt27 The basic algorithm is to assert your line when you want the bus, then make
35 3. Check THEIR_CLAIMS. If none are asserted then the we have the bus and we are
/linux-4.1.27/drivers/media/usb/ttusb-dec/
DKconfig18 download/extract them, and then copy them to /usr/lib/hotplug/firmware
/linux-4.1.27/drivers/net/ethernet/moxa/
DKconfig27 want to use the internal ethernet then you should answer Y to this.
/linux-4.1.27/fs/qnx6/
DKconfig15 If you don't know whether you need it, then you don't need it:
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/cpm_qe/qe/
Dfirmware.txt4 boot loader), then a 'firmware' child node should be added to the QE
/linux-4.1.27/Documentation/i2c/busses/
Di2c-amd811123 in your 'lspci -v', then this driver is for your chipset.
/linux-4.1.27/Documentation/aoe/
Dtodo.txt4 there are no other pages available, then deadlock may occur when a
/linux-4.1.27/arch/arm/vfp/
Dvfphw.S115 beq vfp_reload_hw @ then the hw state needs reloading
131 @ For SMP, if this thread does not own the hw context, then we
/linux-4.1.27/Documentation/devicetree/bindings/powerpc/fsl/
Dsrio.txt64 memory and maintenance transactions then a single LIODN is
69 transactions then a pair of LIODNs are represented in the
/linux-4.1.27/Documentation/hwmon/
Dltc424589 voltages, then the in10_input and in11_input sysfs attributes will not be
94 then they will be sampled in round-robin fashion. If userspace reads too
/linux-4.1.27/drivers/tty/hvc/
DKconfig96 a JTAG then you probably don't want this option.
104 the HVC driver. If you don't have JTAG, then you probably don't
/linux-4.1.27/Documentation/cpuidle/
Dsysfs.txt90 then all deeper states are disabled as well, but the disable variable
92 state still is disabled, then this has no effect.
/linux-4.1.27/Documentation/ioctl/
Dbotching-up-ioctls.txt59 past) then you need a driver feature flag or revision number somewhere.
72 then bakes in the ABI that those fields can never be used for anything else
188 command submission ioctl. But then if objects are shareable userspace needs
211 maybe only your testsuite needs this interface, and then debugfs with its
215 your driver proves popular and your hardware platforms long-lived then you'll
218 years to accomplish this. And then again years until the last user able to
/linux-4.1.27/drivers/net/ethernet/hisilicon/
DKconfig34 want to use the internal ethernet then you should answer Y to this.

123456