/linux/drivers/gpu/drm/panel/ |
H A D | panel-samsung-s6e3ha2.c | 22 #define S6E3HA2_MIN_BRIGHTNESS 0 31 { 0x00, 0xb8, 0x00, 0xc3, 0x00, 0xb1, 0x89, 0x87, 0x87, 0x82, 0x83, 32 0x85, 0x88, 0x8b, 0x8b, 0x84, 0x88, 0x82, 0x82, 0x89, 0x86, 0x8c, 33 0x94, 0x84, 0xb1, 0xaf, 0x8e, 0xcf, 0xad, 0xc9, 0x00, 0x00, 0x00, 34 0x00, 0x00 }, 35 { 0x00, 0xb8, 0x00, 0xc3, 0x00, 0xb1, 0x89, 0x87, 0x87, 0x84, 0x84, 36 0x85, 0x87, 0x8b, 0x8a, 0x84, 0x88, 0x82, 0x82, 0x89, 0x86, 0x8a, 37 0x93, 0x84, 0xb0, 0xae, 0x8e, 0xc9, 0xa8, 0xc5, 0x00, 0x00, 0x00, 38 0x00, 0x00 }, 39 { 0x00, 0xb8, 0x00, 0xc3, 0x00, 0xb1, 0x89, 0x87, 0x87, 0x83, 0x83, [all …]
|
/linux/tools/perf/ |
H A D | check-headers.sh | 4 YELLOW='\033[0;33m' 5 NC='\033[0m' # No Color 29 "arch/x86/include/asm/disabled-features.h" 30 "arch/x86/include/asm/required-features.h" 31 "arch/x86/include/asm/cpufeatures.h" 32 "arch/x86/include/asm/inat_types.h" 33 "arch/x86/include/asm/emulate_prefix.h" 34 "arch/x86/include/asm/msr-index.h" 35 "arch/x86/lib/x86-opcode-map.txt" 36 "arch/x86/tools/gen-insn-attr-x86.awk" [all …]
|
/linux/tools/perf/arch/x86/tests/ |
H A D | gen-insn-x86-dat.sh | 3 # gen-insn-x86-dat: generate data for the insn-x86 test 14 cd "$(dirname $0)" 18 echo "Compiling insn-x86-dat-src.c to 64-bit object" 20 gcc -g -c insn-x86-dat-src.c 22 objdump -dSw insn-x86-dat-src.o | awk -f gen-insn-x86-dat.awk > insn-x86-dat-64.c 24 rm -f insn-x86-dat-src.o 26 echo "Compiling insn-x86 [all...] |
H A D | insn-x86.c | 8 #include "../../../../arch/x86/include/asm/insn.h" 22 #include "insn-x86-dat-32.c" 23 {{0x0f, 0x01, 0xee}, 3, 0, NULL, NULL, "0f 01 ee \trdpkru"}, 24 {{0x0f, 0x01, 0xef}, 3, 0, NULL, NULL, "0f 01 ef \twrpkru"}, 25 {{0}, 0, 0, NULL, NULL, NULL}, 29 #include "insn-x86-dat-64.c" 30 {{0x0f, 0x01, 0xee}, 3, 0, NULL, NULL, "0f 01 ee \trdpkru"}, 31 {{0x0f, 0x01, 0xef}, 3, 0, NULL, NULL, "0f 01 ef \twrpkru"}, 32 {{0xf2, 0x0f, 0x01, 0xca}, 4, 0, "erets", "indirect", "f2 0f 01 ca \terets"}, 33 {{0xf3, 0x0f, 0x01, 0xca}, 4, 0, "eretu", "indirect", "f3 0f 01 ca \teretu"}, [all …]
|
H A D | gen-insn-x86-dat.awk | 3 # gen-insn-x86-dat.awk: script to convert data for the insn-x86 test 9 print " * Generated by gen-insn-x86-dat.sh and gen-insn-x86-dat.awk" 10 print " * from insn-x86-dat-src.c for inclusion by insn-x86.c" 15 rel = 0 16 going = 0 24 going = 0 27 /^\s*[0-9a-fA-F]+\:/ { 29 colon_pos = index($0, ":") 30 useful_line = substr($0, colon_pos + 1) 31 first_pos = match(useful_line, "[0-9a-fA-F]") [all …]
|
/linux/tools/objtool/ |
H A D | sync-check.sh | 11 if [ "$SRCARCH" = "x86" ]; then 13 arch/x86/include/asm/nops.h 14 arch/x86/include/asm/inat_types.h 15 arch/x86/include/asm/orc_types.h 16 arch/x86/include/asm/emulate_prefix.h 17 arch/x86/lib/x86-opcode-map.txt 18 arch/x86/tools/gen-insn-attr-x86.awk 23 arch/x86/include/asm/inat.h 24 arch/x86/include/asm/insn.h 25 arch/x86/lib/inat.c [all …]
|
/linux/sound/soc/amd/acp/ |
H A D | Kconfig | 11 depends on X86 && PCI 37 depends on X86 && PCI 50 depends on X86 && PCI 61 depends on X86 && PCI 69 depends on X86 && PCI 81 tristate "AMD ACP ASOC Acp7.0 Support" 82 depends on X86 && PCI 89 This option enables Acp7.0 PDM support on AMD platform. 90 Say Y if you want to enable AUDIO on ACP7.0 95 depends on X86 && PCI && I2C [all …]
|
/linux/arch/x86/ |
H A D | Makefile | 5 ifeq ($(ARCH),x86) 103 # Kernel IBT has S_CET.NOTRACK_EN=0, as such the compilers must not generate 137 include $(srctree)/arch/x86/Makefile_32.cpu 168 # By default gcc and clang use a stack alignment of 16 bytes for x86. 169 # However the standard kernel entry on x86-64 leaves the stack on an 229 # retpoline builds, however, gcc does not for x86. This has 230 # only been fixed starting from gcc stable version 8.4.0 and 260 # The 64-bit kernel must be aligned to 2MB. Pass -z max-page-size=0x200000 to 265 LDFLAGS_vmlinux += -z max-page-size=0x200000 270 $(Q)$(MAKE) $(build)=arch/x86/tools relocs [all …]
|
/linux/fs/unicode/ |
H A D | utf8data.c_shipped | 8 0, 9 0x10100, 10 0x20000, 11 0x20100, 12 0x30000, 13 0x30100, 14 0x30200, 15 0x40000, 16 0x40100, 17 0x50000, [all …]
|
/linux/arch/x86/include/uapi/asm/ |
H A D | bootparam.h | 8 #define RAMDISK_IMAGE_START_MASK 0x07FF 9 #define RAMDISK_PROMPT_FLAG 0x8000 10 #define RAMDISK_LOAD_FLAG 0x4000 13 #define LOADED_HIGH (1<<0) 20 #define XLF_KERNEL_64 (1<<0) 85 /* Gleaned from OFW's set-parameters in cpu/x86/pc/linux.fth */ 106 * (the zeropage), which is part of the x86 boot protocol ABI: 117 struct screen_info screen_info; /* 0x000 */ 118 struct apm_bios_info apm_bios_info; /* 0x040 */ 119 __u8 _pad2[4]; /* 0x054 */ [all …]
|
/linux/Documentation/admin-guide/ |
H A D | kernel-parameters.txt | 12 acpi= [HW,ACPI,X86,ARM64,RISCV64,EARLY] 36 1,0: use 1st APIC table 37 default: 0 77 acpi.debug_layer=0x20000000 80 acpi.debug_layer=0xffffffff acpi.debug_level=0x2 82 acpi.debug_layer=0x2 acpi.debug_level=0xffffffff 106 By default, this is disabled due to x86 early mapping 230 acpi_pm_good [X86] 277 add_efi_memmap [EFI,X86,EARLY] Include EFI memory map in 291 behaviour to be specified. Bit 0 enables warnings, [all …]
|
/linux/include/xen/interface/ |
H A D | features.h | 17 #define XENFEAT_writable_page_tables 0 33 /* If set, the guest is running in supervisor mode (e.g., x86 ring 0). */ 37 * If set, the guest does not need to allocate x86 PAE page directories 42 /* x86: Does this Xen host support the MMU_PT_UPDATE_PRESERVE_AD hypercall? */ 45 /* x86: Does this Xen host support the MMU_{CLEAR,COPY}_PAGE hypercall? */ 54 /* x86: Does this Xen host support the HVM callback vector type? */ 57 /* x86: pvclock algorithm is safe to use on HVM */ 60 /* x86: pirq can be used by HVM guests */ 78 * x86/PVH: If set, ACPI RSDP can be placed at any address. Otherwise RSDP 93 * - not auto_translated domains (x86 only) are always direct-mapped [all …]
|
H A D | callback.h | 22 /* x86: Callback for event delivery. */ 23 #define CALLBACKTYPE_event 0 25 /* x86: Failsafe callback when guest state cannot be restored by Xen. */ 28 /* x86/64 hypervisor: Syscall by 64-bit guest app ('64-on-64-on-64'). */ 32 * x86/32 hypervisor: Only available on x86/32 when supervisor_mode_kernel 37 /* x86: Callback for NMI delivery. */ 41 * x86: sysenter is only available as follows: 51 * x86/64 hypervisor: Syscall by 32-bit guest app on AMD CPUs 60 #define _CALLBACKF_mask_events 0 66 #define CALLBACKOP_register 0
|
/linux/drivers/gpu/drm/nouveau/ |
H A D | Kconfig | 19 select X86_PLATFORM_DEVICES if ACPI && X86 20 select ACPI_WMI if ACPI && X86 21 select MXM_WMI if ACPI && X86 24 select BACKLIGHT_CLASS_DEVICE if ACPI && X86 25 select INPUT if ACPI && X86 26 select THERMAL if ACPI && X86 27 select ACPI_VIDEO if ACPI && X86 43 range 0 7 48 0 - fatal 63 range 0 7
|
/linux/arch/x86/lib/ |
H A D | cpu.c | 8 unsigned int x86; in x86_family() local 10 x86 = (sig >> 8) & 0xf; in x86_family() 12 if (x86 == 0xf) in x86_family() 13 x86 += (sig >> 20) & 0xff; in x86_family() 15 return x86; in x86_family() 25 model = (sig >> 4) & 0xf; in x86_model() 27 if (fam >= 0x6) in x86_model() 28 model += ((sig >> 16) & 0xf) << 4; in x86_model() 36 return sig & 0xf; in x86_stepping()
|
/linux/arch/x86/kernel/cpu/ |
H A D | centaur.c | 27 if (cpuid_eax(0xC0000000) >= 0xC0000001) { in init_c3() 28 u32 tmp = cpuid_edx(0xC0000001); in init_c3() 49 c->x86_capability[CPUID_C000_0001_EDX] = cpuid_edx(0xC0000001); in init_c3() 64 if (c->x86 == 0x6 && c->x86_model >= 0xf) { in init_c3() 69 if (c->x86 >= 7) in init_c3() 98 if (c->x86 == 5) in early_init_centaur() 101 if ((c->x86 == 6 && c->x86_model >= 0xf) || in early_init_centaur() 102 (c->x86 >= 7)) in early_init_centaur() 118 u32 fcr_set = 0; in init_centaur() 119 u32 fcr_clr = 0; in init_centaur() [all …]
|
H A D | amd.c | 34 u32 gprs[8] = { 0 }; in rdmsrl_amd_safe() 37 WARN_ONCE((boot_cpu_data.x86 != 0xf), in rdmsrl_amd_safe() 41 gprs[7] = 0x9c5a203a; in rdmsrl_amd_safe() 45 *p = gprs[0] | ((u64)gprs[2] << 32); in rdmsrl_amd_safe() 52 u32 gprs[8] = { 0 }; in wrmsrl_amd_safe() 54 WARN_ONCE((boot_cpu_data.x86 != 0xf), in wrmsrl_amd_safe() 57 gprs[0] = (u32)val; in wrmsrl_amd_safe() 60 gprs[7] = 0x9c5a203a; in wrmsrl_amd_safe() 93 * of the Elan at 0x000df000. Unfortunately, one of the Linux in init_amd_k5() 97 #define CBAR (0xfffc) /* Configuration Base Address (32-bit) */ in init_amd_k5() [all …]
|
H A D | intel.c | 45 sld_off = 0, 62 * on CPUs that do not support SLD can cause fireworks, even when writing '0'. 107 if (c->x86 != 6) in probe_xeon_phi_r3mwait() 142 { INTEL_KABYLAKE, 0x0B, 0x80 }, 143 { INTEL_KABYLAKE, 0x0A, 0x80 }, 144 { INTEL_KABYLAKE, 0x09, 0x80 }, 145 { INTEL_KABYLAKE_L, 0x0A, 0x80 }, 146 { INTEL_KABYLAKE_L, 0x09, 0x80 }, 147 { INTEL_SKYLAKE_X, 0x03, 0x0100013e }, 148 { INTEL_SKYLAKE_X, 0x04, 0x0200003c }, [all …]
|
/linux/tools/perf/Documentation/ |
H A D | android.txt | 17 For x86: 18 export NDK_TOOLCHAIN=${NDK}/toolchains/x86-4.9/prebuilt/linux-x86_64/bin/i686-linux-android- 19 export NDK_SYSROOT=${NDK}/platforms/android-24/arch-x86 38 For x86: 39 ./build/tools/build-ndk-sysroot.sh --abi=x86 40 export NDK_SYSROOT=${ANDROID_BUILD_TOP}/ndk/build/platforms/android-3/arch-x86 45 For x86: 52 make WERROR=0 ARCH=arm CROSS_COMPILE=${NDK_TOOLCHAIN} EXTRA_CFLAGS="-pie --sysroot=${NDK_SYSROOT}" 53 For x86: 54 make WERROR=0 ARCH=x86 CROSS_COMPILE=${NDK_TOOLCHAIN} EXTRA_CFLAGS="-pie --sysroot=${NDK_SYSROOT}"
|
/linux/tools/testing/selftests/rseq/ |
H A D | rseq-x86.h | 3 * rseq-x86.h 9 #error "Never use <rseq-x86.h> directly; include <rseq.h> instead." 18 * x86-32: 0f b9 3d 53 30 05 53 ud1 0x53053053,%edi 19 * x86-64: 0f b9 3d 53 30 05 53 ud1 0x53053053(%rip),%edi 21 #define RSEQ_SIG 0x53053053 39 __asm__ __volatile__ ("lock; addl $0,-128(%%rsp)" ::: "memory", "cc") 56 } while (0) 72 __RSEQ_ASM_DEFINE_TABLE(label, 0x0, 0x0, start_ip, \ 102 ".byte 0x0f, 0xb9, 0x3d\n\t" \ 121 __asm__ __volatile__ ("lock; addl $0,-128(%%esp)" ::: "memory", "cc") [all …]
|
/linux/Documentation/virt/kvm/x86/ |
H A D | hypercalls.rst | 7 X86: 21 S390 uses diagnose instruction as hypercall (0x500) along with hypercall 36 KVM hypercalls use the HYPCALL instruction with code 0 and the hypercall 52 :Architecture: x86 60 :Architecture: x86 70 :Purpose: Expose hypercall availability to the guest. On x86 platforms, cpuid 89 :Architecture: x86 105 :Architecture: x86 114 a1: clock_type, ATM only KVM_CLOCK_PAIRING_WALLCLOCK (0) 131 * flags: flags, unused (0) at the moment. [all …]
|
/linux/crypto/ |
H A D | testmgr.h | 33 * @ksize: Length of @key in bytes (0 if no key) 103 * @crypt_error: When @novrfy=0, the expected error from encrypt(). When 263 "\x86\x98\x40\xB4\x16\x66\xB4\x2E\x92\xEA\x0D\xA3\xB4\x32\x04\xB5" 272 "\x47\x1E\x02\x90\xFF\x0A\xF0\x75\x03\x51\xB7\xF8\x78\x86\x4C\xA9" 279 "\x9F\xC9\x86\x32\x15\x4F\x58\x83\xB1\x67\xA9\x67\xBF\x40\x2B\x4E" 358 "\x49\x9B\x5C\x98\xBC\xBD\x26\xEF\x0C\xE9\x2E\xED\x19\x7E\x86\x41" 370 "\x6A\x37\x3B\x86\x6C\x51\x37\x5B\x1D\x79\xF2\xA3\x43\x10\xC6\xA7" 454 "\xA0\x86\xED\xF2\xB9\x50\x5C\x54\x5C\xBA\xE4\xA1\xB2\xA7\xAE\x2F" 459 "\x56\x7F\x0B\xF1\xB1\xE2\x43\x70\xBD\x86\x1D\xA1\xCC\x2B\x19\x08" 468 "\xB9\x23\x40\xA8\x86\x1E\x38\x83\xB2\x73\x1D\x53\xFB\x9E\x2A\x8A" [all …]
|
/linux/Documentation/translations/sp_SP/process/ |
H A D | maintainer-kvm-x86.rst | 3 :Original: Documentation/process/maintainer-kvm-x86.rst 6 KVM x86 16 seguir las directrices de KVM x86, sea receptivo a los comentarios, y 27 KVM x86 se encuentra actualmente en un período de transición de ser parte 29 x86 está dividido entre el árbol principal de KVM, 31 x86, ``github.com/kvm-x86/linux.git``. 35 para el siguiente ciclo se dirige a través del árbol de KVM x86. En el 37 través del árbol KVM x86, se aplicará a la rama ``fixes`` antes de llegar 45 El árbol de KVM x86 está organizado en múltiples ramas por temas. El 62 decir, no pasan por el árbol x86 de KVM. [all …]
|
/linux/Documentation/process/ |
H A D | maintainer-kvm-x86.rst | 3 KVM x86 12 an honest effort to follow KVM x86's guidelines, are receptive to feedback, 22 KVM x86 is currently in a transition period from being part of the main KVM 23 tree, to being "just another KVM arch". As such, KVM x86 is split across the 24 main KVM tree, ``git.kernel.org/pub/scm/virt/kvm/kvm.git``, and a KVM x86 25 specific tree, ``github.com/kvm-x86/linux.git``. 29 KVM x86 tree. In the unlikely event that a fix for the current cycle is routed 30 through the KVM x86 tree, it will be applied to the ``fixes`` branch before 38 The KVM x86 tree is organized into multiple topic branches. The purpose of 52 directly to the main KVM tree, i.e. do not route through the KVM x86 tree. [all …]
|
/linux/Documentation/arch/x86/ |
H A D | entry_64.rst | 8 arch/x86/entry/entry_64.S. A lot of this explanation is adapted from 13 The x86 architecture has quite a few different ways to jump into 15 arch/x86/kernel/traps.c and implemented in arch/x86/entry/entry_64.S 16 for 64-bit, arch/x86/entry/entry_32.S for 32-bit and finally 17 arch/x86/entry/entry_64_compat.S which implements the 32-bit compatibility 21 The IDT vector assignments are listed in arch/x86/include/asm/irq_vectors.h. 27 - entry_INT80_compat: int 0x80 from 32-bit or 64-bit code; compat syscall 44 There are a few complexities here. The different x86-64 entries 109 generate all 'normal' entry points with the regular (faster) paranoid=0
|