| /linux/scripts/gendwarfksyms/examples/ |
| H A D | kabi_ex.h | 42 int a; member 53 A, enumerator 65 * STABLE-NEXT: enumerator A = 0 , 74 int a; member 81 * STABLE-NEXT: member base_type int byte_size(4) encoding(5) a data_member_location(0) , 82 …e_type [[ULONG:long unsigned int|unsigned long]] byte_size(8) encoding(7) data_member_location(8) , 83 * STABLE-NEXT: member base_type [[ULONG]] byte_size(8) encoding(7) data_member_location(16) 88 int a; member 95 * STABLE-NEXT: member base_type int byte_size(4) encoding(5) a data_member_location(0) , 96 * STABLE-NEXT: member base_type [[ULONG]] byte_size(8) encoding(7) data_member_location(8) , [all …]
|
| /linux/include/uapi/drm/ |
| H A D | drm_fourcc.h | 4 * Permission is hereby granted, free of charge, to any person obtaining a 17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL 38 * fourcc code, a Format Modifier may optionally be provided, in order to 44 * Format modifiers are used in conjunction with a fourcc code, forming a 56 * vendor-namespaced, and as such the relationship between a fourcc code and a 61 * Modifiers must uniquely encode buffer layout. In other words, a buffer must 62 * match only a single modifier. A modifier must not be a subset of layouts of 64 * a modifier: a buffer may match a 64-pixel aligned modifier and a 32-pixel 69 * a canonical pair needs to be defined and used by all drivers. Preferred 105 #define fourcc_code(a, b, c, d) ((__u32)(a) | ((__u32)(b) << 8) | \ argument [all …]
|
| /linux/arch/x86/crypto/ |
| H A D | twofish-i586-asm_32.S | 16 #define out_blk 8 /* output byte array address parameter*/ 21 #define c_offset 8 30 #define w 4096 /* 8 whitening keys (word) */ 33 /* define a few register aliases to allow macro substitution */ 61 * a input register containing a (rotated 16) 65 * operations on a and b are interleaved to increase performance 67 #define encrypt_round(a,b,c,d,round)\ argument 71 movzx a ## B, %edi;\ 76 movzx a ## H, %edi;\ 77 ror $16, a ## D;\ [all …]
|
| H A D | aes-gcm-aesni-x86_64.S | 14 // Licensed under the Apache License 2.0 (the "License"). You may obtain a copy 39 // IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 81 // do an 8-register wide loop. Considering that and the fact that we have 96 // As a rough approximation, we can assume that Karatsuba multiplication is 98 // 0.25 pxors are cheaper than a pclmulqdq. (We assume that the 64-bit 114 // An additional 0.25 pclmulqdq per block (2 per 8 blocks) could be 115 // saved by using a multiplication-less reduction method. We don't do that 116 // because it would require a large number of shift and xor instructions, 119 // It does make sense to sometimes use a different reduction optimization 120 // that saves a pclmulqdq, though: precompute the hash key times x^64, and [all …]
|
| /linux/Documentation/gpu/ |
| H A D | afbc.rst | 7 AFBC is a proprietary lossless image compression protocol and format. 21 AFBC streams can contain several components - where a component 22 corresponds to a color channel (i.e. R, G, B, X, A, Y, Cb, Cr). 42 * Component 0: R(8) 43 * Component 1: G(8) 44 * Component 2: B(8) 45 * Component 3: A(8) 49 * Component 0: R(8) 50 * Component 1: G(8) 51 * Component 2: B(8) [all …]
|
| /linux/tools/perf/pmu-events/arch/x86/pantherlake/ |
| H A D | frontend.json | 7 …the Branch Target Buffer (BTB) prediction or lack thereof, was corrected by a later branch predict… 14 "Counter": "0,1,2,3,4,5,6,7,8,9", 17 …s resteered when it finds a branch instruction in a fetch line. This is called Unknown Branch whic… 23 "BriefDescription": "Counts the number of BACLEARS due to a conditional jump.", 41 "BriefDescription": "Counts the number of BACLEARS due to a return branch.", 50 "BriefDescription": "Counts the number of BACLEARS due to a direct, unconditional jump.", 60 "Counter": "0,1,2,3,4,5,6,7,8,9", 63 …to the number of prefixes in a 16B-line. This may result in a three-cycle penalty for each LCP (Le… 70 "Counter": "0,1,2,3,4,5,6,7,8,9", 79 "Counter": "0,1,2,3,4,5,6,7,8,9", [all …]
|
| H A D | virtual-memory.json | 3 …"BriefDescription": "Counts the number of page walks initiated by a demand load that missed the fi… 12 …s but second level hits due to a demand load that did not start a page walk. Accounts for all page… 22 "Counter": "0,1,2,3,4,5,6,7,8,9", 31 … "BriefDescription": "Cycles when at least one PMH is busy with a page walk for a demand load.", 32 "Counter": "0,1,2,3,4,5,6,7,8,9", 36 …ounts cycles when at least one PMH (Page Miss Handler) is busy with a page walk for a demand load.… 52 …"BriefDescription": "Load miss in all TLB levels causes a page walk that completes. (All page size… 53 "Counter": "0,1,2,3,4,5,6,7,8,9", 56 …s it missed in the DTLB and further levels of TLB. The page walk can end with or without a fault.", 62 "BriefDescription": "Page walks completed due to a demand data load to a 1G page.", [all …]
|
| H A D | pipeline.json | 4 "Counter": "0,1,2,3,4,5,6,7,8,9", 15 "Counter": "0,1,2,3,4,5,6,7,8,9", 25 … "BriefDescription": "Number of occurrences where a microcode assist is invoked by hardware.", 26 "Counter": "0,1,2,3,4,5,6,7,8,9", 29 …"PublicDescription": "Counts the number of occurrences where a microcode assist is invoked by hard… 36 "Counter": "0,1,2,3,4,5,6,7,8,9", 48 … in which the instruction pointer (IP) of the processor is resteered due to a branch instruction a… 54 "Counter": "0,1,2,3,4,5,6,7,8,9", 63 "Counter": "0,1,2,3,4,5,6,7,8,9", 83 "Counter": "0,1,2,3,4,5,6,7,8,9", [all …]
|
| /linux/lib/842/ |
| H A D | 842.h | 12 * template operation. For normal operations, each arg is either a specific 14 * to a previously-written number of data bytes to copy to the output buffer. 16 * The template code is a 5-bit value. This code indicates what to do with 20 * an arg following the template code bits. Each action is either a "data" 21 * type action, or a "index" type action, and each action results in 2, 4, or 8 23 * in the table row) will add up to 8 bytes being written to the output buffer. 28 * corresponding arg is 2, 4, or 8 bytes, respectively, in the compressed data 32 * corresponding arg is an index parameter that points to, respectively, a 2, 33 * 4, or 8 byte value already in the output buffer, that should be copied to 34 * the end of the output buffer. Essentially, the index points to a position [all …]
|
| /linux/Documentation/admin-guide/media/ |
| H A D | dvb_intro.rst | 17 video) is an analogue encoding of a sequence of image frames (25 frames 20 Analogue TV card for a PC has the following purpose: 22 * Tune the receiver to receive a broadcast signal 29 some countries employ a digital audio signal 37 circuitry on the card and is often presented uncompressed. For a PAL TV 38 signal encoded at a resolution of 768x576 24-bit color pixels over 25 39 frames per second - a fair amount of data is generated and must be 46 The purpose of a simple budget digital TV card (DVB-T,C or S) is to 49 * Tune the received to receive a broadcast signal. * Extract the encoded 55 digital TV card spits out a compressed encoded digital datastream. As [all …]
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-service-time.rst | 5 dm-service-time is a path selector module for device-mapper targets, 6 which selects a path with the shortest estimated service time for 10 of in-flight I/Os on a path with the performance value of the path. 11 The performance value is a relative throughput value among all paths 12 in a path-group, and it can be specified as a table argument. 30 other paths having a positive value are available. 36 'A' if the path is active, 'F' if the path is failed. 51 Basically, dm-service-time selects a path having minimum service time 82 # echo "0 10 multipath 0 0 1 1 service-time 0 2 2 8:0 128 1 8:16 128 4" \ 86 test: 0 10 multipath 0 0 1 1 service-time 0 2 2 8:0 128 1 8:16 128 4 [all …]
|
| /linux/arch/powerpc/kernel/ |
| H A D | idle_book3s.S | 26 * An EC=0 type wakeup will return with a value of 0. SRESET wakeup (which can 44 * A wakeup without GPR loss may alteratively be handled as in 56 * Use the stack red zone rather than a new frame for saving regs since 60 std r2,-8*1(r1) 61 std r14,-8*2(r1) 62 std r15,-8*3(r1) 63 std r16,-8*4(r1) 64 std r17,-8*5(r1) 65 std r18,-8*6(r1) 66 std r19,-8*7(r1) [all …]
|
| /linux/kernel/irq/ |
| H A D | timings.c | 40 * Currently, the interrupt timings are stored in a circular array 41 * buffer every time there is an interrupt, as a tuple: the interrupt 45 * For every interrupt occurring in a short period of time, we can 47 * interrupt and we end up with a suite of intervals. The experience 48 * showed the interrupts are often coming following a periodic 52 * in a fastest way and use its period to predict the next irq event. 69 * Suffix array is an array of all the suffixes of a string. It is 70 * widely used as a data structure for compression, text search, ... 72 * 'anana' 'nana' 'ana' 'na' 'a' 77 * search by a max period and min period. [all …]
|
| /linux/Documentation/userspace-api/media/rc/ |
| H A D | rc-protos.rst | 9 IR is encoded as a series of pulses and spaces, using a protocol. These 10 protocols can encode e.g. an address (which device should respond) and a 12 across different devices for a given protocol. 14 Therefore out the output of the IR decoder is a scancode; a single u32 17 Other things can be encoded too. Some IR protocols encode a toggle bit; this 22 Some remotes have a pointer-type device which can used to control the 32 This IR protocol uses manchester encoding to encode 14 bits. There is a 67 - 8 to 13 77 There is a variant of rc5 called either rc5x or extended rc5 130 This rc-5 extended to encoded 20 bits. The is a 3555 microseconds space [all …]
|
| /linux/tools/perf/pmu-events/arch/x86/lunarlake/ |
| H A D | frontend.json | 7 …the Branch Target Buffer (BTB) prediction or lack thereof, was corrected by a later branch predict… 14 "Counter": "0,1,2,3,4,5,6,7,8,9", 17 …s resteered when it finds a branch instruction in a fetch line. This is called Unknown Branch whic… 23 "BriefDescription": "Counts the number of BACLEARS due to a conditional jump.", 41 "BriefDescription": "Counts the number of BACLEARS due to a return branch.", 50 "BriefDescription": "Counts the number of BACLEARS due to a direct, unconditional jump.", 60 "Counter": "0,1,2,3,4,5,6,7,8,9", 63 …to the number of prefixes in a 16B-line. This may result in a three-cycle penalty for each LCP (Le… 70 "Counter": "0,1,2,3,4,5,6,7,8,9", 78 …"BriefDescription": "Counts the number of times a decode restriction reduces the decode throughput… [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | verifier_array_access.c | 53 __description("valid map access into an array with a constant") 60 *(u64*)(r10 - 8) = r1; \ in an_array_with_a_constant_1() 62 r2 += -8; \ in an_array_with_a_constant_1() 77 __description("valid map access into an array with a register") 84 *(u64*)(r10 - 8) = r1; \ in __flag() 86 r2 += -8; \ in __flag() 104 __description("valid map access into an array with a variable") 111 *(u64*)(r10 - 8) = r1; \ in __flag() 113 r2 += -8; \ in __flag() 133 __description("valid map access into an array with a signed variable") [all …]
|
| /linux/tools/perf/pmu-events/arch/x86/arrowlake/ |
| H A D | frontend.json | 7 …the Branch Target Buffer (BTB) prediction or lack thereof, was corrected by a later branch predict… 14 "Counter": "0,1,2,3,4,5,6,7,8,9", 17 …s resteered when it finds a branch instruction in a fetch line. This is called Unknown Branch whic… 27 …the Branch Target Buffer (BTB) prediction or lack thereof, was corrected by a later branch predict… 34 "Counter": "0,1,2,3,4,5,6,7,8,9", 37 …to the number of prefixes in a 16B-line. This may result in a three-cycle penalty for each LCP (Le… 44 "Counter": "0,1,2,3,4,5,6,7,8,9", 53 "Counter": "0,1,2,3,4,5,6,7,8,9", 56 …a Uop-cache that holds translations of previously fetched instructions that were decoded by the le… 79 "Counter": "0,1,2,3,4,5,6,7,8,9", [all …]
|
| /linux/arch/powerpc/crypto/ |
| H A D | aes-tab-4k.S | 10 * crypto/aes_generic.c and are designed to be simply accessed by a combination 11 * of rlwimi/lwz instructions with a minimum of table registers (usually only 18 * the generic tables they have been reduced from 16KB to 8KB + 256 bytes. 19 * This is a quite good tradeoff for low power devices (e.g. routers) without 25 #define R(a, b, c, d) \ argument 26 0x##a##b##c##d, 0x##d##a##b##c, 0x##c##d##a##b, 0x##b##c##d##a 34 .long R(ee, 77, 77, 99), R(f6, 7b, 7b, 8d) 40 .long R(4d, ab, ab, e6), R(ec, 76, 76, 9a) 41 .long R(8f, ca, ca, 45), R(1f, 82, 82, 9d) 44 .long R(8e, 47, 47, c9), R(fb, f0, f0, 0b) [all …]
|
| /linux/arch/arm64/lib/ |
| H A D | kasan_sw_tags.S | 10 * Report a tag mismatch detected by tag-based KASAN. 12 * A compiler-generated thunk calls this with a non-AAPCS calling 22 * The caller has decremented the SP by 256 bytes, and created a 30 * Note that this is not a struct pt_regs. 32 * To call a regular AAPCS function we must save x2 to x15 (which we can 33 * store in the gaps), and create a frame record (for which we can use 43 stp x2, x3, [sp, #8 * 2] 44 stp x4, x5, [sp, #8 * 4] 45 stp x6, x7, [sp, #8 * 6] 46 stp x8, x9, [sp, #8 * 8] [all …]
|
| H A D | strncmp.S | 14 * ARMv8-a, AArch64. 71 (=> (X - 1) & ~(X | 0x7f)) is non-zero iff a byte is zero, and 75 ldr data1, [src1], #8 76 ldr data2, [src2], #8 78 subs limit, limit, #8 91 add limit, limit, 8 /* Rewind limit to before last subs. */ 103 perform a signed 32-bit subtraction. */ 109 /* Not reached the limit, must have found the end or a diff. */ 111 add tmp1, limit, 8 136 /* Re-compute the NUL-byte detection, using a byte-reversed value. */ [all …]
|
| /linux/drivers/ras/amd/atl/ |
| H A D | reg_fields.h | 17 * a) "x" is the first major revision where the new field appears. 31 * DF2 BlockFabricId [19:8] 32 * DF3 BlockFabricId [19:8] 33 * DF3p5 BlockFabricId [19:8] 34 * DF4 BlockFabricId [19:8] 35 * DF4p5 BlockFabricId [15:8] 37 #define DF2_COH_ST_FABRIC_ID GENMASK(19, 8) 38 #define DF4p5_COH_ST_FABRIC_ID GENMASK(15, 8) 48 * DF2 N/A 97 * DF2 DieIdMask [15:8] [all …]
|
| /linux/net/ceph/ |
| H A D | ceph_hash.c | 10 #define mix(a, b, c) \ argument 12 a = a - b; a = a - c; a = a ^ (c >> 13); \ 13 b = b - c; b = b - a; b = b ^ (a << 8); \ 14 c = c - a; c = c - b; c = c ^ (b >> 13); \ 15 a = a - b; a = a - c; a = a ^ (c >> 12); \ 16 b = b - c; b = b - a; b = b ^ (a << 16); \ 17 c = c - a; c = c - b; c = c ^ (b >> 5); \ 18 a = a - b; a = a - c; a = a ^ (c >> 3); \ 19 b = b - c; b = b - a; b = b ^ (a << 10); \ 20 c = c - a; c = c - b; c = c ^ (b >> 15); \ [all …]
|
| /linux/drivers/net/fddi/skfp/h/ |
| H A D | skfbi.h | 5 * a business unit of Schneider & Koch & Co. Datensysteme GmbH. 31 * Note: The temperature and voltage sensors are relocated on a different 40 #define B0_RAP 0x0000 /* 8 bit register address port */ 42 #define B0_CTRL 0x0004 /* 8 bit control register */ 43 #define B0_DAS 0x0005 /* 8 Bit control register (DAS) */ 44 #define B0_LED 0x0006 /* 8 Bit LED register */ 45 #define B0_TST_CTRL 0x0007 /* 8 bit test control register */ 71 #define B0_CNTRL_A 0x0050 /* control register A (r/w) */ 76 #define B0_STATUS_A 0x0060 /* status register A (read only) */ 83 #define B0_XA_CSR 0x0078 /* 32 bit BMU control/status reg (a xmit q) */ [all …]
|
| /linux/arch/x86/entry/ |
| H A D | entry_64.S | 13 * A note on terminology: 58 * well as some other programs and libraries. There are also a handful 59 * of SYSCALL instructions in the vDSO used, for example, as a 64 * rflags gets masked by a value from another MSR (so CLD and CLAC 125 * a completely clean 64-bit userspace context. If we're not, 200 * When switching from a shallower to a deeper call stack 221 * A newly forked process directly context switches into this address. 230 * This is the start of the kernel stack; even through there's a 234 * This ensures stack unwinds of kernel threads terminate in a known 249 * -- at this point the register set should be a valid user set [all …]
|
| /linux/Documentation/hwmon/ |
| H A D | it87.rst | 10 Addresses scanned: from Super I/O config space (8 I/O ports) 18 Addresses scanned: from Super I/O config space (8 I/O ports) 24 Addresses scanned: from Super I/O config space (8 I/O ports) 32 Addresses scanned: from Super I/O config space (8 I/O ports) 40 Addresses scanned: from Super I/O config space (8 I/O ports) 48 Addresses scanned: from Super I/O config space (8 I/O ports) 56 Addresses scanned: from Super I/O config space (8 I/O ports) 64 Addresses scanned: from Super I/O config space (8 I/O ports) 72 Addresses scanned: from Super I/O config space (8 I/O ports) 80 Addresses scanned: from Super I/O config space (8 I/O ports) [all …]
|