Home
last modified time | relevance | path

Searched refs:an (Results 1 – 25 of 1599) sorted by relevance

12345678910>>...64

/linux-3.4.99/Documentation/usb/
Danchors.txt5 a driver to cease all IO to an interface. To do so, a
15 There's no API to allocate an anchor. It is simply declared
28 An association of URBs to an anchor is made by an explicit
30 an URB is finished by (successful) completion. Thus disassociation
32 all URBs associated with an anchor.
41 This function kills all URBs associated with an anchor. The URBs
48 This function unlinks all URBs associated with an anchor. The URBs
58 All URBs of an anchor are unanchored en masse.
63 This function waits for all URBs associated with an anchor to finish
70 Returns true if no URBs are associated with an anchor. Locking
[all …]
/linux-3.4.99/arch/m68k/ifpsp060/
Dfskeleton.S9 |THE SOFTWARE is provided on an "AS IS" basis and without warranty.
61 | simply execute an "rte" as with the sample code below.
70 | This is the exit point for the 060FPSP when an enabled overflow exception
72 | for enabled overflow conditions. The exception stack frame is an overflow
76 | does an "rte".
89 | This is the exit point for the 060FPSP when an enabled underflow exception
91 | for enabled underflow conditions. The exception stack frame is an underflow
95 | does an "rte".
107 | This is the exit point for the 060FPSP when an enabled operand error exception
109 | for enabled operand error exceptions. The exception stack frame is an operand error
[all …]
/linux-3.4.99/Documentation/i2c/
Dfault-codes5 A "Fault" is not always an "Error"
14 result for an operation ... it doesn't indicate that anything is wrong
43 Also returned when trying to invoke an I2C operation in an
48 Returned by SMBus logic when an invalid Packet Error Code byte
63 This rather vague error means an invalid parameter has been
67 One example would be a driver trying an SMBus Block Write
72 performing an I/O operation. Use a more specific fault
89 of a transfer didn't get an ACK. While it might just mean
90 an I2C device was temporarily not responding, usually it
97 Returned by an adapter when asked to perform an operation
[all …]
/linux-3.4.99/Documentation/ABI/stable/
Dsysfs-bus-firewire12 Binary attribute; an array of host-endian u32.
17 Hexadecimal string representation of an u64.
30 Summary of all units present in an IEEE 1394 node.
70 These attributes are only created if the root directory of an
71 IEEE 1394 node or the unit directory of an IEEE 1394 unit
75 Hexadecimal string representation of an u24.
81 Hexadecimal string representation of an u24.
87 Hexadecimal string representation of an u24.
91 Hexadecimal string representation of an u24.
98 Hexadecimal string representation of an u24.
[all …]
/linux-3.4.99/Documentation/
DIRQ.txt1 What is an IRQ?
3 An IRQ is an interrupt request from a device.
6 sharing an IRQ.
9 interrupt source. Typically this is an index into the global irq_desc
13 An IRQ number is an enumeration of the possible interrupt sources on a
Drpmsg.txt17 its own instance of RTOS in an AMP configuration.
76 Returns 0 on success and an appropriate error value on failure.
82 its length (in bytes), and an explicit destination address.
93 Returns 0 on success and an appropriate error value on failure.
111 Returns 0 on success and an appropriate error value on failure.
123 Returns 0 on success and an appropriate error value on failure.
129 its length (in bytes), and an explicit destination address.
137 Returns 0 on success and an appropriate error value on failure.
152 Returns 0 on success and an appropriate error value on failure.
157 - every rpmsg address in the system is bound to an rx callback (so when
[all …]
Dio-mapping.txt1 The io_mapping functions in linux/io-mapping.h provide an abstraction for
2 efficiently mapping small regions of an I/O device to the CPU. The initial
28 creation function yields undefined results. Using an offset
29 which is not page aligned yields an undefined result. The
66 mechanisms and so provides only an abstraction layer and no new
75 kmap_atomic_pfn to map the specified page in an atomic fashion;
77 provides an efficient mapping for this usage.
81 performs an IPI to inform all processors about the new mapping. This results
/linux-3.4.99/Documentation/filesystems/
Dautofs4-mount-control.txt15 are things such as setting an autofs mount catatonic, setting the
17 certain types of autofs triggered mounts can end up covering an autofs
36 module source you will see a third type called an offset, which is just
58 For the above indirect map an autofs file system is mounted on /test and
63 The way that direct mounts are handled is by making an autofs mount on
72 For example, an indirect mount map entry could also be:
90 One of the issues with version 4 of autofs was that, when mounting an
105 The current autofs implementation uses an ioctl file descriptor opened
119 implement an isolated operation it was decided to re-implement the
126 autofs maps. They are recorded at mount request time and an operation
[all …]
Dinotify.txt14 First step in using inotify is to initialise an inotify instance:
20 Change events are managed by "watches". A watch is an (object,mask) pair where
36 You can update an existing watch in the same manner, by passing in a new mask.
42 Events are provided in the form of an inotify_event structure that is read(2)
51 Where "buf" is a pointer to an array of "inotify_event" structures at least
74 Inotify's kernel API consists a set of functions for managing watches and an
77 To use the kernel API, you must first initialize an inotify instance with a set
78 of inotify_operations. You are given an opaque inotify_handle, which you use
92 cookie - an identifier for synchronizing events
99 structure and specifying the inode to watch along with an inotify event mask.
[all …]
Daffs.txt47 of the original permissions. Directories will get an x
63 quiet The file system will not return an error for disallowed
75 symbolic links on an AFFS partition. Default = "/".
78 volume=name When symbolic links with an absolute path are created
79 on an AFFS partition, name will be prepended as the
158 have an Amiga harddisk connected to your PC, it will overwrite
160 the Rigid Disk Block. Sheer luck has it that this is an unused
189 do care about the case. Example (with /wb being an affs mounted fs):
197 in an ugly way (but the real AFFS doesn't do much better). This
200 You cannot execute programs on an OFS (Old File System), since the
[all …]
/linux-3.4.99/drivers/eisa/
DKconfig10 Bus (VLB) card that identify itself as an EISA card (such as
26 # Using EISA_VIRTUAL_ROOT on something other than an Alpha or
27 # an X86 may lead to crashes...
35 (no PCI slots). The Alpha Jensen is an example of such
50 you are building an installation floppy or kernel for an
/linux-3.4.99/Documentation/filesystems/caching/
Dbackend-api.txt5 The FS-Cache system provides an API by which actual caches can be supplied to
84 In either case, this may not be an appropriate context in which to access the
171 An operation can be made exclusive upon an object by setting the
173 an operation needs more processing time, it should be enqueued again.
197 The to_do field is an empty list available for the cache backend to use as
228 This isn't strictly an operation, but should be pointed at a string naming
251 This method is used to look up an object, given that the object is already
278 This method is called to increment the reference count on an object. It
288 These methods are used to exclusively lock an object. It must be possible
297 These methods are used to pin an object into the cache. Once pinned an
[all …]
Dobject.txt25 FS-Cache maintains an in-kernel representation of each object that a netfs is
36 represented by multiple objects - an index may exist in more than one cache -
97 machine. The state for an object is kept in the fscache_object struct, in
101 Each state has an action associated with it that is invoked when the machine
105 representations are hierarchical, and it is expected that an object must
122 Then when an event is raised (by calling fscache_raise_event()), if the event
165 the cache, it is expected that it will not be possible to look an object
192 Create an object on disk, using the parent as a starting point. This
201 operations the netfs has queued for an object. If creation failed, the
225 And there are terminal states in which an object cleans itself up, deallocates
[all …]
/linux-3.4.99/Documentation/devicetree/bindings/powerpc/fsl/cpm_qe/qe/
Dpincfg.txt14 1 = The pin is an output
15 2 = The pin is an input
20 0 = The pin is actively driven as an output
21 1 = The pin is an open-drain driver. As an output, the pin is
/linux-3.4.99/Documentation/networking/
Dppp_generic.txt8 The generic PPP driver in linux-2.4 provides an implementation of the
56 * ioctl() provides an interface which can be used by a user-space
58 procedure will be called when a user-space program does an ioctl
59 system call on an instance of /dev/ppp which is bound to the
86 (e.g. an ioctl) to transmit this back to user-space, as user-space
87 will need it to attach an instance of /dev/ppp to this channel.
101 communications medium and prepare it to do PPP. For example, with an
123 The channel must provide an instance of a ppp_channel struct to
255 this way an effect similar to Solaris' clone open is obtained,
256 allowing us to control an arbitrary number of PPP interfaces and
[all …]
/linux-3.4.99/drivers/input/joystick/iforce/
DKconfig8 Say Y here if you have an I-Force joystick or steering wheel
19 Say Y here if you have an I-Force joystick or steering wheel
26 Say Y here if you have an I-Force joystick or steering wheel
29 You will need an additional utility called inputattach, see
/linux-3.4.99/net/atm/
DKconfig13 In order to participate in an ATM network, your Linux box needs an
34 Normally, an "ICMP host unreachable" message is sent if a neighbour
44 LAN Emulation emulates services of existing LANs across an ATM
46 LANE client can also act as an proxy client bridging packets between
63 This device will act like an ethernet from the kernels point of view,
71 This is an experimental mechanism for users who need to terminate a
/linux-3.4.99/Documentation/arm/
Dswp_emulation8 instructions, triggering an undefined instruction exception when executed.
9 Trapped instructions are emulated using an LDREX/STREX or LDREXB/STREXB
10 sequence. If a memory access fault (an abort) occurs, a segmentation fault is
22 NOTE: when accessing uncached shared regions, LDREX/STREX rely on an external
/linux-3.4.99/Documentation/hwmon/
Dadt741118 The ADT7411 can use an I2C/SMBus compatible 2-wire interface or an
20 converter which measures 1 temperature, vdd and 8 input voltages. It has an
21 internal temperature sensor, but an external one can also be connected (one
/linux-3.4.99/Documentation/ia64/
Dserial.txt11 - Firmware on some machines (mostly from HP) provides an HCDP
25 With an HCDP, device names changed depending on EFI configuration
26 and "console=" arguments. Without an HCDP, device names didn't
29 For example, an HP rx1600 with a single built-in serial port
30 (described in the ACPI namespace) plus an MP[2] (a PCI device) has
62 - Without an HCDP, Linux defaults to a VGA console unless you
77 2.6.10 and later kernels have an "early uart" driver that works
79 this if the user supplies an argument like "console=uart,io,0x3f8",
81 firmware supplies an HCDP.
100 - You're connected to an HP MP port[2] but have a non-MP UART
[all …]
/linux-3.4.99/security/tomoyo/
DMakefile5 @echo Creating an empty policy/profile.conf
16 @echo Creating an empty policy/domain_policy.conf
21 @echo Creating an empty policy/manager.conf
26 @echo Creating an empty policy/stat.conf
/linux-3.4.99/Documentation/cgroups/
Dnet_prio.txt4 The Network priority cgroup provides an interface to allow an administrator to
8 Nominally, an application would set the priority of its traffic via the
13 decision rather than an application defined one.
15 This cgroup allows an administrator to assign a process to a group which defines
29 value that the kernel uses as an internal representation of this cgroup.
/linux-3.4.99/Documentation/RCU/
DUP.txt11 an idea this is.
16 Suppose that an RCU-based algorithm scans a linked list containing
38 Suppose that an RCU-based algorithm again scans a linked list containing
90 immediately on an UP system. It is also safe for synchronize_rcu()
101 Because the calling function is scanning an RCU-protected linked
102 list, and is therefore within an RCU read-side critical section.
103 Therefore, the called function has been invoked within an RCU
109 Any lock that is acquired within an RCU callback must be
110 acquired elsewhere using an _irq variant of the spinlock
111 primitive. For example, if "mylock" is acquired by an
[all …]
Dlockdep-splat.txt4 family to access an RCU-protected pointer without the proper protection.
5 When such misuse is detected, an lockdep-RCU splat is emitted.
7 The usual cause of a lockdep-RCU slat is someone accessing an
14 So let's look at an example RCU lockdep splat from 3.0-rc5, one that
72 take the struct request_queue "q" from cfq_exit_queue() as an argument,
79 code was invoked either from within an RCU read-side critical section
84 On the other hand, perhaps we really do need an RCU read-side critical
98 With this change, the rcu_dereference() is always within an RCU
/linux-3.4.99/Documentation/device-mapper/
Dthin-provisioning.txt12 Another significant feature is support for an arbitrary depth of
17 with depth. Fragmentation may still be an issue, however, in some
67 data device. If you do not have an existing metadata device you can
94 Using an existing pool device
114 Resuming a device with a new table itself triggers an event so the
123 To create a new thinly- provisioned volume you must send a message to an
128 Here '0' is an identifier for the volume, a 24-bit number. It's up
143 i) Creating an internal snapshot.
158 ii) Using an internal snapshot.
175 You can use an external _read only_ device as an origin for a
[all …]

12345678910>>...64