| /OK3568_Linux_fs/kernel/net/ethtool/ |
| H A D | common.c | 129 __DEFINE_LINK_MODE_NAME(40000, CR4, Full), 133 __DEFINE_LINK_MODE_NAME(56000, CR4, Full), 143 __DEFINE_LINK_MODE_NAME(100000, CR4, Full), 171 __DEFINE_LINK_MODE_NAME(200000, CR4, Full), 194 __DEFINE_LINK_MODE_NAME(400000, CR4, Full),
|
| H A D | linkmodes.c | 199 __DEFINE_LINK_MODE_PARAMS(40000, CR4, Full), 203 __DEFINE_LINK_MODE_PARAMS(56000, CR4, Full), 213 __DEFINE_LINK_MODE_PARAMS(100000, CR4, Full), 241 __DEFINE_LINK_MODE_PARAMS(200000, CR4, Full), 264 __DEFINE_LINK_MODE_PARAMS(400000, CR4, Full),
|
| /OK3568_Linux_fs/u-boot/board/renesas/sh7752evb/ |
| H A D | spi-boot.c | 30 #define CR4 0xFE002020 macro 71 while (!(spi_read(CR4) & SPI_SpiS0)) { in spi_reset()
|
| /OK3568_Linux_fs/u-boot/board/renesas/sh7753evb/ |
| H A D | spi-boot.c | 27 #define CR4 0xFE002020 macro 77 while (!(spi_read(CR4) & SPI_SpiS0)) { in spi_reset()
|
| /OK3568_Linux_fs/kernel/arch/x86/kernel/ |
| H A D | relocate_kernel_64.S | 34 #define CR4 DATA(0x18) macro 70 movq %rax, CR4(%r11) 226 movq CR4(%r8), %rax
|
| H A D | relocate_kernel_32.S | 31 #define CR4 DATA(0xc) macro 57 movl %eax, CR4(%edi) 206 movl CR4(%edi), %eax
|
| H A D | head_32.S | 207 # which means no CPUID and no CR4 216 jz .Lenable_paging # No flags or only CPUID.FPU = no CR4
|
| /OK3568_Linux_fs/u-boot/board/renesas/sh7757lcr/ |
| H A D | spi-boot.c | 34 #define CR4 0xFE002020 macro
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/lkdtm/ |
| H A D | tests.txt | 14 UNSET_SMEP pinned CR4 bits changed:
|
| /OK3568_Linux_fs/kernel/Documentation/virt/kvm/ |
| H A D | mmu.rst | 396 - if CR4.SMEP is enabled: since we've turned the page into a kernel page, 401 - if CR4.SMAP is disabled: since the page has been changed to a kernel 402 page, it can not be reused when CR4.SMAP is enabled. We set 403 CR4.SMAP && !CR0.WP into shadow page's role to avoid this case. Note, 404 here we do not care the case that CR4.SMAP is enabled since KVM will
|
| H A D | timekeeping.rst | 342 means of the CR4.TSD bit, which when enabled, disables CPL > 0 TSC access.
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0026-efi-Fix-use-after-free-in-halt-reboot-path.patch | 30 CR4 - 0000000000000668, CR8 - 0000000000000000
|
| /OK3568_Linux_fs/kernel/Documentation/x86/x86_64/ |
| H A D | fsgs.rst | 96 automatically. The kernel has to enable them explicitly in CR4. The
|
| /OK3568_Linux_fs/kernel/drivers/dma/ |
| H A D | pl330.c | 136 #define CR4 0xe10 macro 2046 pl330->pcfg.peri_ns = readl(regs + CR4); in read_dmac_config()
|
| /OK3568_Linux_fs/kernel/Documentation/networking/ |
| H A D | arcnet-hardware.rst | 599 | | \/ | CR4 |___| 629 CR3/CR4 Diagnostic LEDs 807 < CR4 |___| 837 CR4 Red Monitors Board Activity
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/share/info/ |
| H A D | libc.info-15 | 3744 • ‘OSPKE’ – OS has set CR4.PKE to enable protection keys. 3746 • ‘OSXSAVE’ – The OS has set CR4.OSXSAVE[bit 18] to enable
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/share/info/ |
| H A D | libc.info-15 | 3744 • ‘OSPKE’ – OS has set CR4.PKE to enable protection keys. 3746 • ‘OSXSAVE’ – The OS has set CR4.OSXSAVE[bit 18] to enable
|
| /OK3568_Linux_fs/recovery/ |
| HD | rootfs.cpio.gz | 107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000binusr/bin07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ... |