| /OK3568_Linux_fs/kernel/net/sctp/ |
| H A D | sm_statefuns.c | 58 struct sctp_cmd_seq *commands); 67 struct sctp_cmd_seq *commands, 75 struct sctp_cmd_seq *commands); 82 struct sctp_cmd_seq *commands); 89 struct sctp_cmd_seq *commands); 94 struct sctp_cmd_seq *commands, 104 struct sctp_cmd_seq *commands, 114 struct sctp_cmd_seq *commands); 122 struct sctp_cmd_seq *commands); 130 struct sctp_cmd_seq *commands); [all …]
|
| H A D | sm_sideeffect.c | 47 struct sctp_cmd_seq *commands, 56 struct sctp_cmd_seq *commands, 139 struct sctp_cmd_seq *commands) in sctp_gen_sack() argument 200 sctp_add_cmd_sf(commands, SCTP_CMD_TIMER_RESTART, in sctp_gen_sack() 215 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(sack)); in sctp_gen_sack() 218 sctp_add_cmd_sf(commands, SCTP_CMD_TIMER_STOP, in sctp_gen_sack() 518 static void sctp_do_8_2_transport_strike(struct sctp_cmd_seq *commands, in sctp_do_8_2_transport_strike() argument 593 static void sctp_cmd_init_failed(struct sctp_cmd_seq *commands, in sctp_cmd_init_failed() argument 604 sctp_add_cmd_sf(commands, SCTP_CMD_EVENT_ULP, in sctp_cmd_init_failed() 607 sctp_add_cmd_sf(commands, SCTP_CMD_NEW_STATE, in sctp_cmd_init_failed() [all …]
|
| /OK3568_Linux_fs/kernel/arch/sparc/kernel/ |
| H A D | setup_32.c | 148 static void __init boot_flags_init(char *commands) in boot_flags_init() argument 150 while (*commands) { in boot_flags_init() 152 while (*commands == ' ') in boot_flags_init() 153 commands++; in boot_flags_init() 156 if (*commands == '\0') in boot_flags_init() 158 if (*commands == '-') { in boot_flags_init() 159 commands++; in boot_flags_init() 160 while (*commands && *commands != ' ') in boot_flags_init() 161 process_switch(*commands++); in boot_flags_init() 164 if (!strncmp(commands, "mem=", 4)) { in boot_flags_init() [all …]
|
| H A D | setup_64.c | 133 static void __init boot_flags_init(char *commands) in boot_flags_init() argument 135 while (*commands) { in boot_flags_init() 137 while (*commands == ' ') in boot_flags_init() 138 commands++; in boot_flags_init() 141 if (*commands == '\0') in boot_flags_init() 143 if (*commands == '-') { in boot_flags_init() 144 commands++; in boot_flags_init() 145 while (*commands && *commands != ' ') in boot_flags_init() 146 process_switch(*commands++); in boot_flags_init() 149 if (!strncmp(commands, "mem=", 4)) in boot_flags_init() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/platform/x86/ |
| H A D | samsung-laptop.c | 147 const struct sabi_commands commands; member 172 .commands = { 235 .commands = { 480 const struct sabi_commands *commands = &samsung->config->commands; in read_brightness() local 485 retval = sabi_command(samsung, commands->get_brightness, in read_brightness() 502 const struct sabi_commands *commands = &samsung->config->commands; in set_brightness() local 513 sabi_set_commandb(samsung, commands->set_brightness, 0); in set_brightness() 516 sabi_set_commandb(samsung, commands->set_brightness, user_level); in set_brightness() 563 const struct sabi_commands *commands = &samsung->config->commands; in update_status() local 568 sabi_set_commandb(samsung, commands->set_backlight, 1); in update_status() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/hwmon/ |
| H A D | pmbus-core.rst | 21 Unfortunately, while PMBus commands are standardized, there are no mandatory 22 commands, and manufacturers can add as many non-standard commands as they like. 23 Also, different PMBUs devices act differently if non-supported commands are 47 PMBus commands. Auto-detection is somewhat limited, since there are simply too 49 which PMBus commands are paged and which commands are replicated across all 53 all commands can be auto-detected. The data structures in this driver can be 57 Some commands are always auto-detected. This applies to all limit commands 67 standard PMBus commands and virtual PMBus commands. 69 Standard PMBus commands 72 Standard PMBus commands (commands values 0x00 to 0xff) are defined in the PMBUs [all …]
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0038-efi-Use-grub_is_lockdown-instead-of-hardcoding-a-dis.patch | 8 prevent executing commands that can be utilized to circumvent the UEFI 10 have to be disabled, prevent the usage of commands that can be dangerous. 12 This not only allows the commands to be disabled on other platforms, but 22 grub-core/commands/i386/wrmsr.c | 5 +++-- 23 grub-core/commands/iorw.c | 19 ++++++++++--------- 24 grub-core/commands/memrw.c | 19 ++++++++++--------- 48 -@command{iorw}, the @command{memrw} and the @command{wrmsr} commands are 53 +Device Trees, etc. have to be signed, e.g, using PGP. Additionally, the commands 61 diff --git a/grub-core/commands/i386/wrmsr.c b/grub-core/commands/i386/wrmsr.c 63 --- a/grub-core/commands/i386/wrmsr.c [all …]
|
| H A D | 0093-commands-ls-Require-device_name-is-not-NULL-before-p.patch | 4 Subject: [PATCH] commands/ls: Require device_name is not NULL before printing 16 grub-core/commands/ls.c | 2 +- 19 diff --git a/grub-core/commands/ls.c b/grub-core/commands/ls.c 21 --- a/grub-core/commands/ls.c 22 +++ b/grub-core/commands/ls.c
|
| H A D | 0043-commands-hdparm-Restrict-hdparm-command-when-locked-.patch | 4 Subject: [PATCH] commands/hdparm: Restrict hdparm command when locked down 13 grub-core/commands/hdparm.c | 6 +++--- 16 diff --git a/grub-core/commands/hdparm.c b/grub-core/commands/hdparm.c 18 --- a/grub-core/commands/hdparm.c 19 +++ b/grub-core/commands/hdparm.c
|
| H A D | 0042-commands-setpci-Restrict-setpci-command-when-locked-.patch | 4 Subject: [PATCH] commands/setpci: Restrict setpci command when locked down 13 grub-core/commands/setpci.c | 8 ++++---- 16 diff --git a/grub-core/commands/setpci.c b/grub-core/commands/setpci.c 18 --- a/grub-core/commands/setpci.c 19 +++ b/grub-core/commands/setpci.c
|
| H A D | 0077-commands-hashsum-Fix-a-memory-leak.patch | 4 Subject: [PATCH] commands/hashsum: Fix a memory leak 16 grub-core/commands/hashsum.c | 15 ++++++++++++--- 19 diff --git a/grub-core/commands/hashsum.c b/grub-core/commands/hashsum.c 21 --- a/grub-core/commands/hashsum.c 22 +++ b/grub-core/commands/hashsum.c
|
| H A D | 0041-commands-Restrict-commands-that-can-load-BIOS-or-DT-.patch | 4 Subject: [PATCH] commands: Restrict commands that can load BIOS or DT blobs 7 There are some more commands that should be restricted when the GRUB is 8 locked down. Following is the list of commands and reasons to restrict: 25 grub-core/commands/efi/loadbios.c | 16 ++++++++-------- 44 diff --git a/grub-core/commands/efi/loadbios.c b/grub-core/commands/efi/loadbios.c 46 --- a/grub-core/commands/efi/loadbios.c 47 +++ b/grub-core/commands/efi/loadbios.c
|
| H A D | 0097-commands-menuentry-Fix-quoting-in-setparams_prefix.patch | 4 Subject: [PATCH] commands/menuentry: Fix quoting in setparams_prefix() 30 grub-core/commands/menuentry.c | 2 +- 33 diff --git a/grub-core/commands/menuentry.c b/grub-core/commands/menuentry.c 35 --- a/grub-core/commands/menuentry.c 36 +++ b/grub-core/commands/menuentry.c
|
| H A D | 0039-acpi-Don-t-register-the-acpi-command-when-locked-dow.patch | 22 grub-core/commands/acpi.c | 15 ++++++++------- 41 diff --git a/grub-core/commands/acpi.c b/grub-core/commands/acpi.c 43 --- a/grub-core/commands/acpi.c 44 +++ b/grub-core/commands/acpi.c
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
| H A D | check-openssl-cmds-in-script-bootstrap.patch | 1 bootstrap: check commands of openssl exist 3 It calls openssl commands dhparam and pkcs12 in script bootstrap. These 4 commands are configurable based on configure options 'no-dh' and 6 these commands. If not, abort running of script bootstrap. 13 be run on a host which provides these openssl commands. 28 +# check commands of openssl exist
|
| /OK3568_Linux_fs/kernel/Documentation/i2c/ |
| H A D | i2c-stub.rst | 9 types of SMBus commands: write quick, (r/w) byte, (r/w) byte data, (r/w) 13 driver, which will then only react to SMBus commands to these addresses. 16 quick commands to the specified addresses; it will respond to the other 17 commands (also to the specified addresses) by reading from or writing to 29 SMBus block commands must be written to configure an SMBus command for 30 SMBus block operations. Writes can be partial. Block read commands always 50 Functionality override, to disable some commands. See I2C_FUNC_* 53 commands.
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | debugfs-cec-error-inj | 6 The CEC Framework allows for CEC error injection commands through 8 through which the error injection commands can be given. 16 It is up to the driver to decide what commands to implement. The only 19 commands. 23 commands. 34 Drivers that implement this functionality must document the commands as
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/ |
| H A D | 0003-comment-out-sections-shutdown-and-environment-in-gen.patch | 15 pykickstart/commands/reboot.py | 3 +++ 19 diff --git a/pykickstart/commands/reboot.py b/pykickstart/commands/reboot.py 21 --- a/pykickstart/commands/reboot.py 22 +++ b/pykickstart/commands/reboot.py
|
| /OK3568_Linux_fs/kernel/Documentation/firmware-guide/acpi/ |
| H A D | aml-debugger.rst | 25 the following commands:: 41 started by using the following commands:: 48 debugger commands. 50 The commands are documented in the "ACPICA Overview and Programmer Reference" 55 The detailed debugger commands reference is located in Chapter 12 "ACPICA 62 the "quit" or "exit" commands. When finished, unload the module with::
|
| /OK3568_Linux_fs/kernel/kernel/debug/kdb/ |
| H A D | kdb_cmds | 1 # Initial commands for kdb, alter to suit your needs. 2 # These commands are executed in kdb_init() context, no SMP, no 4 # registers) are not reliable this early. set and bp commands should 5 # be safe. Global breakpoint commands affect each cpu as it is booted.
|
| /OK3568_Linux_fs/u-boot/doc/ |
| H A D | README.ext4 | 5 but without selecting the corresponding commands, use one of: 10 Next, to select the ext2-related commands: 15 or ext4-related commands: 36 Also relevant are the generic filesystem commands, selected by: 43 Some sample commands to test ext4 support: 45 1. Check that the commands can be seen in the output of U-Boot help:
|
| H A D | README.serial_multi | 17 *) The console can be switched to SCC by any of the following commands: 23 *) The console can be switched to SMC by any of the following commands: 30 will be used which, in turn, can be switched by above commands. 46 *) The console can be switched to UART1 by any of the following commands: 51 *) The console can be switched to UART0 by any of the following commands:
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | package-make-target.txt | 36 | +configure+ | Run the configure commands, if any 38 | +build+ | Run the compilation commands 49 *target package:* Run the 2 previous installation commands 86 | +reinstall+ | Re-run the install commands 88 | +rebuild+ | Re-run the compilation commands - this only makes 92 | +reconfigure+ | Re-run the configure commands, then rebuild - this only
|
| /OK3568_Linux_fs/u-boot/cmd/ |
| H A D | Kconfig | 4 bool "Support U-Boot commands" 8 to enter commands into U-Boot for a wide variety of purposes. It 9 also allows scripts (containing commands) to be executed. 10 Various commands and command categorys can be indivdually enabled. 11 Depending on the number of commands enabled, this can add 37 This function is used to support some special U-Boot commands with 132 menu "Info commands" 180 menu "Boot commands" 246 Android DTB/DTBO image manipulation commands. Read dtb/dtbo files from 258 bool "Flattened Device Tree utility commands" [all …]
|
| /OK3568_Linux_fs/kernel/tools/power/cpupower/utils/ |
| H A D | cpupower.c | 50 static struct cmd_struct commands[] = { variable 72 for (i = 0; i < ARRAY_SIZE(commands); i++) in print_help() 73 printf("\t%s\n", commands[i].cmd); in print_help() 221 for (i = 0; i < ARRAY_SIZE(commands); i++) { in main() 222 struct cmd_struct *p = commands + i; in main()
|