| /OK3568_Linux_fs/external/xserver/hw/xquartz/ |
| H A D | X11Controller.h | 50 @property (nonatomic, readwrite, strong) IBOutlet NSPanel *prefs_panel; 52 @property (nonatomic, readwrite, strong) IBOutlet NSButton *fake_buttons; 53 @property (nonatomic, readwrite, strong) IBOutlet NSButton *enable_fullscreen; 54 @property (nonatomic, readwrite, strong) IBOutlet NSButton *enable_fullscreen_menu; 55 @property (nonatomic, readwrite, strong) IBOutlet NSTextField *enable_fullscreen_menu_text; 56 @property (nonatomic, readwrite, strong) IBOutlet NSButton *enable_keyequivs; 57 @property (nonatomic, readwrite, strong) IBOutlet NSButton *sync_keymap; 58 @property (nonatomic, readwrite, strong) IBOutlet NSButton *option_sends_alt; 59 @property (nonatomic, readwrite, strong) IBOutlet NSButton *scroll_in_device_direction; 60 @property (nonatomic, readwrite, strong) IBOutlet NSButton *click_through; [all …]
|
| /OK3568_Linux_fs/external/rknpu2/examples/3rdparty/opencv/opencv-linux-aarch64/include/opencv2/videoio/ |
| H A D | cap_ios.h | 49 @property (nonatomic, strong) AVCaptureSession* captureSession; 50 @property (nonatomic, strong) AVCaptureConnection* videoCaptureConnection; 60 @property (nonatomic, strong) NSString *const defaultAVCaptureSessionPreset; 65 @property (nonatomic, strong) UIView* parentView; 115 @property (nonatomic, strong) AVAssetWriterInput* recordAssetWriterInput; 116 @property (nonatomic, strong) AVAssetWriterInputPixelBufferAdaptor* recordPixelBufferAdaptor; 117 @property (nonatomic, strong) AVAssetWriter* recordAssetWriter;
|
| /OK3568_Linux_fs/kernel/drivers/hid/ |
| H A D | hid-pl.c | 43 s32 *strong; member 61 *plff->strong = left; in hid_plff_play() 80 s32 *strong; in plff_init() local 120 strong = &report->field[0]->value[2]; in plff_init() 133 strong = &report->field[2]->value[0]; in plff_init() 158 plff->strong = strong; in plff_init() 162 *strong = 0x00; in plff_init()
|
| H A D | hid-mf.c | 38 int strong, weak; in mf_play() local 40 strong = effect->u.rumble.strong_magnitude; in mf_play() 43 dbg_hid("Called with 0x%04x 0x%04x.\n", strong, weak); in mf_play() 45 strong = strong * 0xff / 0xffff; in mf_play() 48 dbg_hid("Running with 0x%02x 0x%02x.\n", strong, weak); in mf_play() 51 mf->report->field[0]->value[1] = strong; in mf_play()
|
| H A D | hid-emsff.c | 27 int weak, strong; in emsff_play() local 30 strong = effect->u.rumble.strong_magnitude; in emsff_play() 32 dbg_hid("called with 0x%04x 0x%04x\n", strong, weak); in emsff_play() 35 strong = strong * 0xff / 0xffff; in emsff_play() 38 emsff->report->field[0]->value[2] = strong; in emsff_play() 40 dbg_hid("running with 0x%02x 0x%02x\n", strong, weak); in emsff_play()
|
| H A D | hid-lg2ff.c | 27 int weak, strong; in play_effect() local 29 strong = effect->u.rumble.strong_magnitude; in play_effect() 32 if (weak || strong) { in play_effect() 34 strong = strong * 0xff / 0xffff; in play_effect() 38 lg2ff->report->field[0]->value[4] = strong; in play_effect()
|
| H A D | hid-dr.c | 36 int strong, weak; in drff_play() local 38 strong = effect->u.rumble.strong_magnitude; in drff_play() 41 dbg_hid("called with 0x%04x 0x%04x", strong, weak); in drff_play() 43 if (strong || weak) { in drff_play() 44 strong = strong * 0xff / 0xffff; in drff_play() 56 drff->report->field[0]->value[4] = strong; in drff_play() 68 dbg_hid("running with 0x%02x 0x%02x", strong, weak); in drff_play()
|
| /OK3568_Linux_fs/kernel/arch/xtensa/boot/lib/ |
| H A D | Makefile | 20 CFLAGS_REMOVE_inflate.o += -fstack-protector -fstack-protector-strong 21 CFLAGS_REMOVE_zmem.o += -fstack-protector -fstack-protector-strong 22 CFLAGS_REMOVE_inftrees.o += -fstack-protector -fstack-protector-strong 23 CFLAGS_REMOVE_inffast.o += -fstack-protector -fstack-protector-strong
|
| /OK3568_Linux_fs/kernel/tools/memory-model/ |
| H A D | linux-kernel.cat | 43 let strong-fence = mb | gp 45 let nonrw-fence = strong-fence | po-rel | acq-po 75 (* Propagation: Ordering from release operations and strong fences. *) 77 let cumul-fence = [Marked] ; (A-cumul(strong-fence | po-rel) | wmb | 93 (* Propagation: Each non-rf link needs a strong fence. *) 94 let pb = prop ; strong-fence ; hb* ; [Marked] 117 * The synchronize_rcu() strong fence is special in that it can order not 126 * inter-CPU strong fence. 143 let strong-fence = strong-fence | rcu-fence 171 ((strong-fence ; [Marked] ; xbstar) | (xbstar & int)) [all …]
|
| /OK3568_Linux_fs/buildroot/package/davfs2/ |
| H A D | 0001-src-Makefile.am-do-not-hardcode-fstack-protector-str.patch | 4 Subject: [PATCH] src/Makefile.am: do not hardcode -fstack-protector-strong 6 davfs2 does not truly require -fstack-protector-strong, so do not hardcode 24 - -fstack-protector-strong --param=ssp-buffer-size=4 38 - -fstack-protector-strong --param=ssp-buffer-size=4
|
| /OK3568_Linux_fs/kernel/drivers/media/dvb-frontends/ |
| H A D | au8522_dig.c | 696 u16 strong; in au8522_led_status() local 705 strong = led_config->qam256_strong; in au8522_led_status() 707 strong = led_config->qam64_strong; in au8522_led_status() 709 strong = led_config->vsb8_strong; in au8522_led_status() 711 if (*snr >= strong) in au8522_led_status() 717 (((strong < *snr) ? (*snr - strong) : (strong - *snr)) <= 10)) in au8522_led_status()
|
| /OK3568_Linux_fs/kernel/Documentation/w1/slaves/ |
| H A D | w1_therm.rst | 44 powered devices are detected on the bus (and strong pullup is enabled 56 A strong pullup will be applied during the conversion if required. 99 strong pullup, 1 to enable autodetection or 2 to force strong pullup. 102 If so, it will activate the master's strong pullup. 104 (seems to be the case with some DS18S20) the strong pullup can 107 If the strong pullup is enabled, the master's strong pullup will be 109 does support the strong pullup (or it falls back to a pullup 112 sufficient. The strong pullup is designed to provide the additional
|
| /OK3568_Linux_fs/buildroot/package/copas/ |
| H A D | 0001-Do-not-load-coxpcall-for-LuaJIT.patch | 26 + <dt><strong>Copas</strong> [unreleased]</dt> 31 <dt><strong>Copas 2.0.2</strong> [2017]</dt>
|
| /OK3568_Linux_fs/buildroot/package/sox/ |
| H A D | 0002-configure.ac-put-back-disable-stack-protector.patch | 33 -AX_APPEND_COMPILE_FLAGS([-fstack-protector-strong]) 35 + AS_HELP_STRING([--disable-stack-protector], [Disable -fstack-protector-strong]), 38 + [AX_APPEND_COMPILE_FLAGS([-fstack-protector-strong])])
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0133-kern-efi-Add-initial-stack-protector-implementation.patch | 49 +AC_MSG_CHECKING([whether `$CC' accepts `-fstack-protector-strong']) 56 +if eval "$ac_compile -S -fstack-protector-strong -o conftest.s" 2> /dev/null; then] 123 …echo "$as_me:${as_lineno-$LINENO}: checking whether \`$CC' accepts \`-fstack-protector-strong'" >&5 124 +$as_echo_n "checking whether \`$CC' accepts \`-fstack-protector-strong'... " >&6; } 138 +if eval "$ac_compile -S -fstack-protector-strong -o conftest.s" 2> /dev/null; then 198 …_fn_error $? "--enable-stack-protector=strong is not supported (compiler doesn't support -fstack-p… 200 + TARGET_CFLAGS="$TARGET_CFLAGS -fstack-protector-strong" 260 …AC_MSG_ERROR([--enable-stack-protector=strong is not supported (compiler doesn't support -fstack-p… 262 + TARGET_CFLAGS="$TARGET_CFLAGS -fstack-protector-strong"
|
| /OK3568_Linux_fs/external/camera_engine_rkaiq/rkaiq/cmake/ |
| H A D | CompileOptions.cmake | 47 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-protector-strong") 49 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-protector-strong") 64 set(CMAKE_CXX_FLAGS_RELEASE "${CMAKE_CXX_FLAGS_RELEASE} -fstack-protector-strong") 65 set(CMAKE_CXX_FLAGS_MINSIZEREL "${CMAKE_CXX_FLAGS_MINSIZEREL} -fstack-protector-strong")
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/gcc/gcc/ |
| H A D | 0020-Add-ssp_nonshared-to-link-commandline-for-musl-targe.patch | 36 + "|fstack-protector-strong|fstack-protector-explicit" \ 56 + "|fstack-protector-strong|fstack-protector-explicit" \ 77 + "|fstack-protector-strong|fstack-protector-explicit" \
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/ |
| H A D | entropy.h | 116 int strong; /**< Is the source strong? */ member 178 size_t threshold, int strong );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/ |
| H A D | entropy.h | 116 int strong; /**< Is the source strong? */ member 178 size_t threshold, int strong );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/ |
| H A D | entropy.h | 116 int strong; /**< Is the source strong? */ member 178 size_t threshold, int strong );
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/ |
| H A D | entropy.h | 116 int strong; /**< Is the source strong? */ member 178 size_t threshold, int strong );
|
| /OK3568_Linux_fs/kernel/drivers/android/ |
| H A D | binder.c | 923 static int binder_inc_node_nilocked(struct binder_node *node, int strong, in binder_inc_node_nilocked() argument 932 if (strong) { in binder_inc_node_nilocked() 972 static int binder_inc_node(struct binder_node *node, int strong, int internal, in binder_inc_node() argument 978 ret = binder_inc_node_nilocked(node, strong, internal, target_list); in binder_inc_node() 985 int strong, int internal) in binder_dec_node_nilocked() argument 992 if (strong) { in binder_dec_node_nilocked() 1044 static void binder_dec_node(struct binder_node *node, int strong, int internal) in binder_dec_node() argument 1049 free_node = binder_dec_node_nilocked(node, strong, internal); in binder_dec_node() 1144 } else if (need_strong_ref && !ref->data.strong) { in binder_get_ref_olocked() 1252 if (ref->data.strong) in binder_cleanup_ref_olocked() [all …]
|
| /OK3568_Linux_fs/buildroot/package/vte/ |
| H A D | 0002-build-Fix-check-for-fstack-protector-compiler-support.patch | 26 - '-fstack-protector-strong', 37 + ['-fstack-protector-strong', false],
|
| /OK3568_Linux_fs/kernel/Documentation/locking/ |
| H A D | lockdep-design.rst | 512 Dependency types and strong dependency paths: 571 "strong" path, which indicates the strong dependency throughout each dependency 573 -(xR)-> and -(Sx)->. In other words, a "strong" path is a path from a lock 579 We will see why the path is called "strong" in next section. 588 If there is a closed strong path (i.e. a strong circle), then there is a 589 combination of locking sequences that causes deadlock. I.e. a strong circle is 594 If there is no closed strong path (i.e. strong circle), then there is no 595 combination of locking sequences that could cause deadlock. I.e. strong 598 With these two Lemmas, we can easily say a closed strong path is both sufficient 599 and necessary for deadlocks, therefore a closed strong path is equivalent to [all …]
|
| /OK3568_Linux_fs/buildroot/package/sysvinit/ |
| H A D | 0001-Makefile-disable-stack-protector-strong.patch | 4 Subject: [PATCH] Makefile: disable stack-protector-strong 26 -override CFLAGS += -ansi -fomit-frame-pointer -fstack-protector-strong -W -Wall -Wunreachable-code…
|