Loading Documentation/ABI/testing/sysfs-bus-iio +2 −1 Original line number Diff line number Diff line Loading @@ -1559,7 +1559,8 @@ What: /sys/bus/iio/devices/iio:deviceX/in_concentrationX_voc_raw KernelVersion: 4.3 Contact: linux-iio@vger.kernel.org Description: Raw (unscaled no offset etc.) percentage reading of a substance. Raw (unscaled no offset etc.) reading of a substance. Units after application of scale and offset are percents. What: /sys/bus/iio/devices/iio:deviceX/in_resistance_raw What: /sys/bus/iio/devices/iio:deviceX/in_resistanceX_raw Loading Documentation/admin-guide/kernel-parameters.txt +6 −2 Original line number Diff line number Diff line Loading @@ -494,10 +494,14 @@ cut the overhead, others just disable the usage. So only cgroup_disable=memory is actually worthy} cgroup_no_v1= [KNL] Disable one, multiple, all cgroup controllers in v1 Format: { controller[,controller...] | "all" } cgroup_no_v1= [KNL] Disable cgroup controllers and named hierarchies in v1 Format: { { controller | "all" | "named" } [,{ controller | "all" | "named" }...] } Like cgroup_disable, but only applies to cgroup v1; the blacklisted controllers remain available in cgroup2. "all" blacklists all controllers and "named" disables named mounts. Specifying both "all" and "named" disables all v1 hierarchies. cgroup.memory= [KNL] Pass options to the cgroup memory controller. Format: <string> Loading Documentation/filesystems/affs.txt +10 −6 Original line number Diff line number Diff line Loading @@ -93,13 +93,15 @@ The Amiga protection flags RWEDRWEDHSPARWED are handled as follows: - R maps to r for user, group and others. On directories, R implies x. - If both W and D are allowed, w will be set. - W maps to w. - E maps to x. - H and P are always retained and ignored under Linux. - D is ignored. - A is always reset when a file is written to. - H, S and P are always retained and ignored under Linux. - A is cleared when a file is written to. User id and group id will be used unless set[gu]id are given as mount options. Since most of the Amiga file systems are single user systems Loading @@ -111,11 +113,13 @@ Linux -> Amiga: The Linux rwxrwxrwx file mode is handled as follows: - r permission will set R for user, group and others. - r permission will allow R for user, group and others. - w permission will allow W for user, group and others. - w permission will set W and D for user, group and others. - x permission of the user will allow E for plain files. - x permission of the user will set E for plain files. - D will be allowed for user, group and others. - All other flags (suid, sgid, ...) are ignored and will not be retained. Loading Makefile +13 −4 Original line number Diff line number Diff line # SPDX-License-Identifier: GPL-2.0 VERSION = 4 PATCHLEVEL = 19 SUBLEVEL = 136 SUBLEVEL = 146 EXTRAVERSION = NAME = "People's Front" Loading Loading @@ -761,11 +761,20 @@ KBUILD_CFLAGS += -fomit-frame-pointer endif endif # Initialize all stack variables with a pattern, if desired. ifdef CONFIG_INIT_STACK_ALL # Initialize all stack variables with a 0xAA pattern. ifdef CONFIG_INIT_STACK_ALL_PATTERN KBUILD_CFLAGS += -ftrivial-auto-var-init=pattern endif # Initialize all stack variables with a zero value. ifdef CONFIG_INIT_STACK_ALL_ZERO # Future support for zero initialization is still being debated, see # https://bugs.llvm.org/show_bug.cgi?id=45497. These flags are subject to being # renamed or dropped. KBUILD_CFLAGS += -ftrivial-auto-var-init=zero KBUILD_CFLAGS += -enable-trivial-auto-var-init-zero-knowing-it-will-be-removed-from-clang endif KBUILD_CFLAGS += $(call cc-option, -fno-var-tracking-assignments) KBUILD_CFLAGS += $(call cc-option, -Wvla) Loading android/abi_gki_aarch64.xml +4657 −6659 File changed.File size exceeds preview limit. View original file View changed file Loading
Documentation/ABI/testing/sysfs-bus-iio +2 −1 Original line number Diff line number Diff line Loading @@ -1559,7 +1559,8 @@ What: /sys/bus/iio/devices/iio:deviceX/in_concentrationX_voc_raw KernelVersion: 4.3 Contact: linux-iio@vger.kernel.org Description: Raw (unscaled no offset etc.) percentage reading of a substance. Raw (unscaled no offset etc.) reading of a substance. Units after application of scale and offset are percents. What: /sys/bus/iio/devices/iio:deviceX/in_resistance_raw What: /sys/bus/iio/devices/iio:deviceX/in_resistanceX_raw Loading
Documentation/admin-guide/kernel-parameters.txt +6 −2 Original line number Diff line number Diff line Loading @@ -494,10 +494,14 @@ cut the overhead, others just disable the usage. So only cgroup_disable=memory is actually worthy} cgroup_no_v1= [KNL] Disable one, multiple, all cgroup controllers in v1 Format: { controller[,controller...] | "all" } cgroup_no_v1= [KNL] Disable cgroup controllers and named hierarchies in v1 Format: { { controller | "all" | "named" } [,{ controller | "all" | "named" }...] } Like cgroup_disable, but only applies to cgroup v1; the blacklisted controllers remain available in cgroup2. "all" blacklists all controllers and "named" disables named mounts. Specifying both "all" and "named" disables all v1 hierarchies. cgroup.memory= [KNL] Pass options to the cgroup memory controller. Format: <string> Loading
Documentation/filesystems/affs.txt +10 −6 Original line number Diff line number Diff line Loading @@ -93,13 +93,15 @@ The Amiga protection flags RWEDRWEDHSPARWED are handled as follows: - R maps to r for user, group and others. On directories, R implies x. - If both W and D are allowed, w will be set. - W maps to w. - E maps to x. - H and P are always retained and ignored under Linux. - D is ignored. - A is always reset when a file is written to. - H, S and P are always retained and ignored under Linux. - A is cleared when a file is written to. User id and group id will be used unless set[gu]id are given as mount options. Since most of the Amiga file systems are single user systems Loading @@ -111,11 +113,13 @@ Linux -> Amiga: The Linux rwxrwxrwx file mode is handled as follows: - r permission will set R for user, group and others. - r permission will allow R for user, group and others. - w permission will allow W for user, group and others. - w permission will set W and D for user, group and others. - x permission of the user will allow E for plain files. - x permission of the user will set E for plain files. - D will be allowed for user, group and others. - All other flags (suid, sgid, ...) are ignored and will not be retained. Loading
Makefile +13 −4 Original line number Diff line number Diff line # SPDX-License-Identifier: GPL-2.0 VERSION = 4 PATCHLEVEL = 19 SUBLEVEL = 136 SUBLEVEL = 146 EXTRAVERSION = NAME = "People's Front" Loading Loading @@ -761,11 +761,20 @@ KBUILD_CFLAGS += -fomit-frame-pointer endif endif # Initialize all stack variables with a pattern, if desired. ifdef CONFIG_INIT_STACK_ALL # Initialize all stack variables with a 0xAA pattern. ifdef CONFIG_INIT_STACK_ALL_PATTERN KBUILD_CFLAGS += -ftrivial-auto-var-init=pattern endif # Initialize all stack variables with a zero value. ifdef CONFIG_INIT_STACK_ALL_ZERO # Future support for zero initialization is still being debated, see # https://bugs.llvm.org/show_bug.cgi?id=45497. These flags are subject to being # renamed or dropped. KBUILD_CFLAGS += -ftrivial-auto-var-init=zero KBUILD_CFLAGS += -enable-trivial-auto-var-init-zero-knowing-it-will-be-removed-from-clang endif KBUILD_CFLAGS += $(call cc-option, -fno-var-tracking-assignments) KBUILD_CFLAGS += $(call cc-option, -Wvla) Loading
android/abi_gki_aarch64.xml +4657 −6659 File changed.File size exceeds preview limit. View original file View changed file