| /linux/Documentation/wmi/devices/ |
| H A D | msi-wmi-platform.rst | 43 [WmiMethodId(1), Implemented, read, write, Description("Return the contents of a package")] 46 [WmiMethodId(2), Implemented, read, write, Description("Set the contents of a package")] 49 [WmiMethodId(3), Implemented, read, write, Description("Return the contents of a package")] 52 [WmiMethodId(4), Implemented, read, write, Description("Set the contents of a package")] 55 [WmiMethodId(5), Implemented, read, write, Description("Return the contents of a package")] 58 [WmiMethodId(6), Implemented, read, write, Description("Set the contents of a package")] 61 [WmiMethodId(7), Implemented, read, write, Description("Return the contents of a package")] 64 [WmiMethodId(8), Implemented, read, write, Description("Set the contents of a package")] 67 [WmiMethodId(9), Implemented, read, write, Description("Return the contents of a package")] 70 [WmiMethodId(10), Implemented, read, write, Description("Set the contents of a package")] [all …]
|
| /linux/fs/nls/ |
| H A D | Kconfig | 48 only, not to the file contents. You can include several codepages; 60 only, not to the file contents. You can include several codepages; 72 only, not to the file contents. You can include several codepages; 85 only, not to the file contents. You can include several codepages; 101 only, not to the file contents. You can include several codepages; 116 only, not to the file contents. You can include several codepages; 127 only, not to the file contents. You can include several codepages; 138 only, not to the file contents. You can include several codepages; 149 only, not to the file contents. You can include several codepages; 160 only, not to the file contents. You can include several codepages; [all …]
|
| /linux/include/linux/ |
| H A D | papr_scm.h | 6 /* SCM device is unable to persist memory contents */ 8 /* SCM device failed to persist memory contents */ 10 /* SCM device contents are persisted from previous IPL */ 12 /* SCM device contents are not persisted from previous IPL */ 18 /* SCM contents cannot persist due to current platform health status */ 20 /* SCM device is unable to persist memory contents in certain conditions */
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-bus-papr-pmem | 15 Indicates that NVDIMM contents will not 18 Indicates that NVDIMM contents 22 Indicates that NVDIMM contents 26 NVDIMM contents are encrypted. 30 Indicating that contents of the 33 Indicating that NVDIMM contents can't
|
| /linux/include/rdma/ |
| H A D | ibta_vol1_c12.h | 39 /* Table 106 REQ Message Contents */ 100 /* Table 107 MRA Message Contents */ 108 /* Table 108 REJ Message Contents */ 118 /* Table 110 REP Message Contents */ 140 /* Table 111 RTU Message Contents */ 146 /* Table 112 DREQ Message Contents */ 153 /* Table 113 DREP Message Contents */ 159 /* Table 115 LAP Message Contents */ 184 /* Table 116 APR Message Contents */ 195 /* Table 119 SIDR_REQ Message Contents */ [all …]
|
| /linux/arch/x86/kvm/vmx/ |
| H A D | sgx.c | 146 struct sgx_secs *contents = (struct sgx_secs *)pageinfo->contents; in __handle_encls_ecreate() local 160 miscselect = contents->miscselect; in __handle_encls_ecreate() 161 attributes = contents->attributes; in __handle_encls_ecreate() 162 xfrm = contents->xfrm; in __handle_encls_ecreate() 163 size = contents->size; in __handle_encls_ecreate() 224 struct sgx_secs *contents; in handle_encls_ecreate() local 248 sgx_get_encls_gva(vcpu, pageinfo.contents, 4096, 4096, in handle_encls_ecreate() 272 * Copy contents into kernel memory to prevent TOCTOU attack. E.g. the in handle_encls_ecreate() 277 contents = (struct sgx_secs *)__get_free_page(GFP_KERNEL); in handle_encls_ecreate() 278 if (!contents) in handle_encls_ecreate() [all …]
|
| /linux/Documentation/networking/devlink/ |
| H A D | ixgbe.rst | 67 - Version defining the format of the flash contents. 78 - The first 4 bytes of the hash of the netlist module contents. 100 in the flash with the contents from the provided image, without 136 - The contents of the entire flash chip, sometimes referred to as 139 - The contents of the Shadow RAM, which is loaded from the beginning 140 of the flash. Although the contents are primarily from the flash, 144 - The contents of the device firmware's capabilities buffer. Useful to 148 snapshot. The ``device-caps`` region requires a snapshot as the contents are
|
| /linux/include/uapi/linux/ |
| H A D | papr_pdsm.h | 56 * papr_scm and libndctl so that contents of payload can be interpreted. As such 88 * dimm_unarmed : Dimm not armed. So contents wont persist. 89 * dimm_bad_shutdown : Previous shutdown did not persist contents. 90 * dimm_bad_restore : Contents from previous shutdown werent restored. 91 * dimm_scrubbed : Contents of the dimm have been scrubbed. 92 * dimm_locked : Contents of the dimm cant be modified until CEC reboot 93 * dimm_encrypted : Contents of dimm are encrypted.
|
| /linux/Documentation/filesystems/ |
| H A D | ubifs-authentication.rst | 15 contents and file names. This prevents attacks where an attacker is able to 16 read contents of the filesystem on a single point in time. A classic example 21 the attacker is able to modify the filesystem contents and the user uses the 23 contents arbitrarily without the user noticing. One example is to modify a 26 fairly easy to swap files and replace their contents. 36 This document describes an approach to get file contents _and_ full metadata 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 100 contents or inode nodes (``struct ubifs_ino_node``) which represent VFS inodes. 210 the authenticity and integrity of metadata and file contents stored on flash. 218 authenticity of on-flash file contents and filesystem metadata. This covers [all …]
|
| H A D | fscrypt.rst | 57 protects the confidentiality of file contents and filenames in the 90 plaintext file contents or filenames from other users on the same 113 keys and file contents encryption keys (but not other types of fscrypt 144 - In general, decrypted contents and filenames in the kernel VFS 165 unable to exfiltrate the master keys or file contents keys in a form 206 greater of the security strength of the contents and filenames 290 suitable for both contents and filenames encryption, and it accepts 299 (contents or filenames) is encrypted, the file's 16-byte nonce is 316 protected by the same master key sharing a single contents encryption 359 fscrypt allows one encryption mode to be specified for file contents [all …]
|
| /linux/Documentation/networking/ |
| H A D | ethtool-netlink.rst | 97 attribute with contents of one of two forms: compact (two binary bitmaps 116 Compact form: nested (bitset) attribute contents: 141 Bit-by-bit form: nested (bitset) attribute contents: 251 ``ETHTOOL_MSG_STRSET_GET_REPLY`` string set contents 340 Requests contents of a string set as provided by ioctl commands 347 Request contents: 359 Kernel response contents: 403 Request contents: 409 Kernel response contents: 433 Request contents: [all …]
|
| /linux/drivers/scsi/mpt3sas/ |
| H A D | mpt3sas_config.c | 282 * @config_page: contents of the config page 511 * @config_page: contents of the config page 547 * @config_page: contents of the config page 583 * @config_page: contents of the config page 620 * @config_page: contents of the config page 657 * @config_page: contents of the config page 694 * @config_page: contents of the config page 730 * @config_page: contents of the config page 767 * @config_page: contents of the config page 808 * @config_page: contents of the config page [all …]
|
| /linux/arch/powerpc/lib/ |
| H A D | ldstfp.S | 19 /* Get the contents of frN into *p; N is in r3 and p is in r4. */ 43 /* Put the contents of *p into frN; N is in r3 and p is in r4. */ 68 /* Get the contents of vrN into *p; N is in r3 and p is in r4. */ 92 /* Put the contents of *p into vrN; N is in r3 and p is in r4. */ 118 /* Get the contents of vsN into vs0; N is in r3. */ 137 /* Put the contents of vs0 into vsN; N is in r3. */
|
| /linux/drivers/comedi/drivers/ni_routing/tools/ |
| H A D | convert_csv_to_c.py | 144 * The contents of this file are generated using the tools in 147 * Please use those tools to help maintain the contents of this file. 175 * The contents of this file are generated using the tools in 178 * Please use those tools to help maintain the contents of this file. 212 * The contents of this file are generated using the tools in 215 * Please use those tools to help maintain the contents of this file. 323 * The contents of this file are generated using the tools in 326 * Please use those tools to help maintain the contents of this file. 354 * The contents of this file are generated using the tools in 357 * Please use those tools to help maintain the contents of this file. [all …]
|
| /linux/rust/kernel/ |
| H A D | iov.rs | 288 /// Utility for implementing `read_iter` given the full contents of the file. 290 /// The full contents of the file being read from is represented by `contents`. This call will 291 /// write the appropriate sub-slice of `contents` and update the file position in `ppos` so 292 /// that the file will appear to contain `contents` even if takes multiple reads to read the 295 pub fn simple_read_from_buffer(&mut self, ppos: &mut i64, contents: &[u8]) -> Result<usize> { in simple_read_from_buffer() 302 if pos >= contents.len() { in simple_read_from_buffer() 306 // BOUNDS: We just checked that `pos < contents.len()` above. in simple_read_from_buffer() 307 let num_written = self.copy_to_iter(&contents[pos..]); in simple_read_from_buffer() 309 // OVERFLOW: `pos+num_written <= contents.len() <= isize::MAX <= i64::MAX`. in simple_read_from_buffer()
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm_event_log.rst | 24 to a challenger. However, PCR contents are difficult to interpret; 25 therefore, attestation is typically more useful when the PCR contents 28 contents. The PCR contents are used to provide the validation of the
|
| /linux/kernel/ |
| H A D | gen_kheaders.sh | 37 # Use a temporary file to store directory contents to prevent find/xargs from 39 find "${tmpdir}" -type f -print0 > "${tmpdir}.contents.txt" 42 < "${tmpdir}.contents.txt" 43 rm -f "${tmpdir}.contents.txt"
|
| /linux/Documentation/gpu/ |
| H A D | msm-crash-dump.rst | 12 and all the contents of a section will be indented two spaces from the header. 43 Section containing the contents of each ringbuffer. Each ringbuffer is 68 The contents of the ring encoded as ascii85. Only the used 82 The contents of the buffer object encoded with ascii85. Only
|
| /linux/Documentation/arch/x86/ |
| H A D | exception-tables.rst | 58 Since we jump to the contents of fixup, fixup obviously points 172 > CONTENTS, ALLOC, LOAD, READONLY, CODE 174 > CONTENTS, ALLOC, LOAD, READONLY, CODE 176 > CONTENTS, ALLOC, LOAD, READONLY, DATA 178 > CONTENTS, ALLOC, LOAD, READONLY, DATA 180 > CONTENTS, ALLOC, LOAD, DATA 184 > CONTENTS, READONLY 186 > CONTENTS, READONLY 218 > objdump --full-contents --section=__ex_table vmlinux 290 exception table (i.e. the contents of the ELF section __ex_table)
|
| /linux/tools/perf/util/ |
| H A D | pmu.h | 129 * @cpus: Empty or the contents of either of: 135 * @format: Holds the contents of files read from 136 * <sysfs>/bus/event_source/devices/<name>/format/. The contents specify 173 * @caps: Holds the contents of files read from 176 * The contents are pairs of the filename with the value of its 177 * contents, for example, max_precise (see above) may have a value of 3. 240 * For example, the contents of <sysfs>/devices/cpu/format/event may be 257 /** @loaded: Has the contents been loaded/parsed. */
|
| /linux/sound/core/ |
| H A D | pcm_iec958.c | 25 * Drivers may wish to tweak the contents of the buffer after creation. 128 * Drivers may wish to tweak the contents of the buffer after its been 151 * Drivers may wish to tweak the contents of the buffer after its been 172 * Drivers may wish to tweak the contents of the buffer after creation. 198 * Drivers may wish to tweak the contents of the buffer after creation.
|
| /linux/drivers/gpio/ |
| H A D | gpio-pch.c | 60 * @ien_reg: To store contents of IEN register. 61 * @imask_reg: To store contents of IMASK register. 62 * @po_reg: To store contents of PO register. 63 * @pm_reg: To store contents of PM register. 64 * @im0_reg: To store contents of IM0 register. 65 * @im1_reg: To store contents of IM1 register. 66 * @gpio_use_sel_reg : To store contents of GPIO_USE_SEL register. 194 /* to store contents of PO register */ in pch_gpio_restore_reg_conf() 196 /* to store contents of PM register */ in pch_gpio_restore_reg_conf()
|
| /linux/arch/s390/include/asm/ |
| H A D | user.h | 16 obstacles to being able to view the contents of the floating point 18 contents of them. Actually, you can read in the core file and look at 19 the contents of the user struct to find out what the floating point 21 The actual file contents are as follows:
|
| /linux/include/media/ |
| H A D | tveeprom.h | 94 * tveeprom_hauppauge_analog - Fill struct tveeprom using the contents 99 * @eeprom_data: Array with the contents of the eeprom_data. It should 100 * contain 256 bytes filled with the contents of the 107 * tveeprom_read - Reads the contents of the eeprom found at the Hauppauge
|
| /linux/drivers/gpu/nova-core/gsp/ |
| H A D | cmdq.rs | 310 // Create the contents area. in allocate_command() 312 // Contents fits entirely in `slice_1`. in allocate_command() 322 contents: (slice_1, slice_2), in allocate_command() 379 // Writable slices to the contents of the command. The second slice is zero unless the command 381 contents: (&'a mut [u8], &'a mut [u8]), field 390 // Slices to the contents of the message. The second slice is zero unless the message loops 392 contents: (&'a [u8], &'a [u8]), field 475 let (cmd, payload_1) = M::Command::from_bytes_mut_prefix(dst.contents.0).ok_or(EIO)?; in send_command() 489 SBufferIter::new_writer([&mut payload_1[..], &mut dst.contents.1[..]]); in send_command() 501 dst.contents.0, in send_command() [all …]
|