/linux-6.8/drivers/hid/ |
D | hid-appleir.c | 1 // SPDX-License-Identifier: GPL-2.0-only 6 * Ported to recent 2.6 kernel versions by Greg Kroah-Hartman <gregkh@suse.de> 11 * Copyright (C) 2008 Greg Kroah-Hartman <greg@kroah.com> 21 #include "hid-ids.h" 34 * 25 87 ee 83 0c - 39 * 26 00 00 00 00 for key repeat 45 * 25 87 ee ca 0d - 50 * 26 00 00 00 00 for key repeat 53 * sent after a key is release, which I interpret 61 * 25 87 ee 47 0d - [all …]
|
D | hid-prodikeys.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 3 * HID driver for the Prodikeys PC-MIDI Keyboard 8 * Controls for Octave Shift Up/Down, Channel, and 25 #include "hid-ids.h" 29 pr_debug("hid-prodikeys: " format "\n" , ## arg) 31 pr_err("hid-prodikeys: " format "\n" , ## arg) 78 #define PCMIDI_OCTAVE_MIN (-2) 83 static const char shortname[] = "PC-MIDI"; 84 static const char longname[] = "Prodikeys PC-MIDI Keyboard"; 93 MODULE_PARM_DESC(index, "Index value for the PC-MIDI virtual audio driver"); [all …]
|
/linux-6.8/kernel/sched/ |
D | wait.c | 1 // SPDX-License-Identifier: GPL-2.0-only 8 …_init_waitqueue_head(struct wait_queue_head *wq_head, const char *name, struct lock_class_key *key) in __init_waitqueue_head() argument 10 spin_lock_init(&wq_head->lock); in __init_waitqueue_head() 11 lockdep_set_class_and_name(&wq_head->lock, key, name); in __init_waitqueue_head() 12 INIT_LIST_HEAD(&wq_head->head); in __init_waitqueue_head() 21 wq_entry->flags &= ~WQ_FLAG_EXCLUSIVE; in add_wait_queue() 22 spin_lock_irqsave(&wq_head->lock, flags); in add_wait_queue() 24 spin_unlock_irqrestore(&wq_head->lock, flags); in add_wait_queue() 32 wq_entry->flags |= WQ_FLAG_EXCLUSIVE; in add_wait_queue_exclusive() 33 spin_lock_irqsave(&wq_head->lock, flags); in add_wait_queue_exclusive() [all …]
|
/linux-6.8/Documentation/devicetree/bindings/input/ |
D | gpio-keys.yaml | 1 # SPDX-License-Identifier: GPL-2.0-only 3 --- 4 $id: http://devicetree.org/schemas/input/gpio-keys.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Rob Herring <robh@kernel.org> 15 - gpio-keys 16 - gpio-keys-polled 23 poll-interval: true 26 …"^(button|event|key|switch|(button|event|key|switch)-[a-z0-9-]+|[a-z0-9-]+-(button|event|key|switc… 35 - items: [all …]
|
D | qcom,pm8921-pwrkey.yaml | 1 # SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) 3 --- 4 $id: http://devicetree.org/schemas/input/qcom,pm8921-pwrkey.yaml# 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 7 title: Qualcomm PM8921 PMIC Power Key 10 - Bjorn Andersson <andersson@kernel.org> 13 - $ref: input.yaml# 18 - enum: 19 - qcom,pm8921-pwrkey 20 - qcom,pm8058-pwrkey [all …]
|
/linux-6.8/Documentation/networking/ |
D | dns_resolver.rst | 1 .. SPDX-License-Identifier: GPL-2.0 9 - Overview. 10 - Compilation. 11 - Setting up. 12 - Usage. 13 - Mechanism. 14 - Debugging. 21 by way of requesting a key of key type dns_resolver. These queries are 22 upcalled to userspace through /sbin/request-key. 25 request-key. It is under development and does not yet provide the full feature [all …]
|
D | openvswitch.rst | 1 .. SPDX-License-Identifier: GPL-2.0 8 flow-level packet processing on selected network devices. It can be 10 VLAN processing, network access control, flow-based network control, 22 extracting its flow key and looking it up in the flow table. If there 25 its processing, userspace will likely set up a flow to handle further 26 packets of the same type entirely in-kernel). 29 Flow key compatibility 30 ---------------------- 35 versions to parse additional protocols as part of the flow key. It 39 applications to work with any version of the flow key, past or future. [all …]
|
D | fib_trie.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 LC-trie implementation notes 8 ---------- 10 An end node with data. This has a copy of the relevant key, along 16 indexed through a subset of the key. See Level Compression. 19 ------------------------ 21 The number of bits in the key segment used for indexing into the 22 child array - the "child index". See Level Compression. 25 The position (in the key) of the key segment used for indexing into 30 a segment of the key specified by the parent's "pos" and "bits" [all …]
|
/linux-6.8/drivers/accessibility/speakup/ |
D | DefaultKeyAssignments | 3 anything you want but that will take some familiarity with key 6 We have remapped the insert or zero key on the keypad to act as a 7 shift key. Well, actually as an altgr key. So in the following list 8 InsKeyPad-period means hold down the insert key like a shift key and 11 KeyPad-8 Say current Line 12 InsKeyPad-8 say from top of screen to reading cursor. 13 KeyPad-7 Say Previous Line (UP one line) 14 KeyPad-9 Say Next Line (down one line) 15 KeyPad-5 Say Current Word 16 InsKeyPad-5 Spell Current Word [all …]
|
/linux-6.8/drivers/scsi/ |
D | scsi_devinfo.c | 1 // SPDX-License-Identifier: GPL-2.0 33 int key; /* unique numeric identifier */ member 43 * settings that differ from the default, includes black-listed (broken) 59 * others will lock up. 61 {"Aashima", "IMAGERY 2400SP", "1.03", BLIST_NOLUN}, /* locks up */ 62 {"CHINON", "CD-ROM CDS-431", "H42", BLIST_NOLUN}, /* locks up */ 63 {"CHINON", "CD-ROM CDS-535", "Q14", BLIST_NOLUN}, /* locks up */ 64 {"DENON", "DRD-25X", "V", BLIST_NOLUN}, /* locks up */ 67 {"IBM", "2104-DU3", NULL, BLIST_NOLUN}, /* locks up */ 68 {"IBM", "2104-TU3", NULL, BLIST_NOLUN}, /* locks up */ [all …]
|
/linux-6.8/fs/crypto/ |
D | hooks.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Encryption hooks for higher-level filesystem operations. 11 * fscrypt_file_open() - prepare to open a possibly-encrypted regular file 13 * @filp: the struct file being set up 15 * Currently, an encrypted regular file can only be opened if its encryption key 17 * Therefore, we first set up the inode's encryption key (if not already done) 28 * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code 44 d_inode(dir)->i_ino); in fscrypt_file_open() 45 err = -EPERM; in fscrypt_file_open() 56 return -ENOKEY; in __fscrypt_prepare_link() [all …]
|
D | keysetup.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * Key setup facility for FS encryption support. 18 .friendly_name = "AES-256-XTS", 26 .friendly_name = "AES-256-CTS-CBC", 33 .friendly_name = "AES-128-CBC-ESSIV", 41 .friendly_name = "AES-128-CTS-CBC", 48 .friendly_name = "SM4-XTS", 56 .friendly_name = "SM4-CTS-CBC", 71 .friendly_name = "AES-256-HCTR2", 87 if (S_ISREG(inode->i_mode)) in select_encryption_mode() [all …]
|
/linux-6.8/tools/testing/selftests/drivers/net/ocelot/ |
D | tc_flower_chains.sh | 2 # SPDX-License-Identifier: GPL-2.0 52 # +----------------------------------------------+ +-----------------------------------------+ 55 # | +----------+ +----------+ +----------+ | | +----------+ +----------+ | 56 # | | Lookup 0 | | Lookup 1 | | Lookup 2 | | --+------> PAG 0: | Lookup 0 | -> | Lookup 1 | | 57 # | +----------+ -> +----------+ -> +----------+ | | | +----------+ +----------+ | 58 # | |key&action| |key&action| |key&action| | | | |key&action| |key&action| | 59 # | |key&action| |key&action| |key&action| | | | | .. | | .. | | 60 # | | .. | | .. | | .. | | | | +----------+ +----------+ | 61 # | +----------+ +----------+ +----------+ | | | | 62 # | selects PAG | | | +----------+ +----------+ | [all …]
|
/linux-6.8/tools/testing/selftests/wireguard/ |
D | netns.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. 24 set -e 25 shopt -s extglob 30 NPROC=( /sys/devices/system/cpu/cpu+([0-9]) ); NPROC=${#NPROC[@]} 31 netns0="wg-test-$$-0" 32 netns1="wg-test-$$-1" 33 netns2="wg-test-$$-2" 34 pretty() { echo -e "\x1b[32m\x1b[1m[+] ${1:+NS$1: }${2}\x1b[0m" >&3; } 36 maybe_exec() { if [[ $BASHPID -eq $$ ]]; then "$@"; else exec "$@"; fi; } [all …]
|
/linux-6.8/Documentation/crypto/ |
D | asymmetric-keys.rst | 1 .. SPDX-License-Identifier: GPL-2.0 4 Asymmetric / Public-key Cryptography Key Type 9 - Overview. 10 - Key identification. 11 - Accessing asymmetric keys. 12 - Signature verification. 13 - Asymmetric key subtypes. 14 - Instantiation data parsers. 15 - Keyring link restrictions. 21 The "asymmetric" key type is designed to be a container for the keys used in [all …]
|
/linux-6.8/include/linux/ |
D | btree.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 11 * A B+Tree is a data structure for looking up arbitrary (currently allowing 13 * is described at https://en.wikipedia.org/wiki/B-tree, we currently do not 14 * use binary search to find the key on lookups. 18 * and pointers to sub-nodes, or, for leaf nodes, the keys and values for the 24 * Each key here is an array of unsigned longs, geo->no_longs in total. The 25 * number of keys and values (N) is geo->no_pairs. 29 * struct btree_head - btree head 45 * btree_alloc - allocate function for the mempool 52 * btree_free - free function for the mempool [all …]
|
D | fscrypt.h | 1 /* SPDX-License-Identifier: GPL-2.0 */ 3 * fscrypt.h: declarations for per-file encryption 5 * Filesystems that implement per-file encryption must include this header 24 * some of the supported modes don't support arbitrarily byte-aligned messages. 28 * filesystem can generate arbitrarily byte-aligned block lengths (e.g., via 53 #define FSTR_TO_QSTR(f) QSTR_INIT((f)->name, (f)->len) 54 #define fname_name(p) ((p)->disk_name.name) 55 #define fname_len(p) ((p)->disk_name.len) 67 * first time an encryption key is set up for a file. The bounce page 70 * - fscrypt_encrypt_pagecache_blocks() [all …]
|
/linux-6.8/Documentation/userspace-api/media/rc/ |
D | rc-tables.rst | 1 .. SPDX-License-Identifier: GPL-2.0 OR GFDL-1.1-no-invariants-or-later 20 layer. This means that the IR key strokes will look like normal keyboard 21 key strokes (if CONFIG_INPUT_KEYBOARD is enabled). Using the event 30 .. flat-table:: IR default keymapping 31 :header-rows: 0 32 :stub-columns: 0 36 - .. row 1 38 - Key code 40 - Meaning 42 - Key examples on IR [all …]
|
/linux-6.8/Documentation/core-api/ |
D | assoc_array.rst | 20 Rather, the array is made up of metadata blocks that point to objects. 24 4. Index keys must be unique. Inserting an object with the same key as one 35 key order. 43 10. Objects in the array can be looked up by means of their index key. 45 11. Objects can be looked up while the array is being modified, provided the 46 RCU readlock is being held by the thread doing the look up. 48 The implementation uses a tree of 16-pointer nodes internally that are indexed 49 on each level by nibbles from the index key in the same manner as in a radix 51 what would otherwise be a series of single-occupancy nodes. Further, nodes 68 ./script/config -e ASSOCIATIVE_ARRAY [all …]
|
/linux-6.8/Documentation/admin-guide/laptops/ |
D | thinkpad-acpi.rst | 9 - Borislav Deianov <borislav@users.sf.net> 10 - Henrique de Moraes Holschuh <hmh@hmh.eng.br> 12 http://ibm-acpi.sf.net/ 19 This driver used to be named ibm-acpi until kernel 2.6.21 and release 20 0.13-20070314. It used to be in the drivers/acpi tree, but it was 21 moved to the drivers/misc tree and renamed to thinkpad-acpi for kernel 25 The driver is named "thinkpad-acpi". In some places, like module 29 "tpacpi" is used as a shorthand where "thinkpad-acpi" would be too 33 ------ 38 - Fn key combinations [all …]
|
/linux-6.8/security/keys/ |
D | key.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* Basic authentication token and access key management 4 * Copyright (C) 2004-2008 Red Hat, Inc. All Rights Reserved. 27 unsigned int key_quota_root_maxkeys = 1000000; /* root's key count quota */ 28 unsigned int key_quota_root_maxbytes = 25000000; /* root's key space quota */ 29 unsigned int key_quota_maxkeys = 200; /* general key count quota */ 30 unsigned int key_quota_maxbytes = 20000; /* general key space quota */ 35 /* We serialise key instantiation and link */ 39 void __key_check(const struct key *key) in __key_check() argument 41 printk("__key_check: key %p {%08x} should be {%08x}\n", in __key_check() [all …]
|
D | keyring.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (C) 2004-2005, 2008, 2013 Red Hat, Inc. All Rights Reserved. 17 #include <keys/keyring-type.h> 18 #include <keys/user-type.h> 25 * When plumbing the depths of the key tree, this sets a hard limit 40 static inline struct key *keyring_ptr_to_key(const struct assoc_array_ptr *x) in keyring_ptr_to_key() 43 return (struct key *)((unsigned long)object & ~KEYRING_PTR_SUBTYPE); in keyring_ptr_to_key() 45 static inline void *keyring_key_to_ptr(struct key *key) in keyring_key_to_ptr() argument 47 if (key->type == &key_type_keyring) in keyring_key_to_ptr() 48 return (void *)((unsigned long)key | KEYRING_PTR_SUBTYPE); in keyring_key_to_ptr() [all …]
|
/linux-6.8/kernel/trace/ |
D | tracing_map.c | 1 // SPDX-License-Identifier: GPL-2.0 3 * tracing_map - lock-free map for tracing 7 * tracing_map implementation inspired by lock-free map algorithms 10 * http://www.azulsystems.com/blog/cliff/2007-03-26-non-blocking-hashtable 30 * tracing_map_update_sum - Add a value to a tracing_map_elt's sum field 37 * tracing_map_add_sum_field() when the tracing map was set up. 41 atomic64_add(n, &elt->fields[i].sum); in tracing_map_update_sum() 45 * tracing_map_read_sum - Return the value of a tracing_map_elt's sum field 52 * up. 58 return (u64)atomic64_read(&elt->fields[i].sum); in tracing_map_read_sum() [all …]
|
/linux-6.8/Documentation/input/devices/ |
D | atarikbd.rst | 12 provides a convenient connection point for a mouse and switch-type joysticks. 13 The ikbd processor also maintains a time-of-day clock with one second 18 The ikbd communicates with the main processor over a high speed bi-directional 27 The keyboard always returns key make/break scan codes. The ikbd generates 28 keyboard scan codes for each key press and release. The key scan make (key 30 ISO key position in the scan code table should exist even if no keyswitch 31 exists in that position on a particular keyboard. The break code for each key 41 0xF8-0xFB relative mouse position records (lsbs determined by 43 0xFC time-of-day 49 The two shift keys return different scan codes in this mode. The ENTER key [all …]
|
/linux-6.8/kernel/futex/ |
D | core.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 16 * PI-futex support started by Ingo Molnar and Thomas Gleixner 23 * Requeue-PI support by Darren Hart <dvhltc@us.ibm.com> 29 * Kirkwood for proof-of-concept implementation. 39 #include <linux/fault-inject.h> 98 debugfs_create_bool("ignore-private", mode, dir, in fail_futex_debugfs() 110 * futex_hash - Return the hash bucket in the global hash 111 * @key: Pointer to the futex key for which the hash is calculated 116 struct futex_hash_bucket *futex_hash(union futex_key *key) in futex_hash() argument 118 u32 hash = jhash2((u32 *)key, offsetof(typeof(*key), both.offset) / 4, in futex_hash() [all …]
|