/linux-6.12.1/drivers/gpu/drm/xe/ |
D | xe_gt_sriov_pf_policy.c | 1 // SPDX-License-Identifier: MIT 3 * Copyright © 2023-2024 Intel Corporation 30 return xe_guc_ct_send_block(&guc->ct, request, ARRAY_SIZE(request)); in guc_action_update_vgt_policy() 42 struct xe_guc *guc = >->uc.guc; in pf_send_policy_klvs() 54 xe_map_memcpy_to(xe, &bo->vmap, 0, klvs, bytes); in pf_send_policy_klvs() 64 * Return: 0 on success, -ENOKEY if some KLVs were not updated, -EPROTO if reply was malformed, 77 int err = ret < 0 ? ret : ret < num_klvs ? -ENOKEY : -EPROTO; in pf_push_policy_klvs() 89 static int pf_push_policy_u32(struct xe_gt *gt, u16 key, u32 value) in pf_push_policy_u32() argument 92 PREP_GUC_KLV(key, 1), in pf_push_policy_u32() 99 static int pf_update_policy_bool(struct xe_gt *gt, u16 key, bool *policy, bool value) in pf_update_policy_bool() argument [all …]
|
/linux-6.12.1/Documentation/admin-guide/ |
D | sysrq.rst | 1 Linux Magic System Request Key Hacks 6 What is the magic SysRq key? 9 It is a 'magical' key combo you can hit which the kernel will respond to 12 How do I enable the magic SysRq key? 15 You need to say "yes" to 'Magic SysRq key (CONFIG_MAGIC_SYSRQ)' when 18 the SysRq key. The default value in this file is set by the 22 - 0 - disable sysrq completely 23 - 1 - enable all functions of sysrq 24 - >1 - bitmask of allowed sysrq functions (see below for detailed function 27 2 = 0x2 - enable control of console logging level [all …]
|
/linux-6.12.1/security/keys/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 3 # Key management configuration 7 bool "Enable access key retention support" 17 Furthermore, a special type of key is available that acts as keyring: 19 to five standard keyrings: UID-specific, GID-specific, session, 25 bool "Enable temporary caching of the last request_key() result" 33 This allows the key used for multiple step processes where each step 34 wants to request a key that is likely the same as the one requested 39 key. Pathwalk will call multiple methods for each dentry traversed 43 bool "Enable register of persistent per-UID keyrings" [all …]
|
/linux-6.12.1/drivers/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 39 called padlock-aes. 53 called padlock-sha. 61 Say 'Y' here to use the AMD Geode LX processor on-board AES 65 will be called geode-aes. 73 Select this option if you want to enable support for 79 tristate "Kernel API for protected key handling" 86 The protected key support is distributed into: 87 - A pkey base and API kernel module (pkey.ko) which offers the 89 and the sysfs API and the in-kernel API to the crypto cipher [all …]
|
/linux-6.12.1/include/linux/input/ |
D | adp5589.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright 2010-2011 Analog Devices Inc. 47 #define ADP5589_GPIMAPSIZE_MAX (ADP5589_GPI_PIN_END - ADP5589_GPI_PIN_BASE + 1) 76 #define ADP5585_GPIMAPSIZE_MAX (ADP5585_GPI_PIN_END - ADP5585_GPI_PIN_BASE + 1) 114 * ---------------- BIT ------------------ 131 * ---- BIT -- ----------- 149 unsigned keypad_en_mask; /* Keypad (Rows/Columns) enable mask */ 152 bool repeat; /* Enable key repeat */ 153 bool en_keylock; /* Enable key lock feature (ADP5589 only)*/ 154 unsigned char unlock_key1; /* Unlock Key 1 (ADP5589 only) */ [all …]
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | evm | 8 HMAC-sha1 value across the extended attributes, storing the 12 an HMAC-sha1 generated locally with a 13 trusted/encrypted key stored in the Kernel Key 16 asymmetric key. These keys are loaded onto root's 24 0 Enable HMAC validation and creation 25 1 Enable digital signature validation 26 2 Permit modification of EVM-protected metadata at 36 will enable HMAC validation and creation 42 will enable HMAC and digital signature validation and 49 will enable digital signature validation, permit [all …]
|
/linux-6.12.1/drivers/input/misc/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 44 tristate "AB8500 Pon (PowerOn) Key" 47 Say Y here to use the PowerOn Key for ST-Ericsson's AB8500 48 Mix-Sig PMIC. 51 will be called ab8500-ponkey. 71 module will be called ad714x-i2c. 81 module will be called ad714x-spi. 88 Say Y to enable support for reporting power button status on 92 will be called ariel-pwrbutton. 99 Say Y to enable support for the haptics module in Arizona CODECs. [all …]
|
/linux-6.12.1/drivers/input/keyboard/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 24 board-specific setup logic must also provide a configuration data 38 be called adp5520-keys. 51 module will be called adp5588-keys. 61 module will be called adp5589-keys. 84 You will also need to enable appropriate SPI master controllers: 126 Say Y here if you have a PA-RISC machine and want to use an AT or 128 PA-RISC keyboards. 138 built-in keyboard (as opposed to an external keyboard). 149 Left 102nd key (the key to the right of Left Shift) [all …]
|
D | pxa27x_keypad.c | 1 // SPDX-License-Identifier: GPL-2.0-only 29 #include <linux/platform_data/keypad-pxa27x.h> 34 #define KPDK 0x0008 /* Keypad Direct Key register */ 36 #define KPMK 0x0018 /* Keypad Matrix Key register */ 39 /* Keypad Automatic Scan Multiple Key Presser register 0-3 */ 47 #define KPC_MKRN(n) ((((n) - 1) & 0x7) << 26) /* matrix key row number */ 48 #define KPC_MKCN(n) ((((n) - 1) & 0x7) << 23) /* matrix key column number */ 49 #define KPC_DKN(n) ((((n) - 1) & 0x7) << 6) /* direct key number */ 54 #define KPC_IMKP (0x1 << 21) /* Ignore Multiple Key Press */ 59 #define KPC_ME (0x1 << 12) /* Matrix Keypad Enable */ [all …]
|
/linux-6.12.1/security/keys/trusted-keys/ |
D | Kconfig | 5 bool "TPM-based trusted keys" 17 Enable use of the Trusted Platform Module (TPM) as trusted key 19 which will be generated and RSA-sealed by the TPM. 24 bool "TEE-based trusted keys" 29 Enable use of the Trusted Execution Environment (TEE) as trusted 30 key backend. 33 bool "CAAM-based trusted keys" 39 Enable use of NXP's Cryptographic Accelerator and Assurance Module 40 (CAAM) as trusted key backend. 43 bool "DCP-based trusted keys" [all …]
|
/linux-6.12.1/tools/testing/selftests/kvm/s390x/ |
D | tprot.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 14 #define CR0_FETCH_PROTECTION_OVERRIDE (1UL << (63 - 38)) 15 #define CR0_STORAGE_PROTECTION_OVERRIDE (1UL << (63 - 39)) 22 static int set_storage_key(void *addr, uint8_t key) in set_storage_key() argument 31 "0: sske %[key], %[addr]\n" in set_storage_key() 34 : [key] "r" (key) in set_storage_key() 37 return -not_mapped; in set_storage_key() 47 static enum permission test_protection(void *addr, uint8_t key) in test_protection() argument 52 "tprot %[addr], 0(%[key])\n" in test_protection() 56 [key] "a" (key) in test_protection() [all …]
|
/linux-6.12.1/drivers/net/wireless/realtek/rtw89/ |
D | wow.c | 1 // SPDX-License-Identifier: GPL-2.0 OR BSD-3-Clause 2 /* Copyright(c) 2019-2022 Realtek Corporation 17 struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *)skb->data; in rtw89_wow_parse_akm() 18 struct rtw89_wow_param *rtw_wow = &rtwdev->wow; in rtw89_wow_parse_akm() 19 const u8 *rsn, *ies = mgmt->u.assoc_req.variable; in rtw89_wow_parse_akm() 22 rsn = cfg80211_find_ie(WLAN_EID_RSN, ies, skb->len); in rtw89_wow_parse_akm() 27 rtw_wow->akm = rsn_ie->akm_cipher_suite.type; in rtw89_wow_parse_akm() 55 if (cipher_info_defs->cipher == cipher) in rtw89_cipher_alg_recognize() 62 static int _pn_to_iv(struct rtw89_dev *rtwdev, struct ieee80211_key_conf *key, in _pn_to_iv() argument 65 switch (key->cipher) { in _pn_to_iv() [all …]
|
/linux-6.12.1/Documentation/admin-guide/laptops/ |
D | thinkpad-acpi.rst | 9 - Borislav Deianov <borislav@users.sf.net> 10 - Henrique de Moraes Holschuh <hmh@hmh.eng.br> 12 http://ibm-acpi.sf.net/ 19 This driver used to be named ibm-acpi until kernel 2.6.21 and release 20 0.13-20070314. It used to be in the drivers/acpi tree, but it was 21 moved to the drivers/misc tree and renamed to thinkpad-acpi for kernel 25 The driver is named "thinkpad-acpi". In some places, like module 29 "tpacpi" is used as a shorthand where "thinkpad-acpi" would be too 33 ------ 38 - Fn key combinations [all …]
|
/linux-6.12.1/security/integrity/ima/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0-only 36 bool "Enable carrying the IMA measurement list across a soft boot" 71 limited to 255 characters. The 'ima-ng' measurement list 77 bool "ima-ng (default)" 79 bool "ima-sig" 84 default "ima-ng" if IMA_NG_TEMPLATE 85 default "ima-sig" if IMA_SIG_TEMPLATE 126 bool "Enable multiple writes to the IMA policy" 136 bool "Enable reading back the current IMA policy" 151 the security extended attributes from offline attack, enable [all …]
|
/linux-6.12.1/Documentation/driver-api/nvdimm/ |
D | security.rst | 6 --------------- 16 ------------------ 28 update <old_keyid> <new_keyid> - enable or update passphrase. 29 disable <keyid> - disable enabled security and remove key. 30 freeze - freeze changing of security states. 31 erase <keyid> - delete existing user encryption key. 32 overwrite <keyid> - wipe the entire nvdimm. 33 master_update <keyid> <new_keyid> - enable or update master passphrase. 34 master_erase <keyid> - delete existing user encryption key. 36 3. Key Management [all …]
|
/linux-6.12.1/drivers/net/wireless/ralink/rt2x00/ |
D | rt2500usb.h | 1 /* SPDX-License-Identifier: GPL-2.0-or-later */ 3 Copyright (C) 2004 - 2009 Ivo van Doorn <IvDoorn@gmail.com> 36 * Default offset is required for RSSI <-> dBm conversion. 168 * AUTO_WAKE: Enable auto wakeup / sleep mechanism. 238 * ACK_TIMEOUT: ACK Timeout in unit of 1-us. 315 * TXRX_CSR9: TX ACK time-out. 349 * TSF_COUNT: Enable TSF auto counting. 350 * TSF_SYNC: Tsf sync, 0: disable, 1: infra, 2: ad-hoc/master mode. 351 * TBCN: Enable Tbcn with reload value. 352 * BEACON_GEN: Enable beacon generator. [all …]
|
/linux-6.12.1/fs/ubifs/ |
D | debug.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 5 * Copyright (C) 2006-2008 Nokia Corporation. 29 * ubifs_debug_info - per-FS debugging information. 30 * @old_zroot: old index root - used by 'dbg_check_old_index()' 31 * @old_zroot_level: old index root level - used by 'dbg_check_old_index()' 32 * @old_zroot_sqnum: old index root sqnum - used by 'dbg_check_old_index()' 34 * @pc_happened: non-zero if an emulated power cut happened 45 * @new_ihead_lnum: used by debugging to check @c->ihead_lnum 46 * @new_ihead_offs: used by debugging to check @c->ihead_offs 51 * @saved_idx_gc_cnt: saved value of @c->idx_gc_cnt [all …]
|
/linux-6.12.1/fs/btrfs/ |
D | verity.c | 1 // SPDX-License-Identifier: GPL-2.0 31 * has a lot of careful code around i_size and it seems better to make a new key 40 * fs verity items are stored under two different key types on disk. 55 * starting at offset 0 for this key type. These are also opaque to btrfs, 59 * linearly with the size of the file (with 4K pages/blocks and SHA-256, it's 61 * operation. For that reason, we guard the whole enable verity operation 76 * fs-verity, it is convenient to do size computations in terms of a file 87 u64 sz = inode->i_size; in merkle_file_pos() 90 if (rounded > inode->i_sb->s_maxbytes) in merkle_file_pos() 91 return -EFBIG; in merkle_file_pos() [all …]
|
/linux-6.12.1/sound/core/ |
D | jack.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 44 struct snd_jack *jack = device->device_data; in snd_jack_dev_disconnect() 49 guard(mutex)(&jack->input_dev_lock); in snd_jack_dev_disconnect() 50 if (!jack->input_dev) in snd_jack_dev_disconnect() 55 if (jack->registered) in snd_jack_dev_disconnect() 56 input_unregister_device(jack->input_dev); in snd_jack_dev_disconnect() 58 input_free_device(jack->input_dev); in snd_jack_dev_disconnect() 59 jack->input_dev = NULL; in snd_jack_dev_disconnect() 66 struct snd_jack *jack = device->device_data; in snd_jack_dev_free() 67 struct snd_card *card = device->card; in snd_jack_dev_free() [all …]
|
/linux-6.12.1/Documentation/devicetree/bindings/sound/ |
D | nuvoton,nau8821.yaml | 1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 3 --- 5 $schema: http://devicetree.org/meta-schemas/core.yaml# 10 - Seven Lee <wtli@nuvoton.com> 13 - $ref: dai-common.yaml# 25 nuvoton,jkdet-enable: 26 description: Enable jack detection via JKDET pin. 29 nuvoton,jkdet-pull-enable: 30 description: Enable JKDET pin pull. If set - pin pull enabled, 34 nuvoton,jkdet-pull-up: [all …]
|
/linux-6.12.1/drivers/net/wireless/mediatek/mt76/ |
D | mt76_connac_mcu.c | 1 // SPDX-License-Identifier: ISC 108 struct mt76_dev *dev = phy->dev; in mt76_connac_mcu_set_channel_domain() 112 n_max_channels = phy->sband_2g.sband.n_channels + in mt76_connac_mcu_set_channel_domain() 113 phy->sband_5g.sband.n_channels + in mt76_connac_mcu_set_channel_domain() 114 phy->sband_6g.sband.n_channels; in mt76_connac_mcu_set_channel_domain() 119 return -ENOMEM; in mt76_connac_mcu_set_channel_domain() 123 for (i = 0; i < phy->sband_2g.sband.n_channels; i++) { in mt76_connac_mcu_set_channel_domain() 124 chan = &phy->sband_2g.sband.channels[i]; in mt76_connac_mcu_set_channel_domain() 125 if (chan->flags & IEEE80211_CHAN_DISABLED) in mt76_connac_mcu_set_channel_domain() 128 channel.hw_value = cpu_to_le16(chan->hw_value); in mt76_connac_mcu_set_channel_domain() [all …]
|
/linux-6.12.1/drivers/net/ethernet/marvell/octeontx2/af/ |
D | rvu_npc_fs.c | 1 // SPDX-License-Identifier: GPL-2.0 62 struct npc_mcam *mcam = &rvu->hw->mcam; in npc_is_feature_supported() 66 mcam_features = is_npc_intf_tx(intf) ? mcam->tx_features : mcam->rx_features; in npc_is_feature_supported() 82 * spans in the key. 87 struct npc_key_field *field = &mcam->rx_key_fields[type]; in npc_set_kw_masks() 91 if (mcam->banks_per_entry == 1) in npc_set_kw_masks() 93 else if (mcam->banks_per_entry == 2) in npc_set_kw_masks() 99 field = &mcam->tx_key_fields[type]; in npc_set_kw_masks() 105 field->kw_mask[start_kwi] |= GENMASK_ULL(nr_bits - 1, 0) in npc_set_kw_masks() 107 field->nr_kws = 1; in npc_set_kw_masks() [all …]
|
/linux-6.12.1/arch/arm64/boot/dts/exynos/ |
D | exynosautov9-sadk.dts | 1 // SPDX-License-Identifier: GPL-2.0 9 /dts-v1/; 11 #include <dt-bindings/gpio/gpio.h> 12 #include <dt-bindings/input/input.h> 16 compatible = "samsung,exynosautov9-sadk", "samsung,exynosautov9"; 18 #address-cells = <2>; 19 #size-cells = <2>; 26 stdout-path = &serial_0; 36 gpio-keys { 37 compatible = "gpio-keys"; [all …]
|
/linux-6.12.1/arch/arm/boot/dts/nxp/imx/ |
D | imx6dl-prtmvt.dts | 1 // SPDX-License-Identifier: GPL-2.0-or-later OR MIT 7 /dts-v1/; 8 #include <dt-bindings/display/sdtv-standards.h> 9 #include <dt-bindings/gpio/gpio.h> 10 #include <dt-bindings/input/input.h> 11 #include <dt-bindings/leds/common.h> 12 #include <dt-bindings/media/tvp5150.h> 13 #include <dt-bindings/sound/fsl-imx-audmux.h> 21 stdout-path = &uart4; 25 compatible = "pwm-backlight"; [all …]
|
/linux-6.12.1/crypto/ |
D | Kconfig | 1 # SPDX-License-Identifier: GPL-2.0 171 bool "Disable run-time self tests" 174 Disable run-time self tests that normally take place at 178 bool "Enable extra run-time crypto self tests" 181 Enable extra run-time self tests of registered crypto algorithms, 247 menu "Public-key cryptography" 250 tristate "RSA (Rivest-Shamir-Adleman)" 256 RSA (Rivest-Shamir-Adleman) public key algorithm (RFC8017) 259 tristate "DH (Diffie-Hellman)" 263 DH (Diffie-Hellman) key exchange algorithm [all …]
|