Home
last modified time | relevance | path

Searched +full:key +full:- +full:release (Results 1 – 25 of 1077) sorted by relevance

12345678910>>...44

/kernel/linux/linux-5.10/drivers/gpu/drm/vmwgfx/
Dttm_object.h3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
32 * Base- and reference object implementation for the various
34 * and release on file close.
40 #include <linux/dma-buf.h>
74 * Device-specific types should use the
97 * @hash: hash entry for the per-device object hash.
113 * already been taken out of the per-device hash. The parameter
118 * This function may, for example, release a lock held by a user-space
[all …]
/kernel/linux/linux-6.6/drivers/gpu/drm/vmwgfx/
Dttm_object.h3 * Copyright (c) 2006-2022 VMware, Inc., Palo Alto, CA., USA
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
32 * Base- and reference object implementation for the various
34 * and release on file close.
40 #include <linux/dma-buf.h>
51 * Device-specific types should use the
73 * @hash: hash entry for the per-device object hash.
89 * already been taken out of the per-device hash. The parameter
94 * This function may, for example, release a lock held by a user-space
[all …]
Dttm_object.c1 /* SPDX-License-Identifier: GPL-2.0 OR MIT */
4 * Copyright (c) 2009-2022 VMware, Inc., Palo Alto, CA., USA
21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
29 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
39 * Base- and reference object implementation for the various
41 * and release on file close.
70 * file release.
92 * This is the per-device data structure needed for ttm object management.
106 * @hash: Hash entry for the per-file object reference hash.
108 * @head: List entry for the per-file list of ref-objects.
[all …]
/kernel/linux/linux-6.6/drivers/input/keyboard/
Dmax7359_keypad.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * max7359_keypad.c - MAX7359 Key Switch Controller Driver
10 * Datasheet: http://www.maxim-ic.com/quick_view2.cfm/qv_pk/5456
57 /* matrix key code map */
69 dev_err(&client->dev, "%s: reg 0x%x, val 0x%x, err %d\n", in max7359_write_reg()
79 dev_err(&client->dev, "%s: reg 0x%x, err %d\n", in max7359_read_reg()
84 /* runs in an IRQ thread -- can (and will!) sleep */
88 struct input_dev *input_dev = keypad->input_dev; in max7359_interrupt()
89 int val, row, col, release, code; in max7359_interrupt() local
91 val = max7359_read_reg(keypad->client, MAX7359_REG_KEYFIFO); in max7359_interrupt()
[all …]
/kernel/linux/linux-5.10/drivers/input/keyboard/
Dmax7359_keypad.c1 // SPDX-License-Identifier: GPL-2.0-only
3 * max7359_keypad.c - MAX7359 Key Switch Controller Driver
10 * Datasheet: http://www.maxim-ic.com/quick_view2.cfm/qv_pk/5456
57 /* matrix key code map */
69 dev_err(&client->dev, "%s: reg 0x%x, val 0x%x, err %d\n", in max7359_write_reg()
79 dev_err(&client->dev, "%s: reg 0x%x, err %d\n", in max7359_read_reg()
84 /* runs in an IRQ thread -- can (and will!) sleep */
88 struct input_dev *input_dev = keypad->input_dev; in max7359_interrupt()
89 int val, row, col, release, code; in max7359_interrupt() local
91 val = max7359_read_reg(keypad->client, MAX7359_REG_KEYFIFO); in max7359_interrupt()
[all …]
Ddavinci_keyscan.c1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * DaVinci Key Scan Driver for TI platforms
9 * Initial Code: Sandeep Paulraj <s-paulraj@ti.com>
22 #include <linux/platform_data/keyscan-davinci.h>
24 /* Key scan registers */
37 /* Key Control Register (KEYCTRL) */
65 struct device *dev = &davinci_ks->input->dev; in davinci_ks_initialize()
66 struct davinci_ks_platform_data *pdata = davinci_ks->pdata; in davinci_ks_initialize()
71 davinci_ks->base + DAVINCI_KEYSCAN_INTENA); in davinci_ks_initialize()
75 davinci_ks->base + DAVINCI_KEYSCAN_INTCLR); in davinci_ks_initialize()
[all …]
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/input/
Dqcom,pm8xxx-pwrkey.txt1 Qualcomm PM8xxx PMIC Power Key
5 - compatible:
9 "qcom,pm8058-pwrkey"
10 "qcom,pm8921-pwrkey"
12 - reg:
14 Value type: <prop-encoded-array>
15 Definition: address of power key control register
17 - interrupts:
19 Value type: <prop-encoded-array>
20 Definition: the first interrupt specifies the key release interrupt
[all …]
/kernel/linux/linux-5.10/drivers/platform/x86/
Dintel-vbtn.c1 // SPDX-License-Identifier: GPL-2.0+
12 #include <linux/input/sparse-keymap.h>
37 { KE_KEY, 0xC0, { KEY_POWER } }, /* power key press */
38 { KE_IGNORE, 0xC1, { KEY_POWER } }, /* power key release */
39 { KE_KEY, 0xC2, { KEY_LEFTMETA } }, /* 'Windows' key press */
40 { KE_KEY, 0xC3, { KEY_LEFTMETA } }, /* 'Windows' key release */
41 { KE_KEY, 0xC4, { KEY_VOLUMEUP } }, /* volume-up key press */
42 { KE_IGNORE, 0xC5, { KEY_VOLUMEUP } }, /* volume-up key release */
43 { KE_KEY, 0xC6, { KEY_VOLUMEDOWN } }, /* volume-down key press */
44 { KE_IGNORE, 0xC7, { KEY_VOLUMEDOWN } }, /* volume-down key release */
[all …]
/kernel/linux/linux-5.10/fs/nfs/
Dfscache.c1 // SPDX-License-Identifier: GPL-2.0-or-later
29 * Layout of the key for an NFS server cache object.
45 * Get the per-client index cookie for an NFS client if the appropriate mount
47 * - We always try and get an index cookie for the client, but get filehandle
48 * cookies on a per-superblock basis, depending on the mount flags
52 const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *) &clp->cl_addr; in nfs_fscache_get_client_cookie()
53 const struct sockaddr_in *sin = (struct sockaddr_in *) &clp->cl_addr; in nfs_fscache_get_client_cookie()
54 struct nfs_server_key key; in nfs_fscache_get_client_cookie() local
55 uint16_t len = sizeof(key.hdr); in nfs_fscache_get_client_cookie()
57 memset(&key, 0, sizeof(key)); in nfs_fscache_get_client_cookie()
[all …]
/kernel/linux/linux-6.6/drivers/platform/x86/intel/
Dvbtn.c1 // SPDX-License-Identifier: GPL-2.0+
12 #include <linux/input/sparse-keymap.h>
38 { KE_KEY, 0xC0, { KEY_POWER } }, /* power key press */
39 { KE_IGNORE, 0xC1, { KEY_POWER } }, /* power key release */
40 { KE_KEY, 0xC2, { KEY_LEFTMETA } }, /* 'Windows' key press */
41 { KE_KEY, 0xC3, { KEY_LEFTMETA } }, /* 'Windows' key release */
42 { KE_KEY, 0xC4, { KEY_VOLUMEUP } }, /* volume-up key press */
43 { KE_IGNORE, 0xC5, { KEY_VOLUMEUP } }, /* volume-up key release */
44 { KE_KEY, 0xC6, { KEY_VOLUMEDOWN } }, /* volume-down key press */
45 { KE_IGNORE, 0xC7, { KEY_VOLUMEDOWN } }, /* volume-down key release */
[all …]
/kernel/linux/linux-6.6/drivers/net/ethernet/sfc/
Dtc_conntrack.c1 // SPDX-License-Identifier: GPL-2.0-only
33 struct efx_nic *efx = zone->efx; in efx_tc_ct_zone_free()
35 netif_err(efx, drv, efx->net_dev, in efx_tc_ct_zone_free()
37 zone->zone); in efx_tc_ct_zone_free()
39 nf_flow_table_offload_del_cb(zone->nf_ft, efx_tc_flow_block, zone); in efx_tc_ct_zone_free()
48 netif_err(efx, drv, efx->net_dev, in efx_tc_ct_free()
50 conn->cookie); in efx_tc_ct_free()
52 /* We can release the counter, but we can't remove the CT itself in efx_tc_ct_free()
55 efx_tc_flower_release_counter(efx, conn->cnt); in efx_tc_ct_free()
63 rc = rhashtable_init(&efx->tc->ct_zone_ht, &efx_tc_ct_zone_ht_params); in efx_tc_init_conntrack()
[all …]
Dtc.c1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright 2020-2022 Xilinx Inc.
48 return ERR_PTR(-EOPNOTSUPP); in efx_tc_flower_lookup_efv()
50 if (dev == efx->net_dev) in efx_tc_flower_lookup_efv()
53 if (dev->netdev_ops != &efx_ef100_rep_netdev_ops) in efx_tc_flower_lookup_efv()
54 return ERR_PTR(-EOPNOTSUPP); in efx_tc_flower_lookup_efv()
59 if (efv->parent != efx) in efx_tc_flower_lookup_efv()
60 return ERR_PTR(-EOPNOTSUPP); in efx_tc_flower_lookup_efv()
64 /* Convert a driver-internal vport ID into an internal device (PF or VF) */
74 efx_mae_mport_mport(efx, efv->mport, &mport); in efx_tc_flower_internal_mport()
[all …]
/kernel/linux/linux-5.10/include/net/
Dflow_offload.h12 void *key; member
16 struct flow_dissector_key_meta *key, *mask; member
20 struct flow_dissector_key_basic *key, *mask; member
24 struct flow_dissector_key_control *key, *mask; member
28 struct flow_dissector_key_eth_addrs *key, *mask; member
32 struct flow_dissector_key_vlan *key, *mask; member
36 struct flow_dissector_key_ipv4_addrs *key, *mask; member
40 struct flow_dissector_key_ipv6_addrs *key, *mask; member
44 struct flow_dissector_key_ip *key, *mask; member
48 struct flow_dissector_key_ports *key, *mask; member
[all …]
/kernel/linux/linux-5.10/block/
Dkeyslot-manager.c1 // SPDX-License-Identifier: GPL-2.0
11 * with a slot number to specify the key to use for en/decryption.
14 * many inline encryption hardware, we don't want to program the same key into
15 * multiple slots - if multiple requests are using the same key, we want to
16 * program just one slot with that key and use that slot for all requests.
26 * key into some slot in the inline encryption hardware.
29 #define pr_fmt(fmt) "blk-crypto: " fmt
31 #include <linux/keyslot-manager.h>
42 const struct blk_crypto_key *key; member
49 * Calling into the driver requires ksm->lock held and the device in blk_ksm_hw_enter()
[all …]
/kernel/linux/linux-5.10/drivers/tty/
Dsysrq.c1 // SPDX-License-Identifier: GPL-2.0
3 * Linux Magic System Request Key Hacks
9 * overhauled to use key registration
68 * sysrq_mask - Getter for sysrq_enabled mask.
101 static void sysrq_handle_loglevel(int key) in sysrq_handle_loglevel() argument
105 i = key - '0'; in sysrq_handle_loglevel()
112 .help_msg = "loglevel(0-9)",
118 static void sysrq_handle_SAK(int key) in sysrq_handle_SAK() argument
134 static void sysrq_handle_unraw(int key) in sysrq_handle_unraw() argument
149 static void sysrq_handle_crash(int key) in sysrq_handle_crash() argument
[all …]
/kernel/linux/linux-6.6/drivers/tty/
Dsysrq.c1 // SPDX-License-Identifier: GPL-2.0
3 * Linux Magic System Request Key Hacks
9 * overhauled to use key registration
68 * sysrq_mask - Getter for sysrq_enabled mask.
101 static void sysrq_handle_loglevel(u8 key) in sysrq_handle_loglevel() argument
103 u8 loglevel = key - '0'; in sysrq_handle_loglevel()
111 .help_msg = "loglevel(0-9)",
117 static void sysrq_handle_SAK(u8 key) in sysrq_handle_SAK() argument
134 static void sysrq_handle_unraw(u8 key) in sysrq_handle_unraw() argument
149 static void sysrq_handle_crash(u8 key) in sysrq_handle_crash() argument
[all …]
/kernel/linux/linux-6.6/include/net/
Dflow_offload.h12 void *key; member
16 struct flow_dissector_key_meta *key, *mask; member
20 struct flow_dissector_key_basic *key, *mask; member
24 struct flow_dissector_key_control *key, *mask; member
28 struct flow_dissector_key_eth_addrs *key, *mask; member
32 struct flow_dissector_key_vlan *key, *mask; member
36 struct flow_dissector_key_arp *key, *mask; member
40 struct flow_dissector_key_ipv4_addrs *key, *mask; member
44 struct flow_dissector_key_ipv6_addrs *key, *mask; member
48 struct flow_dissector_key_ip *key, *mask; member
[all …]
/kernel/linux/linux-6.6/include/linux/
Dcred.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
2 /* Credentials management - see Documentation/security/credentials.rst
13 #include <linux/key.h>
32 * get_group_info - Get a reference to a group info structure
42 atomic_inc(&gi->usage); in get_group_info()
47 * put_group_info - Release a reference to a group info structure
48 * @group_info: The group info to release
52 if (atomic_dec_and_test(&(group_info)->usage)) \
96 * upon another object, be that a file, a task, a key or whatever.
98 * Note that some members of this structure belong to both categories - the
[all …]
/kernel/linux/linux-6.6/drivers/target/
Dtarget_core_pr.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * This file contains SPC-3 compliant persistent reservations and
6 * legacy SPC-2 reservations with compatible reservation handling (CRH=1)
8 * (c) Copyright 2009-2013 Datera, Inc.
48 if (!pr_reg->isid_present_at_reg) { in core_pr_dump_initiator_port()
53 snprintf(buf, size, ",i,0x%s", pr_reg->pr_reg_isid); in core_pr_dump_initiator_port()
77 pr_res_type = pr_res_holder->pr_res_type; in is_reservation_holder()
89 struct se_device *dev = cmd->se_dev; in target_scsi2_reservation_check()
90 struct se_session *sess = cmd->se_sess; in target_scsi2_reservation_check()
92 switch (cmd->t_task_cdb[0]) { in target_scsi2_reservation_check()
[all …]
/kernel/linux/linux-6.6/block/
Dblk-crypto-profile.c1 // SPDX-License-Identifier: GPL-2.0
7 * DOC: blk-crypto profiles
9 * 'struct blk_crypto_profile' contains all generic inline encryption-related
17 * these keyslots in a device-independent way, using the driver-provided
19 * of which key and how many I/O requests are using each keyslot, getting
20 * keyslots for I/O requests, and handling key eviction requests.
22 * For more information, see Documentation/block/inline-encryption.rst.
25 #define pr_fmt(fmt) "blk-crypto: " fmt
27 #include <linux/blk-crypto-profile.h>
34 #include <linux/blk-integrity.h>
[all …]
/kernel/linux/linux-5.10/drivers/target/
Dtarget_core_pr.c1 // SPDX-License-Identifier: GPL-2.0-or-later
5 * This file contains SPC-3 compliant persistent reservations and
6 * legacy SPC-2 reservations with compatible reservation handling (CRH=1)
8 * (c) Copyright 2009-2013 Datera, Inc.
48 if (!pr_reg->isid_present_at_reg) { in core_pr_dump_initiator_port()
53 snprintf(buf, size, ",i,0x%s", pr_reg->pr_reg_isid); in core_pr_dump_initiator_port()
77 pr_res_type = pr_res_holder->pr_res_type; in is_reservation_holder()
89 struct se_device *dev = cmd->se_dev; in target_scsi2_reservation_check()
90 struct se_session *sess = cmd->se_sess; in target_scsi2_reservation_check()
92 switch (cmd->t_task_cdb[0]) { in target_scsi2_reservation_check()
[all …]
/kernel/linux/linux-6.6/Documentation/driver-api/media/
Drc-core.rst1 .. SPDX-License-Identifier: GPL-2.0
4 -------------------------
12 Every time a key is pressed on a remote controller, a scan code is produced.
13 Also, on most hardware, keeping a key pressed for more than a few dozens of
14 milliseconds produce a repeat key event. That's somewhat similar to what
22 produces one event for a key press and another one for key release. On
23 infrared-based remote controllers, there's no key release event. Instead,
24 an extra code is produced to indicate key repeats.
48 At receiver, a simple low-pass filter can be used to convert the received
86 .. kernel-doc:: include/media/rc-core.h
[all …]
/kernel/linux/linux-5.10/Documentation/driver-api/media/
Drc-core.rst1 .. SPDX-License-Identifier: GPL-2.0
4 -------------------------
12 Every time a key is pressed on a remote controller, a scan code is produced.
13 Also, on most hardware, keeping a key pressed for more than a few dozens of
14 milliseconds produce a repeat key event. That's somewhat similar to what
22 produces one event for a key press and another one for key release. On
23 infrared-based remote controllers, there's no key release event. Instead,
24 an extra code is produced to indicate key repeats.
48 At receiver, a simple low-pass filter can be used to convert the received
86 .. kernel-doc:: include/media/rc-core.h
[all …]
/kernel/linux/linux-5.10/include/linux/
Dcred.h1 /* SPDX-License-Identifier: GPL-2.0-or-later */
2 /* Credentials management - see Documentation/security/credentials.rst
13 #include <linux/key.h>
32 * get_group_info - Get a reference to a group info structure
42 atomic_inc(&gi->usage); in get_group_info()
47 * put_group_info - Release a reference to a group info structure
48 * @group_info: The group info to release
52 if (atomic_dec_and_test(&(group_info)->usage)) \
97 * upon another object, be that a file, a task, a key or whatever.
99 * Note that some members of this structure belong to both categories - the
[all …]
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/sound/
Dti,ts3a227e.yaml1 # SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
3 ---
5 $schema: http://devicetree.org/meta-schemas/core.yaml#
11 - Dylan Reid <dgreid@chromium.org>
14 The TS3A227E detect headsets of 3-ring and 4-ring standards and
16 handles key press detection in accordance with the Android audio
22 - ti,ts3a227e
34 - 0 # 2.1 V
35 - 1 # 2.2 V
36 - 2 # 2.3 V
[all …]

12345678910>>...44