/Linux-v5.15/fs/nls/ |
D | Kconfig | 48 only, not to the file contents. You can include several codepages; 60 only, not to the file contents. You can include several codepages; 72 only, not to the file contents. You can include several codepages; 85 only, not to the file contents. You can include several codepages; 101 only, not to the file contents. You can include several codepages; 116 only, not to the file contents. You can include several codepages; 127 only, not to the file contents. You can include several codepages; 138 only, not to the file contents. You can include several codepages; 149 only, not to the file contents. You can include several codepages; 160 only, not to the file contents. You can include several codepages; [all …]
|
/Linux-v5.15/Documentation/ABI/testing/ |
D | sysfs-bus-papr-pmem | 15 Indicates that NVDIMM contents will not 18 Indicates that NVDIMM contents 22 Indicates that NVDIMM contents 26 NVDIMM contents are encrypted. 30 Indicating that contents of the 33 Indicating that NVDIMM contents cant
|
/Linux-v5.15/include/rdma/ |
D | ibta_vol1_c12.h | 39 /* Table 106 REQ Message Contents */ 100 /* Table 107 MRA Message Contents */ 108 /* Table 108 REJ Message Contents */ 118 /* Table 110 REP Message Contents */ 140 /* Table 111 RTU Message Contents */ 146 /* Table 112 DREQ Message Contents */ 153 /* Table 113 DREP Message Contents */ 159 /* Table 115 LAP Message Contents */ 184 /* Table 116 APR Message Contents */ 195 /* Table 119 SIDR_REQ Message Contents */ [all …]
|
/Linux-v5.15/arch/x86/kvm/vmx/ |
D | sgx.c | 148 struct sgx_secs *contents = (struct sgx_secs *)pageinfo->contents; in __handle_encls_ecreate() local 164 miscselect = contents->miscselect; in __handle_encls_ecreate() 165 attributes = contents->attributes; in __handle_encls_ecreate() 166 xfrm = contents->xfrm; in __handle_encls_ecreate() 167 size = contents->size; in __handle_encls_ecreate() 219 struct sgx_secs *contents; in handle_encls_ecreate() local 243 sgx_get_encls_gva(vcpu, pageinfo.contents, 4096, 4096, in handle_encls_ecreate() 267 * Copy contents into kernel memory to prevent TOCTOU attack. E.g. the in handle_encls_ecreate() 272 contents = (struct sgx_secs *)__get_free_page(GFP_KERNEL_ACCOUNT); in handle_encls_ecreate() 273 if (!contents) in handle_encls_ecreate() [all …]
|
/Linux-v5.15/arch/powerpc/include/uapi/asm/ |
D | papr_pdsm.h | 56 * papr_scm and libndctl so that contents of payload can be interpreted. As such 88 * dimm_unarmed : Dimm not armed. So contents wont persist. 89 * dimm_bad_shutdown : Previous shutdown did not persist contents. 90 * dimm_bad_restore : Contents from previous shutdown werent restored. 91 * dimm_scrubbed : Contents of the dimm have been scrubbed. 92 * dimm_locked : Contents of the dimm cant be modified until CEC reboot 93 * dimm_encrypted : Contents of dimm are encrypted.
|
/Linux-v5.15/scripts/ |
D | kernel-doc | 421 my $contents = ""; 566 # dumps section contents to arrays/hashes intended for that purpose. 571 my $contents = join "\n", @_; 575 $parameterdescs{$name} = $contents; 581 $parameterdescs{$name} = $contents; 592 $sections{$name} .= $contents; 594 $sections{$name} = $contents; 608 my $contents = join "\n", @_; 620 dump_section($file, $name, $contents); 640 my $contents = join "\n",@_; [all …]
|
/Linux-v5.15/Documentation/filesystems/ |
D | ubifs-authentication.rst | 15 contents and file names. This prevents attacks where an attacker is able to 16 read contents of the filesystem on a single point in time. A classic example 21 the attacker is able to modify the filesystem contents and the user uses the 23 contents arbitrarily without the user noticing. One example is to modify a 26 fairly easy to swap files and replace their contents. 36 This document describes an approach to get file contents _and_ full metadata 37 authentication for UBIFS. Since UBIFS uses fscrypt for file contents and file 100 contents or inode nodes (``struct ubifs_ino_node``) which represent VFS inodes. 210 the authenticity and integrity of metadata and file contents stored on flash. 218 authenticity of on-flash file contents and filesystem metadata. This covers [all …]
|
/Linux-v5.15/Documentation/security/tpm/ |
D | tpm_event_log.rst | 24 to a challenger. However, PCR contents are difficult to interpret; 25 therefore, attestation is typically more useful when the PCR contents 28 contents. The PCR contents are used to provide the validation of the
|
/Linux-v5.15/arch/powerpc/lib/ |
D | ldstfp.S | 19 /* Get the contents of frN into *p; N is in r3 and p is in r4. */ 43 /* Put the contents of *p into frN; N is in r3 and p is in r4. */ 68 /* Get the contents of vrN into *p; N is in r3 and p is in r4. */ 92 /* Put the contents of *p into vrN; N is in r3 and p is in r4. */ 118 /* Get the contents of vsN into vs0; N is in r3. */ 137 /* Put the contents of vs0 into vsN; N is in r3. */
|
/Linux-v5.15/Documentation/gpu/ |
D | msm-crash-dump.rst | 12 and all the contents of a section will be indented two spaces from the header. 43 Section containing the contents of each ringbuffer. Each ringbuffer is 68 The contents of the ring encoded as ascii85. Only the used 82 The contents of the buffer object encoded with ascii85. Only
|
/Linux-v5.15/tools/testing/nvdimm/test/ |
D | ndtest.h | 8 /* SCM device is unable to persist memory contents */ 10 /* SCM device failed to persist memory contents */ 12 /* SCM device contents are not persisted from previous IPL */ 17 /* SCM contents cannot persist due to current platform health status */
|
/Linux-v5.15/drivers/scsi/mpt3sas/ |
D | mpt3sas_config.c | 282 * @config_page: contents of the config page 508 * @config_page: contents of the config page 544 * @config_page: contents of the config page 582 * @config_page: contents of the config page 619 * @config_page: contents of the config page 656 * @config_page: contents of the config page 693 * @config_page: contents of the config page 729 * @config_page: contents of the config page 765 * @config_page: contents of the config page 801 * @config_page: contents of the config page [all …]
|
/Linux-v5.15/drivers/comedi/drivers/ni_routing/tools/ |
D | convert_csv_to_c.py | 144 * The contents of this file are generated using the tools in 147 * Please use those tools to help maintain the contents of this file. 175 * The contents of this file are generated using the tools in 178 * Please use those tools to help maintain the contents of this file. 212 * The contents of this file are generated using the tools in 215 * Please use those tools to help maintain the contents of this file. 323 * The contents of this file are generated using the tools in 326 * Please use those tools to help maintain the contents of this file. 354 * The contents of this file are generated using the tools in 357 * Please use those tools to help maintain the contents of this file. [all …]
|
/Linux-v5.15/Documentation/networking/ |
D | ethtool-netlink.rst | 85 attribute with contents of one of two forms: compact (two binary bitmaps 104 Compact form: nested (bitset) atrribute contents: 129 Bit-by-bit form: nested (bitset) attribute contents: 221 ``ETHTOOL_MSG_STRSET_GET_REPLY`` string set contents 291 Requests contents of a string set as provided by ioctl commands 298 Request contents: 310 Kernel response contents: 354 Request contents: 360 Kernel response contents: 384 Request contents: [all …]
|
/Linux-v5.15/arch/x86/kernel/cpu/sgx/ |
D | encl.c | 40 pginfo.contents = (unsigned long)kmap_atomic(b.contents); in __sgx_encl_eldu() 59 kunmap_atomic((void *)(unsigned long)pginfo.contents); in __sgx_encl_eldu() 570 * Pin the backing storage pages for storing the encrypted contents and Paging 581 struct page *contents; in sgx_encl_get_backing() local 584 contents = sgx_encl_get_backing_page(encl, page_index); in sgx_encl_get_backing() 585 if (IS_ERR(contents)) in sgx_encl_get_backing() 586 return PTR_ERR(contents); in sgx_encl_get_backing() 590 put_page(contents); in sgx_encl_get_backing() 595 backing->contents = contents; in sgx_encl_get_backing() 613 set_page_dirty(backing->contents); in sgx_encl_put_backing() [all …]
|
/Linux-v5.15/security/loadpin/ |
D | loadpin.c | 122 bool contents) in loadpin_read_file() argument 128 * If we will not know that we'll be seeing the full contents in loadpin_read_file() 130 * off disk. Treat all contents=false hooks as if there were in loadpin_read_file() 133 if (!contents) in loadpin_read_file() 190 static int loadpin_load_data(enum kernel_load_data_id id, bool contents) in loadpin_load_data() argument 192 return loadpin_read_file(NULL, (enum kernel_read_file_id) id, contents); in loadpin_load_data()
|
/Linux-v5.15/sound/core/ |
D | pcm_iec958.c | 25 * Drivers may wish to tweak the contents of the buffer after creation. 128 * Drivers may wish to tweak the contents of the buffer after its been 151 * Drivers may wish to tweak the contents of the buffer after its been 172 * Drivers may wish to tweak the contents of the buffer after creation. 198 * Drivers may wish to tweak the contents of the buffer after creation.
|
/Linux-v5.15/include/media/ |
D | tveeprom.h | 94 * tveeprom_hauppauge_analog - Fill struct tveeprom using the contents 99 * @eeprom_data: Array with the contents of the eeprom_data. It should 100 * contain 256 bytes filled with the contents of the 107 * tveeprom_read - Reads the contents of the eeprom found at the Hauppauge
|
/Linux-v5.15/include/linux/ |
D | t10-pi.h | 14 * Type 1 defines the contents of the guard and reference tags 16 * Type 2 defines the contents of the guard and reference tags and 19 * Type 3 defines the contents of the guard tag only
|
/Linux-v5.15/Documentation/x86/ |
D | exception-tables.rst | 58 Since we jump to the contents of fixup, fixup obviously points 172 > CONTENTS, ALLOC, LOAD, READONLY, CODE 174 > CONTENTS, ALLOC, LOAD, READONLY, CODE 176 > CONTENTS, ALLOC, LOAD, READONLY, DATA 178 > CONTENTS, ALLOC, LOAD, READONLY, DATA 180 > CONTENTS, ALLOC, LOAD, DATA 184 > CONTENTS, READONLY 186 > CONTENTS, READONLY 218 > objdump --full-contents --section=__ex_table vmlinux 287 exception table (i.e. the contents of the ELF section __ex_table)
|
/Linux-v5.15/arch/x86/include/asm/ |
D | sgx.h | 115 * @mrenclave: SHA256-hash of the enclave contents 200 * @contents: pointer to the page contents 206 u64 contents; member 275 * @mac: MAC over PCMD, page contents and isvsvn 312 * struct sgx_sigstruct_body - defines contents of the enclave 319 * @mrenclave: SHA256-hash of the enclave contents 343 * @body: defines contents of the enclave
|
/Linux-v5.15/arch/s390/include/asm/ |
D | user.h | 16 obstacles to being able to view the contents of the floating point 18 contents of them. Actually, you can read in the core file and look at 19 the contents of the user struct to find out what the floating point 21 The actual file contents are as follows:
|
/Linux-v5.15/arch/h8300/include/asm/ |
D | user.h | 10 obstacles to being able to view the contents of the floating point 12 contents of them. Actually, you can read in the core file and look at 13 the contents of the user struct to find out what the floating point 15 The actual file contents are as follows:
|
/Linux-v5.15/Documentation/dev-tools/kunit/ |
D | usage.rst | 309 "contents" in an internal buffer. For example, let's assume we have a class that 338 char contents[FAKE_EEPROM_CONTENTS_SIZE]; 346 memcpy(buffer, this->contents + offset, count); 356 memcpy(this->contents + offset, buffer, count); 365 memset(this->contents, 0, FAKE_EEPROM_CONTENTS_SIZE); 387 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0); 390 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0); 393 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0xff); 394 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[1], 0xff); 407 KUNIT_EXPECT_EQ(test, fake_eeprom->contents[0], 0); [all …]
|
/Linux-v5.15/Documentation/vm/ |
D | highmem.rst | 9 .. contents:: :local: 79 wants to access the contents of a page that might be allocated from high memory 86 /* Gain access to the contents of that page. */ 89 /* Do something to the contents of that page. */ 118 a pointer to the page contents rather than juggling mappings about. In such a
|