From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B6A152AF05; Tue, 3 Dec 2024 14:53:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1733237633; cv=none; b=kMXNPIDIhC3T5EvywGVxqLKtZLueBx3ghg0txUg0kMiJqY8K/qCz2BMFW2sqrd3J/kRqfaC5YZWcBA+WfbqVRQSGn90CsXvqnmJEUhs0BZBFolgBNT3eJv4OZm/SYzA2TZTWF9RYCz/Uzujh3MN9N2i2Ntzk4l6gpflFl/TK2Fc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1733237633; c=relaxed/simple; bh=p/9dJuorFSkqBWtxvcgG4574N3rVzWV7ZHIr0JHWUxc=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=TXPxGUo7OmyyvudvLEucBJQ0WIJ0sfNiuIB1hQUOREnpQgBFsZfE6f7OdRDfJTWAdXC4K8qVAuEXVo1VTwTyiFcIlvXLGCiYiTboGxeWd/1d9sVY/hr8iI3sgswGCa5kHu6r4Pw3FsG9DfmbdKqr+1Jx6FAOTHdAgxTN4yrbwfg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=qBCpyJEz; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="qBCpyJEz" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2E440C4CECF; Tue, 3 Dec 2024 14:53:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1733237633; bh=p/9dJuorFSkqBWtxvcgG4574N3rVzWV7ZHIr0JHWUxc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qBCpyJEzPlZKbz44tX30ro0jgwq5wGamt16+8CjzlOwNE0rwd79ooqWsHcdq1sP9l tpyGI9Xu1qiECofyWmaU3tcOvJzzhjIelReFiBFfSKv8oL5LviDRpkPJSwOLgDyOfC 1f+LHgNpFLTwZ4I/PSJOY2MQUPjgQIlSd/UVHQKo= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Kurt Borja , Mario Limonciello , =?UTF-8?q?Pali=20Roh=C3=A1r?= , Hans de Goede , Sasha Levin Subject: [PATCH 6.11 026/817] platform/x86: dell-wmi-base: Handle META key Lock/Unlock events Date: Tue, 3 Dec 2024 15:33:18 +0100 Message-ID: <20241203143956.669540629@linuxfoundation.org> X-Mailer: git-send-email 2.47.1 In-Reply-To: <20241203143955.605130076@linuxfoundation.org> References: <20241203143955.605130076@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 6.11-stable review patch. If anyone has any objections, please let me know. ------------------ From: Kurt Borja [ Upstream commit ec61f0bb4feec3345626a2b93b970b6719743997 ] Some Alienware devices have a key that locks/unlocks the Meta key. This key triggers a WMI event that should be ignored by the kernel, as it's handled by internally the firmware. There is no known way of changing this default behavior. The firmware would lock/unlock the Meta key, regardless of how the event is handled. Tested on an Alienware x15 R1. Signed-off-by: Kurt Borja Reviewed-by: Mario Limonciello Acked-by: Pali Rohár Link: https://lore.kernel.org/r/20241031154441.6663-2-kuurtb@gmail.com Reviewed-by: Hans de Goede Signed-off-by: Hans de Goede Signed-off-by: Sasha Levin --- drivers/platform/x86/dell/dell-wmi-base.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/platform/x86/dell/dell-wmi-base.c b/drivers/platform/x86/dell/dell-wmi-base.c index 24fd7ffadda95..841a5414d28a6 100644 --- a/drivers/platform/x86/dell/dell-wmi-base.c +++ b/drivers/platform/x86/dell/dell-wmi-base.c @@ -80,6 +80,12 @@ static const struct dmi_system_id dell_wmi_smbios_list[] __initconst = { static const struct key_entry dell_wmi_keymap_type_0000[] = { { KE_IGNORE, 0x003a, { KEY_CAPSLOCK } }, + /* Meta key lock */ + { KE_IGNORE, 0xe000, { KEY_RIGHTMETA } }, + + /* Meta key unlock */ + { KE_IGNORE, 0xe001, { KEY_RIGHTMETA } }, + /* Key code is followed by brightness level */ { KE_KEY, 0xe005, { KEY_BRIGHTNESSDOWN } }, { KE_KEY, 0xe006, { KEY_BRIGHTNESSUP } }, -- 2.43.0