| /linux/tools/perf/util/arm-spe-decoder/ |
| H A D | arm-spe-decoder.c | 25 static u64 arm_spe_calc_ip(int index, u64 payload) in arm_spe_calc_ip() argument 33 ns = SPE_ADDR_PKT_GET_NS(payload); in arm_spe_calc_ip() 34 el = SPE_ADDR_PKT_GET_EL(payload); in arm_spe_calc_ip() 37 payload = SPE_ADDR_PKT_ADDR_GET_BYTES_0_6(payload); in arm_spe_calc_ip() 41 payload |= 0xffULL << SPE_ADDR_PKT_ADDR_BYTE7_SHIFT; in arm_spe_calc_ip() 47 payload = SPE_ADDR_PKT_ADDR_GET_BYTES_0_6(payload); in arm_spe_calc_ip() 51 * defines the data virtual address payload format, the top byte in arm_spe_calc_ip() 56 * specific pattern in bits [55:52] of payload which falls in in arm_spe_calc_ip() 63 val = SPE_ADDR_PKT_ADDR_GET_BYTE_6(payload); in arm_spe_calc_ip() 65 payload |= 0xffULL << SPE_ADDR_PKT_ADDR_BYTE7_SHIFT; in arm_spe_calc_ip() [all …]
|
| H A D | arm-spe-pkt-decoder.c | 59 case 1: packet->payload = *(uint8_t *)buf; break; in arm_spe_get_payload() 60 case 2: packet->payload = get_unaligned_le16(buf); break; in arm_spe_get_payload() 61 case 4: packet->payload = get_unaligned_le32(buf); break; in arm_spe_get_payload() 62 case 8: packet->payload = get_unaligned_le64(buf); break; in arm_spe_get_payload() 282 u64 payload = packet->payload; in arm_spe_pkt_desc_event() local 287 if (payload & BIT(EV_EXCEPTION_GEN)) in arm_spe_pkt_desc_event() 289 if (payload & BIT(EV_RETIRED)) in arm_spe_pkt_desc_event() 291 if (payload & BIT(EV_L1D_ACCESS)) in arm_spe_pkt_desc_event() 293 if (payload & BIT(EV_L1D_REFILL)) in arm_spe_pkt_desc_event() 295 if (payload & BIT(EV_TLB_ACCESS)) in arm_spe_pkt_desc_event() [all …]
|
| /linux/drivers/accel/ivpu/ |
| H A D | ivpu_jsm_msg.c | 102 req.payload.register_db.db_idx = db_id; in ivpu_jsm_register_db() 103 req.payload.register_db.jobq_base = jobq_base; in ivpu_jsm_register_db() 104 req.payload.register_db.jobq_size = jobq_size; in ivpu_jsm_register_db() 105 req.payload.register_db.host_ssid = ctx_id; in ivpu_jsm_register_db() 121 req.payload.unregister_db.db_idx = db_id; in ivpu_jsm_unregister_db() 140 req.payload.query_engine_hb.engine_idx = engine; in ivpu_jsm_get_heartbeat() 150 *heartbeat = resp.payload.query_engine_hb_done.heartbeat; in ivpu_jsm_get_heartbeat() 163 req.payload.engine_reset.engine_idx = engine; in ivpu_jsm_reset_engine() 184 req.payload.engine_preempt.engine_idx = engine; in ivpu_jsm_preempt_engine() 185 req.payload.engine_preempt.preempt_id = preempt_id; in ivpu_jsm_preempt_engine() [all …]
|
| /linux/security/keys/ |
| H A D | big_key.c | 21 * Layout of key payload words. 28 #define to_big_key_payload(payload) \ argument 29 (struct big_key_payload *)((payload).data) 40 * arbitrary blob of data as the payload 59 struct big_key_payload *payload = to_big_key_payload(prep->payload); in big_key_preparse() local 67 BUILD_BUG_ON(sizeof(*payload) != sizeof(prep->payload.data)); in big_key_preparse() 75 payload->length = datalen; in big_key_preparse() 123 payload->data = enckey; in big_key_preparse() 124 payload->path = file->f_path; in big_key_preparse() 125 path_get(&payload->path); in big_key_preparse() [all …]
|
| /linux/tools/perf/util/intel-pt-decoder/ |
| H A D | intel-pt-pkt-decoder.c | 76 uint64_t payload; in intel_pt_get_long_tnt() local 82 payload = get_unaligned_le64(buf); in intel_pt_get_long_tnt() 85 if (payload & BIT63) in intel_pt_get_long_tnt() 87 payload <<= 1; in intel_pt_get_long_tnt() 92 packet->payload = payload << 1; in intel_pt_get_long_tnt() 99 uint64_t payload = 0; in intel_pt_get_pip() local 105 memcpy_le64(&payload, buf + 2, 6); in intel_pt_get_pip() 106 packet->payload = payload; in intel_pt_get_pip() 123 packet->payload = get_unaligned_le16(buf + 2); in intel_pt_get_cbr() 135 memcpy_le64(&packet->payload, buf + 2, 5); in intel_pt_get_vmcs() [all …]
|
| /linux/include/uapi/linux/ |
| H A D | dm-log-userspace.h | 41 * you will see 'Payload-to-userspace' and 'Payload-to-kernel'. The 42 * 'Payload-to-userspace' is what the kernel sends in 'additional data' as 43 * necessary parameters to complete the request. The 'Payload-to-kernel' is 46 * structure denotes the availability and amount of payload data. 54 * Payload-to-userspace: 56 * Payload-to-kernel: 78 * Payload-to-userspace: 80 * Payload-to-kernel: 85 * payload data. 97 * Payload-to-userspace: [all …]
|
| H A D | papr_pdsm.h | 20 * envelope which consists of 2 headers sections and payload sections as 25 * | ND-HEADER | PDSM-HEADER | PDSM-PAYLOAD | 30 * | nd_command | payload --> | | 40 * 'nd_size_in' : (In) PDSM-HEADER + PDSM-IN-PAYLOAD (usually 0) 41 * 'nd_size_out' : (In) PDSM-HEADER + PDSM-RETURN-PAYLOAD 43 * 'nd_fw_size' : (Out) PDSM-HEADER + size of actual payload returned 46 * This is papr-scm specific header that precedes the payload. This is defined 51 * 'payload' : A union of all the possible payload structs 53 * PDSM Payload: 55 * The layout of the PDSM Payload is defined by various structs shared between [all …]
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | profiler.inc.h | 206 void* payload, in read_full_cgroup_path() argument 209 void* payload_start = payload; in read_full_cgroup_path() 217 bpf_probe_read_kernel_str(payload, MAX_PATH, in read_full_cgroup_path() 220 return payload; in read_full_cgroup_path() 222 *root_pos = payload - payload_start; in read_full_cgroup_path() 224 payload += filepart_length; in read_full_cgroup_path() 228 return payload; in read_full_cgroup_path() 251 void* payload) in populate_cgroup_info() argument 304 bpf_probe_read_kernel_str(payload, MAX_PATH, in populate_cgroup_info() 308 payload += cgroup_root_length; in populate_cgroup_info() [all …]
|
| H A D | test_varlen.c | 46 void *payload = payload1; in handler64_unsigned() local 53 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_unsigned() 55 payload += len; in handler64_unsigned() 59 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_unsigned() 61 payload += len; in handler64_unsigned() 65 total1 = payload - (void *)payload1; in handler64_unsigned() 76 void *payload = payload3; in handler64_signed() local 83 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_signed() 85 payload += len; in handler64_signed() 88 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_signed() [all …]
|
| /linux/drivers/net/ethernet/netronome/nfp/flower/ |
| H A D | tunnel_conf.c | 210 struct nfp_tun_active_tuns *payload; in nfp_tunnel_keep_alive() local 217 payload = nfp_flower_cmsg_get_data(skb); in nfp_tunnel_keep_alive() 218 count = be32_to_cpu(payload->count); in nfp_tunnel_keep_alive() 225 if (pay_len != struct_size(payload, tun_info, count)) { in nfp_tunnel_keep_alive() 232 ipv4_addr = payload->tun_info[i].ipv4; in nfp_tunnel_keep_alive() 233 port = be32_to_cpu(payload->tun_info[i].egress_port); in nfp_tunnel_keep_alive() 252 struct nfp_tun_active_tuns_v6 *payload; in nfp_tunnel_keep_alive_v6() local 259 payload = nfp_flower_cmsg_get_data(skb); in nfp_tunnel_keep_alive_v6() 260 count = be32_to_cpu(payload->count); in nfp_tunnel_keep_alive_v6() 267 if (pay_len != struct_size(payload, tun_info, count)) { in nfp_tunnel_keep_alive_v6() [all …]
|
| /linux/drivers/net/ipa/ |
| H A D | ipa_cmd.c | 31 * has a well-defined format, having a payload of a known length. This 33 * immediate command's opcode. The payload for a command resides in AP 137 /* Immediate command payload */ 259 struct ipa_cmd_register_write *payload; in ipa_cmd_register_write_offset_valid() local 269 bit_count = BITS_PER_BYTE * sizeof(payload->offset); in ipa_cmd_register_write_offset_valid() 367 struct ipa_cmd_hw_ip_fltrt_init *payload; in ipa_cmd_table_init_add() local 388 payload = &cmd_payload->table_init; in ipa_cmd_table_init_add() 392 payload->hash_rules_addr = cpu_to_le64(hash_addr); in ipa_cmd_table_init_add() 393 payload->flags = cpu_to_le64(val); in ipa_cmd_table_init_add() 394 payload->nhash_rules_addr = cpu_to_le64(addr); in ipa_cmd_table_init_add() [all …]
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm2.c | 23 static int tpm2_key_encode(struct trusted_key_payload *payload, in tpm2_key_encode() argument 76 work1 = payload->blob; in tpm2_key_encode() 77 work1 = asn1_encode_sequence(work1, work1 + sizeof(payload->blob), in tpm2_key_encode() 86 return work1 - payload->blob; in tpm2_key_encode() 101 static int tpm2_key_decode(struct trusted_key_payload *payload, in tpm2_key_decode() argument 111 ret = asn1_ber_decoder(&tpm2key_decoder, &ctx, payload->blob, in tpm2_key_decode() 112 payload->blob_len); in tpm2_key_decode() 224 * tpm2_seal_trusted() - seal the payload of a trusted key 227 * @payload: the key data in clear and encrypted form 233 struct trusted_key_payload *payload, in tpm2_seal_trusted() argument [all …]
|
| /linux/drivers/platform/surface/aggregator/ |
| H A D | ssh_parser.c | 97 * @payload: The parsed payload (output). 100 * Parses and validates a SSH frame, including its payload, from the given 102 * writes the limits of the frame payload to the provided @payload span 109 * the %NULL pointer and the payload span will be set to the null span (start 114 * payload) CRC is invalid, or %-EMSGSIZE if the SSH message is bigger than 118 struct ssh_frame **frame, struct ssam_span *payload, in sshp_parse_frame() argument 126 payload->ptr = NULL; in sshp_parse_frame() 127 payload->len = 0; in sshp_parse_frame() 158 /* Pin down payload. */ in sshp_parse_frame() 161 /* Check for frame + payload length. */ in sshp_parse_frame() [all …]
|
| /linux/drivers/gpu/drm/amd/display/dc/link/protocols/ |
| H A D | link_ddc.c | 97 struct i2c_payload payload = { in i2c_payloads_add() local 102 dal_vector_append(&payloads->payloads, &payload); in i2c_payloads_add() 276 struct aux_payload *payload) in submit_aux_command() argument 284 if (!payload) in submit_aux_command() 290 payload->length; in submit_aux_command() 292 payload->length - retrieved : DEFAULT_AUX_MAX_DATA_SIZE; in submit_aux_command() 294 current_payload.address = payload->address; in submit_aux_command() 295 current_payload.data = &payload->data[retrieved]; in submit_aux_command() 296 current_payload.defer_delay = payload->defer_delay; in submit_aux_command() 297 current_payload.i2c_over_aux = payload->i2c_over_aux; in submit_aux_command() [all …]
|
| /linux/include/linux/greybus/ |
| H A D | greybus_protocols.h | 38 * other value indicates an error; in this case, the payload of the 47 __le16 size; /* Size in bytes of header + payload */ 108 /* Control protocol manifest get size request has no payload*/ 113 /* Control protocol manifest get request has no payload */ 126 /* disconnecting response has no payload */ 131 /* Control protocol [dis]connected response has no payload */ 155 * it. Both operations have no payload. 241 /* firmware download release firmware response has no payload */ 276 /* firmware management interface firmware version request has no payload */ 289 /* firmware management load and validate firmware response has no payload*/ [all …]
|
| /linux/include/linux/i3c/ |
| H A D | ccc.h | 56 * struct i3c_ccc_events - payload passed to ENEC/DISEC CCC 69 * struct i3c_ccc_mwl - payload passed to SETMWL/GETMWL CCC 81 * struct i3c_ccc_mrl - payload passed to SETMRL/GETMRL CCC 84 * @ibi_len: maximum IBI payload length 121 * struct i3c_ccc_defslvs - payload passed to DEFSLVS CCC 150 * struct i3c_ccc_enttm - payload passed to ENTTM CCC 162 * struct i3c_ccc_setda - payload passed to SETNEWDA and SETDASA CCCs 174 * struct i3c_ccc_getpid - payload passed to GETPID CCC 183 * struct i3c_ccc_getbcr - payload passed to GETBCR CCC 192 * struct i3c_ccc_getdcr - payload passed to GETDCR CCC [all …]
|
| /linux/include/net/ |
| H A D | netlink.h | 17 * <--- nlmsg_total_size(payload) ---> 18 * <-- nlmsg_msg_size(payload) -> 20 * | nlmsghdr | Pad | Payload | Pad | nlmsghdr 25 * Payload Format: 53 * nlmsg_msg_size(payload) length of message w/o padding 54 * nlmsg_total_size(payload) length of message w/ padding 55 * nlmsg_padlen(payload) length of padding at tail 57 * Message Payload Access: 58 * nlmsg_data(nlh) head of message payload 59 * nlmsg_len(nlh) length of message payload [all …]
|
| /linux/drivers/hid/ |
| H A D | hid-wiimote-core.c | 1250 static void handler_keys(struct wiimote_data *wdata, const __u8 *payload) in handler_keys() argument 1257 ops->in_keys(wdata, payload); in handler_keys() 1265 ops->in_keys(wdata, payload); in handler_keys() 1271 static void handler_accel(struct wiimote_data *wdata, const __u8 *payload) in handler_accel() argument 1278 ops->in_accel(wdata, payload); in handler_accel() 1286 ops->in_accel(wdata, payload); in handler_accel() 1304 static void handler_ext(struct wiimote_data *wdata, const __u8 *payload, in handler_ext() argument 1319 if (len < 6 || !memcmp(payload, invalid, len)) in handler_ext() 1325 if (payload[5] & 0x01) in handler_ext() 1328 if (payload[4] & 0x01) { in handler_ext() [all …]
|
| /linux/certs/ |
| H A D | system_keyring.c | 39 * @payload: The payload of the new key. 47 const union key_payload *payload, in restrict_link_by_builtin_trusted() argument 50 return restrict_link_by_signature(dest_keyring, type, payload, in restrict_link_by_builtin_trusted() 58 * @payload: The payload of the new key. 67 const union key_payload *payload, in restrict_link_by_digsig_builtin() argument 70 return restrict_link_by_digsig(dest_keyring, type, payload, in restrict_link_by_digsig_builtin() 80 * @payload: The payload of the new key. 90 const union key_payload *payload, in restrict_link_by_builtin_and_secondary_trusted() argument 98 payload == &builtin_trusted_keys->payload) in restrict_link_by_builtin_and_secondary_trusted() 102 return restrict_link_by_signature(dest_keyring, type, payload, in restrict_link_by_builtin_and_secondary_trusted() [all …]
|
| /linux/net/ncsi/ |
| H A D | ncsi-cmd.c | 51 h->length = htons(nca->payload); in ncsi_cmd_build_header() 57 sizeof(*h) + nca->payload); in ncsi_cmd_build_header() 59 ALIGN(nca->payload, 4)); in ncsi_cmd_build_header() 218 int payload; in ncsi_cmd_handler_oem() local 220 * requires payload to be padded with 0 to in ncsi_cmd_handler_oem() 226 payload = ALIGN(nca->payload, 4); in ncsi_cmd_handler_oem() 228 len += max(payload, padding_bytes); in ncsi_cmd_handler_oem() 231 unsafe_memcpy(&cmd->mfr_id, nca->data, nca->payload, in ncsi_cmd_handler_oem() 232 /* skb allocated with enough to load the payload */); in ncsi_cmd_handler_oem() 240 int payload; member [all …]
|
| /linux/drivers/net/ethernet/sfc/ |
| H A D | selftest.c | 82 * @payload: Payload used in tests 91 struct efx_loopback_payload payload; member 290 struct efx_loopback_payload *payload; in efx_loopback_rx_packet() local 298 payload = &state->payload; in efx_loopback_rx_packet() 302 received.ip.saddr = payload->ip.saddr; in efx_loopback_rx_packet() 304 received.ip.check = payload->ip.check; in efx_loopback_rx_packet() 315 if (memcmp(&received.header, &payload->header, ETH_HLEN) != 0) { in efx_loopback_rx_packet() 332 if (memcmp(&received.ip, &payload->ip, sizeof(payload->ip)) != 0) { in efx_loopback_rx_packet() 340 if (memcmp(&received.msg, &payload->msg, sizeof(received.msg)) != 0) { in efx_loopback_rx_packet() 348 if (received.iteration != payload->iteration) { in efx_loopback_rx_packet() [all …]
|
| /linux/drivers/net/ethernet/sfc/siena/ |
| H A D | selftest.c | 83 * @payload: Payload used in tests 92 struct efx_loopback_payload payload; member 291 struct efx_loopback_payload *payload; in efx_siena_loopback_rx_packet() local 299 payload = &state->payload; in efx_siena_loopback_rx_packet() 303 received.ip.saddr = payload->ip.saddr; in efx_siena_loopback_rx_packet() 305 received.ip.check = payload->ip.check; in efx_siena_loopback_rx_packet() 316 if (memcmp(&received.header, &payload->header, ETH_HLEN) != 0) { in efx_siena_loopback_rx_packet() 333 if (memcmp(&received.ip, &payload->ip, sizeof(payload->ip)) != 0) { in efx_siena_loopback_rx_packet() 341 if (memcmp(&received.msg, &payload->msg, sizeof(received.msg)) != 0) { in efx_siena_loopback_rx_packet() 349 if (received.iteration != payload->iteration) { in efx_siena_loopback_rx_packet() [all …]
|
| /linux/drivers/net/ethernet/sfc/falcon/ |
| H A D | selftest.c | 80 * @payload: Payload used in tests 89 struct ef4_loopback_payload payload; member 293 struct ef4_loopback_payload *payload; in ef4_loopback_rx_packet() local 301 payload = &state->payload; in ef4_loopback_rx_packet() 305 received.ip.saddr = payload->ip.saddr; in ef4_loopback_rx_packet() 307 received.ip.check = payload->ip.check; in ef4_loopback_rx_packet() 318 if (memcmp(&received.header, &payload->header, ETH_HLEN) != 0) { in ef4_loopback_rx_packet() 335 if (memcmp(&received.ip, &payload->ip, sizeof(payload->ip)) != 0) { in ef4_loopback_rx_packet() 343 if (memcmp(&received.msg, &payload->msg, sizeof(received.msg)) != 0) { in ef4_loopback_rx_packet() 351 if (received.iteration != payload->iteration) { in ef4_loopback_rx_packet() [all …]
|
| /linux/crypto/asymmetric_keys/ |
| H A D | restrict.c | 60 * @payload: The payload of the new key. 75 const union key_payload *payload, in restrict_link_by_signature() argument 90 sig = payload->data[asym_auth]; in restrict_link_by_signature() 122 * @payload: The payload of the new key. 135 const union key_payload *payload, in restrict_link_by_ca() argument 143 pkey = payload->data[asym_crypto]; in restrict_link_by_ca() 162 * @payload: The payload of the new key. 176 const union key_payload *payload, in restrict_link_by_digsig() argument 184 pkey = payload->data[asym_crypto]; in restrict_link_by_digsig() 198 return restrict_link_by_signature(dest_keyring, type, payload, in restrict_link_by_digsig() [all …]
|
| /linux/Documentation/security/keys/ |
| H A D | core.rst | 35 - A payload. 67 * Each key can have a payload. This is a quantity of data that represent the 72 Having a payload is not required; and the payload can, in fact, just be a 76 called with a blob of data, and that then creates the key's payload in 81 attached payload back into a blob of data. 120 be given a payload when created. 124 A key of this type has a description and a payload that are arbitrary 130 Like a "user" key, a "logon" key has a payload that is an arbitrary 137 be created and updated from userspace, but the payload is only 173 amount of description and payload space that can be consumed. [all …]
|