/linux/kernel/bpf/ |
H A D | token.c | 16 bool bpf_token_capable(const struct bpf_token *token, int cap) in bpf_token_capable() argument 20 /* BPF token allows ns_capable() level of capabilities */ in bpf_token_capable() 21 userns = token ? token->userns : &init_user_ns; in bpf_token_capable() 24 if (token && security_bpf_token_capable(token, cap) < 0) in bpf_token_capable() 29 void bpf_token_inc(struct bpf_token *token) in bpf_token_inc() argument 31 atomic64_inc(&token->refcnt); in bpf_token_inc() 34 static void bpf_token_free(struct bpf_token *token) in bpf_token_free() argument 36 security_bpf_token_free(token); in bpf_token_free() 37 put_user_ns(token->userns); in bpf_token_free() 38 kfree(token); in bpf_token_free() [all …]
|
/linux/net/mptcp/ |
H A D | token.c | 2 /* Multipath TCP token management 48 static struct token_bucket *token_bucket(u32 token) in token_bucket() argument 50 return &token_hash[token & token_mask]; in token_bucket() 55 __token_lookup_req(struct token_bucket *t, u32 token) in __token_lookup_req() argument 61 if (req->token == token) in __token_lookup_req() 68 __token_lookup_msk(struct token_bucket *t, u32 token) in __token_lookup_msk() argument 74 if (mptcp_sk(sk)->token == token) in __token_lookup_msk() 79 static bool __token_bucket_busy(struct token_bucket *t, u32 token) in __token_bucket_busy() argument 81 return !token || t->chain_len >= TOKEN_MAX_CHAIN_LEN || in __token_bucket_busy() 82 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy() [all …]
|
H A D | token_test.c | 25 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic() 26 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, req->token)); in mptcp_token_test_req_basic() 64 /* be sure the token helpers can dereference sk->sk_prot */ in build_msk() 85 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic() 86 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic() 87 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 91 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(&init_net, ctx->token)); in mptcp_token_test_msk_basic() 101 msk->token = req->token; in mptcp_token_test_accept() 103 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() 107 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(&init_net, msk->token)); in mptcp_token_test_accept() [all …]
|
/linux/net/rxrpc/ |
H A D | key.c | 49 * parse an RxKAD type XDR format token 56 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local 74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 77 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad() 78 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 79 if (!token) in rxrpc_preparse_xdr_rxkad() 82 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 83 if (!token in rxrpc_preparse_xdr_rxkad() 138 const __be32 *xdr = prep->data, *token, *p; rxrpc_preparse_xdr() local 280 struct rxrpc_key_token *token, **pp; rxrpc_preparse() local 383 rxrpc_free_token_list(struct rxrpc_key_token * token) rxrpc_free_token_list() argument 424 const struct rxrpc_key_token *token; rxrpc_describe() local 565 const struct rxrpc_key_token *token; rxrpc_read() local [all...] |
/linux/arch/powerpc/platforms/powernv/ |
H A D | opal-async.c | 44 int i, token = -EBUSY; in __opal_async_get_token() local 51 token = i; in __opal_async_get_token() 57 return token; in __opal_async_get_token() 61 * Note: If the returned token is used in an opal call and opal returns 68 int token; in opal_async_get_token_interruptible() local 70 /* Wait until a token is available */ in opal_async_get_token_interruptible() 74 token = __opal_async_get_token(); in opal_async_get_token_interruptible() 75 if (token < 0) in opal_async_get_token_interruptible() 78 return token; in opal_async_get_token_interruptible() 82 static int __opal_async_release_token(int token) in __opal_async_release_token() argument [all …]
|
H A D | opal-sensor.c | 22 int ret, token; in opal_get_sensor_data() local 26 token = opal_async_get_token_interruptible(); in opal_get_sensor_data() 27 if (token < 0) in opal_get_sensor_data() 28 return token; in opal_get_sensor_data() 30 ret = opal_sensor_read(sensor_hndl, token, &data); in opal_get_sensor_data() 33 ret = opal_async_wait_response(token, &msg); in opal_get_sensor_data() 59 opal_async_release_token(token); in opal_get_sensor_data() 66 int ret, token; in opal_get_sensor_data_u64() local 79 token = opal_async_get_token_interruptible(); in opal_get_sensor_data_u64() 80 if (token < 0) in opal_get_sensor_data_u64() [all …]
|
/linux/fs/btrfs/ |
H A D | accessors.c | 28 void btrfs_init_map_token(struct btrfs_map_token *token, struct extent_buffer *eb) in btrfs_init_map_token() argument 30 token->eb = eb; in btrfs_init_map_token() 31 token->kaddr = folio_address(eb->folios[0]); in btrfs_init_map_token() 32 token->offset = 0; in btrfs_init_map_token() 44 * Generic helpers with a token (cached address of the most recently accessed 60 u##bits btrfs_get_token_##bits(struct btrfs_map_token *token, \ 64 const unsigned long idx = get_eb_folio_index(token->eb, member_offset); \ 65 const unsigned long oil = get_eb_offset_in_folio(token->eb, \ 67 const int unit_size = token->eb->folio_size; \ 68 const int unit_shift = token->eb->folio_shift; \ [all …]
|
/linux/drivers/net/ethernet/freescale/dpaa2/ |
H A D | dpsw.c | 27 * @token: Returned token; use in subsequent API calls 32 * This function returns a unique authentication token, 34 * portal; this token must be used in all subsequent commands for 39 int dpsw_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpsw_id, u16 *token) in dpsw_open() argument 58 *token = mc_cmd_hdr_read_token(&cmd); in dpsw_open() 67 * @token: Token of DPSW object 74 int dpsw_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpsw_close() argument 81 token); in dpsw_close() 91 * @token: Token of DPSW object 95 int dpsw_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpsw_enable() argument [all …]
|
H A D | dpni.c | 83 * @token: Returned token; use in subsequent API calls 88 * This function returns a unique authentication token, 90 * portal; this token must be used in all subsequent commands for 98 u16 *token) in dpni_open() argument 118 *token = mc_cmd_hdr_read_token(&cmd); in dpni_open() 127 * @token: Token of DPNI object 136 u16 token) in dpni_close() argument 143 token); in dpni_close() 153 * @token: Token of DPNI object 163 u16 token, in dpni_set_pools() argument [all …]
|
H A D | dprtc.c | 17 * @token: Returned token; use in subsequent API calls 22 * This function returns a unique authentication token, 24 * portal; this token must be used in all subsequent commands for 32 u16 *token) in dprtc_open() argument 48 *token = mc_cmd_hdr_read_token(&cmd); in dprtc_open() 57 * @token: Token of DPRTC object 66 u16 token) in dprtc_close() argument 71 token); in dprtc_close() 80 * @token: Token of DPRTC object 93 u16 token, in dprtc_set_irq_enable() argument [all …]
|
H A D | dpmac.c | 14 * @token: Returned token; use in subsequent API calls 19 * This function returns a unique authentication token, 21 * portal; this token must be used in all subsequent commands for 29 u16 *token) in dpmac_open() argument 48 *token = mc_cmd_hdr_read_token(&cmd); in dpmac_open() 57 * @token: Token of DPMAC object 66 u16 token) in dpmac_close() argument 72 token); in dpmac_close() 83 * @token: Token of DPMAC object 90 u16 token, in dpmac_get_attributes() argument [all …]
|
H A D | dpsw.h | 23 int dpsw_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpsw_id, u16 *token); 25 int dpsw_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 85 int dpsw_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 87 int dpsw_disable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 89 int dpsw_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 118 int dpsw_set_irq_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 121 int dpsw_set_irq_mask(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 124 int dpsw_get_irq_status(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 127 int dpsw_clear_irq_status(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 169 int dpsw_get_attributes(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, [all …]
|
/linux/scripts/genksyms/ |
H A D | parse.y | 64 %token ASM_KEYW 65 %token ATTRIBUTE_KEYW 66 %token AUTO_KEYW 67 %token BOOL_KEYW 68 %token BUILTIN_INT_KEYW 69 %token CHAR_KEYW 70 %token CONST_KEYW 71 %token DOUBLE_KEYW 72 %token ENUM_KEYW 73 %token EXTERN_KEYW [all …]
|
H A D | lex.l | 93 * We mark any token, that that equals to a known enumerator, as 136 int token, count = 0; 147 token = yylex1(); 149 if (token == 0) 151 else if (token == FILENAME) 180 switch (token) 187 switch (token = r) 221 token = TYPE; 249 switch (token) 258 token [all...] |
/linux/drivers/crypto/caam/ |
H A D | dpseci.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, associated with the 22 * specific object ID and the specific MC portal; this token must be used in all 28 u16 *token) in dpseci_open() argument 43 *token = mc_cmd_hdr_read_token(&cmd); in dpseci_open() 52 * @token: Token of DPSECI object 59 int dpseci_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpseci_close() argument 65 token); in dpseci_close() 73 * @token: Token of DPSECI object 77 int dpseci_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpseci_enable() argument [all …]
|
/linux/drivers/bus/fsl-mc/ |
H A D | dpcon.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) in dpcon_open() argument 50 *token = mc_cmd_hdr_read_token(&cmd); in dpcon_open() 60 * @token: Token of DPCON object 69 u16 token) in dpcon_close() argument 76 token); in dpcon_close() 87 * @token: Token of DPCON object 93 u16 token) in dpcon_enable() argument [all …]
|
H A D | fsl-mc-uapi.c | 25 bool token; member 85 .token = true, 91 .token = true, 97 .token = false, 103 .token = true, 110 .token = true, 117 .token = true, 124 .token = true, 131 .token = true, 137 .token = true, [all …]
|
H A D | dpbp.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) in dpbp_open() argument 49 *token = mc_cmd_hdr_read_token(&cmd); in dpbp_open() 59 * @token: Token of DPBP object 68 u16 token) in dpbp_close() argument 74 token); in dpbp_close() 85 * @token: Token of DPBP object 91 u16 token) in dpbp_enable() argument [all …]
|
H A D | dprc.c | 24 * @token: Returned token of DPRC object 33 u16 *token) in dprc_open() argument 51 *token = mc_cmd_hdr_read_token(&cmd); in dprc_open() 61 * @token: Token of DPRC object 70 u16 token) in dprc_close() argument 76 token); in dprc_close() 87 * @token: Token of DPRC object 114 u16 token, in dprc_reset_container() argument 144 cmd.header = mc_encode_cmd_header(cmdid, cmd_flags, token); in dprc_reset_container() 158 * @token: Token of DPRC object [all …]
|
/linux/drivers/dma/fsl-dpaa2-qdma/ |
H A D | dpdmai.c | 61 * @token: Returned token; use in subsequent API calls 66 * This function returns a unique authentication token, 68 * portal; this token must be used in all subsequent commands for 74 int dpdmai_id, u16 *token) in dpdmai_open() argument 93 *token = mc_cmd_hdr_read_token(&cmd); in dpdmai_open() 103 * @token: Token of DPDMAI object 110 int dpdmai_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpdmai_close() argument 116 cmd_flags, token); in dpdmai_close() 128 * @token: Token of DPDMAI object 132 int dpdmai_destroy(struct fsl_mc_io *mc_io, u32 cmd_flags, u32 dpdmai_id, u16 token) in dpdmai_destroy() argument [all …]
|
/linux/drivers/soc/fsl/dpio/ |
H A D | dpio.c | 23 * @token: Returned token; use in subsequent API calls 28 * This function returns a unique authentication token, 30 * portal; this token must be used in all subsequent commands for 38 u16 *token) in dpio_open() argument 56 *token = mc_cmd_hdr_read_token(&cmd); in dpio_open() 65 * @token: Token of DPIO object 71 u16 token) in dpio_close() argument 78 token); in dpio_close() 87 * @token: Token of DPIO object 93 u16 token) in dpio_enable() argument [all …]
|
/linux/tools/perf/pmu-events/arch/x86/amdzen3/ |
H A D | other.json | 22 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 28 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 34 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 40 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 46 …cles where a dispatch group is valid but does not get dispatched due to a token stall. Integer Sch… 52 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 58 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 64 …patched due to a Token Stall. Also counts cycles when the thread is not selected to dispatch but w… 70 …cles where a dispatch group is valid but does not get dispatched due to a token stall. Insufficien… 76 …cles where a dispatch group is valid but does not get dispatched due to a token stall. AGSQ Tokens… [all …]
|
/linux/tools/testing/selftests/net/mptcp/ |
H A D | userspace_pm.sh | 229 client_token=$(mptcp_lib_evts_get_info token "$client_evts") 232 server_token=$(mptcp_lib_evts_get_info token "$server_evts") 286 local token 292 token=$(mptcp_lib_evts_get_info token "$evt" $e_type) 302 check_expected "type" "token" "addr" "dport" "id" 312 # ADD_ADDR using an invalid token should result in no action 314 ip netns exec "$ns2" ./pm_nl_ctl ann 10.0.2.2 token $invalid_token id\ 319 print_test "ADD_ADDR 10.0.2.2 (ns2) => ns1, invalid token" 330 ./pm_nl_ctl ann 10.0.2.2 token "$client4_token" id $client_addr_id dev\ 340 dead:beef:2::2 token "$client6_token" id $client_addr_id dev ns2eth1 [all …]
|
/linux/drivers/virt/coco/arm-cca-guest/ |
H A D | arm-cca-guest.c | 18 * struct arm_cca_token_info - a descriptor for the token buffer. 21 * @granule: PA of the granule to which the token will be written 44 * arm_cca_attestation_continue - Retrieve the attestation token data. 48 * Attestation token generation is a long running operation and therefore 49 * the token data may not be retrieved in a single call. Moreover, the 50 * token retrieval operation must be requested on the same CPU on which the 51 * attestation token generation was initialised. 53 * times until the entire token data is retrieved. 70 * arm_cca_report_new - Generate a new attestation token. 75 * Initialise the attestation token generation using the challenge data [all …]
|
/linux/sound/soc/intel/avs/ |
H A D | topology.c | 29 * Scan provided block of tuples for the specified token. If found, 30 * @offset is updated with position at which first matching token is 37 u32 block_size, u32 token, u32 *offset) in avs_tplg_vendor_array_lookup() argument 49 if (le32_to_cpu(tuple->token) == token) { in avs_tplg_vendor_array_lookup() 68 * several vendor tuples and a specific token marks the beginning of 73 u32 block_size, u32 token, u32 *offset) in avs_tplg_vendor_array_lookup_next() argument 84 ret = avs_tplg_vendor_array_lookup(tuples, block_size, token, offset); in avs_tplg_vendor_array_lookup_next() 91 * Scan provided block of tuples for the specified token which marks 94 * matching token has been found. In such case, returned @size is 118 * @token: vendor specific token that identifies tuple [all …]
|