| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | bpf_flow.c | 75 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument 78 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 81 memcpy(&val, keys, sizeof(val)); in export_flow_keys() 118 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local 137 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 140 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 146 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local 148 if (keys->n_proto == bpf_htons(ETH_P_IP)) { in _dissect() 161 return parse_eth_proto(skb, keys->n_proto); in _dissect() 167 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local [all …]
|
| /linux/drivers/input/keyboard/ |
| H A D | mtk-pmic-keys.c | 138 struct mtk_pmic_keys *keys; member 150 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 159 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 170 error = of_property_read_u32(keys->dev->of_node, "power-off-time-sec", in mtk_pmic_keys_lp_reset_setup() 178 error = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 202 regmap_update_bits(keys->regmap, regs->pmic_rst_reg, mask, value); in mtk_pmic_keys_lp_reset_setup() 210 regmap_read(info->keys->regmap, info->regs->deb_reg, &key_deb); in mtk_pmic_keys_irq_handler_thread() 216 input_report_key(info->keys->input_dev, info->keycode, pressed); in mtk_pmic_keys_irq_handler_thread() 217 input_sync(info->keys->input_dev); in mtk_pmic_keys_irq_handler_thread() 219 dev_dbg(info->keys->dev, "(%s) key =%d using PMIC\n", in mtk_pmic_keys_irq_handler_thread() [all …]
|
| H A D | omap4-keypad.c | 85 u64 keys; member 116 u64 keys, bool down) in omap4_keypad_report_keys() argument 124 bitmap_from_u64(mask, keys); in omap4_keypad_report_keys() 143 static void omap4_keypad_scan_keys(struct omap4_keypad *keypad_data, u64 keys) in omap4_keypad_scan_keys() argument 149 changed = keys ^ keypad_data->keys; in omap4_keypad_scan_keys() 155 omap4_keypad_report_keys(keypad_data, changed & ~keys, false); in omap4_keypad_scan_keys() 158 omap4_keypad_report_keys(keypad_data, changed & keys, true); in omap4_keypad_scan_keys() 160 keypad_data->keys = keys; in omap4_keypad_scan_keys() 180 u64 keys; in omap4_keypad_irq_thread_fn() local 188 keys = low | (u64)high << 32; in omap4_keypad_irq_thread_fn() [all …]
|
| /linux/arch/arm64/include/asm/ |
| H A D | pointer_auth.h | 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_init_kernel() argument 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_switch_kernel() argument 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel() 74 static inline void ptrauth_keys_install_user(struct ptrauth_keys_user *keys) in ptrauth_keys_install_user() argument 77 __ptrauth_key_install_nosync(APIB, keys->apib); in ptrauth_keys_install_user() 78 __ptrauth_key_install_nosync(APDA, keys->apda); in ptrauth_keys_install_user() 79 __ptrauth_key_install_nosync(APDB, keys->apdb); in ptrauth_keys_install_user() 83 __ptrauth_key_install_nosync(APGA, keys->apga); in ptrauth_keys_install_user() 86 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys) in ptrauth_keys_init_user() argument [all …]
|
| /linux/tools/testing/selftests/net/ |
| H A D | tcp_fastopen_backup_key.c | 49 static void get_keys(int fd, uint32_t *keys) in get_keys() argument 55 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys() 62 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 63 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 67 static void set_keys(int fd, uint32_t *keys) in set_keys() argument 72 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys() 79 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 80 keys[6], keys[7]); in set_keys() 83 keys[0], keys[1], keys[2], keys[3]); in set_keys() 96 uint32_t keys[8]; in build_rcv_fd() local [all …]
|
| /linux/tools/testing/selftests/bpf/map_tests/ |
| H A D | htab_map_batch_ops.c | 14 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 29 keys[i] = i + 1; in map_batch_update() 37 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 42 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument 56 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify() 59 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify() 62 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 64 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify() 81 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 98 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() [all …]
|
| H A D | array_map_batch_ops.c | 15 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 26 keys[i] = i; in map_batch_update() 36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 40 static void map_batch_verify(int *visited, __u32 max_entries, int *keys, in map_batch_verify() argument 52 CHECK(keys[i] + j + 1 != value, in map_batch_verify() 55 j, keys[i], value); in map_batch_verify() 58 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 59 "error: i %d key %d value %lld\n", i, keys[i], in map_batch_verify() 72 int map_fd, *keys, *visited; in __test_map_lookup_and_update_batch() local 92 keys = calloc(max_entries, sizeof(*keys)); in __test_map_lookup_and_update_batch() [all …]
|
| H A D | lpm_trie_map_batch_ops.c | 23 struct test_lpm_key *keys, int *values) in map_batch_update() argument 34 keys[i].prefix = 32; in map_batch_update() 36 inet_pton(AF_INET, buff, &keys[i].ipv4); in map_batch_update() 40 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 45 struct test_lpm_key *keys, int *values) in map_batch_verify() argument 53 inet_ntop(AF_INET, &keys[i].ipv4, buff, 32); in map_batch_verify() 69 struct test_lpm_key *keys, key; in test_lpm_trie_map_batch_ops() local 86 keys = malloc(max_entries * sizeof(struct test_lpm_key)); in test_lpm_trie_map_batch_ops() 89 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_lpm_trie_map_batch_ops() 94 map_batch_update(map_fd, max_entries, keys, values); in test_lpm_trie_map_batch_ops() [all …]
|
| /linux/arch/arm64/kernel/ |
| H A D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys() 46 ptrauth_keys_install_user(keys); in ptrauth_prctl_reset_keys() 67 int ptrauth_set_enabled_keys(struct task_struct *tsk, unsigned long keys, in ptrauth_set_enabled_keys() argument 78 if ((keys & ~PR_PAC_ENABLED_KEYS_MASK) || (enabled & ~keys)) in ptrauth_set_enabled_keys() [all …]
|
| /linux/drivers/net/ethernet/cisco/enic/ |
| H A D | enic_clsf.c | 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 165 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search() [all …]
|
| /linux/drivers/mfd/ |
| H A D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
| /linux/security/integrity/ |
| H A D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 44 asymmetric keys. 47 bool "Require all keys on the integrity keyrings be signed" 52 This option requires that all keys added to the .ima and 57 bool "Provide keyring for platform/firmware trusted keys" 61 Provide a separate, distinct keyring for platform trusted keys, which 74 be added. This keyring shall contain just MOK keys. Unlike keys 75 in the platform keyring, keys contained in the .machine keyring will [all …]
|
| /linux/drivers/md/persistent-data/ |
| H A D | dm-btree.c | 50 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch() 104 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 367 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw() 375 uint64_t *keys, void *value_le) in dm_btree_lookup() argument 397 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup() 402 if (rkey != keys[level]) { in dm_btree_lookup() 462 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single() 471 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument 480 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next() 486 if (*rkey != keys[level]) { in dm_btree_lookup_next() [all …]
|
| H A D | dm-btree.h | 111 uint64_t *keys, void *value_le); 118 uint64_t *keys, uint64_t *rkey, void *value_le); 124 uint64_t *keys, void *value, dm_block_t *new_root) 133 uint64_t *keys, void *value, dm_block_t *new_root, 143 uint64_t *keys, dm_block_t *new_root); 152 uint64_t *keys, uint64_t end_key, 177 int (*fn)(void *context, uint64_t *keys, void *leaf),
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | key-management.c | 427 struct test_key *keys; member 454 struct test_key *key = &collection.keys[index]; in init_key_in_collection() 485 size_t key_sz = sizeof(collection.keys[0]); in init_default_key_collection() 488 free(collection.keys); in init_default_key_collection() 489 collection.keys = NULL; in init_default_key_collection() 501 collection.keys = reallocarray(collection.keys, nr_keys, key_sz); in init_default_key_collection() 502 if (!collection.keys) in init_default_key_collection() 505 memset(collection.keys, 0, nr_keys * key_sz); in init_default_key_collection() 593 struct test_key *key = &collection.keys[i]; in key_collection_socket() 639 struct test_key *key = &collection.keys[i]; in verify_counters() [all …]
|
| /linux/net/core/ |
| H A D | flow_dissector.c | 1767 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 1771 switch (keys->control.addr_type) { in __flow_hash_consistentify() 1773 if ((__force u32)keys->addrs.v4addrs.dst < in __flow_hash_consistentify() 1774 (__force u32)keys->addrs.v4addrs.src) in __flow_hash_consistentify() 1775 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1777 if ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 1778 (__force u16)keys->ports.src) { in __flow_hash_consistentify() 1779 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1783 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify() 1784 &keys->addrs.v6addrs.src, in __flow_hash_consistentify() [all …]
|
| /linux/certs/ |
| H A D | Kconfig | 39 Note: Remove all ECDSA signing keys, e.g. certs/signing_key.pem, 45 bool "Provide system-wide ring of trusted keys" 50 Provide a system keyring to which trusted keys can be added. Keys in 53 userspace may only add extra keys if those keys can be verified by 54 keys already in the keyring. 59 string "Additional X.509 keys for default system keyring" 67 NOTE: If you previously provided keys for the system keyring in the 88 bool "Provide a keyring to which extra trustable keys may be added" 91 If set, provide a keyring to which extra keys may be added, provided 92 those keys are not blacklisted and are vouched for by a key built [all …]
|
| /linux/lib/ |
| H A D | test_static_keys.c | 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() 79 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
| /linux/fs/xfs/libxfs/ |
| H A D | xfs_iext_tree.c | 117 uint64_t keys[KEYS_PER_NODE]; member 281 if (node->keys[n] > offset) in xfs_iext_key_cmp() 283 if (node->keys[n] < offset) in xfs_iext_key_cmp() 366 if (node->keys[i] == XFS_IEXT_KEY_INVALID) in xfs_iext_node_nr_entries() 414 node->keys[0] = xfs_iext_leaf_key(prev, 0); in xfs_iext_grow() 421 node->keys[0] = prev->keys[0]; in xfs_iext_grow() 426 node->keys[i] = XFS_IEXT_KEY_INVALID; in xfs_iext_grow() 447 if (node->keys[i] == old_offset) in xfs_iext_update_node() 448 node->keys[i] = new_offset; in xfs_iext_update_node() 479 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node() [all …]
|
| /linux/include/trace/events/ |
| H A D | bcache.h | 225 TP_PROTO(struct bio *bio, u32 keys), 226 TP_ARGS(bio, keys), 240 __entry->nr_keys = keys; 269 __field(unsigned, keys ) 275 __entry->keys = b->keys.set[b->keys.nsets].data->keys; 279 __entry->bucket, __entry->block, __entry->keys) 366 TP_PROTO(struct btree *b, unsigned keys), 367 TP_ARGS(b, keys), 371 __field(unsigned, keys ) 376 __entry->keys = keys; [all …]
|
| /linux/Documentation/devicetree/bindings/input/ |
| H A D | input-reset.txt | 3 A simple binding to represent a set of keys as described in 4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the 5 sysrq driver. Upon holding the keys for a specified amount of time (if 8 Key sequences are global to the system but all the keys in a set must be coming 12 a set of keys. 18 timeout-ms: duration keys must be pressed together in milliseconds before
|
| /linux/fs/xfs/ |
| H A D | xfs_fsmap.c | 188 const struct xfs_fsmap *keys, 469 const struct xfs_fsmap *keys, in __xfs_getfsmap_datadev() argument 487 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_datadev() 489 start_fsb = XFS_DADDR_TO_FSB(mp, keys[0].fmr_physical); in __xfs_getfsmap_datadev() 490 end_fsb = XFS_DADDR_TO_FSB(mp, min(eofs - 1, keys[1].fmr_physical)); in __xfs_getfsmap_datadev() 497 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in __xfs_getfsmap_datadev() 498 error = xfs_fsmap_owner_to_rmap(&info->low, &keys[0]); in __xfs_getfsmap_datadev() 501 info->low.rm_blockcount = XFS_BB_TO_FSBT(mp, keys[0].fmr_length); in __xfs_getfsmap_datadev() 502 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in __xfs_getfsmap_datadev() 540 keys[1].fmr_offset); in __xfs_getfsmap_datadev() [all …]
|
| /linux/crypto/ |
| H A D | authenc.c | 44 int crypto_authenc_extractkeys(struct crypto_authenc_keys *keys, const u8 *key, in crypto_authenc_extractkeys() argument 66 keys->enckeylen = be32_to_cpu(param->enckeylen); in crypto_authenc_extractkeys() 71 if (keylen < keys->enckeylen) in crypto_authenc_extractkeys() 74 keys->authkeylen = keylen - keys->enckeylen; in crypto_authenc_extractkeys() 75 keys->authkey = key; in crypto_authenc_extractkeys() 76 keys->enckey = key + keys->authkeylen; in crypto_authenc_extractkeys() 88 struct crypto_authenc_keys keys; in crypto_authenc_setkey() local 91 if (crypto_authenc_extractkeys(&keys, key, keylen) != 0) in crypto_authenc_setkey() 97 err = crypto_ahash_setkey(auth, keys.authkey, keys.authkeylen); in crypto_authenc_setkey() 104 err = crypto_skcipher_setkey(enc, keys.enckey, keys.enckeylen); in crypto_authenc_setkey() [all …]
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | flow_dissector.c | 91 struct bpf_flow_keys keys; member 110 .keys = { 131 .keys = { 154 .keys = { 177 .keys = { 201 .keys = { 228 .keys = { 250 .keys = { 277 .keys = { 300 .keys = { [all …]
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | flow_dissector_load.h | 18 struct bpf_map *prog_array, *keys; in bpf_flow_load() local 44 keys = bpf_object__find_map_by_name(*obj, keys_map_name); in bpf_flow_load() 45 if (!keys) in bpf_flow_load() 48 *keys_fd = bpf_map__fd(keys); in bpf_flow_load()
|