| /linux/drivers/net/ethernet/micrel/ |
| H A D | ks8851_spi.c | 56 #define to_ks8851_spi(ks) container_of((ks), struct ks8851_net_spi, ks8851) argument 78 static void ks8851_lock_spi(struct ks8851_net *ks, unsigned long *flags) in ks8851_lock_spi() argument 80 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_lock_spi() 92 static void ks8851_unlock_spi(struct ks8851_net *ks, unsigned long *flags) in ks8851_unlock_spi() argument 94 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_unlock_spi() 114 static void ks8851_wrreg16_spi(struct ks8851_net *ks, unsigned int reg, in ks8851_wrreg16_spi() argument 117 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_wrreg16_spi() 132 netdev_err(ks->netdev, "spi_sync() failed\n"); in ks8851_wrreg16_spi() 145 static void ks8851_rdreg(struct ks8851_net *ks, unsigned int op, in ks8851_rdreg() argument 148 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_rdreg() [all …]
|
| H A D | ks8851.h | 411 void (*lock)(struct ks8851_net *ks, 413 void (*unlock)(struct ks8851_net *ks, 415 unsigned int (*rdreg16)(struct ks8851_net *ks, 417 void (*wrreg16)(struct ks8851_net *ks, 419 void (*rdfifo)(struct ks8851_net *ks, u8 *buff, 421 void (*wrfifo)(struct ks8851_net *ks, 425 void (*flush_tx_work)(struct ks8851_net *ks); 442 static void __maybe_unused ks8851_done_tx(struct ks8851_net *ks, in ks8851_done_tx() argument 445 struct net_device *dev = ks->netdev; in ks8851_done_tx()
|
| /linux/kernel/debug/kdb/ |
| H A D | kdb_debugger.c | 37 int kdb_common_init_state(struct kgdb_state *ks) in kdb_common_init_state() argument 40 kdb_current_task = kgdb_info[ks->cpu].task; in kdb_common_init_state() 41 kdb_current_regs = kgdb_info[ks->cpu].debuggerinfo; in kdb_common_init_state() 53 int kdb_stub(struct kgdb_state *ks) in kdb_stub() argument 57 unsigned long addr = kgdb_arch_pc(ks->ex_vector, ks->linux_regs); in kdb_stub() 62 kdb_ks = ks; in kdb_stub() 66 addr = instruction_pointer(ks->linux_regs); in kdb_stub() 68 ks->pass_exception = 0; in kdb_stub() 72 if (ks->err_code == KDB_REASON_SYSTEM_NMI && ks->signo == SIGTRAP) in kdb_stub() 82 if (addr != instruction_pointer(ks->linux_regs)) in kdb_stub() [all …]
|
| /linux/drivers/net/ovpn/ |
| H A D | io.c | 103 struct ovpn_crypto_key_slot *ks; in ovpn_decrypt_post() local 118 ks = ovpn_skb_cb(skb)->ks; in ovpn_decrypt_post() 131 ret = ovpn_pktid_recv(&ks->pid_recv, ntohl(*pid), 0); in ovpn_decrypt_post() 204 if (likely(ks)) in ovpn_decrypt_post() 205 ovpn_crypto_key_slot_put(ks); in ovpn_decrypt_post() 211 struct ovpn_crypto_key_slot *ks; in ovpn_recv() local 218 ks = ovpn_crypto_key_id_to_slot(&peer->crypto, key_id); in ovpn_recv() 219 if (unlikely(!ks)) { in ovpn_recv() 230 ovpn_decrypt_post(skb, ovpn_aead_decrypt(peer, ks, skb)); in ovpn_recv() 235 struct ovpn_crypto_key_slot *ks; in ovpn_encrypt_post() local [all …]
|
| /linux/drivers/net/ethernet/intel/i40e/ |
| H A D | i40e_ethtool.c | 494 struct ethtool_link_ksettings *ks) in i40e_phy_type_to_ethtool() argument 499 ethtool_link_ksettings_zero_link_mode(ks, supported); in i40e_phy_type_to_ethtool() 500 ethtool_link_ksettings_zero_link_mode(ks, advertising); in i40e_phy_type_to_ethtool() 503 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() 506 ethtool_link_ksettings_add_link_mode(ks, advertising, in i40e_phy_type_to_ethtool() 509 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() 511 ethtool_link_ksettings_add_link_mode(ks, advertising, in i40e_phy_type_to_ethtool() 520 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() 523 ethtool_link_ksettings_add_link_mode(ks, advertising, in i40e_phy_type_to_ethtool() 527 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() [all …]
|
| /linux/lib/crypto/ |
| H A D | aescfb.c | 44 u8 ks[AES_BLOCK_SIZE]; in aescfb_encrypt() local 48 aescfb_encrypt_block(ctx, ks, v); in aescfb_encrypt() 49 crypto_xor_cpy(dst, src, ks, min(len, AES_BLOCK_SIZE)); in aescfb_encrypt() 57 memzero_explicit(ks, sizeof(ks)); in aescfb_encrypt() 73 u8 ks[2][AES_BLOCK_SIZE]; in aescfb_decrypt() local 75 aescfb_encrypt_block(ctx, ks[0], iv); in aescfb_decrypt() 84 aescfb_encrypt_block(ctx, ks[!i], src); in aescfb_decrypt() 86 crypto_xor_cpy(dst, src, ks[i], min(len, AES_BLOCK_SIZE)); in aescfb_decrypt() 93 memzero_explicit(ks, sizeof(ks)); in aescfb_decrypt()
|
| /linux/kernel/debug/ |
| H A D | debug_core.h | 67 extern int gdb_serial_stub(struct kgdb_state *ks); 71 extern int gdbstub_state(struct kgdb_state *ks, char *cmd); 75 extern int kdb_stub(struct kgdb_state *ks); 77 extern int kdb_common_init_state(struct kgdb_state *ks); 81 static inline int kdb_stub(struct kgdb_state *ks) in kdb_stub() argument
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | get_stack_raw_tp.c | 32 struct ksym *ks; in get_stack_print_output() local 51 ks = ksym_search(raw_data[i]); in get_stack_print_output() 52 if (ks && (strcmp(ks->name, nonjit_func) == 0)) { in get_stack_print_output() 68 ks = ksym_search(e.kern_stack[i]); in get_stack_print_output() 69 if (ks && (strcmp(ks->name, nonjit_func) == 0)) { in get_stack_print_output()
|
| H A D | kprobe_multi_test.c | 500 struct ksym *ks; get_syms() local
|
| /linux/fs/btrfs/ |
| H A D | locking.c | 84 struct btrfs_lockdep_keyset *ks; in btrfs_set_buffer_lockdep_class() local 86 ASSERT(level < ARRAY_SIZE(ks->keys)); in btrfs_set_buffer_lockdep_class() 89 for (ks = btrfs_lockdep_keysets; ks->id; ks++) in btrfs_set_buffer_lockdep_class() 90 if (ks->id == objectid) in btrfs_set_buffer_lockdep_class() 93 lockdep_set_class_and_name(&eb->lock, &ks->keys[level], ks->names[level]); in btrfs_set_buffer_lockdep_class()
|
| /linux/drivers/media/i2c/ |
| H A D | ks0127.c | 324 struct ks0127 *ks = to_ks0127(sd); in ks0127_write() local 330 ks->regs[reg] = val; in ks0127_write() 337 struct ks0127 *ks = to_ks0127(sd); in ks0127_and_or() local 339 u8 val = ks->regs[reg]; in ks0127_and_or() 396 struct ks0127 *ks = to_ks0127(sd); in ks0127_s_routing() local 472 if (ks->norm & V4L2_STD_525_60) in ks0127_s_routing() 528 struct ks0127 *ks = to_ks0127(sd); in ks0127_s_std() local 533 ks->norm = std; in ks0127_s_std() 647 struct ks0127 *ks; in ks0127_probe() local 654 ks = devm_kzalloc(&client->dev, sizeof(*ks), GFP_KERNEL); in ks0127_probe() [all …]
|
| /linux/kernel/module/ |
| H A D | kallsyms.c | 27 const struct kernel_symbol *ks; in is_exported() local 30 ks = lookup_exported_symbol(name, __start___ksymtab, __stop___ksymtab); in is_exported() 32 ks = lookup_exported_symbol(name, mod->syms, mod->syms + mod->num_syms); in is_exported() 34 return ks && kernel_symbol_value(ks) == value; in is_exported()
|
| H A D | version.c | 142 struct kernel_symbol *ks, in module_layout() argument
|
| H A D | internal.h | 394 struct kernel_symbol *ks, struct tracepoint * const *tp);
|
| /linux/tools/perf/util/ |
| H A D | call-path.c | 79 struct symbol *sym, u64 ip, u64 ks) in call_path__findnew() argument 84 bool in_kernel = ip >= ks; in call_path__findnew()
|
| H A D | thread-stack.c | 914 u64 ks = ts->kernel_start; in thread_stack__no_call_return() local 920 if (ip >= ks && addr < ks) { in thread_stack__no_call_return() 928 cp = call_path__findnew(cpr, root, tsym, addr, ks); in thread_stack__no_call_return() 932 } else if (thread_stack__in_kernel(ts) && ip < ks) { in thread_stack__no_call_return() 958 cp = call_path__findnew(cpr, root, tsym, addr, ks); in thread_stack__no_call_return() 968 cp = call_path__findnew(cpr, parent, tsym, addr, ks); in thread_stack__no_call_return() 982 cp = call_path__findnew(cpr, parent, tsym, addr, ks); in thread_stack__no_call_return() 988 cp = call_path__findnew(cpr, cp, fsym, ip, ks); in thread_stack__no_call_return()
|
| H A D | call-path.h | 66 struct symbol *sym, u64 ip, u64 ks);
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | trace_helpers.c | 169 struct ksym *ks; in search_kallsyms_custom_local() 174 ks = &ksyms->syms[mid]; in search_kallsyms_custom_local() 175 result = cmp_cb(p, ks); in search_kallsyms_custom_local() 181 return ks; in search_kallsyms_custom_local() 619 struct ksym *ks; 659 ks = search_kallsyms_custom_local(ksyms, name, search_kallsyms_compare); 660 if (!ks) { 665 ksym_name = ks->name; 167 struct ksym *ks; search_kallsyms_custom_local() local
|
| /linux/arch/microblaze/include/asm/ |
| H A D | mmu.h | 44 unsigned long ks:1; /* Supervisor 'key' (normally 0) */ member
|
| /linux/drivers/char/hw_random/ |
| H A D | Makefile | 45 obj-$(CONFIG_HW_RANDOM_KEYSTONE) += ks-sa-rng.o
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-ce-glue.c | 543 static u8 const ks[3][SM4_BLOCK_SIZE] = { in sm4_xcbc_setkey() local 556 sm4_ce_crypt_block(ctx->key.rkey_enc, key2, ks[0]); in sm4_xcbc_setkey() 557 sm4_ce_crypt(ctx->key.rkey_enc, ctx->consts, ks[1], 2); in sm4_xcbc_setkey()
|
| H A D | aes-glue.c | 810 static u8 const ks[3][AES_BLOCK_SIZE] = { in xcbc_setkey() local 826 aes_ecb_encrypt(key, ks[0], ctx->key.key_enc, rounds, 1); in xcbc_setkey() 827 aes_ecb_encrypt(ctx->consts, ks[1], ctx->key.key_enc, rounds, 2); in xcbc_setkey()
|
| /linux/mm/ |
| H A D | slab_common.c | 1226 size_t ks; in kfree_sensitive() local 1229 ks = ksize(mem); in kfree_sensitive() 1230 if (ks) { in kfree_sensitive() 1231 kasan_unpoison_range(mem, ks); in kfree_sensitive() 1232 memzero_explicit(mem, ks); in kfree_sensitive()
|
| H A D | slub.c | 6945 size_t ks = 0; in __do_krealloc() 6967 ks = orig_size = kfence_ksize(p); in __do_krealloc() 6974 ks = page_size(page); in __do_krealloc() 6975 WARN_ON(ks <= KMALLOC_MAX_CACHE_SIZE); in __do_krealloc() 6980 ks = s->object_size; in __do_krealloc() 6985 if (new_size > ks) in __do_krealloc() 6998 memset(kasan_reset_tag(p) + new_size, 0, ks - new_size); in __do_krealloc() 7005 if (s->flags & SLAB_RED_ZONE && new_size < ks) in __do_krealloc() 7007 SLUB_RED_ACTIVE, ks - new_size); in __do_krealloc() 7018 memcpy(ret, kasan_reset_tag(p), orig_size ?: ks); in __do_krealloc() 6943 size_t ks = 0; __do_krealloc() local [all...] |
| /linux/drivers/md/ |
| H A D | dm-crypt.c | 940 u8 *es, *ks, *data, *data2, *data_offset; in crypt_iv_elephant() local 948 ks = kzalloc(32, GFP_NOIO); /* Elephant sector key */ in crypt_iv_elephant() 950 if (!req || !es || !ks) { in crypt_iv_elephant() 959 sg_init_one(&dst, ks, 16); in crypt_iv_elephant() 968 sg_init_one(&dst, &ks[16], 16); in crypt_iv_elephant() 993 crypto_xor(data_offset + i * 32, ks, 32); in crypt_iv_elephant() 1004 kfree_sensitive(ks); in crypt_iv_elephant()
|