/Linux-v6.1/drivers/crypto/amcc/ |
D | crypto4xx_alg.c | 30 static void set_dynamic_sa_command_0(struct dynamic_sa_ctl *sa, u32 save_h, in set_dynamic_sa_command_0() argument 35 sa->sa_command_0.w = 0; in set_dynamic_sa_command_0() 36 sa->sa_command_0.bf.save_hash_state = save_h; in set_dynamic_sa_command_0() 37 sa->sa_command_0.bf.save_iv = save_iv; in set_dynamic_sa_command_0() 38 sa->sa_command_0.bf.load_hash_state = ld_h; in set_dynamic_sa_command_0() 39 sa->sa_command_0.bf.load_iv = ld_iv; in set_dynamic_sa_command_0() 40 sa->sa_command_0.bf.hdr_proc = hdr_proc; in set_dynamic_sa_command_0() 41 sa->sa_command_0.bf.hash_alg = h; in set_dynamic_sa_command_0() 42 sa->sa_command_0.bf.cipher_alg = c; in set_dynamic_sa_command_0() 43 sa->sa_command_0.bf.pad_type = pad_type & 3; in set_dynamic_sa_command_0() [all …]
|
/Linux-v6.1/fs/xfs/scrub/ |
D | agheader.c | 39 error = xchk_ag_init_existing(sc, agno, &sc->sa); in xchk_superblock_xref() 48 /* scrub teardown will take care of sc->sa for us */ in xchk_superblock_xref() 373 struct xfs_agf *agf = sc->sa.agf_bp->b_addr; in xchk_agf_xref_freeblks() 377 if (!sc->sa.bno_cur) in xchk_agf_xref_freeblks() 380 error = xfs_alloc_query_all(sc->sa.bno_cur, in xchk_agf_xref_freeblks() 382 if (!xchk_should_check_xref(sc, &error, &sc->sa.bno_cur)) in xchk_agf_xref_freeblks() 385 xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp); in xchk_agf_xref_freeblks() 393 struct xfs_agf *agf = sc->sa.agf_bp->b_addr; in xchk_agf_xref_cntbt() 399 if (!sc->sa.cnt_cur) in xchk_agf_xref_cntbt() 403 error = xfs_alloc_lookup_le(sc->sa.cnt_cur, 0, -1U, &have); in xchk_agf_xref_cntbt() [all …]
|
D | common.c | 409 struct xchk_ag *sa) in xchk_ag_read_headers() argument 414 ASSERT(!sa->pag); in xchk_ag_read_headers() 415 sa->pag = xfs_perag_get(mp, agno); in xchk_ag_read_headers() 416 if (!sa->pag) in xchk_ag_read_headers() 419 error = xfs_ialloc_read_agi(sa->pag, sc->tp, &sa->agi_bp); in xchk_ag_read_headers() 423 error = xfs_alloc_read_agf(sa->pag, sc->tp, 0, &sa->agf_bp); in xchk_ag_read_headers() 427 error = xfs_alloc_read_agfl(sa->pag, sc->tp, &sa->agfl_bp); in xchk_ag_read_headers() 437 struct xchk_ag *sa) in xchk_ag_btcur_free() argument 439 if (sa->refc_cur) in xchk_ag_btcur_free() 440 xfs_btree_del_cursor(sa->refc_cur, XFS_BTREE_ERROR); in xchk_ag_btcur_free() [all …]
|
D | refcount.c | 287 if (!sc->sa.rmap_cur || xchk_skip_xref(sc->sm)) in xchk_refcountbt_xref_rmap() 297 error = xfs_rmap_query_range(sc->sa.rmap_cur, &low, &high, in xchk_refcountbt_xref_rmap() 299 if (!xchk_should_check_xref(sc, &error, &sc->sa.rmap_cur)) in xchk_refcountbt_xref_rmap() 304 xchk_btree_xref_set_corrupt(sc, sc->sa.rmap_cur, 0); in xchk_refcountbt_xref_rmap() 369 if (!sc->sa.rmap_cur || xchk_skip_xref(sc->sm)) in xchk_refcount_xref_rmap() 373 error = xfs_btree_count_blocks(sc->sa.refc_cur, &refcbt_blocks); in xchk_refcount_xref_rmap() 374 if (!xchk_btree_process_error(sc, sc->sa.refc_cur, 0, &error)) in xchk_refcount_xref_rmap() 376 error = xchk_count_rmap_ownedby_ag(sc, sc->sa.rmap_cur, in xchk_refcount_xref_rmap() 378 if (!xchk_should_check_xref(sc, &error, &sc->sa.rmap_cur)) in xchk_refcount_xref_rmap() 381 xchk_btree_xref_set_corrupt(sc, sc->sa.rmap_cur, 0); in xchk_refcount_xref_rmap() [all …]
|
/Linux-v6.1/arch/s390/kernel/ |
D | crash_dump.c | 63 struct save_area *sa; in save_area_alloc() local 65 sa = memblock_alloc(sizeof(*sa), 8); in save_area_alloc() 66 if (!sa) in save_area_alloc() 70 list_add(&sa->list, &dump_save_areas); in save_area_alloc() 72 list_add_tail(&sa->list, &dump_save_areas); in save_area_alloc() 73 return sa; in save_area_alloc() 87 void __init save_area_add_regs(struct save_area *sa, void *regs) in save_area_add_regs() argument 92 memcpy(&sa->psw, &lc->psw_save_area, sizeof(sa->psw)); in save_area_add_regs() 93 memcpy(&sa->ctrs, &lc->cregs_save_area, sizeof(sa->ctrs)); in save_area_add_regs() 94 memcpy(&sa->gprs, &lc->gpregs_save_area, sizeof(sa->gprs)); in save_area_add_regs() [all …]
|
/Linux-v6.1/security/apparmor/ |
D | audit.c | 53 * Record common AppArmor audit data from @sa 57 struct common_audit_data *sa = ca; in audit_pre() local 61 aa_audit_type[aad(sa)->type]); in audit_pre() 64 if (aad(sa)->op) { in audit_pre() 65 audit_log_format(ab, " operation=\"%s\"", aad(sa)->op); in audit_pre() 68 if (aad(sa)->info) { in audit_pre() 69 audit_log_format(ab, " info=\"%s\"", aad(sa)->info); in audit_pre() 70 if (aad(sa)->error) in audit_pre() 71 audit_log_format(ab, " error=%d", aad(sa)->error); in audit_pre() 74 if (aad(sa)->label) { in audit_pre() [all …]
|
D | ipc.c | 54 struct common_audit_data *sa = va; in audit_signal_cb() local 56 if (aad(sa)->request & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 58 audit_signal_mask(aad(sa)->request)); in audit_signal_cb() 59 if (aad(sa)->denied & AA_SIGNAL_PERM_MASK) { in audit_signal_cb() 61 audit_signal_mask(aad(sa)->denied)); in audit_signal_cb() 64 if (aad(sa)->signal == SIGUNKNOWN) in audit_signal_cb() 66 aad(sa)->unmappedsig); in audit_signal_cb() 67 else if (aad(sa)->signal < MAXMAPPED_SIGNAME) in audit_signal_cb() 68 audit_log_format(ab, " signal=%s", sig_names[aad(sa)->signal]); in audit_signal_cb() 71 aad(sa)->signal - SIGRT_BASE); in audit_signal_cb() [all …]
|
D | net.c | 73 struct common_audit_data *sa = va; in audit_net_cb() local 75 if (address_family_names[sa->u.net->family]) in audit_net_cb() 77 address_family_names[sa->u.net->family]); in audit_net_cb() 80 sa->u.net->family); in audit_net_cb() 81 if (sock_type_names[aad(sa)->net.type]) in audit_net_cb() 83 sock_type_names[aad(sa)->net.type]); in audit_net_cb() 86 aad(sa)->net.type); in audit_net_cb() 87 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb() 89 if (aad(sa)->request & NET_PERMS_MASK) { in audit_net_cb() 91 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb() [all …]
|
D | task.c | 210 struct common_audit_data *sa = va; in audit_ptrace_cb() local 212 if (aad(sa)->request & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 214 audit_ptrace_mask(aad(sa)->request)); in audit_ptrace_cb() 216 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 218 audit_ptrace_mask(aad(sa)->denied)); in audit_ptrace_cb() 222 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_ptrace_cb() 230 struct common_audit_data *sa) in profile_ptrace_perm() argument 234 aad(sa)->peer = peer; in profile_ptrace_perm() 238 return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb); in profile_ptrace_perm() 243 struct common_audit_data *sa) in profile_tracee_perm() argument [all …]
|
D | capability.c | 46 struct common_audit_data *sa = va; in audit_cb() local 49 audit_log_untrustedstring(ab, capability_names[sa->u.cap]); in audit_cb() 54 * @sa: audit data 62 * Returns: 0 or sa->error on success, error code on failure 64 static int audit_caps(struct common_audit_data *sa, struct aa_profile *profile, in audit_caps() argument 70 aad(sa)->error = error; in audit_caps() 102 return aa_audit(type, profile, sa, audit_cb); in audit_caps() 110 * @sa: audit data (MAY BE NULL indicating no auditing) 115 unsigned int opts, struct common_audit_data *sa) in profile_capable() argument 131 aad(sa)->info = "optional: no audit"; in profile_capable() [all …]
|
D | resource.c | 32 struct common_audit_data *sa = va; in audit_cb() local 35 rlim_names[aad(sa)->rlim.rlim], aad(sa)->rlim.max); in audit_cb() 36 if (aad(sa)->peer) { in audit_cb() 38 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_cb() 50 * Returns: 0 or sa->error else other error code on failure 56 DEFINE_AUDIT_DATA(sa, LSM_AUDIT_DATA_NONE, OP_SETRLIMIT); in audit_resource() 58 aad(&sa)->rlim.rlim = resource; in audit_resource() 59 aad(&sa)->rlim.max = value; in audit_resource() 60 aad(&sa)->peer = peer; in audit_resource() 61 aad(&sa)->info = info; in audit_resource() [all …]
|
D | file.c | 46 struct common_audit_data *sa = va; in file_audit_cb() local 50 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 52 map_mask_to_chr_mask(aad(sa)->request)); in file_audit_cb() 55 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 57 map_mask_to_chr_mask(aad(sa)->denied)); in file_audit_cb() 60 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 64 from_kuid(&init_user_ns, aad(sa)->fs.ouid)); in file_audit_cb() 67 if (aad(sa)->peer) { in file_audit_cb() 69 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in file_audit_cb() 71 } else if (aad(sa)->fs.target) { in file_audit_cb() [all …]
|
/Linux-v6.1/drivers/net/ethernet/aquantia/atlantic/macsec/ |
D | macsec_struct.h | 13 /*! This is used to store the 48 bit value used to compare SA, DA or 14 * halfDA+half SA value. 28 * 2: compare SA only 29 * 3: compare half DA + half SA 32 * 6: compare SA + ethertype 195 /*! If packet matches and tagged as controlled-packet, this SC/SA 196 * index is used for later SC and SA table lookup. 199 /*! This field is used to specify how many SA entries are 201 * 2'b00: 1 SC has 4 SA. 203 * SA index is equivalent to {SC_Index[4:2], SC entry's current AN[1:0] [all …]
|
/Linux-v6.1/arch/m68k/ifpsp060/ |
D | README | 32 fpsp.sa Full FP Kernel Module - hex image 36 pfpsp.sa Partial FP Kernel Module - hex image 39 fplsp.sa FP Library Module - hex image 43 isp.sa Integer Unimplemented Kernel Module - hex image 47 ilsp.sa Integer Unimplemented Library Module - hex image 51 fskeleton.s Sample Call-outs needed by fpsp.sa and pfpsp.sa 53 iskeleton.s Sample Call-outs needed by isp.sa 55 os.s Sample Call-outs needed by fpsp.sa, pfpsp.sa, and isp.sa 57 ftest.sa Simple test program to test that {p}fpsp.sa 61 itest.sa Simple test program to test that isp.sa was [all …]
|
/Linux-v6.1/drivers/net/netdevsim/ |
D | ipsec.c | 33 "SA count=%u tx=%u\n", in nsim_dbg_netdev_ops_read() 37 struct nsim_sa *sap = &ipsec->sa[i]; in nsim_dbg_netdev_ops_read() 43 "sa[%i] %cx ipaddr=0x%08x %08x %08x %08x\n", in nsim_dbg_netdev_ops_read() 47 "sa[%i] spi=0x%08x proto=0x%x salt=0x%08x crypt=%d\n", in nsim_dbg_netdev_ops_read() 51 "sa[%i] key=0x%08x %08x %08x %08x\n", in nsim_dbg_netdev_ops_read() 75 /* search sa table */ in nsim_ipsec_find_empty_idx() 77 if (!ipsec->sa[i].used) in nsim_ipsec_find_empty_idx() 133 struct nsim_sa sa; in nsim_ipsec_add_sa() local 155 netdev_err(dev, "No space for SA in Rx table!\n"); in nsim_ipsec_add_sa() 160 memset(&sa, 0, sizeof(sa)); in nsim_ipsec_add_sa() [all …]
|
/Linux-v6.1/tools/perf/trace/beauty/ |
D | sockaddr.c | 13 static size_t af_inet__scnprintf(struct sockaddr *sa, char *bf, size_t size) in af_inet__scnprintf() argument 15 struct sockaddr_in *sin = (struct sockaddr_in *)sa; in af_inet__scnprintf() 21 static size_t af_inet6__scnprintf(struct sockaddr *sa, char *bf, size_t size) in af_inet6__scnprintf() argument 23 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa; in af_inet6__scnprintf() 36 static size_t af_local__scnprintf(struct sockaddr *sa, char *bf, size_t size) in af_local__scnprintf() argument 38 struct sockaddr_un *sun = (struct sockaddr_un *)sa; in af_local__scnprintf() 42 static size_t (*af_scnprintfs[])(struct sockaddr *sa, char *bf, size_t size) = { 50 struct sockaddr *sa = (struct sockaddr *)arg->augmented.args; in syscall_arg__scnprintf_augmented_sockaddr() local 54 …(&strarray__socket_families, family, sizeof(family), "%d", arg->show_string_prefix, sa->sa_family); in syscall_arg__scnprintf_augmented_sockaddr() 57 if (sa->sa_family < ARRAY_SIZE(af_scnprintfs) && af_scnprintfs[sa->sa_family]) in syscall_arg__scnprintf_augmented_sockaddr() [all …]
|
/Linux-v6.1/include/net/phonet/ |
D | phonet.h | 42 struct sock *pn_find_sock_by_sa(struct net *net, const struct sockaddr_pn *sa); 72 void pn_skb_get_src_sockaddr(struct sk_buff *skb, struct sockaddr_pn *sa) in pn_skb_get_src_sockaddr() argument 77 sa->spn_family = AF_PHONET; in pn_skb_get_src_sockaddr() 78 pn_sockaddr_set_object(sa, obj); in pn_skb_get_src_sockaddr() 79 pn_sockaddr_set_resource(sa, ph->pn_res); in pn_skb_get_src_sockaddr() 80 memset(sa->spn_zero, 0, sizeof(sa->spn_zero)); in pn_skb_get_src_sockaddr() 84 void pn_skb_get_dst_sockaddr(struct sk_buff *skb, struct sockaddr_pn *sa) in pn_skb_get_dst_sockaddr() argument 89 sa->spn_family = AF_PHONET; in pn_skb_get_dst_sockaddr() 90 pn_sockaddr_set_object(sa, obj); in pn_skb_get_dst_sockaddr() 91 pn_sockaddr_set_resource(sa, ph->pn_res); in pn_skb_get_dst_sockaddr() [all …]
|
/Linux-v6.1/tools/testing/selftests/x86/ |
D | vdso_restorer.c | 48 struct real_sigaction sa; in main() local 60 memset(&sa, 0, sizeof(sa)); in main() 61 sa.handler = handler_with_siginfo; in main() 62 sa.flags = SA_SIGINFO; in main() 63 sa.restorer = NULL; /* request kernel-provided restorer */ in main() 65 printf("[RUN]\tRaise a signal, SA_SIGINFO, sa.restorer == NULL\n"); in main() 67 if (syscall(SYS_rt_sigaction, SIGUSR1, &sa, NULL, 8) != 0) in main() 79 printf("[RUN]\tRaise a signal, !SA_SIGINFO, sa.restorer == NULL\n"); in main() 81 sa.flags = 0; in main() 82 sa.handler = handler_without_siginfo; in main() [all …]
|
D | sigaltstack.c | 33 struct sigaction sa; in sethandler() local 35 memset(&sa, 0, sizeof(sa)); in sethandler() 36 sa.sa_sigaction = handler; in sethandler() 37 sa.sa_flags = SA_SIGINFO | flags; in sethandler() 38 sigemptyset(&sa.sa_mask); in sethandler() 39 if (sigaction(sig, &sa, 0)) in sethandler() 45 struct sigaction sa; in clearhandler() local 47 memset(&sa, 0, sizeof(sa)); in clearhandler() 48 sa.sa_handler = SIG_DFL; in clearhandler() 49 sigemptyset(&sa.sa_mask); in clearhandler() [all …]
|
D | ioperm.c | 28 struct sigaction sa; in sethandler() local 29 memset(&sa, 0, sizeof(sa)); in sethandler() 30 sa.sa_sigaction = handler; in sethandler() 31 sa.sa_flags = SA_SIGINFO | flags; in sethandler() 32 sigemptyset(&sa.sa_mask); in sethandler() 33 if (sigaction(sig, &sa, 0)) in sethandler() 40 struct sigaction sa; in clearhandler() local 41 memset(&sa, 0, sizeof(sa)); in clearhandler() 42 sa.sa_handler = SIG_DFL; in clearhandler() 43 sigemptyset(&sa.sa_mask); in clearhandler() [all …]
|
D | sysret_rip.c | 45 struct sigaction sa; in sethandler() local 46 memset(&sa, 0, sizeof(sa)); in sethandler() 47 sa.sa_sigaction = handler; in sethandler() 48 sa.sa_flags = SA_SIGINFO | flags; in sethandler() 49 sigemptyset(&sa.sa_mask); in sethandler() 50 if (sigaction(sig, &sa, 0)) in sethandler() 56 struct sigaction sa; in clearhandler() local 57 memset(&sa, 0, sizeof(sa)); in clearhandler() 58 sa.sa_handler = SIG_DFL; in clearhandler() 59 sigemptyset(&sa.sa_mask); in clearhandler() [all …]
|
/Linux-v6.1/kernel/sched/ |
D | pelt.c | 102 accumulate_sum(u64 delta, struct sched_avg *sa, in accumulate_sum() argument 108 delta += sa->period_contrib; in accumulate_sum() 115 sa->load_sum = decay_load(sa->load_sum, periods); in accumulate_sum() 116 sa->runnable_sum = in accumulate_sum() 117 decay_load(sa->runnable_sum, periods); in accumulate_sum() 118 sa->util_sum = decay_load((u64)(sa->util_sum), periods); in accumulate_sum() 136 1024 - sa->period_contrib, delta); in accumulate_sum() 139 sa->period_contrib = delta; in accumulate_sum() 142 sa->load_sum += load * contrib; in accumulate_sum() 144 sa->runnable_sum += runnable * contrib << SCHED_CAPACITY_SHIFT; in accumulate_sum() [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/progs/ |
D | connect6_prog.c | 31 struct sockaddr_in6 sa; in connect_v6_prog() local 77 memset(&sa, 0, sizeof(sa)); in connect_v6_prog() 79 sa.sin6_family = AF_INET6; in connect_v6_prog() 80 sa.sin6_port = bpf_htons(0); in connect_v6_prog() 82 sa.sin6_addr.s6_addr32[0] = bpf_htonl(SRC_REWRITE_IP6_0); in connect_v6_prog() 83 sa.sin6_addr.s6_addr32[1] = bpf_htonl(SRC_REWRITE_IP6_1); in connect_v6_prog() 84 sa.sin6_addr.s6_addr32[2] = bpf_htonl(SRC_REWRITE_IP6_2); in connect_v6_prog() 85 sa.sin6_addr.s6_addr32[3] = bpf_htonl(SRC_REWRITE_IP6_3); in connect_v6_prog() 87 if (bpf_bind(ctx, (struct sockaddr *)&sa, sizeof(sa)) != 0) in connect_v6_prog()
|
/Linux-v6.1/drivers/input/serio/ |
D | ioc3kbd.c | 127 struct serio *sk, *sa; in ioc3kbd_probe() local 146 sa = kzalloc(sizeof(*sa), GFP_KERNEL); in ioc3kbd_probe() 147 if (!sa) { in ioc3kbd_probe() 161 sa->id.type = SERIO_8042; in ioc3kbd_probe() 162 sa->write = ioc3aux_write; in ioc3kbd_probe() 163 sa->start = ioc3aux_start; in ioc3kbd_probe() 164 sa->stop = ioc3aux_stop; in ioc3kbd_probe() 165 snprintf(sa->name, sizeof(sa->name), "IOC3 auxiliary %d", pdev->id); in ioc3kbd_probe() 166 snprintf(sa->phys, sizeof(sa->phys), "ioc3/serio%daux", pdev->id); in ioc3kbd_probe() 167 sa->port_data = d; in ioc3kbd_probe() [all …]
|
/Linux-v6.1/net/can/j1939/ |
D | address-claim.c | 14 * - resolves NAME<=>SA taking into account the AC states of ECU's. 66 if (skcb->addr.sa == J1939_NO_ADDR) { in j1939_ac_verify_outgoing() 67 netdev_notice(priv->ndev, "tx address claim with broadcast sa\n"); in j1939_ac_verify_outgoing() 97 if (ecu->addr != skcb->addr.sa) in j1939_ac_fixup() 106 netdev_notice(priv->ndev, "tx drop: invalid sa for name 0x%016llx\n", in j1939_ac_fixup() 110 skcb->addr.sa = addr; in j1939_ac_fixup() 145 if (!j1939_address_is_valid(skcb->addr.sa)) { in j1939_ac_process() 146 netdev_notice(priv->ndev, "rx address claim with broadcast sa\n"); in j1939_ac_process() 168 if (!ecu && j1939_address_is_unicast(skcb->addr.sa)) in j1939_ac_process() 177 if (j1939_address_is_idle(skcb->addr.sa)) { in j1939_ac_process() [all …]
|