/Linux-v5.10/net/mptcp/ |
D | token.c | 2 /* Multipath TCP token management 49 static struct token_bucket *token_bucket(u32 token) in token_bucket() argument 51 return &token_hash[token & token_mask]; in token_bucket() 56 __token_lookup_req(struct token_bucket *t, u32 token) in __token_lookup_req() argument 62 if (req->token == token) in __token_lookup_req() 69 __token_lookup_msk(struct token_bucket *t, u32 token) in __token_lookup_msk() argument 75 if (mptcp_sk(sk)->token == token) in __token_lookup_msk() 80 static bool __token_bucket_busy(struct token_bucket *t, u32 token) in __token_bucket_busy() argument 82 return !token || t->chain_len >= TOKEN_MAX_CHAIN_LEN || in __token_bucket_busy() 83 __token_lookup_req(t, token) || __token_lookup_msk(t, token); in __token_bucket_busy() [all …]
|
D | token_test.c | 24 KUNIT_EXPECT_NE(test, 0, (int)req->token); in mptcp_token_test_req_basic() 25 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(req->token)); in mptcp_token_test_req_basic() 75 KUNIT_EXPECT_NE(test, 0, (int)ctx->token); in mptcp_token_test_msk_basic() 76 KUNIT_EXPECT_EQ(test, ctx->token, msk->token); in mptcp_token_test_msk_basic() 77 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(ctx->token)); in mptcp_token_test_msk_basic() 81 KUNIT_EXPECT_PTR_EQ(test, null_msk, mptcp_token_get_sock(ctx->token)); in mptcp_token_test_msk_basic() 91 msk->token = req->token; in mptcp_token_test_accept() 93 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(msk->token)); in mptcp_token_test_accept() 97 KUNIT_EXPECT_PTR_EQ(test, msk, mptcp_token_get_sock(msk->token)); in mptcp_token_test_accept() 114 msk->token = req->token; in mptcp_token_test_destroyed() [all …]
|
/Linux-v5.10/arch/powerpc/platforms/powernv/ |
D | opal-async.c | 44 int i, token = -EBUSY; in __opal_async_get_token() local 51 token = i; in __opal_async_get_token() 57 return token; in __opal_async_get_token() 61 * Note: If the returned token is used in an opal call and opal returns 68 int token; in opal_async_get_token_interruptible() local 70 /* Wait until a token is available */ in opal_async_get_token_interruptible() 74 token = __opal_async_get_token(); in opal_async_get_token_interruptible() 75 if (token < 0) in opal_async_get_token_interruptible() 78 return token; in opal_async_get_token_interruptible() 82 static int __opal_async_release_token(int token) in __opal_async_release_token() argument [all …]
|
D | opal-sensor.c | 20 int ret, token; in opal_get_sensor_data() local 24 token = opal_async_get_token_interruptible(); in opal_get_sensor_data() 25 if (token < 0) in opal_get_sensor_data() 26 return token; in opal_get_sensor_data() 28 ret = opal_sensor_read(sensor_hndl, token, &data); in opal_get_sensor_data() 31 ret = opal_async_wait_response(token, &msg); in opal_get_sensor_data() 57 opal_async_release_token(token); in opal_get_sensor_data() 64 int ret, token; in opal_get_sensor_data_u64() local 77 token = opal_async_get_token_interruptible(); in opal_get_sensor_data_u64() 78 if (token < 0) in opal_get_sensor_data_u64() [all …]
|
D | opal-psr.c | 30 int psr, ret, token; in psr_show() local 32 token = opal_async_get_token_interruptible(); in psr_show() 33 if (token < 0) { in psr_show() 34 pr_devel("Failed to get token\n"); in psr_show() 35 return token; in psr_show() 42 ret = opal_get_power_shift_ratio(psr_attr->handle, token, in psr_show() 46 ret = opal_async_wait_response(token, &msg); in psr_show() 71 opal_async_release_token(token); in psr_show() 80 int psr, ret, token; in psr_store() local 86 token = opal_async_get_token_interruptible(); in psr_store() [all …]
|
/Linux-v5.10/net/rxrpc/ |
D | key.c | 85 * parse an RxKAD type XDR format token 92 struct rxrpc_key_token *token, **pptoken; in rxrpc_preparse_xdr_rxkad() local 110 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; in rxrpc_preparse_xdr_rxkad() 113 plen -= sizeof(*token); in rxrpc_preparse_xdr_rxkad() 114 token = kzalloc(sizeof(*token), GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 115 if (!token) in rxrpc_preparse_xdr_rxkad() 118 token->kad = kzalloc(plen, GFP_KERNEL); in rxrpc_preparse_xdr_rxkad() 119 if (!token->kad) { in rxrpc_preparse_xdr_rxkad() 120 kfree(token); in rxrpc_preparse_xdr_rxkad() 124 token->security_index = RXRPC_SECURITY_RXKAD; in rxrpc_preparse_xdr_rxkad() [all …]
|
/Linux-v5.10/drivers/staging/fsl-dpaa2/ethsw/ |
D | dpsw.c | 29 * @token: Returned token; use in subsequent API calls 34 * This function returns a unique authentication token, 36 * portal; this token must be used in all subsequent commands for 44 u16 *token) in dpsw_open() argument 63 *token = mc_cmd_hdr_read_token(&cmd); in dpsw_open() 72 * @token: Token of DPSW object 81 u16 token) in dpsw_close() argument 88 token); in dpsw_close() 98 * @token: Token of DPSW object 104 u16 token) in dpsw_enable() argument [all …]
|
D | dpsw.h | 33 u16 *token); 37 u16 token); 80 u16 token); 84 u16 token); 88 u16 token); 116 u16 token, 122 u16 token, 128 u16 token, 134 u16 token, 175 u16 token, [all …]
|
/Linux-v5.10/drivers/net/ethernet/freescale/dpaa2/ |
D | dpni.c | 81 * @token: Returned token; use in subsequent API calls 86 * This function returns a unique authentication token, 88 * portal; this token must be used in all subsequent commands for 96 u16 *token) in dpni_open() argument 116 *token = mc_cmd_hdr_read_token(&cmd); in dpni_open() 125 * @token: Token of DPNI object 134 u16 token) in dpni_close() argument 141 token); in dpni_close() 151 * @token: Token of DPNI object 161 u16 token, in dpni_set_pools() argument [all …]
|
D | dprtc.c | 17 * @token: Returned token; use in subsequent API calls 22 * This function returns a unique authentication token, 24 * portal; this token must be used in all subsequent commands for 32 u16 *token) in dprtc_open() argument 48 *token = mc_cmd_hdr_read_token(&cmd); in dprtc_open() 57 * @token: Token of DPRTC object 66 u16 token) in dprtc_close() argument 71 token); in dprtc_close() 80 * @token: Token of DPRTC object 93 u16 token, in dprtc_set_irq_enable() argument [all …]
|
D | dpmac.c | 14 * @token: Returned token; use in subsequent API calls 19 * This function returns a unique authentication token, 21 * portal; this token must be used in all subsequent commands for 29 u16 *token) in dpmac_open() argument 48 *token = mc_cmd_hdr_read_token(&cmd); in dpmac_open() 57 * @token: Token of DPMAC object 66 u16 token) in dpmac_close() argument 72 token); in dpmac_close() 83 * @token: Token of DPMAC object 90 u16 token, in dpmac_get_attributes() argument [all …]
|
/Linux-v5.10/drivers/dma/fsl-dpaa2-qdma/ |
D | dpdmai.c | 56 * @token: Returned token; use in subsequent API calls 61 * This function returns a unique authentication token, 63 * portal; this token must be used in all subsequent commands for 69 int dpdmai_id, u16 *token) in dpdmai_open() argument 88 *token = mc_cmd_hdr_read_token(&cmd); in dpdmai_open() 98 * @token: Token of DPDMAI object 105 int dpdmai_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpdmai_close() argument 111 cmd_flags, token); in dpdmai_close() 123 * @token: Returned token; use in subsequent API calls 131 * This function returns a unique authentication token, [all …]
|
/Linux-v5.10/drivers/bus/fsl-mc/ |
D | dpcon.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) in dpcon_open() argument 50 *token = mc_cmd_hdr_read_token(&cmd); in dpcon_open() 60 * @token: Token of DPCON object 69 u16 token) in dpcon_close() argument 76 token); in dpcon_close() 87 * @token: Token of DPCON object 93 u16 token) in dpcon_enable() argument [all …]
|
D | dpbp.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) in dpbp_open() argument 49 *token = mc_cmd_hdr_read_token(&cmd); in dpbp_open() 59 * @token: Token of DPBP object 68 u16 token) in dpbp_close() argument 74 token); in dpbp_close() 85 * @token: Token of DPBP object 91 u16 token) in dpbp_enable() argument [all …]
|
D | dprc.c | 24 * @token: Returned token of DPRC object 33 u16 *token) in dprc_open() argument 51 *token = mc_cmd_hdr_read_token(&cmd); in dprc_open() 61 * @token: Token of DPRC object 70 u16 token) in dprc_close() argument 76 token); in dprc_close() 87 * @token: Token of DPRC object 114 u16 token, in dprc_reset_container() argument 144 cmd.header = mc_encode_cmd_header(cmdid, cmd_flags, token); in dprc_reset_container() 158 * @token: Token of DPRC object [all …]
|
D | dpmcp.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) in dpmcp_open() argument 49 *token = mc_cmd_hdr_read_token(&cmd); in dpmcp_open() 58 * @token: Token of DPMCP object 67 u16 token) in dpmcp_close() argument 73 cmd_flags, token); in dpmcp_close() 83 * @token: Token of DPMCP object 89 u16 token) in dpmcp_reset() argument [all …]
|
/Linux-v5.10/drivers/crypto/caam/ |
D | dpseci.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, associated with the 22 * specific object ID and the specific MC portal; this token must be used in all 28 u16 *token) in dpseci_open() argument 43 *token = mc_cmd_hdr_read_token(&cmd); in dpseci_open() 52 * @token: Token of DPSECI object 59 int dpseci_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpseci_close() argument 65 token); in dpseci_close() 73 * @token: Token of DPSECI object 77 int dpseci_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) in dpseci_enable() argument [all …]
|
/Linux-v5.10/fs/btrfs/ |
D | struct-funcs.c | 40 * Generic helpers with a token (cached address of the most recently accessed 56 u##bits btrfs_get_token_##bits(struct btrfs_map_token *token, \ 66 ASSERT(token); \ 67 ASSERT(token->kaddr); \ 68 ASSERT(check_setget_bounds(token->eb, ptr, off, size)); \ 69 if (token->offset <= member_offset && \ 70 member_offset + size <= token->offset + PAGE_SIZE) { \ 71 return get_unaligned_le##bits(token->kaddr + oip); \ 73 token->kaddr = page_address(token->eb->pages[idx]); \ 74 token->offset = idx << PAGE_SHIFT; \ [all …]
|
/Linux-v5.10/scripts/genksyms/ |
D | parse.y | 63 %token ASM_KEYW 64 %token ATTRIBUTE_KEYW 65 %token AUTO_KEYW 66 %token BOOL_KEYW 67 %token BUILTIN_INT_KEYW 68 %token CHAR_KEYW 69 %token CONST_KEYW 70 %token DOUBLE_KEYW 71 %token ENUM_KEYW 72 %token EXTERN_KEYW [all …]
|
D | lex.l | 91 * We mark any token, that that equals to a known enumerator, as 129 int token, count = 0; 140 token = yylex1(); 142 if (token == 0) 144 else if (token == FILENAME) 172 switch (token) 180 switch (token = r) 209 token = TYPE; 242 switch (token) 251 token = ATTRIBUTE_PHRASE; [all …]
|
/Linux-v5.10/drivers/soc/fsl/dpio/ |
D | dpio.c | 23 * @token: Returned token; use in subsequent API calls 28 * This function returns a unique authentication token, 30 * portal; this token must be used in all subsequent commands for 38 u16 *token) in dpio_open() argument 56 *token = mc_cmd_hdr_read_token(&cmd); in dpio_open() 65 * @token: Token of DPIO object 71 u16 token) in dpio_close() argument 78 token); in dpio_close() 87 * @token: Token of DPIO object 93 u16 token) in dpio_enable() argument [all …]
|
/Linux-v5.10/tools/perf/pmu-events/ |
D | jsmn.c | 29 * Allocates a fresh unused token from the token pool. 45 * Fills token type and boundaries. 47 static void jsmn_fill_token(jsmntok_t *token, jsmntype_t type, in jsmn_fill_token() argument 50 token->type = type; in jsmn_fill_token() 51 token->start = start; in jsmn_fill_token() 52 token->end = end; in jsmn_fill_token() 53 token->size = 0; in jsmn_fill_token() 57 * Fills next available token with JSON primitive. 63 jsmntok_t *token; in jsmn_parse_primitive() local 103 token = jsmn_alloc_token(parser, tokens, num_tokens); in jsmn_parse_primitive() [all …]
|
/Linux-v5.10/security/apparmor/ |
D | task.c | 100 ctx->token = stack; in aa_set_current_onexec() 108 * @token: token value that must be specified to change from the hat 111 * validate the token to match. 115 int aa_set_current_hat(struct aa_label *label, u64 token) in aa_set_current_hat() argument 128 ctx->token = token; in aa_set_current_hat() 129 } else if (ctx->token == token) { in aa_set_current_hat() 132 /* previous_profile && ctx->token != token */ in aa_set_current_hat() 148 * @token: the token that must be matched to exit hat context 150 * Attempt to return out of a hat to the previous label. The token 151 * must match the stored token value. [all …]
|
/Linux-v5.10/drivers/s390/crypto/ |
D | zcrypt_ccamisc.h | 16 /* Key token types */ 17 #define TOKTYPE_NON_CCA 0x00 /* Non-CCA key token */ 18 #define TOKTYPE_CCA_INTERNAL 0x01 /* CCA internal sym key token */ 19 #define TOKTYPE_CCA_INTERNAL_PKA 0x1f /* CCA internal asym key token */ 22 #define TOKVER_PROTECTED_KEY 0x01 /* Protected key token */ 23 #define TOKVER_CLEAR_KEY 0x02 /* Clear key token */ 26 #define TOKVER_CCA_AES 0x04 /* CCA AES key token */ 27 #define TOKVER_CCA_VLSC 0x05 /* var length sym cipher key token */ 29 /* Max size of a cca variable length cipher key token */ 32 /* header part of a CCA key token */ [all …]
|
/Linux-v5.10/virt/lib/ |
D | irqbypass.c | 86 * with any matching token found on the IRQ consumers list. 94 if (!producer->token) in irq_bypass_register_producer() 105 if (tmp->token == producer->token) { in irq_bypass_register_producer() 112 if (consumer->token == producer->token) { in irq_bypass_register_producer() 144 if (!producer->token) in irq_bypass_unregister_producer() 155 if (tmp->token != producer->token) in irq_bypass_unregister_producer() 159 if (consumer->token == producer->token) { in irq_bypass_unregister_producer() 181 * with any matching token found on the IRQ producer list. 189 if (!consumer->token || in irq_bypass_register_consumer() 201 if (tmp->token == consumer->token || tmp == consumer) { in irq_bypass_register_consumer() [all …]
|