/Linux-v5.10/drivers/input/keyboard/ |
D | ipaq-micro-keys.c | 43 struct ipaq_micro_keys *keys = data; in micro_key_receive() local 50 input_report_key(keys->input, keys->codes[key], down); in micro_key_receive() 51 input_sync(keys->input); in micro_key_receive() 55 static void micro_key_start(struct ipaq_micro_keys *keys) in micro_key_start() argument 57 spin_lock(&keys->micro->lock); in micro_key_start() 58 keys->micro->key = micro_key_receive; in micro_key_start() 59 keys->micro->key_data = keys; in micro_key_start() 60 spin_unlock(&keys->micro->lock); in micro_key_start() 63 static void micro_key_stop(struct ipaq_micro_keys *keys) in micro_key_stop() argument 65 spin_lock(&keys->micro->lock); in micro_key_stop() [all …]
|
D | mtk-pmic-keys.c | 78 struct mtk_pmic_keys *keys; member 89 struct mtk_pmic_keys_info keys[MTK_PMIC_MAX_KEY_COUNT]; member 98 static void mtk_pmic_keys_lp_reset_setup(struct mtk_pmic_keys *keys, in mtk_pmic_keys_lp_reset_setup() argument 104 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 109 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 113 ret = of_property_read_u32(keys->dev->of_node, in mtk_pmic_keys_lp_reset_setup() 120 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 123 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 128 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() 131 regmap_update_bits(keys->regmap, pmic_rst_reg, in mtk_pmic_keys_lp_reset_setup() [all …]
|
D | Makefile | 8 obj-$(CONFIG_KEYBOARD_ADC) += adc-keys.o 9 obj-$(CONFIG_KEYBOARD_ADP5520) += adp5520-keys.o 10 obj-$(CONFIG_KEYBOARD_ADP5588) += adp5588-keys.o 11 obj-$(CONFIG_KEYBOARD_ADP5589) += adp5589-keys.o 30 obj-$(CONFIG_KEYBOARD_IPAQ_MICRO) += ipaq-micro-keys.o 31 obj-$(CONFIG_KEYBOARD_IQS62X) += iqs62x-keys.o 40 obj-$(CONFIG_KEYBOARD_LPC32XX) += lpc32xx-keys.o 46 obj-$(CONFIG_KEYBOARD_MTK_PMIC) += mtk-pmic-keys.o 66 obj-$(CONFIG_KEYBOARD_SUN4I_LRADC) += sun4i-lradc-keys.o
|
/Linux-v5.10/tools/testing/selftests/bpf/progs/ |
D | bpf_flow.c | 74 static __always_inline int export_flow_keys(struct bpf_flow_keys *keys, in export_flow_keys() argument 77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 80 memcpy(&val, keys, sizeof(val)); in export_flow_keys() 117 struct bpf_flow_keys *keys = skb->flow_keys; in parse_eth_proto() local 136 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 139 return export_flow_keys(keys, BPF_DROP); in parse_eth_proto() 145 struct bpf_flow_keys *keys = skb->flow_keys; in _dissect() local 147 return parse_eth_proto(skb, keys->n_proto); in _dissect() 153 struct bpf_flow_keys *keys = skb->flow_keys; in parse_ip_proto() local 165 return export_flow_keys(keys, BPF_DROP); in parse_ip_proto() [all …]
|
/Linux-v5.10/tools/testing/selftests/net/ |
D | tcp_fastopen_backup_key.c | 51 static void get_keys(int fd, uint32_t *keys) in get_keys() argument 57 if (getsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, &len)) in get_keys() 64 if (sscanf(buf, "%x-%x-%x-%x,%x-%x-%x-%x", keys, keys + 1, keys + 2, in get_keys() 65 keys + 3, keys + 4, keys + 5, keys + 6, keys + 7) != 8) in get_keys() 69 static void set_keys(int fd, uint32_t *keys) in set_keys() argument 74 if (setsockopt(fd, SOL_TCP, TCP_FASTOPEN_KEY, keys, in set_keys() 81 keys[0], keys[1], keys[2], keys[3], keys[4], keys[5], in set_keys() 82 keys[6], keys[7]); in set_keys() 85 keys[0], keys[1], keys[2], keys[3]); in set_keys() 98 uint32_t keys[8]; in build_rcv_fd() local [all …]
|
/Linux-v5.10/arch/arm64/include/asm/ |
D | pointer_auth.h | 37 static inline void ptrauth_keys_init_user(struct ptrauth_keys_user *keys) in ptrauth_keys_init_user() argument 40 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_user() 41 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_keys_init_user() 42 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_keys_init_user() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_keys_init_user() 47 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_keys_init_user() 57 static __always_inline void ptrauth_keys_init_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_init_kernel() argument 60 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_keys_init_kernel() 63 static __always_inline void ptrauth_keys_switch_kernel(struct ptrauth_keys_kernel *keys) in ptrauth_keys_switch_kernel() argument 68 __ptrauth_key_install_nosync(APIA, keys->apia); in ptrauth_keys_switch_kernel()
|
/Linux-v5.10/tools/testing/selftests/bpf/map_tests/ |
D | htab_map_batch_ops.c | 13 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 28 keys[i] = i + 1; in map_batch_update() 36 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 41 int *keys, void *values, bool is_pcpu) in map_batch_verify() argument 55 CHECK(keys[i] + 1 + j != bpf_percpu(v[i], j), in map_batch_verify() 58 i, j, keys[i], bpf_percpu(v[i], j)); in map_batch_verify() 61 CHECK(keys[i] + 1 != ((int *)values)[i], in map_batch_verify() 63 "error: i %d key %d value %d\n", i, keys[i], in map_batch_verify() 80 int map_fd, *keys, *visited, key; in __test_map_lookup_and_delete_batch() local 104 keys = malloc(max_entries * sizeof(int)); in __test_map_lookup_and_delete_batch() [all …]
|
D | array_map_batch_ops.c | 12 static void map_batch_update(int map_fd, __u32 max_entries, int *keys, in map_batch_update() argument 22 keys[i] = i; in map_batch_update() 26 err = bpf_map_update_batch(map_fd, keys, values, &max_entries, &opts); in map_batch_update() 31 int *keys, int *values) in map_batch_verify() argument 37 CHECK(keys[i] + 1 != values[i], "key/value checking", in map_batch_verify() 38 "error: i %d key %d value %d\n", i, keys[i], values[i]); in map_batch_verify() 55 int map_fd, *keys, *values, *visited; in test_array_map_batch_ops() local 71 keys = malloc(max_entries * sizeof(int)); in test_array_map_batch_ops() 74 CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", in test_array_map_batch_ops() 78 map_batch_update(map_fd, max_entries, keys, values); in test_array_map_batch_ops() [all …]
|
/Linux-v5.10/arch/arm64/kernel/ |
D | pointer_auth.c | 13 struct ptrauth_keys_user *keys = &tsk->thread.keys_user; in ptrauth_prctl_reset_keys() local 25 ptrauth_keys_init_user(keys); in ptrauth_prctl_reset_keys() 37 get_random_bytes(&keys->apia, sizeof(keys->apia)); in ptrauth_prctl_reset_keys() 39 get_random_bytes(&keys->apib, sizeof(keys->apib)); in ptrauth_prctl_reset_keys() 41 get_random_bytes(&keys->apda, sizeof(keys->apda)); in ptrauth_prctl_reset_keys() 43 get_random_bytes(&keys->apdb, sizeof(keys->apdb)); in ptrauth_prctl_reset_keys() 45 get_random_bytes(&keys->apga, sizeof(keys->apga)); in ptrauth_prctl_reset_keys()
|
/Linux-v5.10/drivers/input/misc/ |
D | dm355evm_keys.c | 102 struct dm355evm_keys *keys = _keys; in dm355evm_keys_irq() local 115 dev_dbg(keys->dev, "input high err %d\n", in dm355evm_keys_irq() 123 dev_dbg(keys->dev, "input low err %d\n", in dm355evm_keys_irq() 152 ke = sparse_keymap_entry_from_scancode(keys->input, event); in dm355evm_keys_irq() 154 dev_dbg(keys->dev, in dm355evm_keys_irq() 159 input_report_key(keys->input, keycode, 1); in dm355evm_keys_irq() 160 input_sync(keys->input); in dm355evm_keys_irq() 161 input_report_key(keys->input, keycode, 0); in dm355evm_keys_irq() 162 input_sync(keys->input); in dm355evm_keys_irq() 172 struct dm355evm_keys *keys; in dm355evm_keys_probe() local [all …]
|
/Linux-v5.10/drivers/md/bcache/ |
D | btree.c | 113 if (b->level && b->keys.nsets) in bch_btree_init_next() 114 bch_btree_sort(&b->keys, &b->c->sort); in bch_btree_init_next() 116 bch_btree_sort_lazy(&b->keys, &b->c->sort); in bch_btree_init_next() 119 bch_bset_init_next(&b->keys, write_block(b), in bch_btree_init_next() 162 iter->b = &b->keys; in bch_btree_node_read_done() 169 b->written < btree_blocks(b) && i->seq == b->keys.set[0].data->seq; in bch_btree_node_read_done() 197 if (i != b->keys.set[0].data && !i->keys) in bch_btree_node_read_done() 207 bset_sector_offset(&b->keys, i) < KEY_SIZE(&b->key); in bch_btree_node_read_done() 209 if (i->seq == b->keys.set[0].data->seq) in bch_btree_node_read_done() 212 bch_btree_sort_and_fix_extents(&b->keys, iter, &b->c->sort); in bch_btree_node_read_done() [all …]
|
D | debug.c | 44 sorted = b->c->verify_data->keys.set->data; in bch_btree_verify() 45 inmemory = b->keys.set->data; in bch_btree_verify() 50 v->keys.ops = b->keys.ops; in bch_btree_verify() 65 sorted = v->keys.set->data; in bch_btree_verify() 67 if (inmemory->keys != sorted->keys || in bch_btree_verify() 78 bch_dump_bset(&b->keys, inmemory, 0); in bch_btree_verify() 81 bch_dump_bset(&v->keys, sorted, 0); in bch_btree_verify() 88 bch_dump_bset(&b->keys, i, block); in bch_btree_verify() 94 for (j = 0; j < inmemory->keys; j++) in bch_btree_verify() 163 struct keybuf keys; member [all …]
|
/Linux-v5.10/drivers/net/ethernet/cisco/enic/ |
D | enic_clsf.c | 21 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq) in enic_addfltr_5t() argument 26 switch (keys->basic.ip_proto) { in enic_addfltr_5t() 38 data.u.ipv4.src_addr = ntohl(keys->addrs.v4addrs.src); in enic_addfltr_5t() 39 data.u.ipv4.dst_addr = ntohl(keys->addrs.v4addrs.dst); in enic_addfltr_5t() 40 data.u.ipv4.src_port = ntohs(keys->ports.src); in enic_addfltr_5t() 41 data.u.ipv4.dst_port = ntohs(keys->ports.dst); in enic_addfltr_5t() 162 if (tpos->keys.addrs.v4addrs.src == k->addrs.v4addrs.src && in htbl_key_search() 163 tpos->keys.addrs.v4addrs.dst == k->addrs.v4addrs.dst && in htbl_key_search() 164 tpos->keys.ports.ports == k->ports.ports && in htbl_key_search() 165 tpos->keys.basic.ip_proto == k->basic.ip_proto && in htbl_key_search() [all …]
|
/Linux-v5.10/drivers/mfd/ |
D | ucb1x00-assabet.c | 41 struct gpio_keys_platform_data keys; in ucb1x00_assabet_add() local 46 memset(&keys, 0, sizeof(keys)); in ucb1x00_assabet_add() 55 keys.buttons = buttons; in ucb1x00_assabet_add() 56 keys.nbuttons = ARRAY_SIZE(buttons); in ucb1x00_assabet_add() 57 keys.poll_interval = 50; in ucb1x00_assabet_add() 58 keys.name = "ucb1x00"; in ucb1x00_assabet_add() 61 &keys, sizeof(keys)); in ucb1x00_assabet_add()
|
/Linux-v5.10/drivers/md/persistent-data/ |
D | dm-btree.c | 47 uint64_t mid_key = le64_to_cpu(n->keys[mid]); in bsearch() 101 array_insert(node->keys, sizeof(*node->keys), nr_entries, index, &key_le); in insert_at() 368 *result_key = le64_to_cpu(ro_node(s)->keys[i]); in btree_lookup_raw() 376 uint64_t *keys, void *value_le) in dm_btree_lookup() argument 398 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup() 403 if (rkey != keys[level]) { in dm_btree_lookup() 463 *rkey = le64_to_cpu(n->keys[i]); in dm_btree_lookup_next_single() 472 uint64_t *keys, uint64_t *rkey, void *value_le) in dm_btree_lookup_next() argument 481 r = btree_lookup_raw(&spine, root, keys[level], in dm_btree_lookup_next() 487 if (*rkey != keys[level]) { in dm_btree_lookup_next() [all …]
|
D | dm-btree.h | 110 uint64_t *keys, void *value_le); 117 uint64_t *keys, uint64_t *rkey, void *value_le); 123 uint64_t *keys, void *value, dm_block_t *new_root) 132 uint64_t *keys, void *value, dm_block_t *new_root, 142 uint64_t *keys, dm_block_t *new_root); 151 uint64_t *keys, uint64_t end_key, 176 int (*fn)(void *context, uint64_t *keys, void *leaf),
|
/Linux-v5.10/net/core/ |
D | flow_dissector.c | 1484 static inline void __flow_hash_consistentify(struct flow_keys *keys) in __flow_hash_consistentify() argument 1488 switch (keys->control.addr_type) { in __flow_hash_consistentify() 1490 addr_diff = (__force u32)keys->addrs.v4addrs.dst - in __flow_hash_consistentify() 1491 (__force u32)keys->addrs.v4addrs.src; in __flow_hash_consistentify() 1494 ((__force u16)keys->ports.dst < in __flow_hash_consistentify() 1495 (__force u16)keys->ports.src))) { in __flow_hash_consistentify() 1496 swap(keys->addrs.v4addrs.src, keys->addrs.v4addrs.dst); in __flow_hash_consistentify() 1497 swap(keys->ports.src, keys->ports.dst); in __flow_hash_consistentify() 1501 addr_diff = memcmp(&keys->addrs.v6addrs.dst, in __flow_hash_consistentify() 1502 &keys->addrs.v6addrs.src, in __flow_hash_consistentify() [all …]
|
/Linux-v5.10/fs/xfs/ |
D | xfs_fsmap.c | 173 struct xfs_fsmap *keys, 406 struct xfs_fsmap *keys, in xfs_getfsmap_logdev() argument 414 info->low.rm_startblock = XFS_BB_TO_FSBT(mp, keys[0].fmr_physical); in xfs_getfsmap_logdev() 415 info->low.rm_offset = XFS_BB_TO_FSBT(mp, keys[0].fmr_offset); in xfs_getfsmap_logdev() 416 error = xfs_fsmap_owner_to_rmap(&info->low, keys); in xfs_getfsmap_logdev() 420 xfs_getfsmap_set_irec_flags(&info->low, &keys[0]); in xfs_getfsmap_logdev() 422 error = xfs_fsmap_owner_to_rmap(&info->high, keys + 1); in xfs_getfsmap_logdev() 435 if (keys[0].fmr_physical > 0) in xfs_getfsmap_logdev() 475 struct xfs_fsmap *keys, in __xfs_getfsmap_rtdev() argument 487 if (keys[0].fmr_physical >= eofs) in __xfs_getfsmap_rtdev() [all …]
|
/Linux-v5.10/drivers/crypto/nx/ |
D | nx-aes-xcbc.c | 64 u8 keys[2][AES_BLOCK_SIZE]; in nx_xcbc_empty() local 76 memset(keys[0], 0x01, sizeof(keys[0])); in nx_xcbc_empty() 77 memset(keys[1], 0x03, sizeof(keys[1])); in nx_xcbc_empty() 79 len = sizeof(keys); in nx_xcbc_empty() 81 in_sg = nx_build_sg_list(nx_ctx->in_sg, (u8 *) keys, &len, in nx_xcbc_empty() 84 if (len != sizeof(keys)) in nx_xcbc_empty() 87 out_sg = nx_build_sg_list(nx_ctx->out_sg, (u8 *) keys, &len, in nx_xcbc_empty() 90 if (len != sizeof(keys)) in nx_xcbc_empty() 102 keys[1][0] ^= 0x80; in nx_xcbc_empty() 104 len = sizeof(keys[1]); in nx_xcbc_empty() [all …]
|
/Linux-v5.10/lib/ |
D | test_static_keys.c | 55 static void invert_keys(struct test_key *keys, int size) in invert_keys() argument 61 if (previous != keys[i].key) { in invert_keys() 62 invert_key(keys[i].key); in invert_keys() 63 previous = keys[i].key; in invert_keys() 68 static int verify_keys(struct test_key *keys, int size, bool invert) in verify_keys() argument 74 ret = static_key_enabled(keys[i].key); in verify_keys() 75 init = keys[i].init_state; in verify_keys() 78 ret = keys[i].test_key(); in verify_keys() 79 if (static_key_enabled(keys[i].key)) { in verify_keys()
|
/Linux-v5.10/security/keys/ |
D | Kconfig | 11 access keys in the kernel. 13 It also includes provision of methods by which such keys might be 18 a searchable sequence of keys. Each process is equipped with access 60 bool "Large payload keys" 65 This option provides support for holding large keys within the kernel 80 keys in the kernel. Trusted keys are random number symmetric keys, 81 generated and RSA-sealed by the TPM. The TPM only unseals the keys, 97 This option provides support for create/encrypting/decrypting keys 98 in the kernel. Encrypted keys are kernel generated random numbers, 106 bool "Diffie-Hellman operations on retained keys" [all …]
|
/Linux-v5.10/security/integrity/ |
D | Kconfig | 29 to "lock" certain keyring to prevent adding new keys. 30 This is useful for evm and module keyrings, when keys are 34 bool "Enable asymmetric keys support" 43 asymmetric keys. 46 bool "Require all keys on the integrity keyrings be signed" 51 This option requires that all keys added to the .ima and 56 bool "Provide keyring for platform/firmware trusted keys" 60 Provide a separate, distinct keyring for platform trusted keys, which 76 bool "Enable loading of platform and blacklisted keys for POWER" 81 Enable loading of keys to the .platform keyring and blacklisted
|
/Linux-v5.10/fs/xfs/libxfs/ |
D | xfs_iext_tree.c | 117 uint64_t keys[KEYS_PER_NODE]; member 281 if (node->keys[n] > offset) in xfs_iext_key_cmp() 283 if (node->keys[n] < offset) in xfs_iext_key_cmp() 366 if (node->keys[i] == XFS_IEXT_KEY_INVALID) in xfs_iext_node_nr_entries() 407 node->keys[0] = xfs_iext_leaf_key(prev, 0); in xfs_iext_grow() 414 node->keys[0] = prev->keys[0]; in xfs_iext_grow() 419 node->keys[i] = XFS_IEXT_KEY_INVALID; in xfs_iext_grow() 440 if (node->keys[i] == old_offset) in xfs_iext_update_node() 441 node->keys[i] = new_offset; in xfs_iext_update_node() 472 new->keys[i] = node->keys[nr_keep + i]; in xfs_iext_split_node() [all …]
|
/Linux-v5.10/Documentation/devicetree/bindings/input/ |
D | input-reset.txt | 3 A simple binding to represent a set of keys as described in 4 include/uapi/linux/input.h. This is to communicate a sequence of keys to the 5 sysrq driver. Upon holding the keys for a specified amount of time (if 8 Key sequences are global to the system but all the keys in a set must be coming 12 a set of keys. 18 timeout-ms: duration keys must be pressed together in milliseconds before
|
/Linux-v5.10/certs/ |
D | Kconfig | 19 bool "Provide system-wide ring of trusted keys" 23 Provide a system keyring to which trusted keys can be added. Keys in 26 userspace may only add extra keys if those keys can be verified by 27 keys already in the keyring. 32 string "Additional X.509 keys for default system keyring" 40 NOTE: If you previously provided keys for the system keyring in the 61 bool "Provide a keyring to which extra trustable keys may be added" 64 If set, provide a keyring to which extra keys may be added, provided 65 those keys are not blacklisted and are vouched for by a key built 69 bool "Provide system-wide ring of blacklisted keys" [all …]
|