/Linux-v5.10/net/sunrpc/auth_gss/ |
D | gss_krb5_seqnum.c | 49 unsigned char *plain; in krb5_make_seq_num() local 52 plain = kmalloc(8, GFP_NOFS); in krb5_make_seq_num() 53 if (!plain) in krb5_make_seq_num() 56 plain[0] = (unsigned char) (seqnum & 0xff); in krb5_make_seq_num() 57 plain[1] = (unsigned char) ((seqnum >> 8) & 0xff); in krb5_make_seq_num() 58 plain[2] = (unsigned char) ((seqnum >> 16) & 0xff); in krb5_make_seq_num() 59 plain[3] = (unsigned char) ((seqnum >> 24) & 0xff); in krb5_make_seq_num() 61 plain[4] = direction; in krb5_make_seq_num() 62 plain[5] = direction; in krb5_make_seq_num() 63 plain[6] = direction; in krb5_make_seq_num() [all …]
|
/Linux-v5.10/lib/ |
D | Kconfig.kcsan | 197 bool "Assume that plain aligned writes up to word size are atomic" 200 Assume that plain aligned writes up to word size are atomic by 203 races due to conflicts where the only plain accesses are aligned 204 writes up to word size: conflicts between marked reads and plain 206 notice that data races between two conflicting plain aligned writes 213 additional filtering. Conflicting marked atomic reads and plain 215 plain reads and marked writes to result in "unknown origin" reports. 221 accesses, conflicting marked atomic reads and plain writes will not 223 due to two conflicting plain writes will be reported (aligned and
|
D | test_printf.c | 300 plain(void) in plain() function 675 plain(); in test_pointer()
|
/Linux-v5.10/Documentation/fb/ |
D | s3fb.rst | 19 I tested s3fb on Trio64 (plain, V+ and V2/DX) and Virge (plain, VX, DX), 40 hardware, i get best results from plain S3 Trio32 card - about 75 MHz). This
|
/Linux-v5.10/tools/memory-model/ |
D | linux-kernel.cat | 163 (* Warn about plain writes and marked accesses in the same region *) 173 (* Boundaries for lifetimes of plain accesses *) 181 (* Visibility and executes-before for plain accesses *) 191 (* Coherence requirements for plain accesses *) 195 empty (wr-incoh | rw-incoh | ww-incoh) as plain-coherence
|
D | linux-kernel.bell | 81 (* Compute marked and plain memory accesses *)
|
/Linux-v5.10/Documentation/devicetree/bindings/pci/ |
D | faraday,ftpci100.txt | 5 plain and dual PCI. The plain version embeds a cascading interrupt controller 50 The plain variant has 128MiB of non-prefetchable memory space, whereas the
|
/Linux-v5.10/net/mac80211/ |
D | fils_aead.c | 67 const u8 *plain, size_t plain_len, in aes_siv_encrypt() argument 81 addr[num_elem] = plain; in aes_siv_encrypt() 101 tmp = kmemdup(plain, plain_len, GFP_KERNEL); in aes_siv_encrypt()
|
/Linux-v5.10/Documentation/dev-tools/ |
D | kcsan.rst | 136 * ``CONFIG_KCSAN_ASSUME_PLAIN_WRITES_ATOMIC``: Assume that plain aligned writes 139 causes KCSAN to not report data races due to conflicts where the only plain 192 *plain access*; they *conflict* if both access the same memory location, and at 209 assumes that as long as a plain access is not observed to race with another 253 compiler instrumenting plain accesses. For each instrumented plain access: 264 To detect data races between plain and marked accesses, KCSAN also annotates
|
/Linux-v5.10/Documentation/core-api/ |
D | protection-keys.rst | 77 behavior of a plain mprotect(). For instance if you do this:: 100 the plain mprotect() permissions are violated.
|
D | mm-api.rst | 26 users will want to use a plain ``GFP_KERNEL``.
|
/Linux-v5.10/crypto/ |
D | ccm.c | 167 static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, in crypto_ccm_auth() argument 214 if (plain) in crypto_ccm_auth() 215 sg_chain(sg, 2, plain); in crypto_ccm_auth() 216 plain = sg; in crypto_ccm_auth() 220 ahash_request_set_crypt(ahreq, plain, pctx->odata, cryptlen); in crypto_ccm_auth()
|
/Linux-v5.10/Documentation/networking/devlink/ |
D | sja1105.rst | 23 - Allow plain ETH_P_8021Q headers to be used as DSA tags.
|
/Linux-v5.10/tools/memory-model/Documentation/ |
D | explanation.txt | 880 Plain-coherence: This requires that plain memory accesses 887 "rcu" and "plain-coherence" axioms are specific to the LKMM. 1927 accesses such as x or y = 0 are simply called "plain" accesses. 1929 Early versions of the LKMM had nothing to say about plain accesses. 1931 by plain accesses are not concurrently read or written by any other 1933 of transformations or optimizations of code containing plain accesses, 1959 But since P0's load from x is a plain access, the compiler may decide 1981 doesn't try to predict all possible outcomes of code containing plain 1994 3. at least one of them is plain, 2106 are plain. Now, although we have not said so explicitly, up to this [all …]
|
/Linux-v5.10/arch/arm/nwfpe/ |
D | entry.S | 104 @ plain LDR instruction. Weird, but it seems harmless.
|
/Linux-v5.10/fs/autofs/ |
D | Kconfig | 11 transitioned to just plain AUTOFS_FS.
|
/Linux-v5.10/Documentation/admin-guide/ |
D | security-bugs.rst | 29 Please send plain text emails without attachments where possible. 34 reproduction steps, and follow it with a proposed fix, all in plain text.
|
/Linux-v5.10/Documentation/hwmon/ |
D | asb100.rst | 31 3 (i.e. one setting controls both.) If you have a plain ASB100, the PWM
|
/Linux-v5.10/Documentation/translations/zh_CN/process/ |
D | email-clients.rst | 33 接收附件,但是附件的内容格式应该是"text/plain"。然而,附件一般是不赞成的,
|
/Linux-v5.10/Documentation/networking/ |
D | ieee802154.rst | 20 - IEEE 802.15.4 layer; We have chosen to use plain Berkeley socket API, 82 code via plain sk_buffs. On skb reception skb->cb must contain additional
|
/Linux-v5.10/tools/testing/selftests/net/ |
D | xfrm_policy.sh | 143 local plain=$5 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow
|
/Linux-v5.10/arch/arm/boot/dts/ |
D | ste-href-family-pinctrl.dtsi | 196 * These are plain GPIO pins used by WLAN
|
/Linux-v5.10/Documentation/misc-devices/ |
D | apds990x.rst | 39 values are known. Otherwise plain sensor default values are used.
|
/Linux-v5.10/Documentation/driver-api/md/ |
D | raid5-ppl.rst | 39 case the behavior is the same as in plain raid5.
|
/Linux-v5.10/Documentation/i2c/ |
D | i2c-protocol.rst | 19 Data (8 bits) A plain data byte. Sometimes, I write DataLow, DataHigh
|