/linux-master/kernel/bpf/ |
H A D | token.c | 17 bool bpf_token_capable(const struct bpf_token *token, int cap) argument 21 /* BPF token allows ns_capable() level of capabilities */ 22 userns = token ? token->userns : &init_user_ns; 25 if (token && security_bpf_token_capable(token, cap) < 0) 30 void bpf_token_inc(struct bpf_token *token) argument 32 atomic64_inc(&token->refcnt); 35 static void bpf_token_free(struct bpf_token *token) argument 37 security_bpf_token_free(token); 44 struct bpf_token *token = container_of(work, struct bpf_token, work); local 49 bpf_token_put(struct bpf_token *token) argument 63 struct bpf_token *token = filp->private_data; local 71 struct bpf_token *token = filp->private_data; local 115 struct bpf_token *token = NULL; local 236 struct bpf_token *token; local 252 bpf_token_allow_cmd(const struct bpf_token *token, enum bpf_cmd cmd) argument 261 bpf_token_allow_map_type(const struct bpf_token *token, enum bpf_map_type type) argument 269 bpf_token_allow_prog_type(const struct bpf_token *token, enum bpf_prog_type prog_type, enum bpf_attach_type attach_type) argument [all...] |
/linux-master/drivers/net/wireless/mediatek/mt76/mt7615/ |
H A D | mt7615_trace.h | 22 #define TOKEN_ENTRY __field(u16, token) 23 #define TOKEN_ASSIGN __entry->token = token 25 #define TOKEN_PR_ARG __entry->token 28 TP_PROTO(struct mt7615_dev *dev, u16 token), 29 TP_ARGS(dev, token), 45 TP_PROTO(struct mt7615_dev *dev, u16 token), 46 TP_ARGS(dev, token)
|
/linux-master/fs/btrfs/ |
H A D | accessors.c | 28 void btrfs_init_map_token(struct btrfs_map_token *token, struct extent_buffer *eb) argument 30 token->eb = eb; 31 token->kaddr = folio_address(eb->folios[0]); 32 token->offset = 0; 44 * Generic helpers with a token (cached address of the most recently accessed 60 u##bits btrfs_get_token_##bits(struct btrfs_map_token *token, \ 64 const unsigned long idx = get_eb_folio_index(token->eb, member_offset); \ 65 const unsigned long oil = get_eb_offset_in_folio(token->eb, \ 67 const int unit_size = token->eb->folio_size; \ 68 const int unit_shift = token [all...] |
/linux-master/arch/powerpc/platforms/powernv/ |
H A D | opal-sensor.c | 22 int ret, token; local 26 token = opal_async_get_token_interruptible(); 27 if (token < 0) 28 return token; 30 ret = opal_sensor_read(sensor_hndl, token, &data); 33 ret = opal_async_wait_response(token, &msg); 59 opal_async_release_token(token); 66 int ret, token; local 79 token = opal_async_get_token_interruptible(); 80 if (token < [all...] |
H A D | opal-async.c | 44 int i, token = -EBUSY; local 51 token = i; 57 return token; 61 * Note: If the returned token is used in an opal call and opal returns 68 int token; local 70 /* Wait until a token is available */ 74 token = __opal_async_get_token(); 75 if (token < 0) 78 return token; 82 static int __opal_async_release_token(int token) argument 116 opal_async_release_token(int token) argument 128 opal_async_wait_response(uint64_t token, struct opal_msg *msg) argument 157 opal_async_wait_response_interruptible(uint64_t token, struct opal_msg *msg) argument 218 uint64_t token; local [all...] |
/linux-master/net/rxrpc/ |
H A D | key.c | 49 * parse an RxKAD type XDR format token 56 struct rxrpc_key_token *token, **pptoken; local 74 plen = sizeof(*token) + sizeof(*token->kad) + tktlen; 77 plen -= sizeof(*token); 78 token = kzalloc(sizeof(*token), GFP_KERNEL); 79 if (!token) 82 token->kad = kzalloc(plen, GFP_KERNEL); 83 if (!token 138 const __be32 *xdr = prep->data, *token, *p; local 280 struct rxrpc_key_token *token, **pp; local 383 rxrpc_free_token_list(struct rxrpc_key_token *token) argument 424 const struct rxrpc_key_token *token; local 565 const struct rxrpc_key_token *token; local [all...] |
/linux-master/drivers/bus/fsl-mc/ |
H A D | dpmcp.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) 49 *token = mc_cmd_hdr_read_token(&cmd); 58 * @token: Token of DPMCP object 67 u16 token) 73 cmd_flags, token); 83 * @token 28 dpmcp_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpmcp_id, u16 *token) argument 65 dpmcp_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 87 dpmcp_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument [all...] |
H A D | dpbp.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) 49 *token = mc_cmd_hdr_read_token(&cmd); 59 * @token: Token of DPBP object 68 u16 token) 74 token); 85 * @token 28 dpbp_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpbp_id, u16 *token) argument 66 dpbp_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 89 dpbp_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 112 dpbp_disable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 135 dpbp_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 160 dpbp_get_attributes(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, struct dpbp_attr *attr) argument [all...] |
H A D | dpcon.c | 16 * @token: Returned token; use in subsequent API calls 21 * This function returns a unique authentication token, 23 * portal; this token must be used in all subsequent commands for 31 u16 *token) 50 *token = mc_cmd_hdr_read_token(&cmd); 60 * @token: Token of DPCON object 69 u16 token) 76 token); 87 * @token 28 dpcon_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpcon_id, u16 *token) argument 67 dpcon_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 91 dpcon_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 115 dpcon_disable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 139 dpcon_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 163 dpcon_get_attributes(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, struct dpcon_attr *attr) argument 201 dpcon_set_notification(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, struct dpcon_notification_cfg *cfg) argument [all...] |
H A D | fsl-mc-uapi.c | 25 bool token; member in struct:fsl_mc_cmd_desc 84 .token = true, 90 .token = true, 96 .token = false, 102 .token = true, 109 .token = true, 116 .token = true, 123 .token = true, 130 .token = true, 136 .token [all...] |
H A D | obj-api.c | 48 u16 *token) 69 *token = mc_cmd_hdr_read_token(&cmd); 77 u16 token) 83 token); 92 u16 token) 98 token); 44 fsl_mc_obj_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int obj_id, char *obj_type, u16 *token) argument 75 fsl_mc_obj_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 90 fsl_mc_obj_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument
|
/linux-master/arch/powerpc/include/asm/ |
H A D | dcr-mmio.h | 14 void __iomem *token; member in struct:__anon64 21 return host.token != NULL; 31 return in_be32(host.token + ((host.base + dcr_n) * host.stride)); 38 out_be32(host.token + ((host.base + dcr_n) * host.stride), value);
|
/linux-master/scripts/genksyms/ |
H A D | parse.y | 63 %token ASM_KEYW 64 %token ATTRIBUTE_KEYW 65 %token AUTO_KEYW 66 %token BOOL_KEYW 67 %token BUILTIN_INT_KEYW 68 %token CHAR_KEYW 69 %token CONST_KEYW 70 %token DOUBLE_KEYW 71 %token ENUM_KEYW 72 %token EXTERN_KEY [all...] |
/linux-master/net/mptcp/ |
H A D | token.c | 2 /* Multipath TCP token management 48 static struct token_bucket *token_bucket(u32 token) argument 50 return &token_hash[token & token_mask]; 55 __token_lookup_req(struct token_bucket *t, u32 token) argument 61 if (req->token == token) 68 __token_lookup_msk(struct token_bucket *t, u32 token) argument 74 if (mptcp_sk(sk)->token == token) 79 static bool __token_bucket_busy(struct token_bucket *t, u32 token) argument 85 mptcp_crypto_key_gen_sha(u64 *key, u32 *token, u64 *idsn) argument 112 u32 token; local 210 mptcp_token_exists(u32 token) argument 246 mptcp_token_get_sock(struct net *net, u32 token) argument [all...] |
/linux-master/drivers/net/ethernet/freescale/dpaa2/ |
H A D | dprtc.h | 26 u16 *token); 30 u16 token); 34 u16 token, 40 u16 token, 46 u16 token, 52 u16 token, 58 u16 token, 64 u16 token,
|
H A D | dpsw.h | 23 int dpsw_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpsw_id, u16 *token); 25 int dpsw_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 85 int dpsw_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 87 int dpsw_disable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 89 int dpsw_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 118 int dpsw_set_irq_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 121 int dpsw_set_irq_mask(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 124 int dpsw_get_irq_status(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 127 int dpsw_clear_irq_status(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 169 int dpsw_get_attributes(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, [all...] |
H A D | dprtc.c | 17 * @token: Returned token; use in subsequent API calls 22 * This function returns a unique authentication token, 24 * portal; this token must be used in all subsequent commands for 32 u16 *token) 48 *token = mc_cmd_hdr_read_token(&cmd); 57 * @token: Token of DPRTC object 66 u16 token) 71 token); 80 * @token 29 dprtc_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dprtc_id, u16 *token) argument 64 dprtc_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 91 dprtc_set_irq_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 irq_index, u8 en) argument 120 dprtc_get_irq_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 irq_index, u8 *en) argument 163 dprtc_set_irq_mask(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 irq_index, u32 mask) argument 195 dprtc_get_irq_mask(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 irq_index, u32 *mask) argument 235 dprtc_get_irq_status(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 irq_index, u32 *status) argument 276 dprtc_clear_irq_status(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 irq_index, u32 status) argument [all...] |
H A D | dpni.h | 89 u16 *token); 93 u16 token); 124 u16 token, 129 u16 token); 133 u16 token); 137 u16 token, 142 u16 token); 156 u16 token, 162 u16 token, 168 u16 token, [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | token_lsm.c | 15 int BPF_PROG(token_capable, struct bpf_token *token, int cap) argument 25 int BPF_PROG(token_cmd, struct bpf_token *token, enum bpf_cmd cmd) argument
|
/linux-master/virt/lib/ |
H A D | irqbypass.c | 82 * with any matching token found on the IRQ consumers list. 90 if (!producer->token) 101 if (tmp->token == producer->token) { 108 if (consumer->token == producer->token) { 140 if (!producer->token) 151 if (tmp->token != producer->token) 155 if (consumer->token [all...] |
/linux-master/drivers/soc/fsl/dpio/ |
H A D | dpio.h | 15 u16 *token); 19 u16 token); 46 u16 token); 50 u16 token); 77 u16 token, 82 u16 token, 92 u16 token);
|
H A D | dpio.c | 23 * @token: Returned token; use in subsequent API calls 28 * This function returns a unique authentication token, 30 * portal; this token must be used in all subsequent commands for 38 u16 *token) 56 *token = mc_cmd_hdr_read_token(&cmd); 65 * @token: Token of DPIO object 71 u16 token) 78 token); 87 * @token 35 dpio_open(struct fsl_mc_io *mc_io, u32 cmd_flags, int dpio_id, u16 *token) argument 69 dpio_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 91 dpio_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 113 dpio_disable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument 136 dpio_get_attributes(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, struct dpio_attr *attr) argument 170 dpio_set_stashing_destination(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, u8 sdest) argument 225 dpio_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token) argument [all...] |
/linux-master/security/apparmor/ |
H A D | procattr.c | 70 * split_token_from_name - separate a string of form <token>^<name> 73 * @token: stores returned parsed token value (NOT NULL) 75 * Returns: start position of name after token else NULL on failure 77 static char *split_token_from_name(const char *op, char *args, u64 *token) argument 81 *token = simple_strtoull(args, &name, 16); 104 u64 token; local 108 hat = split_token_from_name(OP_CHANGE_HAT, args, &token); 112 if (!hat && !token) { 129 , __func__, current->pid, token, coun [all...] |
/linux-master/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; 57 strncpy((char *)auth_tok->token.password.signature, key_desc, 59 auth_tok->token.password.session_key_encryption_key_bytes = 62 * Removed auth_tok->token.password.salt and 63 * auth_tok->token.password.session_key_encryption_key 67 auth_tok->token.password.flags |= 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
|
/linux-master/drivers/dma/fsl-dpaa2-qdma/ |
H A D | dpdmai.h | 163 int dpdmai_id, u16 *token); 164 int dpdmai_close(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 165 int dpdmai_destroy(struct fsl_mc_io *mc_io, u32 cmd_flags, u32 dpdmai_id, u16 token); 166 int dpdmai_enable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 167 int dpdmai_disable(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 168 int dpdmai_reset(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token); 170 u16 token, struct dpdmai_attr *attr); 171 int dpdmai_set_rx_queue(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 173 int dpdmai_get_rx_queue(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token, 176 u16 token, u [all...] |