/linux-master/sound/soc/sof/ |
H A D | sof-audio.h | 173 * @token_list: List of token ID's that should be parsed for the widget 240 * @token: Token ID 244 u32 token; member in struct:snd_sof_tuple 252 * List of SOF token ID's. The order of ID's does not matter as token arrays are looked up based on 294 * struct sof_topology_token - SOF topology token definition 295 * @token: Token number 297 * @get_token: Function pointer to parse the token value and save it in a object 298 * @offset: Offset within an object to save the token value into 301 u32 token; member in struct:sof_topology_token [all...] |
/linux-master/sound/soc/intel/avs/ |
H A D | topology.c | 29 * Scan provided block of tuples for the specified token. If found, 30 * @offset is updated with position at which first matching token is 37 u32 block_size, u32 token, u32 *offset) 49 if (le32_to_cpu(tuple->token) == token) { 68 * several vendor tuples and a specific token marks the beginning of 73 u32 block_size, u32 token, u32 *offset) 84 ret = avs_tplg_vendor_array_lookup(tuples, block_size, token, offset); 91 * Scan provided block of tuples for the specified token which marks 94 * matching token ha 36 avs_tplg_vendor_array_lookup(struct snd_soc_tplg_vendor_array *tuples, u32 block_size, u32 token, u32 *offset) argument 72 avs_tplg_vendor_array_lookup_next(struct snd_soc_tplg_vendor_array *tuples, u32 block_size, u32 token, u32 *offset) argument 124 enum avs_tplg_token token; member in struct:avs_tplg_token_parser [all...] |
/linux-master/net/rxrpc/ |
H A D | rxkad.c | 101 struct rxrpc_key_token *token) 108 conn->security_ix = token->security_index; 117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key, 118 sizeof(token->kad->session_key)) < 0) 187 struct rxrpc_key_token *token; local 208 token = conn->key->payload.data[0]; 209 memcpy(&iv, token->kad->session_key, sizeof(iv)); 296 const struct rxrpc_key_token *token; local 322 token = call->conn->key->payload.data[0]; 323 memcpy(&iv, token 100 rxkad_init_connection_security(struct rxrpc_connection *conn, struct rxrpc_key_token *token) argument 475 const struct rxrpc_key_token *token; local 791 const struct rxrpc_key_token *token; local [all...] |
H A D | insecure.c | 12 struct rxrpc_key_token *token) 11 none_init_connection_security(struct rxrpc_connection *conn, struct rxrpc_key_token *token) argument
|
/linux-master/net/mptcp/ |
H A D | protocol.c | 3099 if (msk->token) 3166 if (msk->token) 3277 WRITE_ONCE(msk->token, subflow_req->token); 3547 pr_debug("msk=%p, token=%u", sk, subflow->token); 3764 /* avoid leaving a dangling token in an unconnected socket */
|
/linux-master/net/core/ |
H A D | filter.c | 8637 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) 8649 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) 11841 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON))
|
/linux-master/kernel/bpf/ |
H A D | verifier.c | 21225 env->allow_ptr_leaks = bpf_allow_ptr_leaks(env->prog->aux->token); 21226 env->allow_uninit_stack = bpf_allow_uninit_stack(env->prog->aux->token); 21227 env->bypass_spec_v1 = bpf_bypass_spec_v1(env->prog->aux->token); 21228 env->bypass_spec_v4 = bpf_bypass_spec_v4(env->prog->aux->token); 21229 env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF);
|
H A D | core.c | 690 !bpf_token_capable(fp->aux->token, CAP_BPF)) 2793 bpf_token_put(aux->token);
|
/linux-master/include/linux/ |
H A D | filter.h | 1151 if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF))
|
/linux-master/drivers/s390/net/ |
H A D | qeth_core_main.c | 1926 card->token.issuer_rm_w = 0x00010103UL; 1927 card->token.cm_filter_w = 0x00010108UL; 1928 card->token.cm_connection_w = 0x0001010aUL; 1929 card->token.ulp_filter_w = 0x0001010bUL; 1930 card->token.ulp_connection_w = 0x0001010dUL; 2217 memcpy(&card->token.issuer_rm_r, 2271 &card->token.issuer_rm_w, QETH_MPC_TOKEN_LENGTH); 2334 memcpy(&card->token.cm_filter_r, 2351 &card->token.issuer_rm_r, QETH_MPC_TOKEN_LENGTH); 2353 &card->token [all...] |
/linux-master/drivers/s390/crypto/ |
H A D | zcrypt_ccamisc.c | 44 * Simple check if the token is a valid CCA secure AES data key 45 * token. If keybitsize is given, the bitsize of the key is 49 const u8 *token, int keybitsize) 51 struct secaeskeytoken *t = (struct secaeskeytoken *)token; 57 DBF("%s token check failed, type 0x%02x != 0x%02x\n", 63 DBF("%s token check failed, version 0x%02x != 0x%02x\n", 69 DBF("%s token check failed, bitsize %d != %d\n", 81 * Simple check if the token is a valid CCA secure AES cipher key 82 * token. If keybitsize is given, the bitsize of the key is 88 const u8 *token, in 48 cca_check_secaeskeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, int keybitsize) argument 87 cca_check_secaescipherkey(debug_info_t *dbg, int dbflvl, const u8 *token, int keybitsize, int checkcpacfexport) argument 174 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) argument 594 u8 token[]; /* cca secure key token */ member in struct:uskreqparm::lv2 1091 u8 *token; local [all...] |
/linux-master/drivers/net/ethernet/broadcom/bnxt/ |
H A D | bnxt.c | 4550 struct bnxt_hwrm_wait_token *token; local 4556 hlist_for_each_entry_rcu(token, &bp->hwrm_pending_list, node) 4557 WRITE_ONCE(token->state, BNXT_HWRM_CANCELLED);
|
/linux-master/drivers/gpu/drm/amd/amdgpu/ |
H A D | gfx_v11_0.c | 5610 uint64_t token = shadow_va ^ csa_va ^ gds_va ^ vmid; local 5616 if (ring->set_q_mode_ptr && ring->set_q_mode_token == token) 5619 ring->set_q_mode_token = token;
|
/linux-master/fs/btrfs/ |
H A D | inode.c | 3967 struct btrfs_map_token token; local 3970 btrfs_init_map_token(&token, leaf); 3972 btrfs_set_token_inode_uid(&token, item, i_uid_read(inode)); 3973 btrfs_set_token_inode_gid(&token, item, i_gid_read(inode)); 3974 btrfs_set_token_inode_size(&token, item, BTRFS_I(inode)->disk_i_size); 3975 btrfs_set_token_inode_mode(&token, item, inode->i_mode); 3976 btrfs_set_token_inode_nlink(&token, item, inode->i_nlink); 3978 btrfs_set_token_timespec_sec(&token, &item->atime, 3980 btrfs_set_token_timespec_nsec(&token, &item->atime, 3983 btrfs_set_token_timespec_sec(&token, [all...] |
/linux-master/fs/smb/server/ |
H A D | smb2pdu.c | 6512 pr_info("RDMA r/w request %#x: token %#x, length %#x\n", 6514 le32_to_cpu(desc[i].token), 6524 work->remote_key = le32_to_cpu(desc->token);
|
/linux-master/fs/smb/client/ |
H A D | smb2pdu.c | 4449 v1->token = cpu_to_le32(rdata->mr->mr->rkey); 4908 v1->token = cpu_to_le32(wdata->mr->mr->rkey);
|
/linux-master/arch/x86/kvm/ |
H A D | x86.c | 13274 static inline int apf_put_user_ready(struct kvm_vcpu *vcpu, u32 token) argument 13276 unsigned int offset = offsetof(struct kvm_vcpu_pv_apf_data, token); 13279 &token, offset, sizeof(token)); 13284 unsigned int offset = offsetof(struct kvm_vcpu_pv_apf_data, token); 13342 trace_kvm_async_pf_not_present(work->arch.token, work->cr2_or_gpa); 13351 fault.address = work->arch.token; 13378 work->arch.token = ~0; /* broadcast wakeup */ 13381 trace_kvm_async_pf_ready(work->arch.token, work->cr2_or_gpa); 13385 !apf_put_user_ready(vcpu, work->arch.token)) { [all...] |
/linux-master/arch/x86/kvm/mmu/ |
H A D | mmu.c | 4253 /* make sure the token value is not 0 */ 4267 arch.token = alloc_apf_token(vcpu);
|
/linux-master/arch/x86/include/asm/ |
H A D | kvm_host.h | 1843 u32 token; member in struct:kvm_arch_async_pf
|
/linux-master/tools/arch/powerpc/include/uapi/asm/ |
H A D | kvm.h | 362 __u64 token; /* Use a token of 0 to undefine a mapping */ member in struct:kvm_rtas_token_args
|
/linux-master/drivers/scsi/ |
H A D | scsi_lib.c | 1338 * scsi_dev_queue_ready: if we can send requests to sdev, assign one token 1339 * and return the token else return -1. 1344 int token; local 1346 token = sbitmap_get(&sdev->budget_map); 1347 if (token < 0) 1351 return token; 1359 sbitmap_put(&sdev->budget_map, token); 1366 return token; 1755 int token = scsi_dev_queue_ready(q, sdev); local 1757 if (token > 1783 scsi_mq_set_rq_budget_token(struct request *req, int token) argument [all...] |
/linux-master/drivers/net/ethernet/mediatek/ |
H A D | mtk_wed.c | 638 int token = dev->wlan.token_start; local 701 token++); 714 ctrl = token << 16 | TX_DMA_PREP_ADDR64(buf_phys); 815 desc->token = cpu_to_le32(RX_DMA_PREP_ADDR64(buf_phys));
|
/linux-master/net/ipv6/ |
H A D | ip6_fib.c | 133 static __be32 addr_bit_set(const void *token, int fn_bit) argument 135 const __be32 *addr = token;
|
H A D | addrconf.c | 447 ndev->token = in6addr_any; 2872 if (!ipv6_addr_any(&in6_dev->token)) { 2875 in6_dev->token.s6_addr + 8, 8); 5828 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla)); 5868 static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token, argument 5878 if (!token) 5906 BUILD_BUG_ON(sizeof(token->s6_addr) != 16); 5907 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8); 5911 clear_token = ipv6_addr_any(token); [all...] |
/linux-master/kernel/trace/ |
H A D | trace_events.c | 3993 char *token; local 3997 token = strsep(&buf, ","); 3999 if (!token) 4002 if (*token) { 4005 ftrace_set_clr_event(tr, token, 0); 4007 ret = ftrace_set_clr_event(tr, token, 1); 4009 pr_warn("Failed to enable trace event: %s\n", token);
|