Searched refs:token (Results 1 - 25 of 519) sorted by last modified time

1234567891011>>

/linux-master/sound/soc/sof/
H A Dsof-audio.h173 * @token_list: List of token ID's that should be parsed for the widget
240 * @token: Token ID
244 u32 token; member in struct:snd_sof_tuple
252 * List of SOF token ID's. The order of ID's does not matter as token arrays are looked up based on
294 * struct sof_topology_token - SOF topology token definition
295 * @token: Token number
297 * @get_token: Function pointer to parse the token value and save it in a object
298 * @offset: Offset within an object to save the token value into
301 u32 token; member in struct:sof_topology_token
[all...]
/linux-master/sound/soc/intel/avs/
H A Dtopology.c29 * Scan provided block of tuples for the specified token. If found,
30 * @offset is updated with position at which first matching token is
37 u32 block_size, u32 token, u32 *offset)
49 if (le32_to_cpu(tuple->token) == token) {
68 * several vendor tuples and a specific token marks the beginning of
73 u32 block_size, u32 token, u32 *offset)
84 ret = avs_tplg_vendor_array_lookup(tuples, block_size, token, offset);
91 * Scan provided block of tuples for the specified token which marks
94 * matching token ha
36 avs_tplg_vendor_array_lookup(struct snd_soc_tplg_vendor_array *tuples, u32 block_size, u32 token, u32 *offset) argument
72 avs_tplg_vendor_array_lookup_next(struct snd_soc_tplg_vendor_array *tuples, u32 block_size, u32 token, u32 *offset) argument
124 enum avs_tplg_token token; member in struct:avs_tplg_token_parser
[all...]
/linux-master/net/rxrpc/
H A Drxkad.c101 struct rxrpc_key_token *token)
108 conn->security_ix = token->security_index;
117 if (crypto_sync_skcipher_setkey(ci, token->kad->session_key,
118 sizeof(token->kad->session_key)) < 0)
187 struct rxrpc_key_token *token; local
208 token = conn->key->payload.data[0];
209 memcpy(&iv, token->kad->session_key, sizeof(iv));
296 const struct rxrpc_key_token *token; local
322 token = call->conn->key->payload.data[0];
323 memcpy(&iv, token
100 rxkad_init_connection_security(struct rxrpc_connection *conn, struct rxrpc_key_token *token) argument
475 const struct rxrpc_key_token *token; local
791 const struct rxrpc_key_token *token; local
[all...]
H A Dinsecure.c12 struct rxrpc_key_token *token)
11 none_init_connection_security(struct rxrpc_connection *conn, struct rxrpc_key_token *token) argument
/linux-master/net/mptcp/
H A Dprotocol.c3099 if (msk->token)
3166 if (msk->token)
3277 WRITE_ONCE(msk->token, subflow_req->token);
3547 pr_debug("msk=%p, token=%u", sk, subflow->token);
3764 /* avoid leaving a dangling token in an unconnected socket */
/linux-master/net/core/
H A Dfilter.c8637 if (!bpf_token_capable(prog->aux->token, CAP_BPF))
8649 if (!bpf_token_capable(prog->aux->token, CAP_BPF))
11841 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON))
/linux-master/kernel/bpf/
H A Dverifier.c21225 env->allow_ptr_leaks = bpf_allow_ptr_leaks(env->prog->aux->token);
21226 env->allow_uninit_stack = bpf_allow_uninit_stack(env->prog->aux->token);
21227 env->bypass_spec_v1 = bpf_bypass_spec_v1(env->prog->aux->token);
21228 env->bypass_spec_v4 = bpf_bypass_spec_v4(env->prog->aux->token);
21229 env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF);
H A Dcore.c690 !bpf_token_capable(fp->aux->token, CAP_BPF))
2793 bpf_token_put(aux->token);
/linux-master/include/linux/
H A Dfilter.h1151 if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF))
/linux-master/drivers/s390/net/
H A Dqeth_core_main.c1926 card->token.issuer_rm_w = 0x00010103UL;
1927 card->token.cm_filter_w = 0x00010108UL;
1928 card->token.cm_connection_w = 0x0001010aUL;
1929 card->token.ulp_filter_w = 0x0001010bUL;
1930 card->token.ulp_connection_w = 0x0001010dUL;
2217 memcpy(&card->token.issuer_rm_r,
2271 &card->token.issuer_rm_w, QETH_MPC_TOKEN_LENGTH);
2334 memcpy(&card->token.cm_filter_r,
2351 &card->token.issuer_rm_r, QETH_MPC_TOKEN_LENGTH);
2353 &card->token
[all...]
/linux-master/drivers/s390/crypto/
H A Dzcrypt_ccamisc.c44 * Simple check if the token is a valid CCA secure AES data key
45 * token. If keybitsize is given, the bitsize of the key is
49 const u8 *token, int keybitsize)
51 struct secaeskeytoken *t = (struct secaeskeytoken *)token;
57 DBF("%s token check failed, type 0x%02x != 0x%02x\n",
63 DBF("%s token check failed, version 0x%02x != 0x%02x\n",
69 DBF("%s token check failed, bitsize %d != %d\n",
81 * Simple check if the token is a valid CCA secure AES cipher key
82 * token. If keybitsize is given, the bitsize of the key is
88 const u8 *token, in
48 cca_check_secaeskeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, int keybitsize) argument
87 cca_check_secaescipherkey(debug_info_t *dbg, int dbflvl, const u8 *token, int keybitsize, int checkcpacfexport) argument
174 cca_check_sececckeytoken(debug_info_t *dbg, int dbflvl, const u8 *token, size_t keysize, int checkcpacfexport) argument
594 u8 token[]; /* cca secure key token */ member in struct:uskreqparm::lv2
1091 u8 *token; local
[all...]
/linux-master/drivers/net/ethernet/broadcom/bnxt/
H A Dbnxt.c4550 struct bnxt_hwrm_wait_token *token; local
4556 hlist_for_each_entry_rcu(token, &bp->hwrm_pending_list, node)
4557 WRITE_ONCE(token->state, BNXT_HWRM_CANCELLED);
/linux-master/drivers/gpu/drm/amd/amdgpu/
H A Dgfx_v11_0.c5610 uint64_t token = shadow_va ^ csa_va ^ gds_va ^ vmid; local
5616 if (ring->set_q_mode_ptr && ring->set_q_mode_token == token)
5619 ring->set_q_mode_token = token;
/linux-master/fs/btrfs/
H A Dinode.c3967 struct btrfs_map_token token; local
3970 btrfs_init_map_token(&token, leaf);
3972 btrfs_set_token_inode_uid(&token, item, i_uid_read(inode));
3973 btrfs_set_token_inode_gid(&token, item, i_gid_read(inode));
3974 btrfs_set_token_inode_size(&token, item, BTRFS_I(inode)->disk_i_size);
3975 btrfs_set_token_inode_mode(&token, item, inode->i_mode);
3976 btrfs_set_token_inode_nlink(&token, item, inode->i_nlink);
3978 btrfs_set_token_timespec_sec(&token, &item->atime,
3980 btrfs_set_token_timespec_nsec(&token, &item->atime,
3983 btrfs_set_token_timespec_sec(&token,
[all...]
/linux-master/fs/smb/server/
H A Dsmb2pdu.c6512 pr_info("RDMA r/w request %#x: token %#x, length %#x\n",
6514 le32_to_cpu(desc[i].token),
6524 work->remote_key = le32_to_cpu(desc->token);
/linux-master/fs/smb/client/
H A Dsmb2pdu.c4449 v1->token = cpu_to_le32(rdata->mr->mr->rkey);
4908 v1->token = cpu_to_le32(wdata->mr->mr->rkey);
/linux-master/arch/x86/kvm/
H A Dx86.c13274 static inline int apf_put_user_ready(struct kvm_vcpu *vcpu, u32 token) argument
13276 unsigned int offset = offsetof(struct kvm_vcpu_pv_apf_data, token);
13279 &token, offset, sizeof(token));
13284 unsigned int offset = offsetof(struct kvm_vcpu_pv_apf_data, token);
13342 trace_kvm_async_pf_not_present(work->arch.token, work->cr2_or_gpa);
13351 fault.address = work->arch.token;
13378 work->arch.token = ~0; /* broadcast wakeup */
13381 trace_kvm_async_pf_ready(work->arch.token, work->cr2_or_gpa);
13385 !apf_put_user_ready(vcpu, work->arch.token)) {
[all...]
/linux-master/arch/x86/kvm/mmu/
H A Dmmu.c4253 /* make sure the token value is not 0 */
4267 arch.token = alloc_apf_token(vcpu);
/linux-master/arch/x86/include/asm/
H A Dkvm_host.h1843 u32 token; member in struct:kvm_arch_async_pf
/linux-master/tools/arch/powerpc/include/uapi/asm/
H A Dkvm.h362 __u64 token; /* Use a token of 0 to undefine a mapping */ member in struct:kvm_rtas_token_args
/linux-master/drivers/scsi/
H A Dscsi_lib.c1338 * scsi_dev_queue_ready: if we can send requests to sdev, assign one token
1339 * and return the token else return -1.
1344 int token; local
1346 token = sbitmap_get(&sdev->budget_map);
1347 if (token < 0)
1351 return token;
1359 sbitmap_put(&sdev->budget_map, token);
1366 return token;
1755 int token = scsi_dev_queue_ready(q, sdev); local
1757 if (token >
1783 scsi_mq_set_rq_budget_token(struct request *req, int token) argument
[all...]
/linux-master/drivers/net/ethernet/mediatek/
H A Dmtk_wed.c638 int token = dev->wlan.token_start; local
701 token++);
714 ctrl = token << 16 | TX_DMA_PREP_ADDR64(buf_phys);
815 desc->token = cpu_to_le32(RX_DMA_PREP_ADDR64(buf_phys));
/linux-master/net/ipv6/
H A Dip6_fib.c133 static __be32 addr_bit_set(const void *token, int fn_bit) argument
135 const __be32 *addr = token;
H A Daddrconf.c447 ndev->token = in6addr_any;
2872 if (!ipv6_addr_any(&in6_dev->token)) {
2875 in6_dev->token.s6_addr + 8, 8);
5828 memcpy(nla_data(nla), idev->token.s6_addr, nla_len(nla));
5868 static int inet6_set_iftoken(struct inet6_dev *idev, struct in6_addr *token, argument
5878 if (!token)
5906 BUILD_BUG_ON(sizeof(token->s6_addr) != 16);
5907 memcpy(idev->token.s6_addr + 8, token->s6_addr + 8, 8);
5911 clear_token = ipv6_addr_any(token);
[all...]
/linux-master/kernel/trace/
H A Dtrace_events.c3993 char *token; local
3997 token = strsep(&buf, ",");
3999 if (!token)
4002 if (*token) {
4005 ftrace_set_clr_event(tr, token, 0);
4007 ret = ftrace_set_clr_event(tr, token, 1);
4009 pr_warn("Failed to enable trace event: %s\n", token);

Completed in 623 milliseconds

1234567891011>>