| /linux/include/uapi/linux/ |
| H A D | keyboard.h | 45 #define K(t,v) (((t)<<8)|(v)) macro 49 #define K_F1 K(KT_FN,0) 50 #define K_F2 K(KT_FN,1) 51 #define K_F3 K(KT_FN,2) 52 #define K_F4 K(KT_FN,3) 53 #define K_F5 K(KT_FN,4) 54 #define K_F6 K(KT_FN,5) 55 #define K_F7 K(KT_FN,6) 56 #define K_F8 K(KT_FN,7) 57 #define K_F9 K(KT_FN,8) [all …]
|
| /linux/rust/kernel/ |
| H A D | rbtree.rs | 171 pub struct RBTree<K, V> { 173 _p: PhantomData<Node<K, V>>, 178 unsafe impl<K: Send, V: Send> Send for RBTree<K, V> {} 182 unsafe impl<K: Sync, V: Sync> Sync for RBTree<K, V> {} 184 impl<K, V> RBTree<K, V> { 201 pub fn iter(&self) -> Iter<'_, K, V> { in iter() argument 216 pub fn iter_mut(&mut self) -> IterMut<'_, K, V> { in iter_mut() argument 231 pub fn keys(&self) -> impl Iterator<Item = &'_ K> { in keys() 246 pub fn cursor_front(&mut self) -> Option<Cursor<'_, K, V>> { in cursor_front() argument 261 pub fn cursor_back(&mut self) -> Option<Cursor<'_, K, V>> { in cursor_back() argument [all …]
|
| /linux/crypto/ |
| H A D | wp512.c | 782 u64 K[8]; /* the round key */ in wp512_process_buffer() local 790 state[0] = block[0] ^ (K[0] = wctx->hash[0]); in wp512_process_buffer() 791 state[1] = block[1] ^ (K[1] = wctx->hash[1]); in wp512_process_buffer() 792 state[2] = block[2] ^ (K[2] = wctx->hash[2]); in wp512_process_buffer() 793 state[3] = block[3] ^ (K[3] = wctx->hash[3]); in wp512_process_buffer() 794 state[4] = block[4] ^ (K[4] = wctx->hash[4]); in wp512_process_buffer() 795 state[5] = block[5] ^ (K[5] = wctx->hash[5]); in wp512_process_buffer() 796 state[6] = block[6] ^ (K[6] = wctx->hash[6]); in wp512_process_buffer() 797 state[7] = block[7] ^ (K[7] = wctx->hash[7]); in wp512_process_buffer() 801 L[0] = C0[(int)(K[0] >> 56) ] ^ in wp512_process_buffer() [all …]
|
| /linux/lib/crypto/ |
| H A D | sm3.c | 18 static const u32 ____cacheline_aligned K[64] = { variable 88 R1(a, b, c, d, e, f, g, h, K[0], I(0), I(4)); in sm3_transform() 89 R1(d, a, b, c, h, e, f, g, K[1], I(1), I(5)); in sm3_transform() 90 R1(c, d, a, b, g, h, e, f, K[2], I(2), I(6)); in sm3_transform() 91 R1(b, c, d, a, f, g, h, e, K[3], I(3), I(7)); in sm3_transform() 92 R1(a, b, c, d, e, f, g, h, K[4], W1(4), I(8)); in sm3_transform() 93 R1(d, a, b, c, h, e, f, g, K[5], W1(5), I(9)); in sm3_transform() 94 R1(c, d, a, b, g, h, e, f, K[6], W1(6), I(10)); in sm3_transform() 95 R1(b, c, d, a, f, g, h, e, K[7], W1(7), I(11)); in sm3_transform() 96 R1(a, b, c, d, e, f, g, h, K[8], W1(8), I(12)); in sm3_transform() [all …]
|
| H A D | des.c | 581 #define ROUND(L, R, A, B, K, d) \ argument 582 B = K[0]; A = K[1]; K += d; \ 782 const u32 *K = ctx->expkey; in des_encrypt() local 791 ROUND(L, R, A, B, K, 2); in des_encrypt() 792 ROUND(R, L, A, B, K, 2); in des_encrypt() 803 const u32 *K = ctx->expkey + DES_EXPKEY_WORDS - 2; in des_decrypt() local 812 ROUND(L, R, A, B, K, -2); in des_decrypt() 813 ROUND(R, L, A, B, K, -2); in des_decrypt() 845 const u32 *K = dctx->expkey; in des3_ede_encrypt() local 854 ROUND(L, R, A, B, K, 2); in des3_ede_encrypt() [all …]
|
| /linux/mm/ |
| H A D | show_mem.c | 259 K(node_page_state(pgdat, NR_ACTIVE_ANON)), in show_free_areas() 260 K(node_page_state(pgdat, NR_INACTIVE_ANON)), in show_free_areas() 261 K(node_page_state(pgdat, NR_ACTIVE_FILE)), in show_free_areas() 262 K(node_page_state(pgdat, NR_INACTIVE_FILE)), in show_free_areas() 263 K(node_page_state(pgdat, NR_UNEVICTABLE)), in show_free_areas() 264 K(node_page_state(pgdat, NR_ISOLATED_ANON)), in show_free_areas() 265 K(node_page_state(pgdat, NR_ISOLATED_FILE)), in show_free_areas() 266 K(node_page_state(pgdat, NR_FILE_MAPPED)), in show_free_areas() 267 K(node_page_state(pgdat, NR_FILE_DIRTY)), in show_free_areas() 268 K(node_page_state(pgdat, NR_WRITEBACK)), in show_free_areas() [all …]
|
| /linux/include/crypto/internal/ |
| H A D | des.h | 59 u32 K[6]; in des3_ede_verify_key() local 61 memcpy(K, key, DES3_EDE_KEY_SIZE); in des3_ede_verify_key() 63 if ((!((K[0] ^ K[2]) | (K[1] ^ K[3])) || in des3_ede_verify_key() 64 !((K[2] ^ K[4]) | (K[3] ^ K[5]))) && in des3_ede_verify_key() 68 if ((!((K[0] ^ K[4]) | (K[1] ^ K[5]))) && fips_enabled) in des3_ede_verify_key() 73 memzero_explicit(K, DES3_EDE_KEY_SIZE); in des3_ede_verify_key()
|
| /linux/arch/sparc/net/ |
| H A D | bpf_jit_comp_32.c | 68 #define SETHI(K, REG) \ argument 69 (F2(0, 0x4) | RD(REG) | (((K) >> 10) & 0x3fffff)) 70 #define OR_LO(K, REG) \ argument 71 (F3(2, 0x02) | IMMED | RS1(REG) | ((K) & 0x3ff) | RD(REG)) 126 #define emit_set_const(K, REG) \ argument 128 *prog++ = SETHI(K, REG); \ 130 *prog++ = OR_LO(K, REG); \ 157 #define emit_alu_K(OPCODE, K) \ argument 159 if (K || OPCODE == AND || OPCODE == MUL) { \ 162 if (is_simm13(K)) { \ [all …]
|
| /linux/Documentation/arch/powerpc/ |
| H A D | vmemmap_dedup.rst | 11 with a 64K page size, only the devdax namespace with 1G alignment uses vmemmap 14 With 2M PMD level mapping, we require 32 struct pages and a single 64K vmemmap 15 page can contain 1024 struct pages (64K/sizeof(struct page)). Hence there is no 18 With 1G PUD level mapping, we require 16384 struct pages and a single 64K 19 vmemmap page can contain 1024 struct pages (64K/sizeof(struct page)). Hence we 20 require 16 64K pages in vmemmap to map the struct page for 1G PUD level mapping. 46 With 4K page size, 2M PMD level mapping requires 512 struct pages and a single 47 4K vmemmap page contains 64 struct pages(4K/sizeof(struct page)). Hence we 48 require 8 4K pages in vmemmap to map the struct page for 2M pmd level mapping. 74 With 1G PUD level mapping, we require 262144 struct pages and a single 4K [all …]
|
| /linux/Documentation/networking/device_drivers/atm/ |
| H A D | iphase.rst | 24 - Supports 4K VCs for the server board (with 512K control memory) and 1K 25 VCs for the client board (with 128K control memory). 31 including x575 (OC3, control memory 128K , 512K and packet memory 128K, 32 512K and 1M), x525 (UTP25) and x531 (DS3 and E3). See 93 The (i)Chip boards have 3 different packet RAM size variants: 128K, 512K and 101 128K 64K 64K 10K 10K 6 6 102 512K 256K 256K 10K 10K 25 25 103 1M 512K 512K 10K 10K 51 51 115 - RX_SIZE = size of receive buffers in the range (48-64K) 117 - TX_SIZE = size of transmit buffers in the range (48-64K)
|
| /linux/arch/arm64/include/asm/ |
| H A D | atomic_ll_sc.h | 16 #define K macro 106 ATOMIC_OPS(and, and, K) in ATOMIC_OPS() 107 ATOMIC_OPS(or, orr, K) in ATOMIC_OPS() 108 ATOMIC_OPS(xor, eor, K) in ATOMIC_OPS() 278 __CMPXCHG_CASE(w, b, , 8, , , , , K) 279 __CMPXCHG_CASE(w, h, , 16, , , , , K) 280 __CMPXCHG_CASE(w, , , 32, , , , , K) 282 __CMPXCHG_CASE(w, b, acq_, 8, , a, , "memory", K) 283 __CMPXCHG_CASE(w, h, acq_, 16, , a, , "memory", K) 284 __CMPXCHG_CASE(w, , acq_, 32, , a, , "memory", K) [all …]
|
| /linux/drivers/base/ |
| H A D | node.c | 440 #define K(x) ((x) << (PAGE_SHIFT - 10)) macro 470 nid, K(i.totalram), in node_read_meminfo() 471 nid, K(i.freeram), in node_read_meminfo() 472 nid, K(i.totalram - i.freeram), in node_read_meminfo() 473 nid, K(swapcached), in node_read_meminfo() 474 nid, K(node_page_state(pgdat, NR_ACTIVE_ANON) + in node_read_meminfo() 476 nid, K(node_page_state(pgdat, NR_INACTIVE_ANON) + in node_read_meminfo() 478 nid, K(node_page_state(pgdat, NR_ACTIVE_ANON)), in node_read_meminfo() 479 nid, K(node_page_state(pgdat, NR_INACTIVE_ANON)), in node_read_meminfo() 480 nid, K(node_page_state(pgdat, NR_ACTIVE_FILE)), in node_read_meminfo() [all …]
|
| /linux/crypto/krb5/ |
| H A D | rfc6803_camellia.c | 31 struct krb5_buffer K, data; in rfc6803_calc_KDF_FEEDBACK_CMAC() local 48 K.len = crypto_shash_digestsize(shash); in rfc6803_calc_KDF_FEEDBACK_CMAC() 49 data.len = K.len + 4 + constant->len + 1 + 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 52 crypto_roundup(K.len) + in rfc6803_calc_KDF_FEEDBACK_CMAC() 61 K.data = buffer + in rfc6803_calc_KDF_FEEDBACK_CMAC() 67 crypto_roundup(K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 69 p = data.data + K.len + 4; in rfc6803_calc_KDF_FEEDBACK_CMAC() 85 memcpy(p, K.data, K.len); in rfc6803_calc_KDF_FEEDBACK_CMAC() 86 p += K.len; in rfc6803_calc_KDF_FEEDBACK_CMAC() 92 ret = crypto_shash_finup(desc, data.data, data.len, K.data); in rfc6803_calc_KDF_FEEDBACK_CMAC() [all …]
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-kernel-mm-damon | 21 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/state 41 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/pid 47 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/refresh_ms 54 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/nr_contexts 61 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/avail_operations 67 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/operations 80 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/addr_unit 87 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/monitoring_attrs/intervals/sample_us 94 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/monitoring_attrs/intervals/aggr_us 101 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/monitoring_attrs/intervals/update_us [all …]
|
| H A D | sysfs-bus-siox | 3 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 16 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 33 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 39 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 47 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 54 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 60 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 67 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 73 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… 81 Contact: Thorsten Scherer <t.scherer@eckelmann.de>, Uwe Kleine-König <u.kleine-koenig@pengutronix.d… [all …]
|
| /linux/Documentation/admin-guide/media/ |
| H A D | dvb_intro.rst | 151 TRANSMISSION_MODE = 8K 179 TRANSMISSION_MODE = 8K 194 TRANSMISSION_MODE = 8K 209 TRANSMISSION_MODE = 8K 224 TRANSMISSION_MODE = 8K 239 TRANSMISSION_MODE = 8K 254 TRANSMISSION_MODE = 8K 269 TRANSMISSION_MODE = 8K 284 TRANSMISSION_MODE = 8K 299 TRANSMISSION_MODE = 8K [all …]
|
| /linux/arch/sparc/crypto/ |
| H A D | des_glue.c | 76 const u64 *K = ctx->encrypt_expkey; in sparc_des_encrypt() local 78 des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst); in sparc_des_encrypt() 84 const u64 *K = ctx->decrypt_expkey; in sparc_des_decrypt() local 86 des_sparc64_crypt(K, (const u64 *) src, (u64 *) dst); in sparc_des_decrypt() 225 const u64 *K = ctx->encrypt_expkey; in sparc_des3_ede_encrypt() local 227 des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst); in sparc_des3_ede_encrypt() 233 const u64 *K = ctx->decrypt_expkey; in sparc_des3_ede_decrypt() local 235 des3_ede_sparc64_crypt(K, (const u64 *) src, (u64 *) dst); in sparc_des3_ede_decrypt() 248 const u64 *K; in __ecb3_crypt() local 257 K = &ctx->encrypt_expkey[0]; in __ecb3_crypt() [all …]
|
| /linux/tools/bpf/ |
| H A D | bpf_dbg.c | 636 uint32_t K = f->k; in bpf_single_step() local 641 r->R = K; in bpf_single_step() 659 r->M[K] = r->A; in bpf_single_step() 662 r->M[K] = r->X; in bpf_single_step() 665 d = pkt_caplen - K; in bpf_single_step() 667 r->A = extract_u32(pkt, K); in bpf_single_step() 672 d = pkt_caplen - K; in bpf_single_step() 674 r->A = extract_u16(pkt, K); in bpf_single_step() 679 d = pkt_caplen - K; in bpf_single_step() 681 r->A = extract_u8(pkt, K); in bpf_single_step() [all …]
|
| /linux/Documentation/translations/zh_CN/arch/arm64/ |
| H A D | hugetlbpage.rst | 42 4K: 64K 2M 32M 1G 43 16K: 2M 32M 1G 44 64K: 2M 512M 16G
|
| /linux/Documentation/translations/zh_TW/arch/arm64/ |
| H A D | hugetlbpage.rst | 45 4K: 64K 2M 32M 1G 46 16K: 2M 32M 1G 47 64K: 2M 512M 16G
|
| /linux/tools/testing/selftests/net/packetdrill/ |
| H A D | tcp_inq_server.pkt | 23 // Now we have 10K of data ready on the socket. 27 // We read 2K and we should have 8K ready to read. 34 // We read 8K and we should have no further data ready to read. 45 // We read 10K and we should have one "fake" byte because the connection is
|
| H A D | tcp_inq_client.pkt | 22 // Now we have 10K of data ready on the socket. 26 // We read 1K and we should have 9K ready to read. 33 // We read 9K and we should have no further data ready to read. 45 // We read 10K and we should have one "fake" byte because the connection is
|
| /linux/Documentation/features/scripts/ |
| H A D | features-refresh.sh | 14 K=$F 17 K=$(echo $F | sed -e 's/^!//g') 47 K_GREP=$(grep "$K" $K_FILES) 65 K_GREP=$(grep "$K" $K_FILES)
|
| /linux/tools/testing/kunit/test_data/ |
| H A D | test_is_test_passed-no_tests_run_no_header.log | 14 Memory: 27868K/56932K available (1681K kernel code, 480K rwdata, 400K rodata, 89K init, 205K bss, 2…
|
| /linux/tools/perf/bench/ |
| H A D | mem-functions.c | 30 #define K 1024 macro 181 if (x < K) \ 183 else if (x < K * K) \ 184 printf(" %14lfd KB/sec\n", x / K); \ 185 else if (x < K * K * K) \ 186 printf(" %14lf MB/sec\n", x / K / K); \ 188 printf(" %14lf GB/sec\n", x / K / K / K); \
|