| /linux/drivers/net/ethernet/micrel/ |
| H A D | ks8851_common.c | 35 static void ks8851_lock(struct ks8851_net *ks, unsigned long *flags) in ks8851_lock() argument 37 ks->lock(ks, flags); in ks8851_lock() 47 static void ks8851_unlock(struct ks8851_net *ks, unsigned long *flags) in ks8851_unlock() argument 49 ks->unlock(ks, flags); in ks8851_unlock() 60 static void ks8851_wrreg16(struct ks8851_net *ks, unsigned int reg, in ks8851_wrreg16() argument 63 ks->wrreg16(ks, reg, val); in ks8851_wrreg16() 73 static unsigned int ks8851_rdreg16(struct ks8851_net *ks, in ks8851_rdreg16() argument 76 return ks->rdreg16(ks, reg); in ks8851_rdreg16() 92 static void ks8851_soft_reset(struct ks8851_net *ks, unsigned op) in ks8851_soft_reset() argument 94 ks8851_wrreg16(ks, KS_GRR, op); in ks8851_soft_reset() [all …]
|
| H A D | ks8851_spi.c | 56 #define to_ks8851_spi(ks) container_of((ks), struct ks8851_net_spi, ks8851) argument 78 static void ks8851_lock_spi(struct ks8851_net *ks, unsigned long *flags) in ks8851_lock_spi() argument 80 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_lock_spi() 92 static void ks8851_unlock_spi(struct ks8851_net *ks, unsigned long *flags) in ks8851_unlock_spi() argument 94 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_unlock_spi() 114 static void ks8851_wrreg16_spi(struct ks8851_net *ks, unsigned int reg, in ks8851_wrreg16_spi() argument 117 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_wrreg16_spi() 132 netdev_err(ks->netdev, "spi_sync() failed\n"); in ks8851_wrreg16_spi() 145 static void ks8851_rdreg(struct ks8851_net *ks, unsigned int op, in ks8851_rdreg() argument 148 struct ks8851_net_spi *kss = to_ks8851_spi(ks); in ks8851_rdreg() [all …]
|
| H A D | ks8851_par.c | 53 #define to_ks8851_par(ks) container_of((ks), struct ks8851_net_par, ks8851) argument 62 static void ks8851_lock_par(struct ks8851_net *ks, unsigned long *flags) in ks8851_lock_par() argument 64 struct ks8851_net_par *ksp = to_ks8851_par(ks); in ks8851_lock_par() 76 static void ks8851_unlock_par(struct ks8851_net *ks, unsigned long *flags) in ks8851_unlock_par() argument 78 struct ks8851_net_par *ksp = to_ks8851_par(ks); in ks8851_unlock_par() 91 static int ks_check_endian(struct ks8851_net *ks) in ks_check_endian() argument 93 struct ks8851_net_par *ksp = to_ks8851_par(ks); in ks_check_endian() 122 netdev_err(ks->netdev, "incorrect EESK endian strap setting\n"); in ks_check_endian() 135 static void ks8851_wrreg16_par(struct ks8851_net *ks, unsigned int reg, in ks8851_wrreg16_par() argument 138 struct ks8851_net_par *ksp = to_ks8851_par(ks); in ks8851_wrreg16_par() [all …]
|
| H A D | ks8851.h | 411 void (*lock)(struct ks8851_net *ks, 413 void (*unlock)(struct ks8851_net *ks, 415 unsigned int (*rdreg16)(struct ks8851_net *ks, 417 void (*wrreg16)(struct ks8851_net *ks, 419 void (*rdfifo)(struct ks8851_net *ks, u8 *buff, 421 void (*wrfifo)(struct ks8851_net *ks, 425 void (*flush_tx_work)(struct ks8851_net *ks); 442 static void __maybe_unused ks8851_done_tx(struct ks8851_net *ks, in ks8851_done_tx() argument 445 struct net_device *dev = ks->netdev; in ks8851_done_tx()
|
| /linux/drivers/net/dsa/ |
| H A D | ks8995.c | 235 static inline __be16 create_spi_cmd(struct ks8995_switch *ks, int cmd, in create_spi_cmd() argument 241 result <<= ks->chip->addr_width + ks->chip->addr_shift; in create_spi_cmd() 243 result |= address << ks->chip->addr_shift; in create_spi_cmd() 248 static int ks8995_read(struct ks8995_switch *ks, char *buf, in ks8995_read() argument 256 cmd = create_spi_cmd(ks, KS8995_CMD_READ, offset); in ks8995_read() 269 mutex_lock(&ks->lock); in ks8995_read() 270 err = spi_sync(ks->spi, &m); in ks8995_read() 271 mutex_unlock(&ks->lock); in ks8995_read() 276 static int ks8995_write(struct ks8995_switch *ks, char *buf, in ks8995_write() argument 284 cmd = create_spi_cmd(ks, KS8995_CMD_WRITE, offset); in ks8995_write() [all …]
|
| /linux/drivers/net/ovpn/ |
| H A D | crypto_aead.c | 32 static int ovpn_aead_encap_overhead(const struct ovpn_crypto_key_slot *ks) in ovpn_aead_encap_overhead() argument 36 crypto_aead_authsize(ks->encrypt); /* Auth Tag */ in ovpn_aead_encap_overhead() 39 int ovpn_aead_encrypt(struct ovpn_peer *peer, struct ovpn_crypto_key_slot *ks, in ovpn_aead_encrypt() argument 42 const unsigned int tag_size = crypto_aead_authsize(ks->encrypt); in ovpn_aead_encrypt() 51 ovpn_skb_cb(skb)->ks = ks; in ovpn_aead_encrypt() 104 ret = ovpn_pktid_xmit_next(&ks->pid_xmit, &pktid); in ovpn_aead_encrypt() 118 ovpn_pktid_aead_write(pktid, ks->nonce_tail_xmit, iv); in ovpn_aead_encrypt() 125 op = ovpn_opcode_compose(OVPN_DATA_V2, ks->key_id, peer->id); in ovpn_aead_encrypt() 133 req = aead_request_alloc(ks->encrypt, GFP_ATOMIC); in ovpn_aead_encrypt() 140 aead_request_set_tfm(req, ks->encrypt); in ovpn_aead_encrypt() [all …]
|
| H A D | crypto.c | 23 struct ovpn_crypto_key_slot *ks; in ovpn_ks_destroy_rcu() local 25 ks = container_of(head, struct ovpn_crypto_key_slot, rcu); in ovpn_ks_destroy_rcu() 26 ovpn_aead_crypto_key_slot_destroy(ks); in ovpn_ks_destroy_rcu() 31 struct ovpn_crypto_key_slot *ks; in ovpn_crypto_key_slot_release() local 33 ks = container_of(kref, struct ovpn_crypto_key_slot, refcount); in ovpn_crypto_key_slot_release() 34 call_rcu(&ks->rcu, ovpn_ks_destroy_rcu); in ovpn_crypto_key_slot_release() 42 struct ovpn_crypto_key_slot *ks; in ovpn_crypto_state_release() local 44 ks = rcu_access_pointer(cs->slots[0]); in ovpn_crypto_state_release() 45 if (ks) { in ovpn_crypto_state_release() 47 ovpn_crypto_key_slot_put(ks); in ovpn_crypto_state_release() [all …]
|
| H A D | crypto.h | 60 static inline bool ovpn_crypto_key_slot_hold(struct ovpn_crypto_key_slot *ks) in ovpn_crypto_key_slot_hold() argument 62 return kref_get_unless_zero(&ks->refcount); in ovpn_crypto_key_slot_hold() 76 struct ovpn_crypto_key_slot *ks; in ovpn_crypto_key_id_to_slot() local 84 ks = rcu_dereference(cs->slots[idx]); in ovpn_crypto_key_id_to_slot() 85 if (ks && ks->key_id == key_id) { in ovpn_crypto_key_id_to_slot() 86 if (unlikely(!ovpn_crypto_key_slot_hold(ks))) in ovpn_crypto_key_id_to_slot() 87 ks = NULL; in ovpn_crypto_key_id_to_slot() 91 ks = rcu_dereference(cs->slots[!idx]); in ovpn_crypto_key_id_to_slot() 92 if (ks && ks->key_id == key_id) { in ovpn_crypto_key_id_to_slot() 93 if (unlikely(!ovpn_crypto_key_slot_hold(ks))) in ovpn_crypto_key_id_to_slot() [all …]
|
| H A D | io.c | 103 struct ovpn_crypto_key_slot *ks; in ovpn_decrypt_post() local 118 ks = ovpn_skb_cb(skb)->ks; in ovpn_decrypt_post() 131 ret = ovpn_pktid_recv(&ks->pid_recv, ntohl(*pid), 0); in ovpn_decrypt_post() 204 if (likely(ks)) in ovpn_decrypt_post() 205 ovpn_crypto_key_slot_put(ks); in ovpn_decrypt_post() 211 struct ovpn_crypto_key_slot *ks; in ovpn_recv() local 218 ks = ovpn_crypto_key_id_to_slot(&peer->crypto, key_id); in ovpn_recv() 219 if (unlikely(!ks)) { in ovpn_recv() 230 ovpn_decrypt_post(skb, ovpn_aead_decrypt(peer, ks, skb)); in ovpn_recv() 235 struct ovpn_crypto_key_slot *ks; in ovpn_encrypt_post() local [all …]
|
| H A D | crypto_aead.h | 18 int ovpn_aead_encrypt(struct ovpn_peer *peer, struct ovpn_crypto_key_slot *ks, 20 int ovpn_aead_decrypt(struct ovpn_peer *peer, struct ovpn_crypto_key_slot *ks, 25 void ovpn_aead_crypto_key_slot_destroy(struct ovpn_crypto_key_slot *ks); 27 enum ovpn_cipher_alg ovpn_aead_crypto_alg(struct ovpn_crypto_key_slot *ks);
|
| /linux/kernel/debug/ |
| H A D | gdbstub.c | 478 static void gdb_cmd_status(struct kgdb_state *ks) in gdb_cmd_status() argument 489 hex_byte_pack(&remcom_out_buffer[1], ks->signo); in gdb_cmd_status() 492 static void gdb_get_regs_helper(struct kgdb_state *ks) in gdb_get_regs_helper() argument 500 thread = kgdb_info[ks->cpu].task; in gdb_get_regs_helper() 501 local_debuggerinfo = kgdb_info[ks->cpu].debuggerinfo; in gdb_get_regs_helper() 536 static void gdb_cmd_getregs(struct kgdb_state *ks) in gdb_cmd_getregs() argument 538 gdb_get_regs_helper(ks); in gdb_cmd_getregs() 543 static void gdb_cmd_setregs(struct kgdb_state *ks) in gdb_cmd_setregs() argument 550 gdb_regs_to_pt_regs(gdb_regs, ks->linux_regs); in gdb_cmd_setregs() 556 static void gdb_cmd_memread(struct kgdb_state *ks) in gdb_cmd_memread() argument [all …]
|
| H A D | debug_core.c | 515 static int kgdb_reenter_check(struct kgdb_state *ks) in kgdb_reenter_check() argument 524 addr = kgdb_arch_pc(ks->ex_vector, ks->linux_regs); in kgdb_reenter_check() 535 kgdb_skipexception(ks->ex_vector, ks->linux_regs); in kgdb_reenter_check() 543 kgdb_skipexception(ks->ex_vector, ks->linux_regs); in kgdb_reenter_check() 571 static int kgdb_cpu_enter(struct kgdb_state *ks, struct pt_regs *regs, in kgdb_cpu_enter() argument 582 kgdb_info[ks->cpu].enter_kgdb++; in kgdb_cpu_enter() 583 kgdb_info[ks->cpu].exception_state |= exception_state; in kgdb_cpu_enter() 601 cpu = ks->cpu; in kgdb_cpu_enter() 686 if (kgdb_skipexception(ks->ex_vector, ks->linux_regs)) in kgdb_cpu_enter() 704 if (ks->send_ready) in kgdb_cpu_enter() [all …]
|
| H A D | debug_core.h | 67 extern int gdb_serial_stub(struct kgdb_state *ks); 71 extern int gdbstub_state(struct kgdb_state *ks, char *cmd); 75 extern int kdb_stub(struct kgdb_state *ks); 77 extern int kdb_common_init_state(struct kgdb_state *ks); 81 static inline int kdb_stub(struct kgdb_state *ks) in kdb_stub() argument
|
| /linux/kernel/debug/kdb/ |
| H A D | kdb_debugger.c | 37 int kdb_common_init_state(struct kgdb_state *ks) in kdb_common_init_state() argument 40 kdb_current_task = kgdb_info[ks->cpu].task; in kdb_common_init_state() 41 kdb_current_regs = kgdb_info[ks->cpu].debuggerinfo; in kdb_common_init_state() 53 int kdb_stub(struct kgdb_state *ks) in kdb_stub() argument 57 unsigned long addr = kgdb_arch_pc(ks->ex_vector, ks->linux_regs); in kdb_stub() 62 kdb_ks = ks; in kdb_stub() 66 addr = instruction_pointer(ks->linux_regs); in kdb_stub() 68 ks->pass_exception = 0; in kdb_stub() 72 if (ks->err_code == KDB_REASON_SYSTEM_NMI && ks->signo == SIGTRAP) in kdb_stub() 82 if (addr != instruction_pointer(ks->linux_regs)) in kdb_stub() [all …]
|
| /linux/drivers/net/ethernet/intel/i40e/ |
| H A D | i40e_ethtool.c | 494 struct ethtool_link_ksettings *ks) in i40e_phy_type_to_ethtool() argument 499 ethtool_link_ksettings_zero_link_mode(ks, supported); in i40e_phy_type_to_ethtool() 500 ethtool_link_ksettings_zero_link_mode(ks, advertising); in i40e_phy_type_to_ethtool() 503 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() 506 ethtool_link_ksettings_add_link_mode(ks, advertising, in i40e_phy_type_to_ethtool() 509 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() 511 ethtool_link_ksettings_add_link_mode(ks, advertising, in i40e_phy_type_to_ethtool() 520 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() 523 ethtool_link_ksettings_add_link_mode(ks, advertising, in i40e_phy_type_to_ethtool() 527 ethtool_link_ksettings_add_link_mode(ks, supported, in i40e_phy_type_to_ethtool() [all …]
|
| /linux/lib/crypto/ |
| H A D | aescfb.c | 44 u8 ks[AES_BLOCK_SIZE]; in aescfb_encrypt() local 48 aescfb_encrypt_block(ctx, ks, v); in aescfb_encrypt() 49 crypto_xor_cpy(dst, src, ks, min(len, AES_BLOCK_SIZE)); in aescfb_encrypt() 57 memzero_explicit(ks, sizeof(ks)); in aescfb_encrypt() 73 u8 ks[2][AES_BLOCK_SIZE]; in aescfb_decrypt() local 75 aescfb_encrypt_block(ctx, ks[0], iv); in aescfb_decrypt() 84 aescfb_encrypt_block(ctx, ks[!i], src); in aescfb_decrypt() 86 crypto_xor_cpy(dst, src, ks[i], min(len, AES_BLOCK_SIZE)); in aescfb_decrypt() 93 memzero_explicit(ks, sizeof(ks)); in aescfb_decrypt()
|
| /linux/drivers/net/ethernet/pensando/ionic/ |
| H A D | ionic_ethtool.c | 124 struct ethtool_link_ksettings *ks) in ionic_get_link_ksettings() argument 130 ethtool_link_ksettings_zero_link_mode(ks, supported); in ionic_get_link_ksettings() 145 ethtool_link_ksettings_add_link_mode(ks, supported, in ionic_get_link_ksettings() 150 ethtool_link_ksettings_add_link_mode(ks, supported, in ionic_get_link_ksettings() 157 ethtool_link_ksettings_add_link_mode(ks, supported, in ionic_get_link_ksettings() 163 ethtool_link_ksettings_add_link_mode(ks, supported, in ionic_get_link_ksettings() 168 ethtool_link_ksettings_add_link_mode(ks, supported, 200000baseCR4_Full); in ionic_get_link_ksettings() 172 ethtool_link_ksettings_add_link_mode(ks, supported, 400000baseCR4_Full); in ionic_get_link_ksettings() 177 ethtool_link_ksettings_add_link_mode(ks, supported, in ionic_get_link_ksettings() 185 ethtool_link_ksettings_add_link_mode(ks, supported, in ionic_get_link_ksettings() [all …]
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | get_stack_raw_tp.c | 32 struct ksym *ks; in get_stack_print_output() local 51 ks = ksym_search(raw_data[i]); in get_stack_print_output() 52 if (ks && (strcmp(ks->name, nonjit_func) == 0)) { in get_stack_print_output() 68 ks = ksym_search(e.kern_stack[i]); in get_stack_print_output() 69 if (ks && (strcmp(ks->name, nonjit_func) == 0)) { in get_stack_print_output()
|
| /linux/fs/btrfs/ |
| H A D | locking.c | 84 struct btrfs_lockdep_keyset *ks; in btrfs_set_buffer_lockdep_class() local 86 ASSERT(level < ARRAY_SIZE(ks->keys)); in btrfs_set_buffer_lockdep_class() 89 for (ks = btrfs_lockdep_keysets; ks->id; ks++) in btrfs_set_buffer_lockdep_class() 90 if (ks->id == objectid) in btrfs_set_buffer_lockdep_class() 93 lockdep_set_class_and_name(&eb->lock, &ks->keys[level], ks->names[level]); in btrfs_set_buffer_lockdep_class()
|
| /linux/drivers/media/i2c/ |
| H A D | ks0127.c | 324 struct ks0127 *ks = to_ks0127(sd); in ks0127_write() local 330 ks->regs[reg] = val; in ks0127_write() 337 struct ks0127 *ks = to_ks0127(sd); in ks0127_and_or() local 339 u8 val = ks->regs[reg]; in ks0127_and_or() 396 struct ks0127 *ks = to_ks0127(sd); in ks0127_s_routing() local 472 if (ks->norm & V4L2_STD_525_60) in ks0127_s_routing() 528 struct ks0127 *ks = to_ks0127(sd); in ks0127_s_std() local 533 ks->norm = std; in ks0127_s_std() 647 struct ks0127 *ks; in ks0127_probe() local 654 ks = devm_kzalloc(&client->dev, sizeof(*ks), GFP_KERNEL); in ks0127_probe() [all …]
|
| /linux/drivers/net/ethernet/intel/ice/ |
| H A D | ice_ethtool.c | 2094 struct ethtool_link_ksettings *ks, u32 req_speeds, in ice_linkmode_set_bit() argument 2097 linkmode_set_bit(phy_to_ethtool->link_mode, ks->link_modes.supported); in ice_linkmode_set_bit() 2102 ks->link_modes.advertising); in ice_linkmode_set_bit() 2112 struct ethtool_link_ksettings *ks) in ice_phy_type_to_ethtool() argument 2179 linkmode_zero(ks->link_modes.supported); in ice_phy_type_to_ethtool() 2180 linkmode_zero(ks->link_modes.advertising); in ice_phy_type_to_ethtool() 2184 ice_linkmode_set_bit(&phy_type_low_lkup[i], ks, in ice_phy_type_to_ethtool() 2191 ice_linkmode_set_bit(&phy_type_high_lkup[i], ks, in ice_phy_type_to_ethtool() 2207 ice_get_settings_link_up(struct ethtool_link_ksettings *ks, in ice_get_settings_link_up() argument 2218 ice_phy_type_to_ethtool(netdev, ks); in ice_get_settings_link_up() [all …]
|
| /linux/drivers/net/ethernet/fungible/funeth/ |
| H A D | funeth_ethtool.c | 177 static void set_asym_pause(u64 advertising, struct ethtool_link_ksettings *ks) in set_asym_pause() argument 184 ethtool_link_ksettings_add_link_mode(ks, advertising, in set_asym_pause() 204 struct ethtool_link_ksettings *ks) in fun_get_link_ksettings() argument 211 ethtool_link_ksettings_zero_link_mode(ks, supported); in fun_get_link_ksettings() 212 ethtool_link_ksettings_zero_link_mode(ks, advertising); in fun_get_link_ksettings() 213 ethtool_link_ksettings_zero_link_mode(ks, lp_advertising); in fun_get_link_ksettings() 225 ks->base.speed = speed; in fun_get_link_ksettings() 226 ks->base.duplex = DUPLEX_FULL; in fun_get_link_ksettings() 228 ks->link_modes.lp_advertising); in fun_get_link_ksettings() 230 ks->base.speed = SPEED_UNKNOWN; in fun_get_link_ksettings() [all …]
|
| /linux/crypto/ |
| H A D | xcbc.c | 18 static u_int32_t ks[12] = {0x01010101, 0x01010101, 0x01010101, 0x01010101, variable 50 crypto_cipher_encrypt_one(ctx->child, consts, (u8 *)ks + bs); in crypto_xcbc_digest_setkey() 51 crypto_cipher_encrypt_one(ctx->child, consts + bs, (u8 *)ks + bs * 2); in crypto_xcbc_digest_setkey() 52 crypto_cipher_encrypt_one(ctx->child, key1, (u8 *)ks); in crypto_xcbc_digest_setkey()
|
| H A D | seed.c | 312 t0 = X3 ^ ks[rbase]; \ 313 t1 = X4 ^ ks[rbase+1]; \ 367 const u32 *ks = ctx->keysched; in seed_encrypt() local 403 const u32 *ks = ctx->keysched; in seed_decrypt() local
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | trace_helpers.c | 169 struct ksym *ks; in search_kallsyms_custom_local() local 174 ks = &ksyms->syms[mid]; in search_kallsyms_custom_local() 175 result = cmp_cb(p, ks); in search_kallsyms_custom_local() 181 return ks; in search_kallsyms_custom_local() 619 struct ksym *ks; in bpf_get_ksyms() local 659 ks = search_kallsyms_custom_local(ksyms, name, search_kallsyms_compare); in bpf_get_ksyms() 660 if (!ks) { in bpf_get_ksyms() 665 ksym_name = ks->name; in bpf_get_ksyms()
|