/kernel/linux/linux-5.10/tools/objtool/ |
D | elf.c | 132 struct section *sec; in find_section_by_name() local 134 elf_hash_for_each_possible(elf->section_name_hash, sec, name_hash, str_hash(name)) in find_section_by_name() 135 if (!strcmp(sec->name, name)) in find_section_by_name() 136 return sec; in find_section_by_name() 144 struct section *sec; in find_section_by_index() local 146 elf_hash_for_each_possible(elf->section_hash, sec, hash, idx) in find_section_by_index() 147 if (sec->idx == idx) in find_section_by_index() 148 return sec; in find_section_by_index() 164 struct symbol *find_symbol_by_offset(struct section *sec, unsigned long offset) in find_symbol_by_offset() argument 168 rb_for_each(&sec->symbol_tree, node, &offset, symbol_by_offset) { in find_symbol_by_offset() [all …]
|
D | special.c | 20 const char *sec; member 29 .sec = ".altinstructions", 39 .sec = "__jump_table", 46 .sec = "__ex_table", 58 static void reloc_to_sec_off(struct reloc *reloc, struct section **sec, in reloc_to_sec_off() argument 61 *sec = reloc->sym->sec; in reloc_to_sec_off() 66 struct section *sec, int idx, in get_alt_entry() argument 78 alt->orig_len = *(unsigned char *)(sec->data->d_buf + offset + in get_alt_entry() 80 alt->new_len = *(unsigned char *)(sec->data->d_buf + offset + in get_alt_entry() 87 feature = *(unsigned short *)(sec->data->d_buf + offset + in get_alt_entry() [all …]
|
D | check.c | 36 struct section *sec, unsigned long offset) in find_insn() argument 40 hash_for_each_possible(file->insn_hash, insn, hash, sec_offset_hash(sec, offset)) { in find_insn() 41 if (insn->sec == sec && insn->offset == offset) in find_insn() 53 if (!next || &next->list == &file->insn_list || next->sec != insn->sec) in next_insn_same_sec() 76 return find_insn(file, func->cfunc->sec, func->cfunc->offset); in next_insn_same_func() 91 for (insn = find_insn(file, func->sec, func->offset); \ 96 for (insn = find_insn(file, sym->sec, sym->offset); \ 98 insn->sec == sym->sec && \ 105 insn->sec == sym->sec && insn->offset >= sym->offset; \ 197 insn = find_insn(file, func->sec, func->offset); in __dead_end_function() [all …]
|
/kernel/linux/linux-5.10/net/mac802154/ |
D | llsec.c | 27 void mac802154_llsec_init(struct mac802154_llsec *sec) in mac802154_llsec_init() argument 29 memset(sec, 0, sizeof(*sec)); in mac802154_llsec_init() 31 memset(&sec->params.default_key_source, 0xFF, IEEE802154_ADDR_LEN); in mac802154_llsec_init() 33 INIT_LIST_HEAD(&sec->table.security_levels); in mac802154_llsec_init() 34 INIT_LIST_HEAD(&sec->table.devices); in mac802154_llsec_init() 35 INIT_LIST_HEAD(&sec->table.keys); in mac802154_llsec_init() 36 hash_init(sec->devices_short); in mac802154_llsec_init() 37 hash_init(sec->devices_hw); in mac802154_llsec_init() 38 rwlock_init(&sec->lock); in mac802154_llsec_init() 41 void mac802154_llsec_destroy(struct mac802154_llsec *sec) in mac802154_llsec_destroy() argument [all …]
|
D | llsec.h | 64 void mac802154_llsec_init(struct mac802154_llsec *sec); 65 void mac802154_llsec_destroy(struct mac802154_llsec *sec); 67 int mac802154_llsec_get_params(struct mac802154_llsec *sec, 69 int mac802154_llsec_set_params(struct mac802154_llsec *sec, 73 int mac802154_llsec_key_add(struct mac802154_llsec *sec, 76 int mac802154_llsec_key_del(struct mac802154_llsec *sec, 79 int mac802154_llsec_dev_add(struct mac802154_llsec *sec, 81 int mac802154_llsec_dev_del(struct mac802154_llsec *sec, 84 int mac802154_llsec_devkey_add(struct mac802154_llsec *sec, 87 int mac802154_llsec_devkey_del(struct mac802154_llsec *sec, [all …]
|
/kernel/linux/linux-5.10/Documentation/devicetree/bindings/crypto/ |
D | fsl-sec2.txt | 1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x 6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3) 10 - interrupts : the SEC's interrupt number 17 should be encoded following the SEC's Descriptor Header Dword 21 bit 1 = set if SEC has the ARC4 EU (AFEU) 22 bit 2 = set if SEC has the DES/3DES EU (DEU) 23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A) 24 bit 4 = set if SEC has the random number generator EU (RNG) 25 bit 5 = set if SEC has the public key EU (PKEU) 26 bit 6 = set if SEC has the AES EU (AESU) [all …]
|
D | fsl-sec6.txt | 1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM). 2 Currently Freescale powerpc chip C29X is embedded with SEC 6. 3 SEC 6 device tree binding include: 4 -SEC 6 Node 9 SEC 6 Node 13 Node defines the base address of the SEC 6 block. 15 configuration registers for the SEC 6 block. 16 For example, In C293, we could see three SEC 6 node. 23 Definition: Must include "fsl,sec-v6.0". 25 - fsl,sec-era [all …]
|
/kernel/linux/linux-5.10/arch/powerpc/boot/dts/fsl/ |
D | qoriq-sec5.3-0.dtsi | 2 * QorIQ Sec/Crypto 5.3 device tree stub [ controller @ offset 0x300000 ] 36 compatible = "fsl,sec-v5.3", "fsl,sec-v5.0", "fsl,sec-v4.0"; 37 fsl,sec-era = <4>; 45 compatible = "fsl,sec-v5.3-job-ring", 46 "fsl,sec-v5.0-job-ring", 47 "fsl,sec-v4.0-job-ring"; 53 compatible = "fsl,sec-v5.3-job-ring", 54 "fsl,sec-v5.0-job-ring", 55 "fsl,sec-v4.0-job-ring"; 61 compatible = "fsl,sec-v5.3-job-ring", [all …]
|
D | qoriq-sec5.2-0.dtsi | 2 * QorIQ Sec/Crypto 5.2 device tree stub [ controller @ offset 0x300000 ] 36 compatible = "fsl,sec-v5.2", "fsl,sec-v5.0", "fsl,sec-v4.0"; 37 fsl,sec-era = <5>; 45 compatible = "fsl,sec-v5.2-job-ring", 46 "fsl,sec-v5.0-job-ring", 47 "fsl,sec-v4.0-job-ring"; 53 compatible = "fsl,sec-v5.2-job-ring", 54 "fsl,sec-v5.0-job-ring", 55 "fsl,sec-v4.0-job-ring"; 61 compatible = "fsl,sec-v5.2-job-ring", [all …]
|
D | qoriq-sec5.0-0.dtsi | 2 * QorIQ Sec/Crypto 5.0 device tree stub [ controller @ offset 0x300000 ] 36 compatible = "fsl,sec-v5.0", "fsl,sec-v4.0"; 37 fsl,sec-era = <5>; 45 compatible = "fsl,sec-v5.0-job-ring", 46 "fsl,sec-v4.0-job-ring"; 52 compatible = "fsl,sec-v5.0-job-ring", 53 "fsl,sec-v4.0-job-ring"; 59 compatible = "fsl,sec-v5.0-job-ring", 60 "fsl,sec-v4.0-job-ring"; 66 compatible = "fsl,sec-v5.0-job-ring", [all …]
|
D | qoriq-sec4.2-0.dtsi | 2 * QorIQ Sec/Crypto 4.2 device tree stub [ controller @ offset 0x300000 ] 36 compatible = "fsl,sec-v4.2", "fsl,sec-v4.0"; 37 fsl,sec-era = <3>; 45 compatible = "fsl,sec-v4.2-job-ring", 46 "fsl,sec-v4.0-job-ring"; 52 compatible = "fsl,sec-v4.2-job-ring", 53 "fsl,sec-v4.0-job-ring"; 59 compatible = "fsl,sec-v4.2-job-ring", 60 "fsl,sec-v4.0-job-ring"; 66 compatible = "fsl,sec-v4.2-job-ring", [all …]
|
D | qoriq-sec6.0-0.dtsi | 2 * QorIQ Sec/Crypto 6.0 device tree stub 35 compatible = "fsl,sec-v6.0", "fsl,sec-v5.0", 36 "fsl,sec-v4.0"; 37 fsl,sec-era = <6>; 42 compatible = "fsl,sec-v6.0-job-ring", 43 "fsl,sec-v5.2-job-ring", 44 "fsl,sec-v5.0-job-ring", 45 "fsl,sec-v4.4-job-ring", 46 "fsl,sec-v4.0-job-ring"; 51 compatible = "fsl,sec-v6.0-job-ring", [all …]
|
/kernel/linux/linux-5.10/drivers/firmware/google/ |
D | vpd.c | 100 struct vpd_section *sec = arg; in vpd_section_attrib_add() local 131 ret = sysfs_create_bin_file(sec->kobj, &info->bin_attr); in vpd_section_attrib_add() 135 list_add_tail(&info->list, &sec->attribs); in vpd_section_attrib_add() 146 static void vpd_section_attrib_destroy(struct vpd_section *sec) in vpd_section_attrib_destroy() argument 151 list_for_each_entry_safe(info, temp, &sec->attribs, list) { in vpd_section_attrib_destroy() 152 sysfs_remove_bin_file(sec->kobj, &info->bin_attr); in vpd_section_attrib_destroy() 162 struct vpd_section *sec = bin_attr->private; in vpd_section_read() local 164 return memory_read_from_buffer(buf, count, &pos, sec->baseaddr, in vpd_section_read() 165 sec->bin_attr.size); in vpd_section_read() 168 static int vpd_section_create_attribs(struct vpd_section *sec) in vpd_section_create_attribs() argument [all …]
|
/kernel/linux/linux-5.10/crypto/ |
D | tcrypt.c | 59 static unsigned int sec; variable 922 printk("%6u opers/sec, %9lu bytes/sec\n", in test_ahash_jiffies_digest() 954 pr_cont("%6u opers/sec, %9lu bytes/sec\n", in test_ahash_jiffies() 2054 test_cipher_speed("ecb(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2056 test_cipher_speed("ecb(aes)", DECRYPT, sec, NULL, 0, in do_test() 2058 test_cipher_speed("cbc(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2060 test_cipher_speed("cbc(aes)", DECRYPT, sec, NULL, 0, in do_test() 2062 test_cipher_speed("lrw(aes)", ENCRYPT, sec, NULL, 0, in do_test() 2064 test_cipher_speed("lrw(aes)", DECRYPT, sec, NULL, 0, in do_test() 2066 test_cipher_speed("xts(aes)", ENCRYPT, sec, NULL, 0, in do_test() [all …]
|
/kernel/linux/linux-5.10/samples/bpf/ |
D | spintest_kern.c | 20 } my_map SEC(".maps"); 26 } my_map2 SEC(".maps"); 33 } stackmap SEC(".maps"); 49 SEC("kprobe/spin_unlock")PROG(p1) 50 SEC("kprobe/spin_lock")PROG(p2) 51 SEC("kprobe/mutex_spin_on_owner")PROG(p3) 52 SEC("kprobe/rwsem_spin_on_owner")PROG(p4) 53 SEC("kprobe/spin_unlock_irqrestore")PROG(p5) 54 SEC("kprobe/_raw_spin_unlock_irqrestore")PROG(p6) 55 SEC("kprobe/_raw_spin_unlock_bh")PROG(p7) [all …]
|
/kernel/linux/linux-5.10/include/linux/ |
D | export.h | 26 #define __CRC_SYMBOL(sym, sec) \ argument 27 asm(" .section \"___kcrctab" sec "+" #sym "\", \"a\" \n" \ 32 #define __CRC_SYMBOL(sym, sec) \ argument 33 asm(" .section \"___kcrctab" sec "+" #sym "\", \"a\" \n" \ 39 #define __CRC_SYMBOL(sym, sec) argument 50 #define __KSYMTAB_ENTRY(sym, sec) \ argument 52 asm(" .section \"___ksymtab" sec "+" #sym "\", \"a\" \n" \ 66 #define __KSYMTAB_ENTRY(sym, sec) \ argument 68 __attribute__((section("___ksymtab" sec "+" #sym), used)) \ 81 #define ___EXPORT_SYMBOL(sym, sec, ns) __GENKSYMS_EXPORT_SYMBOL(sym) argument [all …]
|
/kernel/linux/linux-5.10/arch/mips/boot/tools/ |
D | relocs.c | 273 struct section *sec = &secs[i]; in read_shdrs() local 275 sec->shdr_offset = ftell(fp); in read_shdrs() 279 sec->shdr.sh_name = elf_word_to_cpu(shdr.sh_name); in read_shdrs() 280 sec->shdr.sh_type = elf_word_to_cpu(shdr.sh_type); in read_shdrs() 281 sec->shdr.sh_flags = elf_xword_to_cpu(shdr.sh_flags); in read_shdrs() 282 sec->shdr.sh_addr = elf_addr_to_cpu(shdr.sh_addr); in read_shdrs() 283 sec->shdr.sh_offset = elf_off_to_cpu(shdr.sh_offset); in read_shdrs() 284 sec->shdr.sh_size = elf_xword_to_cpu(shdr.sh_size); in read_shdrs() 285 sec->shdr.sh_link = elf_word_to_cpu(shdr.sh_link); in read_shdrs() 286 sec->shdr.sh_info = elf_word_to_cpu(shdr.sh_info); in read_shdrs() [all …]
|
/kernel/linux/linux-5.10/fs/reiserfs/ |
D | xattr_security.c | 46 struct reiserfs_security_handle *sec) in reiserfs_security_init() argument 51 sec->name = NULL; in reiserfs_security_init() 57 error = security_old_inode_init_security(inode, dir, qstr, &sec->name, in reiserfs_security_init() 58 &sec->value, &sec->length); in reiserfs_security_init() 63 sec->name = NULL; in reiserfs_security_init() 64 sec->value = NULL; in reiserfs_security_init() 65 sec->length = 0; in reiserfs_security_init() 69 if (sec->length && reiserfs_xattrs_initialized(inode->i_sb)) { in reiserfs_security_init() 71 reiserfs_xattr_nblocks(inode, sec->length); in reiserfs_security_init() 81 struct reiserfs_security_handle *sec) in reiserfs_security_write() argument [all …]
|
/kernel/linux/linux-5.10/drivers/infiniband/core/ |
D | security.c | 50 struct ib_device *dev = pp->sec->dev; in get_pkey_idx_qp_list() 68 struct ib_device *dev = pp->sec->dev; in get_pkey_and_subnet_prefix() 112 struct ib_qp_security *sec) in check_qp_port_pkey_settings() argument 130 sec); in check_qp_port_pkey_settings() 144 sec); in check_qp_port_pkey_settings() 153 static void qp_to_error(struct ib_qp_security *sec) in qp_to_error() argument 167 if (sec->destroying) in qp_to_error() 170 ib_modify_qp(sec->qp, in qp_to_error() 174 if (sec->qp->event_handler && sec->qp->qp_context) { in qp_to_error() 175 event.element.qp = sec->qp; in qp_to_error() [all …]
|
/kernel/linux/linux-5.10/drivers/misc/mei/ |
D | hw-txe-regs.h | 25 /* SeC FW Status Register 39 #define IPC_BASE_ADDR 0x80400 /* SeC IPC Base Address */ 46 * the most recent command has been completed by the SEC 79 /* SeC Address Translation Table Entry 2 - Ctrl 81 * This register resides also in SeC's PCI-E Memory space. 100 * interrupts from SeC to host, aggregating both interrupts that 112 * This is the top hierarchy for masking interrupts from SeC to host. 121 /* Host Interrupt Cause Register 0 - SeC IPC Readiness 124 * and it is also exposed in the SeC memory space. 125 * This register is used by SeC's IPC driver in order [all …]
|
/kernel/linux/linux-5.10/drivers/net/wireless/intel/ipw2x00/ |
D | libipw_wx.c | 302 struct libipw_security sec = { in libipw_wx_set_encode() local 347 sec.enabled = 0; in libipw_wx_set_encode() 348 sec.encrypt = 0; in libipw_wx_set_encode() 349 sec.level = SEC_LEVEL_0; in libipw_wx_set_encode() 350 sec.flags |= SEC_ENABLED | SEC_LEVEL | SEC_ENCRYPT; in libipw_wx_set_encode() 356 sec.enabled = 1; in libipw_wx_set_encode() 357 sec.encrypt = 1; in libipw_wx_set_encode() 358 sec.flags |= SEC_ENABLED | SEC_ENCRYPT; in libipw_wx_set_encode() 398 memcpy(sec.keys[key], keybuf, erq->length); in libipw_wx_set_encode() 400 memset(sec.keys[key] + erq->length, 0, in libipw_wx_set_encode() [all …]
|
/kernel/linux/linux-5.10/fs/hpfs/ |
D | alloc.c | 12 static void hpfs_claim_alloc(struct super_block *s, secno sec) in hpfs_claim_alloc() argument 17 hpfs_error(s, "free count underflow, allocating sector %08x", sec); in hpfs_claim_alloc() 25 static void hpfs_claim_free(struct super_block *s, secno sec) in hpfs_claim_free() argument 30 hpfs_error(s, "free count overflow, freeing sector %08x", sec); in hpfs_claim_free() 38 static void hpfs_claim_dirband_alloc(struct super_block *s, secno sec) in hpfs_claim_dirband_alloc() argument 43 hpfs_error(s, "dirband free count underflow, allocating sector %08x", sec); in hpfs_claim_dirband_alloc() 51 static void hpfs_claim_dirband_free(struct super_block *s, secno sec) in hpfs_claim_dirband_free() argument 56 hpfs_error(s, "dirband free count overflow, freeing sector %08x", sec); in hpfs_claim_dirband_free() 69 static int chk_if_allocated(struct super_block *s, secno sec, char *msg) in chk_if_allocated() argument 73 if (!(bmp = hpfs_map_bitmap(s, sec >> 14, &qbh, "chk"))) goto fail; in chk_if_allocated() [all …]
|
/kernel/linux/linux-5.10/arch/x86/tools/ |
D | relocs.c | 277 struct section *sec = &secs[i]; in sym_lookup() local 283 if (sec->shdr.sh_type != SHT_SYMTAB) in sym_lookup() 286 nsyms = sec->shdr.sh_size/sizeof(Elf_Sym); in sym_lookup() 287 symtab = sec->symtab; in sym_lookup() 288 strtab = sec->link->strtab; in sym_lookup() 423 struct section *sec = &secs[i]; in read_shdrs() local 427 sec->shdr.sh_name = elf_word_to_cpu(shdr.sh_name); in read_shdrs() 428 sec->shdr.sh_type = elf_word_to_cpu(shdr.sh_type); in read_shdrs() 429 sec->shdr.sh_flags = elf_xword_to_cpu(shdr.sh_flags); in read_shdrs() 430 sec->shdr.sh_addr = elf_addr_to_cpu(shdr.sh_addr); in read_shdrs() [all …]
|
/kernel/linux/linux-5.10/drivers/nvdimm/ |
D | security.c | 145 if (!nvdimm->sec.ops->change_key) in nvdimm_key_revalidate() 154 rc = nvdimm->sec.ops->change_key(nvdimm, data, data, NVDIMM_USER); in nvdimm_key_revalidate() 161 nvdimm->sec.flags = nvdimm_security_flags(nvdimm, NVDIMM_USER); in nvdimm_key_revalidate() 176 if (!nvdimm->sec.ops || !nvdimm->sec.ops->unlock in __nvdimm_security_unlock() 177 || !nvdimm->sec.flags) in __nvdimm_security_unlock() 181 if (test_bit(NVDIMM_SECURITY_DISABLED, &nvdimm->sec.flags)) in __nvdimm_security_unlock() 196 if (test_bit(NVDIMM_SECURITY_UNLOCKED, &nvdimm->sec.flags)) { in __nvdimm_security_unlock() 204 rc = nvdimm->sec.ops->unlock(nvdimm, data); in __nvdimm_security_unlock() 209 nvdimm->sec.flags = nvdimm_security_flags(nvdimm, NVDIMM_USER); in __nvdimm_security_unlock() 228 if (test_bit(NVDIMM_SECURITY_FROZEN, &nvdimm->sec.flags)) { in check_security_state() [all …]
|
/kernel/linux/linux-5.10/include/asm-generic/ |
D | export.h | 35 .macro ___EXPORT_SYMBOL name,val,sec 37 .section ___ksymtab\sec+\name,"a" 47 .section ___kcrctab\sec+\name,"a" 71 #define __EXPORT_SYMBOL(sym, val, sec) \ argument 73 __cond_export_sym(sym, val, sec, __is_defined(__KSYM_##sym)) 74 #define __cond_export_sym(sym, val, sec, conf) \ argument 75 ___cond_export_sym(sym, val, sec, conf) 76 #define ___cond_export_sym(sym, val, sec, enabled) \ argument 77 __cond_export_sym_##enabled(sym, val, sec) 78 #define __cond_export_sym_1(sym, val, sec) ___EXPORT_SYMBOL sym, val, sec argument [all …]
|