/block/ |
D | keyslot-manager.c | 43 const struct blk_crypto_key *key; member 166 const struct blk_crypto_key *key) in blk_ksm_hash_bucket_for_key() argument 168 return &ksm->slot_hashtable[hash_ptr(key, ksm->log_slot_ht_size)]; in blk_ksm_hash_bucket_for_key() 183 const struct blk_crypto_key *key) in blk_ksm_find_keyslot() argument 185 const struct hlist_head *head = blk_ksm_hash_bucket_for_key(ksm, key); in blk_ksm_find_keyslot() 189 if (slotp->key == key) in blk_ksm_find_keyslot() 197 const struct blk_crypto_key *key) in blk_ksm_find_and_grab_keyslot() argument 201 slot = blk_ksm_find_keyslot(ksm, key); in blk_ksm_find_and_grab_keyslot() 234 const struct blk_crypto_key *key, in blk_ksm_get_slot_for_key() argument 247 slot = blk_ksm_find_and_grab_keyslot(ksm, key); in blk_ksm_get_slot_for_key() [all …]
|
D | blk-crypto-profile.c | 40 const struct blk_crypto_key *key; member 175 const struct blk_crypto_key *key) in blk_crypto_hash_bucket_for_key() argument 178 hash_ptr(key, profile->log_slot_ht_size)]; in blk_crypto_hash_bucket_for_key() 194 const struct blk_crypto_key *key) in blk_crypto_find_keyslot() argument 197 blk_crypto_hash_bucket_for_key(profile, key); in blk_crypto_find_keyslot() 201 if (slotp->key == key) in blk_crypto_find_keyslot() 209 const struct blk_crypto_key *key) in blk_crypto_find_and_grab_keyslot() argument 213 slot = blk_crypto_find_keyslot(profile, key); in blk_crypto_find_and_grab_keyslot() 253 const struct blk_crypto_key *key, in blk_crypto_get_keyslot() argument 270 slot = blk_crypto_find_and_grab_keyslot(profile, key); in blk_crypto_get_keyslot() [all …]
|
D | blk-crypto.c | 101 void bio_crypt_set_ctx(struct bio *bio, const struct blk_crypto_key *key, in bio_crypt_set_ctx() argument 114 bc->bc_key = key; in bio_crypt_set_ctx() 425 const struct blk_crypto_key *key) in blk_crypto_start_using_key() argument 427 if (blk_crypto_config_supported_natively(bdev, &key->crypto_cfg)) in blk_crypto_start_using_key() 429 if (key->crypto_cfg.key_type != BLK_CRYPTO_KEY_TYPE_STANDARD) { in blk_crypto_start_using_key() 433 return blk_crypto_fallback_start_using_mode(key->crypto_cfg.crypto_mode); in blk_crypto_start_using_key() 453 const struct blk_crypto_key *key) in blk_crypto_evict_key() argument 458 if (blk_crypto_config_supported_natively(bdev, &key->crypto_cfg)) in blk_crypto_evict_key() 459 err = __blk_crypto_evict_key(q->crypto_profile, key); in blk_crypto_evict_key() 461 err = blk_crypto_fallback_evict_key(key); in blk_crypto_evict_key()
|
D | sed-opal.c | 1401 const char *key, in start_generic_opal_session() argument 1407 if (key == NULL && auth != OPAL_ANYBODY_UID) in start_generic_opal_session() 1426 add_token_bytestring(&err, dev, key, key_len); in start_generic_opal_session() 1456 const u8 *key = dev->prev_data; in start_SIDASP_opal_session() local 1458 if (!key) { in start_SIDASP_opal_session() 1463 okey->key, in start_SIDASP_opal_session() 1468 key, dev->prev_d_len); in start_SIDASP_opal_session() 1469 kfree(key); in start_SIDASP_opal_session() 1478 struct opal_key *key = data; in start_admin1LSP_opal_session() local 1482 key->key, key->key_len); in start_admin1LSP_opal_session() [all …]
|
D | blk-crypto-internal.h | 75 const struct blk_crypto_key *key, 81 const struct blk_crypto_key *key); 228 int blk_crypto_fallback_evict_key(const struct blk_crypto_key *key); 247 blk_crypto_fallback_evict_key(const struct blk_crypto_key *key) in blk_crypto_fallback_evict_key() argument
|
D | blk-crypto-fallback.c | 108 const struct blk_crypto_key *key, in blk_crypto_fallback_keyslot_program() argument 113 key->crypto_cfg.crypto_mode; in blk_crypto_fallback_keyslot_program() 121 err = crypto_skcipher_setkey(slotp->tfms[crypto_mode], key->raw, in blk_crypto_fallback_keyslot_program() 122 key->size); in blk_crypto_fallback_keyslot_program() 131 const struct blk_crypto_key *key, in blk_crypto_fallback_keyslot_evict() argument 528 int blk_crypto_fallback_evict_key(const struct blk_crypto_key *key) in blk_crypto_fallback_evict_key() argument 530 return __blk_crypto_evict_key(blk_crypto_fallback_profile, key); in blk_crypto_fallback_evict_key()
|
D | blk-flush.c | 522 struct lock_class_key *key) in blk_mq_hctx_set_fq_lock_class() argument 524 lockdep_set_class(&hctx->fq->mq_flush_lock, key); in blk_mq_hctx_set_fq_lock_class()
|
D | ioctl.c | 291 return ops->pr_reserve(bdev, rsv.key, rsv.type, rsv.flags); in blkdev_pr_reserve() 309 return ops->pr_release(bdev, rsv.key, rsv.type); in blkdev_pr_release() 345 return ops->pr_clear(bdev, c.key); in blkdev_pr_clear()
|
D | blk-iolatency.c | 855 char key[16]; in iolatency_set_limit() local 858 if (sscanf(tok, "%15[^=]=%20s", key, val) != 2) in iolatency_set_limit() 861 if (!strcmp(key, "target")) { in iolatency_set_limit()
|
D | blk-rq-qos.c | 213 unsigned int mode, int wake_flags, void *key) in rq_qos_wake_function() argument
|
D | kyber-iosched.c | 196 void *key); 694 void *key) in kyber_domain_wake() argument
|
D | blk-iocost.c | 1447 int flags, void *key) in iocg_wake_fn() argument 1450 struct iocg_wake_ctx *ctx = (struct iocg_wake_ctx *)key; in iocg_wake_fn() 1468 default_wake_function(wq_entry, mode, flags, key); in iocg_wake_fn()
|
D | blk-throttle.c | 683 unsigned long key = tg->disptime; in tg_service_queue_add() local 690 if (time_before(key, __tg->disptime)) in tg_service_queue_add()
|
D | blk-mq.c | 1116 int flags, void *key) in blk_mq_dispatch_wake() argument
|