/linux-6.3-rc2/net/sunrpc/auth_gss/ |
A D | gss_krb5_seqnum.c | 51 unsigned char *plain; in krb5_make_seq_num() local 55 if (!plain) in krb5_make_seq_num() 63 plain[4] = direction; in krb5_make_seq_num() 64 plain[5] = direction; in krb5_make_seq_num() 65 plain[6] = direction; in krb5_make_seq_num() 69 kfree(plain); in krb5_make_seq_num() 86 if (!plain) in krb5_get_seq_num() 92 if ((plain[4] != plain[5]) || (plain[4] != plain[6]) || in krb5_get_seq_num() 93 (plain[4] != plain[7])) { in krb5_get_seq_num() 101 (plain[1] << 8) | (plain[2] << 16) | (plain[3] << 24)); in krb5_get_seq_num() [all …]
|
/linux-6.3-rc2/tools/testing/crypto/chacha20-s390/ |
A D | test-cipher.c | 173 sg_init_one(&sk.sginp, plain, data_size); in test_skcipher() 238 u8 *plain = NULL, *revert = NULL; in chacha_s390_test_init() local 246 plain = vmalloc(data_size); in chacha_s390_test_init() 247 if (!plain) { in chacha_s390_test_init() 252 memset(plain, 'a', data_size); in chacha_s390_test_init() 278 16, 1, plain, in chacha_s390_test_init() 286 if (memcmp(plain, revert, data_size)) { in chacha_s390_test_init() 301 if (memcmp(plain, revert, data_size)) { in chacha_s390_test_init() 323 if (memcmp(plain, revert, data_size)) { in chacha_s390_test_init() 342 if (plain) in chacha_s390_test_init() [all …]
|
/linux-6.3-rc2/lib/ |
A D | Kconfig.kcsan | 37 The compiler instruments plain compound read-write operations 39 distinguish them from other plain accesses. This is currently 199 plain accesses by default (depending on !KCSAN_STRICT) reduce the 216 bool "Assume that plain aligned writes up to word size are atomic" 220 Assume that plain aligned writes up to word size are atomic by 223 races due to conflicts where the only plain accesses are aligned 224 writes up to word size: conflicts between marked reads and plain 226 notice that data races between two conflicting plain aligned writes 234 additional filtering. Conflicting marked atomic reads and plain 242 accesses, conflicting marked atomic reads and plain writes will not [all …]
|
A D | test_printf.c | 303 plain(void) in plain() function 760 plain(); in test_pointer()
|
/linux-6.3-rc2/tools/memory-model/litmus-tests/ |
A D | dep+plain.litmus | 1 C dep+plain 6 * This litmus test demonstrates that in LKMM, plain accesses
|
/linux-6.3-rc2/tools/memory-model/Documentation/ |
A D | access-marking.txt | 33 Neither plain C-language accesses nor data_race() (#1 and #2 above) place 39 preferable to data_race(), which in turn is usually preferable to plain 44 KCSAN will complain about many types of data races involving plain 54 data_race() and even plain C-language accesses is preferable to 85 concurrently with updates to x. Then using plain C-language writes 95 In theory, plain C-language loads can also be used for this use case. 119 In theory, plain C-language loads can also be used for this use case. 140 In theory, plain C-language loads can also be used for this use case. 190 by default, refraining from flagging plain C-language stores: 281 should) be plain C-language accesses. One benefit of making them be [all …]
|
A D | explanation.txt | 932 Plain-coherence: This requires that plain memory accesses 939 "rcu" and "plain-coherence" axioms are specific to the LKMM. 2082 3. at least one of them is plain, 2244 again, now using plain accesses for buf: 2273 machine instructions the compiler generates for the plain 2296 general. Suppose R is a plain load and we want to show that R 2348 The LKMM includes a second way to pre-bound plain accesses, in 2500 they don't make sense even for plain accesses. 2512 executes before, even if one or both is plain). 2525 Perhaps it could say more (for example, plain accesses might [all …]
|
/linux-6.3-rc2/Documentation/fb/ |
A D | s3fb.rst | 19 I tested s3fb on Trio64 (plain, V+ and V2/DX) and Virge (plain, VX, DX), 40 hardware, i get best results from plain S3 Trio32 card - about 75 MHz). This
|
/linux-6.3-rc2/tools/memory-model/ |
A D | linux-kernel.cat | 164 (* Warn about plain writes and marked accesses in the same region *) 174 (* Boundaries for lifetimes of plain accesses *) 182 (* Visibility and executes-before for plain accesses *) 192 (* Coherence requirements for plain accesses *) 196 empty (wr-incoh | rw-incoh | ww-incoh) as plain-coherence
|
A D | linux-kernel.bell | 81 (* Compute marked and plain memory accesses *) 86 (* Redefine dependencies to include those carried through plain accesses *)
|
/linux-6.3-rc2/net/mac80211/ |
A D | fils_aead.c | 67 const u8 *plain, size_t plain_len, in aes_siv_encrypt() argument 81 addr[num_elem] = plain; in aes_siv_encrypt() 101 tmp = kmemdup(plain, plain_len, GFP_KERNEL); in aes_siv_encrypt()
|
/linux-6.3-rc2/Documentation/devicetree/bindings/pci/ |
A D | faraday,ftpci100.yaml | 15 plain and dual PCI. The plain version embeds a cascading interrupt controller 21 The plain variant has 128MiB of non-prefetchable memory space, whereas the
|
/linux-6.3-rc2/Documentation/dev-tools/ |
A D | kcsan.rst | 124 * ``CONFIG_KCSAN_ASSUME_PLAIN_WRITES_ATOMIC``: Assume that plain aligned writes 127 causes KCSAN to not report data races due to conflicts where the only plain 192 *plain access*; they *conflict* if both access the same memory location, and at 253 compiler instrumenting plain accesses. For each instrumented plain access: 264 To detect data races between plain and marked accesses, KCSAN also annotates 276 Each plain memory access for which a watchpoint is set up, is also selected for 312 "prefetch" accesses. Also recall that watchpoints are only set up for plain
|
/linux-6.3-rc2/Documentation/core-api/ |
A D | protection-keys.rst | 75 behavior of a plain mprotect(). For instance if you do this:: 98 the plain mprotect() permissions are violated.
|
/linux-6.3-rc2/drivers/gpu/drm/radeon/ |
A D | Kconfig | 30 run the Radeon in plain VGA mode.
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | sysfs-kernel-mm-numa | 14 characteristics instead of plain NUMA systems where
|
/linux-6.3-rc2/crypto/ |
A D | ccm.c | 168 static int crypto_ccm_auth(struct aead_request *req, struct scatterlist *plain, in crypto_ccm_auth() argument 215 if (plain) in crypto_ccm_auth() 216 sg_chain(sg, 2, plain); in crypto_ccm_auth() 217 plain = sg; in crypto_ccm_auth() 221 ahash_request_set_crypt(ahreq, plain, odata, cryptlen); in crypto_ccm_auth()
|
/linux-6.3-rc2/arch/arm/nwfpe/ |
A D | entry.S | 104 @ plain LDR instruction. Weird, but it seems harmless.
|
/linux-6.3-rc2/fs/autofs/ |
A D | Kconfig | 11 transitioned to just plain AUTOFS_FS.
|
/linux-6.3-rc2/Documentation/admin-guide/ |
A D | security-bugs.rst | 29 Please send plain text emails without attachments where possible. 34 reproduction steps, and follow it with a proposed fix, all in plain text.
|
/linux-6.3-rc2/Documentation/translations/zh_CN/admin-guide/ |
A D | tainted-kernels.rst | 56 `git.kernel.org <https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/plain/tools/deb…
|
/linux-6.3-rc2/Documentation/translations/zh_TW/admin-guide/ |
A D | tainted-kernels.rst | 59 `git.kernel.org <https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/plain/tools/deb…
|
/linux-6.3-rc2/Documentation/hwmon/ |
A D | asb100.rst | 31 3 (i.e. one setting controls both.) If you have a plain ASB100, the PWM
|
/linux-6.3-rc2/Documentation/networking/ |
A D | ieee802154.rst | 20 - IEEE 802.15.4 layer; We have chosen to use plain Berkeley socket API, 82 code via plain sk_buffs. On skb reception skb->cb must contain additional
|
/linux-6.3-rc2/arch/arm/boot/dts/ |
A D | ste-href-family-pinctrl.dtsi | 196 * These are plain GPIO pins used by WLAN
|