mk               2776 drivers/base/core.c 		struct module_kobject *mk = &owner->mkobj;
mk               2778 drivers/base/core.c 		err = sysfs_create_link(&root->dev.kobj, &mk->kobj, "module");
mk                 23 drivers/base/module.c static void module_create_drivers_dir(struct module_kobject *mk)
mk                 28 drivers/base/module.c 	if (mk && !mk->drivers_dir)
mk                 29 drivers/base/module.c 		mk->drivers_dir = kobject_create_and_add("drivers", &mk->kobj);
mk                 37 drivers/base/module.c 	struct module_kobject *mk = NULL;
mk                 43 drivers/base/module.c 		mk = &mod->mkobj;
mk                 50 drivers/base/module.c 			mk = container_of(mkobj, struct module_kobject, kobj);
mk                 52 drivers/base/module.c 			drv->p->mkobj = mk;
mk                 58 drivers/base/module.c 	if (!mk)
mk                 62 drivers/base/module.c 	no_warn = sysfs_create_link(&drv->p->kobj, &mk->kobj, "module");
mk                 65 drivers/base/module.c 		module_create_drivers_dir(mk);
mk                 66 drivers/base/module.c 		no_warn = sysfs_create_link(mk->drivers_dir, &drv->p->kobj,
mk                 74 drivers/base/module.c 	struct module_kobject *mk = NULL;
mk                 83 drivers/base/module.c 		mk = &drv->owner->mkobj;
mk                 85 drivers/base/module.c 		mk = drv->p->mkobj;
mk                 86 drivers/base/module.c 	if (mk && mk->drivers_dir) {
mk                 89 drivers/base/module.c 			sysfs_remove_link(mk->drivers_dir, driver_name);
mk                928 drivers/macintosh/adbhid.c 			int cur_handler_id, int mk)
mk                935 drivers/macintosh/adbhid.c 					      cur_handler_id, mk);
mk                939 drivers/macintosh/adbhid.c 				      cur_handler_id, mk);
mk                 40 fs/crypto/keyring.c static void free_master_key(struct fscrypt_master_key *mk)
mk                 44 fs/crypto/keyring.c 	wipe_master_key_secret(&mk->mk_secret);
mk                 46 fs/crypto/keyring.c 	for (i = 0; i < ARRAY_SIZE(mk->mk_mode_keys); i++)
mk                 47 fs/crypto/keyring.c 		crypto_free_skcipher(mk->mk_mode_keys[i]);
mk                 49 fs/crypto/keyring.c 	key_put(mk->mk_users);
mk                 50 fs/crypto/keyring.c 	kzfree(mk);
mk                 77 fs/crypto/keyring.c 		const struct fscrypt_master_key *mk = key->payload.data[0];
mk                 79 fs/crypto/keyring.c 		if (!is_master_key_secret_present(&mk->mk_secret))
mk                242 fs/crypto/keyring.c static int allocate_master_key_users_keyring(struct fscrypt_master_key *mk)
mk                248 fs/crypto/keyring.c 					    mk->mk_spec.u.identifier);
mk                256 fs/crypto/keyring.c 	mk->mk_users = keyring;
mk                264 fs/crypto/keyring.c static struct key *find_master_key_user(struct fscrypt_master_key *mk)
mk                268 fs/crypto/keyring.c 	format_mk_user_description(description, mk->mk_spec.u.identifier);
mk                269 fs/crypto/keyring.c 	return search_fscrypt_keyring(mk->mk_users, &key_type_fscrypt_user,
mk                279 fs/crypto/keyring.c static int add_master_key_user(struct fscrypt_master_key *mk)
mk                285 fs/crypto/keyring.c 	format_mk_user_description(description, mk->mk_spec.u.identifier);
mk                292 fs/crypto/keyring.c 	err = key_instantiate_and_link(mk_user, NULL, 0, mk->mk_users, NULL);
mk                303 fs/crypto/keyring.c static int remove_master_key_user(struct fscrypt_master_key *mk)
mk                308 fs/crypto/keyring.c 	mk_user = find_master_key_user(mk);
mk                311 fs/crypto/keyring.c 	err = key_unlink(mk->mk_users, mk_user);
mk                325 fs/crypto/keyring.c 	struct fscrypt_master_key *mk;
mk                330 fs/crypto/keyring.c 	mk = kzalloc(sizeof(*mk), GFP_KERNEL);
mk                331 fs/crypto/keyring.c 	if (!mk)
mk                334 fs/crypto/keyring.c 	mk->mk_spec = *mk_spec;
mk                336 fs/crypto/keyring.c 	move_master_key_secret(&mk->mk_secret, secret);
mk                337 fs/crypto/keyring.c 	init_rwsem(&mk->mk_secret_sem);
mk                339 fs/crypto/keyring.c 	refcount_set(&mk->mk_refcount, 1); /* secret is present */
mk                340 fs/crypto/keyring.c 	INIT_LIST_HEAD(&mk->mk_decrypted_inodes);
mk                341 fs/crypto/keyring.c 	spin_lock_init(&mk->mk_decrypted_inodes_lock);
mk                344 fs/crypto/keyring.c 		err = allocate_master_key_users_keyring(mk);
mk                347 fs/crypto/keyring.c 		err = add_master_key_user(mk);
mk                366 fs/crypto/keyring.c 	err = key_instantiate_and_link(key, mk, sizeof(*mk), keyring, NULL);
mk                374 fs/crypto/keyring.c 	free_master_key(mk);
mk                380 fs/crypto/keyring.c static int add_existing_master_key(struct fscrypt_master_key *mk,
mk                391 fs/crypto/keyring.c 	if (mk->mk_users) {
mk                392 fs/crypto/keyring.c 		mk_user = find_master_key_user(mk);
mk                402 fs/crypto/keyring.c 	rekey = !is_master_key_secret_present(&mk->mk_secret);
mk                403 fs/crypto/keyring.c 	if (rekey && !refcount_inc_not_zero(&mk->mk_refcount))
mk                407 fs/crypto/keyring.c 	if (mk->mk_users) {
mk                408 fs/crypto/keyring.c 		err = add_master_key_user(mk);
mk                410 fs/crypto/keyring.c 			if (rekey && refcount_dec_and_test(&mk->mk_refcount))
mk                418 fs/crypto/keyring.c 		down_write(&mk->mk_secret_sem);
mk                419 fs/crypto/keyring.c 		move_master_key_secret(&mk->mk_secret, secret);
mk                420 fs/crypto/keyring.c 		up_write(&mk->mk_secret_sem);
mk                586 fs/crypto/keyring.c 	struct fscrypt_master_key *mk;
mk                597 fs/crypto/keyring.c 	mk = key->payload.data[0];
mk                598 fs/crypto/keyring.c 	mk_user = find_master_key_user(mk);
mk                631 fs/crypto/keyring.c static void evict_dentries_for_decrypted_inodes(struct fscrypt_master_key *mk)
mk                637 fs/crypto/keyring.c 	spin_lock(&mk->mk_decrypted_inodes_lock);
mk                639 fs/crypto/keyring.c 	list_for_each_entry(ci, &mk->mk_decrypted_inodes, ci_master_key_link) {
mk                648 fs/crypto/keyring.c 		spin_unlock(&mk->mk_decrypted_inodes_lock);
mk                654 fs/crypto/keyring.c 		spin_lock(&mk->mk_decrypted_inodes_lock);
mk                657 fs/crypto/keyring.c 	spin_unlock(&mk->mk_decrypted_inodes_lock);
mk                662 fs/crypto/keyring.c 				 struct fscrypt_master_key *mk)
mk                668 fs/crypto/keyring.c 	spin_lock(&mk->mk_decrypted_inodes_lock);
mk                670 fs/crypto/keyring.c 	list_for_each(pos, &mk->mk_decrypted_inodes)
mk                674 fs/crypto/keyring.c 		spin_unlock(&mk->mk_decrypted_inodes_lock);
mk                681 fs/crypto/keyring.c 			list_first_entry(&mk->mk_decrypted_inodes,
mk                686 fs/crypto/keyring.c 	spin_unlock(&mk->mk_decrypted_inodes_lock);
mk                690 fs/crypto/keyring.c 		     sb->s_id, busy_count, master_key_spec_type(&mk->mk_spec),
mk                691 fs/crypto/keyring.c 		     master_key_spec_len(&mk->mk_spec), (u8 *)&mk->mk_spec.u,
mk                697 fs/crypto/keyring.c 				       struct fscrypt_master_key *mk)
mk                722 fs/crypto/keyring.c 	evict_dentries_for_decrypted_inodes(mk);
mk                731 fs/crypto/keyring.c 	err2 = check_for_busy_inodes(sb, mk);
mk                763 fs/crypto/keyring.c 	struct fscrypt_master_key *mk;
mk                789 fs/crypto/keyring.c 	mk = key->payload.data[0];
mk                794 fs/crypto/keyring.c 	if (mk->mk_users && mk->mk_users->keys.nr_leaves_on_tree != 0) {
mk                796 fs/crypto/keyring.c 			err = keyring_clear(mk->mk_users);
mk                798 fs/crypto/keyring.c 			err = remove_master_key_user(mk);
mk                803 fs/crypto/keyring.c 		if (mk->mk_users->keys.nr_leaves_on_tree != 0) {
mk                819 fs/crypto/keyring.c 	if (is_master_key_secret_present(&mk->mk_secret)) {
mk                820 fs/crypto/keyring.c 		down_write(&mk->mk_secret_sem);
mk                821 fs/crypto/keyring.c 		wipe_master_key_secret(&mk->mk_secret);
mk                822 fs/crypto/keyring.c 		dead = refcount_dec_and_test(&mk->mk_refcount);
mk                823 fs/crypto/keyring.c 		up_write(&mk->mk_secret_sem);
mk                835 fs/crypto/keyring.c 		err = try_to_lock_encrypted_files(sb, mk);
mk                897 fs/crypto/keyring.c 	struct fscrypt_master_key *mk;
mk                921 fs/crypto/keyring.c 	mk = key->payload.data[0];
mk                924 fs/crypto/keyring.c 	if (!is_master_key_secret_present(&mk->mk_secret)) {
mk                931 fs/crypto/keyring.c 	if (mk->mk_users) {
mk                934 fs/crypto/keyring.c 		arg.user_count = mk->mk_users->keys.nr_leaves_on_tree;
mk                935 fs/crypto/keyring.c 		mk_user = find_master_key_user(mk);
mk                209 fs/crypto/keysetup.c 			      struct fscrypt_master_key *mk)
mk                217 fs/crypto/keysetup.c 	if (WARN_ON(mode_num >= ARRAY_SIZE(mk->mk_mode_keys)))
mk                221 fs/crypto/keysetup.c 	tfm = READ_ONCE(mk->mk_mode_keys[mode_num]);
mk                226 fs/crypto/keysetup.c 	err = fscrypt_hkdf_expand(&mk->mk_secret.hkdf,
mk                238 fs/crypto/keysetup.c 	prev_tfm = cmpxchg(&mk->mk_mode_keys[mode_num], NULL, tfm);
mk                249 fs/crypto/keysetup.c 				     struct fscrypt_master_key *mk)
mk                269 fs/crypto/keysetup.c 		return setup_per_mode_key(ci, mk);
mk                272 fs/crypto/keysetup.c 	err = fscrypt_hkdf_expand(&mk->mk_secret.hkdf,
mk                298 fs/crypto/keysetup.c 	struct fscrypt_master_key *mk = NULL;
mk                335 fs/crypto/keysetup.c 	mk = key->payload.data[0];
mk                336 fs/crypto/keysetup.c 	down_read(&mk->mk_secret_sem);
mk                339 fs/crypto/keysetup.c 	if (!is_master_key_secret_present(&mk->mk_secret)) {
mk                350 fs/crypto/keysetup.c 	if (mk->mk_secret.size < ci->ci_mode->keysize) {
mk                355 fs/crypto/keysetup.c 			     mk->mk_secret.size, ci->ci_mode->keysize);
mk                362 fs/crypto/keysetup.c 		err = fscrypt_setup_v1_file_key(ci, mk->mk_secret.raw);
mk                365 fs/crypto/keysetup.c 		err = fscrypt_setup_v2_file_key(ci, mk);
mk                379 fs/crypto/keysetup.c 	up_read(&mk->mk_secret_sem);
mk                401 fs/crypto/keysetup.c 		struct fscrypt_master_key *mk = key->payload.data[0];
mk                411 fs/crypto/keysetup.c 		spin_lock(&mk->mk_decrypted_inodes_lock);
mk                413 fs/crypto/keysetup.c 		spin_unlock(&mk->mk_decrypted_inodes_lock);
mk                414 fs/crypto/keysetup.c 		if (refcount_dec_and_test(&mk->mk_refcount))
mk                502 fs/crypto/keysetup.c 			struct fscrypt_master_key *mk =
mk                505 fs/crypto/keysetup.c 			refcount_inc(&mk->mk_refcount);
mk                507 fs/crypto/keysetup.c 			spin_lock(&mk->mk_decrypted_inodes_lock);
mk                509 fs/crypto/keysetup.c 				 &mk->mk_decrypted_inodes);
mk                510 fs/crypto/keysetup.c 			spin_unlock(&mk->mk_decrypted_inodes_lock);
mk                517 fs/crypto/keysetup.c 		struct fscrypt_master_key *mk = master_key->payload.data[0];
mk                519 fs/crypto/keysetup.c 		up_read(&mk->mk_secret_sem);
mk                569 fs/crypto/keysetup.c 	const struct fscrypt_master_key *mk;
mk                579 fs/crypto/keysetup.c 	mk = ci->ci_master_key->payload.data[0];
mk                598 fs/crypto/keysetup.c 	return !is_master_key_secret_present(&mk->mk_secret);
mk                779 kernel/module.c 			struct module_kobject *mk, char *buffer)      \
mk                781 kernel/module.c 	return scnprintf(buffer, PAGE_SIZE, "%s\n", mk->mod->field);  \
mk               1106 kernel/module.c 			   struct module_kobject *mk, char *buffer)
mk               1108 kernel/module.c 	return sprintf(buffer, "%i\n", module_refcount(mk->mod));
mk               1195 kernel/module.c 			      struct module_kobject *mk, char *buffer)
mk               1199 kernel/module.c 	switch (mk->mod->state) {
mk               1219 kernel/module.c 			    struct module_kobject *mk,
mk               1224 kernel/module.c 	rc = kobject_synth_uevent(&mk->kobj, buffer, count);
mk               1232 kernel/module.c 			     struct module_kobject *mk, char *buffer)
mk               1234 kernel/module.c 	return sprintf(buffer, "%u\n", mk->mod->core_layout.size);
mk               1241 kernel/module.c 			     struct module_kobject *mk, char *buffer)
mk               1243 kernel/module.c 	return sprintf(buffer, "%u\n", mk->mod->init_layout.size);
mk               1250 kernel/module.c 			  struct module_kobject *mk, char *buffer)
mk               1254 kernel/module.c 	l = module_flags_taint(mk->mod, buffer);
mk               1522 kernel/module.c 				struct module_kobject *mk, char *buf)
mk                539 kernel/params.c 			       struct module_kobject *mk, char *buf)
mk                547 kernel/params.c 	kernel_param_lock(mk->mod);
mk                549 kernel/params.c 	kernel_param_unlock(mk->mod);
mk                555 kernel/params.c 				struct module_kobject *mk,
mk                564 kernel/params.c 	kernel_param_lock(mk->mod);
mk                569 kernel/params.c 	kernel_param_unlock(mk->mod);
mk                606 kernel/params.c static __modinit int add_sysfs_param(struct module_kobject *mk,
mk                617 kernel/params.c 	if (!mk->mp) {
mk                619 kernel/params.c 		mk->mp = kzalloc(sizeof(*mk->mp), GFP_KERNEL);
mk                620 kernel/params.c 		if (!mk->mp)
mk                622 kernel/params.c 		mk->mp->grp.name = "parameters";
mk                624 kernel/params.c 		mk->mp->grp.attrs = kzalloc(sizeof(mk->mp->grp.attrs[0]),
mk                627 kernel/params.c 		if (!mk->mp->grp.attrs)
mk                632 kernel/params.c 	new_mp = krealloc(mk->mp,
mk                633 kernel/params.c 			  sizeof(*mk->mp) +
mk                634 kernel/params.c 			  sizeof(mk->mp->attrs[0]) * (mk->mp->num + 1),
mk                638 kernel/params.c 	mk->mp = new_mp;
mk                641 kernel/params.c 	new_attrs = krealloc(mk->mp->grp.attrs,
mk                642 kernel/params.c 			     sizeof(mk->mp->grp.attrs[0]) * (mk->mp->num + 2),
mk                646 kernel/params.c 	mk->mp->grp.attrs = new_attrs;
mk                649 kernel/params.c 	memset(&mk->mp->attrs[mk->mp->num], 0, sizeof(mk->mp->attrs[0]));
mk                650 kernel/params.c 	sysfs_attr_init(&mk->mp->attrs[mk->mp->num].mattr.attr);
mk                651 kernel/params.c 	mk->mp->attrs[mk->mp->num].param = kp;
mk                652 kernel/params.c 	mk->mp->attrs[mk->mp->num].mattr.show = param_attr_show;
mk                655 kernel/params.c 		mk->mp->attrs[mk->mp->num].mattr.store = param_attr_store;
mk                657 kernel/params.c 		mk->mp->attrs[mk->mp->num].mattr.store = NULL;
mk                658 kernel/params.c 	mk->mp->attrs[mk->mp->num].mattr.attr.name = (char *)name;
mk                659 kernel/params.c 	mk->mp->attrs[mk->mp->num].mattr.attr.mode = kp->perm;
mk                660 kernel/params.c 	mk->mp->num++;
mk                663 kernel/params.c 	for (i = 0; i < mk->mp->num; i++)
mk                664 kernel/params.c 		mk->mp->grp.attrs[i] = &mk->mp->attrs[i].mattr.attr;
mk                665 kernel/params.c 	mk->mp->grp.attrs[mk->mp->num] = NULL;
mk                670 kernel/params.c static void free_module_param_attrs(struct module_kobject *mk)
mk                672 kernel/params.c 	if (mk->mp)
mk                673 kernel/params.c 		kfree(mk->mp->grp.attrs);
mk                674 kernel/params.c 	kfree(mk->mp);
mk                675 kernel/params.c 	mk->mp = NULL;
mk                744 kernel/params.c 	struct module_kobject *mk;
mk                750 kernel/params.c 		mk = to_module_kobject(kobj);
mk                752 kernel/params.c 		mk = kzalloc(sizeof(struct module_kobject), GFP_KERNEL);
mk                753 kernel/params.c 		BUG_ON(!mk);
mk                755 kernel/params.c 		mk->mod = THIS_MODULE;
mk                756 kernel/params.c 		mk->kobj.kset = module_kset;
mk                757 kernel/params.c 		err = kobject_init_and_add(&mk->kobj, &module_ktype, NULL,
mk                761 kernel/params.c 			err = sysfs_create_file(&mk->kobj, &module_uevent.attr);
mk                764 kernel/params.c 			kobject_put(&mk->kobj);
mk                771 kernel/params.c 		kobject_get(&mk->kobj);
mk                774 kernel/params.c 	return mk;
mk                781 kernel/params.c 	struct module_kobject *mk;
mk                784 kernel/params.c 	mk = locate_module_kobject(name);
mk                785 kernel/params.c 	if (!mk)
mk                789 kernel/params.c 	if (mk->mp)
mk                790 kernel/params.c 		sysfs_remove_group(&mk->kobj, &mk->mp->grp);
mk                793 kernel/params.c 	err = add_sysfs_param(mk, kparam, kparam->name + name_skip);
mk                795 kernel/params.c 	err = sysfs_create_group(&mk->kobj, &mk->mp->grp);
mk                797 kernel/params.c 	kobject_uevent(&mk->kobj, KOBJ_ADD);
mk                798 kernel/params.c 	kobject_put(&mk->kobj);
mk                837 kernel/params.c 			      struct module_kobject *mk, char *buf)
mk                851 kernel/params.c 	struct module_kobject *mk;
mk                857 kernel/params.c 		mk = locate_module_kobject(vattr->module_name);
mk                858 kernel/params.c 		if (mk) {
mk                859 kernel/params.c 			err = sysfs_create_file(&mk->kobj, &vattr->mattr.attr);
mk                861 kernel/params.c 			kobject_uevent(&mk->kobj, KOBJ_ADD);
mk                862 kernel/params.c 			kobject_put(&mk->kobj);
mk                874 kernel/params.c 	struct module_kobject *mk;
mk                878 kernel/params.c 	mk = to_module_kobject(kobj);
mk                883 kernel/params.c 	ret = attribute->show(attribute, mk, buf);
mk                893 kernel/params.c 	struct module_kobject *mk;
mk                897 kernel/params.c 	mk = to_module_kobject(kobj);
mk                902 kernel/params.c 	ret = attribute->store(attribute, mk, buf, len);
mk                930 kernel/params.c 	struct module_kobject *mk = to_module_kobject(kobj);
mk                931 kernel/params.c 	complete(mk->kobj_completion);