mk 2776 drivers/base/core.c struct module_kobject *mk = &owner->mkobj; mk 2778 drivers/base/core.c err = sysfs_create_link(&root->dev.kobj, &mk->kobj, "module"); mk 23 drivers/base/module.c static void module_create_drivers_dir(struct module_kobject *mk) mk 28 drivers/base/module.c if (mk && !mk->drivers_dir) mk 29 drivers/base/module.c mk->drivers_dir = kobject_create_and_add("drivers", &mk->kobj); mk 37 drivers/base/module.c struct module_kobject *mk = NULL; mk 43 drivers/base/module.c mk = &mod->mkobj; mk 50 drivers/base/module.c mk = container_of(mkobj, struct module_kobject, kobj); mk 52 drivers/base/module.c drv->p->mkobj = mk; mk 58 drivers/base/module.c if (!mk) mk 62 drivers/base/module.c no_warn = sysfs_create_link(&drv->p->kobj, &mk->kobj, "module"); mk 65 drivers/base/module.c module_create_drivers_dir(mk); mk 66 drivers/base/module.c no_warn = sysfs_create_link(mk->drivers_dir, &drv->p->kobj, mk 74 drivers/base/module.c struct module_kobject *mk = NULL; mk 83 drivers/base/module.c mk = &drv->owner->mkobj; mk 85 drivers/base/module.c mk = drv->p->mkobj; mk 86 drivers/base/module.c if (mk && mk->drivers_dir) { mk 89 drivers/base/module.c sysfs_remove_link(mk->drivers_dir, driver_name); mk 928 drivers/macintosh/adbhid.c int cur_handler_id, int mk) mk 935 drivers/macintosh/adbhid.c cur_handler_id, mk); mk 939 drivers/macintosh/adbhid.c cur_handler_id, mk); mk 40 fs/crypto/keyring.c static void free_master_key(struct fscrypt_master_key *mk) mk 44 fs/crypto/keyring.c wipe_master_key_secret(&mk->mk_secret); mk 46 fs/crypto/keyring.c for (i = 0; i < ARRAY_SIZE(mk->mk_mode_keys); i++) mk 47 fs/crypto/keyring.c crypto_free_skcipher(mk->mk_mode_keys[i]); mk 49 fs/crypto/keyring.c key_put(mk->mk_users); mk 50 fs/crypto/keyring.c kzfree(mk); mk 77 fs/crypto/keyring.c const struct fscrypt_master_key *mk = key->payload.data[0]; mk 79 fs/crypto/keyring.c if (!is_master_key_secret_present(&mk->mk_secret)) mk 242 fs/crypto/keyring.c static int allocate_master_key_users_keyring(struct fscrypt_master_key *mk) mk 248 fs/crypto/keyring.c mk->mk_spec.u.identifier); mk 256 fs/crypto/keyring.c mk->mk_users = keyring; mk 264 fs/crypto/keyring.c static struct key *find_master_key_user(struct fscrypt_master_key *mk) mk 268 fs/crypto/keyring.c format_mk_user_description(description, mk->mk_spec.u.identifier); mk 269 fs/crypto/keyring.c return search_fscrypt_keyring(mk->mk_users, &key_type_fscrypt_user, mk 279 fs/crypto/keyring.c static int add_master_key_user(struct fscrypt_master_key *mk) mk 285 fs/crypto/keyring.c format_mk_user_description(description, mk->mk_spec.u.identifier); mk 292 fs/crypto/keyring.c err = key_instantiate_and_link(mk_user, NULL, 0, mk->mk_users, NULL); mk 303 fs/crypto/keyring.c static int remove_master_key_user(struct fscrypt_master_key *mk) mk 308 fs/crypto/keyring.c mk_user = find_master_key_user(mk); mk 311 fs/crypto/keyring.c err = key_unlink(mk->mk_users, mk_user); mk 325 fs/crypto/keyring.c struct fscrypt_master_key *mk; mk 330 fs/crypto/keyring.c mk = kzalloc(sizeof(*mk), GFP_KERNEL); mk 331 fs/crypto/keyring.c if (!mk) mk 334 fs/crypto/keyring.c mk->mk_spec = *mk_spec; mk 336 fs/crypto/keyring.c move_master_key_secret(&mk->mk_secret, secret); mk 337 fs/crypto/keyring.c init_rwsem(&mk->mk_secret_sem); mk 339 fs/crypto/keyring.c refcount_set(&mk->mk_refcount, 1); /* secret is present */ mk 340 fs/crypto/keyring.c INIT_LIST_HEAD(&mk->mk_decrypted_inodes); mk 341 fs/crypto/keyring.c spin_lock_init(&mk->mk_decrypted_inodes_lock); mk 344 fs/crypto/keyring.c err = allocate_master_key_users_keyring(mk); mk 347 fs/crypto/keyring.c err = add_master_key_user(mk); mk 366 fs/crypto/keyring.c err = key_instantiate_and_link(key, mk, sizeof(*mk), keyring, NULL); mk 374 fs/crypto/keyring.c free_master_key(mk); mk 380 fs/crypto/keyring.c static int add_existing_master_key(struct fscrypt_master_key *mk, mk 391 fs/crypto/keyring.c if (mk->mk_users) { mk 392 fs/crypto/keyring.c mk_user = find_master_key_user(mk); mk 402 fs/crypto/keyring.c rekey = !is_master_key_secret_present(&mk->mk_secret); mk 403 fs/crypto/keyring.c if (rekey && !refcount_inc_not_zero(&mk->mk_refcount)) mk 407 fs/crypto/keyring.c if (mk->mk_users) { mk 408 fs/crypto/keyring.c err = add_master_key_user(mk); mk 410 fs/crypto/keyring.c if (rekey && refcount_dec_and_test(&mk->mk_refcount)) mk 418 fs/crypto/keyring.c down_write(&mk->mk_secret_sem); mk 419 fs/crypto/keyring.c move_master_key_secret(&mk->mk_secret, secret); mk 420 fs/crypto/keyring.c up_write(&mk->mk_secret_sem); mk 586 fs/crypto/keyring.c struct fscrypt_master_key *mk; mk 597 fs/crypto/keyring.c mk = key->payload.data[0]; mk 598 fs/crypto/keyring.c mk_user = find_master_key_user(mk); mk 631 fs/crypto/keyring.c static void evict_dentries_for_decrypted_inodes(struct fscrypt_master_key *mk) mk 637 fs/crypto/keyring.c spin_lock(&mk->mk_decrypted_inodes_lock); mk 639 fs/crypto/keyring.c list_for_each_entry(ci, &mk->mk_decrypted_inodes, ci_master_key_link) { mk 648 fs/crypto/keyring.c spin_unlock(&mk->mk_decrypted_inodes_lock); mk 654 fs/crypto/keyring.c spin_lock(&mk->mk_decrypted_inodes_lock); mk 657 fs/crypto/keyring.c spin_unlock(&mk->mk_decrypted_inodes_lock); mk 662 fs/crypto/keyring.c struct fscrypt_master_key *mk) mk 668 fs/crypto/keyring.c spin_lock(&mk->mk_decrypted_inodes_lock); mk 670 fs/crypto/keyring.c list_for_each(pos, &mk->mk_decrypted_inodes) mk 674 fs/crypto/keyring.c spin_unlock(&mk->mk_decrypted_inodes_lock); mk 681 fs/crypto/keyring.c list_first_entry(&mk->mk_decrypted_inodes, mk 686 fs/crypto/keyring.c spin_unlock(&mk->mk_decrypted_inodes_lock); mk 690 fs/crypto/keyring.c sb->s_id, busy_count, master_key_spec_type(&mk->mk_spec), mk 691 fs/crypto/keyring.c master_key_spec_len(&mk->mk_spec), (u8 *)&mk->mk_spec.u, mk 697 fs/crypto/keyring.c struct fscrypt_master_key *mk) mk 722 fs/crypto/keyring.c evict_dentries_for_decrypted_inodes(mk); mk 731 fs/crypto/keyring.c err2 = check_for_busy_inodes(sb, mk); mk 763 fs/crypto/keyring.c struct fscrypt_master_key *mk; mk 789 fs/crypto/keyring.c mk = key->payload.data[0]; mk 794 fs/crypto/keyring.c if (mk->mk_users && mk->mk_users->keys.nr_leaves_on_tree != 0) { mk 796 fs/crypto/keyring.c err = keyring_clear(mk->mk_users); mk 798 fs/crypto/keyring.c err = remove_master_key_user(mk); mk 803 fs/crypto/keyring.c if (mk->mk_users->keys.nr_leaves_on_tree != 0) { mk 819 fs/crypto/keyring.c if (is_master_key_secret_present(&mk->mk_secret)) { mk 820 fs/crypto/keyring.c down_write(&mk->mk_secret_sem); mk 821 fs/crypto/keyring.c wipe_master_key_secret(&mk->mk_secret); mk 822 fs/crypto/keyring.c dead = refcount_dec_and_test(&mk->mk_refcount); mk 823 fs/crypto/keyring.c up_write(&mk->mk_secret_sem); mk 835 fs/crypto/keyring.c err = try_to_lock_encrypted_files(sb, mk); mk 897 fs/crypto/keyring.c struct fscrypt_master_key *mk; mk 921 fs/crypto/keyring.c mk = key->payload.data[0]; mk 924 fs/crypto/keyring.c if (!is_master_key_secret_present(&mk->mk_secret)) { mk 931 fs/crypto/keyring.c if (mk->mk_users) { mk 934 fs/crypto/keyring.c arg.user_count = mk->mk_users->keys.nr_leaves_on_tree; mk 935 fs/crypto/keyring.c mk_user = find_master_key_user(mk); mk 209 fs/crypto/keysetup.c struct fscrypt_master_key *mk) mk 217 fs/crypto/keysetup.c if (WARN_ON(mode_num >= ARRAY_SIZE(mk->mk_mode_keys))) mk 221 fs/crypto/keysetup.c tfm = READ_ONCE(mk->mk_mode_keys[mode_num]); mk 226 fs/crypto/keysetup.c err = fscrypt_hkdf_expand(&mk->mk_secret.hkdf, mk 238 fs/crypto/keysetup.c prev_tfm = cmpxchg(&mk->mk_mode_keys[mode_num], NULL, tfm); mk 249 fs/crypto/keysetup.c struct fscrypt_master_key *mk) mk 269 fs/crypto/keysetup.c return setup_per_mode_key(ci, mk); mk 272 fs/crypto/keysetup.c err = fscrypt_hkdf_expand(&mk->mk_secret.hkdf, mk 298 fs/crypto/keysetup.c struct fscrypt_master_key *mk = NULL; mk 335 fs/crypto/keysetup.c mk = key->payload.data[0]; mk 336 fs/crypto/keysetup.c down_read(&mk->mk_secret_sem); mk 339 fs/crypto/keysetup.c if (!is_master_key_secret_present(&mk->mk_secret)) { mk 350 fs/crypto/keysetup.c if (mk->mk_secret.size < ci->ci_mode->keysize) { mk 355 fs/crypto/keysetup.c mk->mk_secret.size, ci->ci_mode->keysize); mk 362 fs/crypto/keysetup.c err = fscrypt_setup_v1_file_key(ci, mk->mk_secret.raw); mk 365 fs/crypto/keysetup.c err = fscrypt_setup_v2_file_key(ci, mk); mk 379 fs/crypto/keysetup.c up_read(&mk->mk_secret_sem); mk 401 fs/crypto/keysetup.c struct fscrypt_master_key *mk = key->payload.data[0]; mk 411 fs/crypto/keysetup.c spin_lock(&mk->mk_decrypted_inodes_lock); mk 413 fs/crypto/keysetup.c spin_unlock(&mk->mk_decrypted_inodes_lock); mk 414 fs/crypto/keysetup.c if (refcount_dec_and_test(&mk->mk_refcount)) mk 502 fs/crypto/keysetup.c struct fscrypt_master_key *mk = mk 505 fs/crypto/keysetup.c refcount_inc(&mk->mk_refcount); mk 507 fs/crypto/keysetup.c spin_lock(&mk->mk_decrypted_inodes_lock); mk 509 fs/crypto/keysetup.c &mk->mk_decrypted_inodes); mk 510 fs/crypto/keysetup.c spin_unlock(&mk->mk_decrypted_inodes_lock); mk 517 fs/crypto/keysetup.c struct fscrypt_master_key *mk = master_key->payload.data[0]; mk 519 fs/crypto/keysetup.c up_read(&mk->mk_secret_sem); mk 569 fs/crypto/keysetup.c const struct fscrypt_master_key *mk; mk 579 fs/crypto/keysetup.c mk = ci->ci_master_key->payload.data[0]; mk 598 fs/crypto/keysetup.c return !is_master_key_secret_present(&mk->mk_secret); mk 779 kernel/module.c struct module_kobject *mk, char *buffer) \ mk 781 kernel/module.c return scnprintf(buffer, PAGE_SIZE, "%s\n", mk->mod->field); \ mk 1106 kernel/module.c struct module_kobject *mk, char *buffer) mk 1108 kernel/module.c return sprintf(buffer, "%i\n", module_refcount(mk->mod)); mk 1195 kernel/module.c struct module_kobject *mk, char *buffer) mk 1199 kernel/module.c switch (mk->mod->state) { mk 1219 kernel/module.c struct module_kobject *mk, mk 1224 kernel/module.c rc = kobject_synth_uevent(&mk->kobj, buffer, count); mk 1232 kernel/module.c struct module_kobject *mk, char *buffer) mk 1234 kernel/module.c return sprintf(buffer, "%u\n", mk->mod->core_layout.size); mk 1241 kernel/module.c struct module_kobject *mk, char *buffer) mk 1243 kernel/module.c return sprintf(buffer, "%u\n", mk->mod->init_layout.size); mk 1250 kernel/module.c struct module_kobject *mk, char *buffer) mk 1254 kernel/module.c l = module_flags_taint(mk->mod, buffer); mk 1522 kernel/module.c struct module_kobject *mk, char *buf) mk 539 kernel/params.c struct module_kobject *mk, char *buf) mk 547 kernel/params.c kernel_param_lock(mk->mod); mk 549 kernel/params.c kernel_param_unlock(mk->mod); mk 555 kernel/params.c struct module_kobject *mk, mk 564 kernel/params.c kernel_param_lock(mk->mod); mk 569 kernel/params.c kernel_param_unlock(mk->mod); mk 606 kernel/params.c static __modinit int add_sysfs_param(struct module_kobject *mk, mk 617 kernel/params.c if (!mk->mp) { mk 619 kernel/params.c mk->mp = kzalloc(sizeof(*mk->mp), GFP_KERNEL); mk 620 kernel/params.c if (!mk->mp) mk 622 kernel/params.c mk->mp->grp.name = "parameters"; mk 624 kernel/params.c mk->mp->grp.attrs = kzalloc(sizeof(mk->mp->grp.attrs[0]), mk 627 kernel/params.c if (!mk->mp->grp.attrs) mk 632 kernel/params.c new_mp = krealloc(mk->mp, mk 633 kernel/params.c sizeof(*mk->mp) + mk 634 kernel/params.c sizeof(mk->mp->attrs[0]) * (mk->mp->num + 1), mk 638 kernel/params.c mk->mp = new_mp; mk 641 kernel/params.c new_attrs = krealloc(mk->mp->grp.attrs, mk 642 kernel/params.c sizeof(mk->mp->grp.attrs[0]) * (mk->mp->num + 2), mk 646 kernel/params.c mk->mp->grp.attrs = new_attrs; mk 649 kernel/params.c memset(&mk->mp->attrs[mk->mp->num], 0, sizeof(mk->mp->attrs[0])); mk 650 kernel/params.c sysfs_attr_init(&mk->mp->attrs[mk->mp->num].mattr.attr); mk 651 kernel/params.c mk->mp->attrs[mk->mp->num].param = kp; mk 652 kernel/params.c mk->mp->attrs[mk->mp->num].mattr.show = param_attr_show; mk 655 kernel/params.c mk->mp->attrs[mk->mp->num].mattr.store = param_attr_store; mk 657 kernel/params.c mk->mp->attrs[mk->mp->num].mattr.store = NULL; mk 658 kernel/params.c mk->mp->attrs[mk->mp->num].mattr.attr.name = (char *)name; mk 659 kernel/params.c mk->mp->attrs[mk->mp->num].mattr.attr.mode = kp->perm; mk 660 kernel/params.c mk->mp->num++; mk 663 kernel/params.c for (i = 0; i < mk->mp->num; i++) mk 664 kernel/params.c mk->mp->grp.attrs[i] = &mk->mp->attrs[i].mattr.attr; mk 665 kernel/params.c mk->mp->grp.attrs[mk->mp->num] = NULL; mk 670 kernel/params.c static void free_module_param_attrs(struct module_kobject *mk) mk 672 kernel/params.c if (mk->mp) mk 673 kernel/params.c kfree(mk->mp->grp.attrs); mk 674 kernel/params.c kfree(mk->mp); mk 675 kernel/params.c mk->mp = NULL; mk 744 kernel/params.c struct module_kobject *mk; mk 750 kernel/params.c mk = to_module_kobject(kobj); mk 752 kernel/params.c mk = kzalloc(sizeof(struct module_kobject), GFP_KERNEL); mk 753 kernel/params.c BUG_ON(!mk); mk 755 kernel/params.c mk->mod = THIS_MODULE; mk 756 kernel/params.c mk->kobj.kset = module_kset; mk 757 kernel/params.c err = kobject_init_and_add(&mk->kobj, &module_ktype, NULL, mk 761 kernel/params.c err = sysfs_create_file(&mk->kobj, &module_uevent.attr); mk 764 kernel/params.c kobject_put(&mk->kobj); mk 771 kernel/params.c kobject_get(&mk->kobj); mk 774 kernel/params.c return mk; mk 781 kernel/params.c struct module_kobject *mk; mk 784 kernel/params.c mk = locate_module_kobject(name); mk 785 kernel/params.c if (!mk) mk 789 kernel/params.c if (mk->mp) mk 790 kernel/params.c sysfs_remove_group(&mk->kobj, &mk->mp->grp); mk 793 kernel/params.c err = add_sysfs_param(mk, kparam, kparam->name + name_skip); mk 795 kernel/params.c err = sysfs_create_group(&mk->kobj, &mk->mp->grp); mk 797 kernel/params.c kobject_uevent(&mk->kobj, KOBJ_ADD); mk 798 kernel/params.c kobject_put(&mk->kobj); mk 837 kernel/params.c struct module_kobject *mk, char *buf) mk 851 kernel/params.c struct module_kobject *mk; mk 857 kernel/params.c mk = locate_module_kobject(vattr->module_name); mk 858 kernel/params.c if (mk) { mk 859 kernel/params.c err = sysfs_create_file(&mk->kobj, &vattr->mattr.attr); mk 861 kernel/params.c kobject_uevent(&mk->kobj, KOBJ_ADD); mk 862 kernel/params.c kobject_put(&mk->kobj); mk 874 kernel/params.c struct module_kobject *mk; mk 878 kernel/params.c mk = to_module_kobject(kobj); mk 883 kernel/params.c ret = attribute->show(attribute, mk, buf); mk 893 kernel/params.c struct module_kobject *mk; mk 897 kernel/params.c mk = to_module_kobject(kobj); mk 902 kernel/params.c ret = attribute->store(attribute, mk, buf, len); mk 930 kernel/params.c struct module_kobject *mk = to_module_kobject(kobj); mk 931 kernel/params.c complete(mk->kobj_completion);