ukey              991 arch/arm64/kernel/ptrace.c static struct ptrauth_key pac_key_from_user(__uint128_t ukey)
ukey              994 arch/arm64/kernel/ptrace.c 		.lo = (unsigned long)ukey,
ukey              995 arch/arm64/kernel/ptrace.c 		.hi = (unsigned long)(ukey >> 64),
ukey              206 crypto/af_alg.c static int alg_setkey(struct sock *sk, char __user *ukey,
ukey              219 crypto/af_alg.c 	if (copy_from_user(key, ukey, keylen))
ukey              716 drivers/s390/crypto/pkey_api.c static void *_copy_key_from_user(void __user *ukey, size_t keylen)
ukey              720 drivers/s390/crypto/pkey_api.c 	if (!ukey || keylen < MINKEYBLOBSIZE || keylen > KEYBLOBBUFSIZE)
ukey              725 drivers/s390/crypto/pkey_api.c 	if (copy_from_user(kkey, ukey, keylen)) {
ukey              725 kernel/bpf/syscall.c static void *__bpf_copy_key(void __user *ukey, u64 key_size)
ukey              728 kernel/bpf/syscall.c 		return memdup_user(ukey, key_size);
ukey              730 kernel/bpf/syscall.c 	if (ukey)
ukey              741 kernel/bpf/syscall.c 	void __user *ukey = u64_to_user_ptr(attr->key);
ukey              771 kernel/bpf/syscall.c 	key = __bpf_copy_key(ukey, map->key_size);
ukey              876 kernel/bpf/syscall.c 	void __user *ukey = u64_to_user_ptr(attr->key);
ukey              903 kernel/bpf/syscall.c 	key = __bpf_copy_key(ukey, map->key_size);
ukey              989 kernel/bpf/syscall.c 	void __user *ukey = u64_to_user_ptr(attr->key);
ukey             1008 kernel/bpf/syscall.c 	key = __bpf_copy_key(ukey, map->key_size);
ukey             1039 kernel/bpf/syscall.c 	void __user *ukey = u64_to_user_ptr(attr->key);
ukey             1059 kernel/bpf/syscall.c 	if (ukey) {
ukey             1060 kernel/bpf/syscall.c 		key = __bpf_copy_key(ukey, map->key_size);
ukey             1105 kernel/bpf/syscall.c 	void __user *ukey = u64_to_user_ptr(attr->key);
ukey             1126 kernel/bpf/syscall.c 	key = __bpf_copy_key(ukey, map->key_size);
ukey              321 net/ceph/ceph_common.c 	struct key *ukey;
ukey              326 net/ceph/ceph_common.c 	ukey = request_key(&key_type_ceph, name, NULL);
ukey              327 net/ceph/ceph_common.c 	if (IS_ERR(ukey)) {
ukey              330 net/ceph/ceph_common.c 		key_err = PTR_ERR(ukey);
ukey              352 net/ceph/ceph_common.c 	ckey = ukey->payload.data[0];
ukey              359 net/ceph/ceph_common.c 	key_put(ukey);
ukey              305 security/keys/encrypted-keys/encrypted.c 	struct key *ukey;
ukey              307 security/keys/encrypted-keys/encrypted.c 	ukey = request_key(&key_type_user, master_desc, NULL);
ukey              308 security/keys/encrypted-keys/encrypted.c 	if (IS_ERR(ukey))
ukey              311 security/keys/encrypted-keys/encrypted.c 	down_read(&ukey->sem);
ukey              312 security/keys/encrypted-keys/encrypted.c 	upayload = user_key_payload_locked(ukey);
ukey              315 security/keys/encrypted-keys/encrypted.c 		up_read(&ukey->sem);
ukey              316 security/keys/encrypted-keys/encrypted.c 		key_put(ukey);
ukey              317 security/keys/encrypted-keys/encrypted.c 		ukey = ERR_PTR(-EKEYREVOKED);
ukey              323 security/keys/encrypted-keys/encrypted.c 	return ukey;