ukey 991 arch/arm64/kernel/ptrace.c static struct ptrauth_key pac_key_from_user(__uint128_t ukey) ukey 994 arch/arm64/kernel/ptrace.c .lo = (unsigned long)ukey, ukey 995 arch/arm64/kernel/ptrace.c .hi = (unsigned long)(ukey >> 64), ukey 206 crypto/af_alg.c static int alg_setkey(struct sock *sk, char __user *ukey, ukey 219 crypto/af_alg.c if (copy_from_user(key, ukey, keylen)) ukey 716 drivers/s390/crypto/pkey_api.c static void *_copy_key_from_user(void __user *ukey, size_t keylen) ukey 720 drivers/s390/crypto/pkey_api.c if (!ukey || keylen < MINKEYBLOBSIZE || keylen > KEYBLOBBUFSIZE) ukey 725 drivers/s390/crypto/pkey_api.c if (copy_from_user(kkey, ukey, keylen)) { ukey 725 kernel/bpf/syscall.c static void *__bpf_copy_key(void __user *ukey, u64 key_size) ukey 728 kernel/bpf/syscall.c return memdup_user(ukey, key_size); ukey 730 kernel/bpf/syscall.c if (ukey) ukey 741 kernel/bpf/syscall.c void __user *ukey = u64_to_user_ptr(attr->key); ukey 771 kernel/bpf/syscall.c key = __bpf_copy_key(ukey, map->key_size); ukey 876 kernel/bpf/syscall.c void __user *ukey = u64_to_user_ptr(attr->key); ukey 903 kernel/bpf/syscall.c key = __bpf_copy_key(ukey, map->key_size); ukey 989 kernel/bpf/syscall.c void __user *ukey = u64_to_user_ptr(attr->key); ukey 1008 kernel/bpf/syscall.c key = __bpf_copy_key(ukey, map->key_size); ukey 1039 kernel/bpf/syscall.c void __user *ukey = u64_to_user_ptr(attr->key); ukey 1059 kernel/bpf/syscall.c if (ukey) { ukey 1060 kernel/bpf/syscall.c key = __bpf_copy_key(ukey, map->key_size); ukey 1105 kernel/bpf/syscall.c void __user *ukey = u64_to_user_ptr(attr->key); ukey 1126 kernel/bpf/syscall.c key = __bpf_copy_key(ukey, map->key_size); ukey 321 net/ceph/ceph_common.c struct key *ukey; ukey 326 net/ceph/ceph_common.c ukey = request_key(&key_type_ceph, name, NULL); ukey 327 net/ceph/ceph_common.c if (IS_ERR(ukey)) { ukey 330 net/ceph/ceph_common.c key_err = PTR_ERR(ukey); ukey 352 net/ceph/ceph_common.c ckey = ukey->payload.data[0]; ukey 359 net/ceph/ceph_common.c key_put(ukey); ukey 305 security/keys/encrypted-keys/encrypted.c struct key *ukey; ukey 307 security/keys/encrypted-keys/encrypted.c ukey = request_key(&key_type_user, master_desc, NULL); ukey 308 security/keys/encrypted-keys/encrypted.c if (IS_ERR(ukey)) ukey 311 security/keys/encrypted-keys/encrypted.c down_read(&ukey->sem); ukey 312 security/keys/encrypted-keys/encrypted.c upayload = user_key_payload_locked(ukey); ukey 315 security/keys/encrypted-keys/encrypted.c up_read(&ukey->sem); ukey 316 security/keys/encrypted-keys/encrypted.c key_put(ukey); ukey 317 security/keys/encrypted-keys/encrypted.c ukey = ERR_PTR(-EKEYREVOKED); ukey 323 security/keys/encrypted-keys/encrypted.c return ukey;