| /linux/crypto/ |
| A D | twofish_common.c | 109 static const u32 mds[4][256] = { variable 484 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 485 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 486 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \ 487 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh] 492 ctx->s[0][i] = mds[0][q0[q0[(b) ^ sa] ^ se] ^ si]; \ 495 ctx->s[3][i] = mds[3][q1[q1[(a) ^ sd] ^ sh] ^ sl]; 530 mds[0][q0[a ^ key[(j) + 8]] ^ key[j]] \ 531 ^ mds[1][q0[b ^ key[(j) + 9]] ^ key[(j) + 1]] \ 532 ^ mds[2][q1[c ^ key[(j) + 10]] ^ key[(j) + 2]] \ [all …]
|
| /linux/fs/ceph/ |
| A D | mdsmap.c | 48 int mds; in ceph_mdsmap_get_random_mds() local 50 mds = __mdsmap_get_random_mds(m, false); in ceph_mdsmap_get_random_mds() 51 if (mds == m->possible_max_rank || mds == -1) in ceph_mdsmap_get_random_mds() 54 return mds == m->possible_max_rank ? -1 : mds; in ceph_mdsmap_get_random_mds() 177 s32 mds, inc, state; in ceph_mdsmap_decode() local 237 i+1, n, global_id, mds, inc, in ceph_mdsmap_decode() 242 if (mds < 0 || mds >= m->possible_max_rank) { in ceph_mdsmap_decode() 253 info = &m->m_info[mds]; in ceph_mdsmap_decode() 312 s32 mds = ceph_decode_32(p); in ceph_mdsmap_decode() local 313 if (mds >= 0 && mds < m->possible_max_rank) { in ceph_mdsmap_decode() [all …]
|
| A D | mds_client.c | 681 if (mds >= mdsc->max_sessions || !mdsc->sessions[mds]) in __ceph_lookup_mds_session() 688 if (mds >= mdsc->max_sessions || !mdsc->sessions[mds]) in __have_session() 804 int mds; in ceph_mdsc_iterate_sessions() local 807 for (mds = 0; mds < mdsc->max_sessions; ++mds) { in ceph_mdsc_iterate_sessions() 1022 int mds = -1; in __choose_mds() local 1123 mds = frag.mds; in __choose_mds() 1156 return mds; in __choose_mds() 1164 return mds; in __choose_mds() 3118 if (mds >= 0 && mds != req->r_session->s_mds) { in handle_reply() 4855 int mds; in ceph_mdsc_force_umount() local [all …]
|
| A D | caps.c | 440 if (mds < cap->mds) in __get_cap_for_mds() 442 else if (mds > cap->mds) in __get_cap_for_mds() 473 if (new->mds < cap->mds) in __insert_cap_node() 475 else if (new->mds > cap->mds) in __insert_cap_node() 639 int mds = session->s_mds; in ceph_add_cap() local 657 cap->mds = mds; in ceph_add_cap() 1627 int mds; in ceph_flush_snaps() local 2011 if (mds >= cap->mds || in ceph_check_caps() 2108 mds = cap->mds; /* remember mds, so we don't repeat */ in ceph_check_caps() 3784 int mds = session->s_mds; in handle_cap_trunc() local [all …]
|
| A D | debugfs.c | 317 int mds; in mds_sessions_show() local 328 for (mds = 0; mds < mdsc->max_sessions; mds++) { in mds_sessions_show() 330 __ceph_lookup_mds_session(mdsc, mds); in mds_sessions_show()
|
| A D | super.h | 165 int mds; /* mds index for this cap */ member 254 int mds; /* -1 if same authority as parent */ member 1167 int mds); 1192 int mds, int drop, int unless, int force); 1195 int mds, int drop, int unless);
|
| A D | mds_client.h | 484 __ceph_lookup_mds_session(struct ceph_mds_client *, int mds); 493 struct ceph_msg *msg, int mds);
|
| A D | inode.c | 166 frag->mds = -1; in __get_or_create_frag() 266 int mds = le32_to_cpu(dirinfo->auth); in ceph_fill_dirfrag() local 274 diri_auth = ci->i_auth_cap->mds; in ceph_fill_dirfrag() 277 if (mds == -1) /* CDIR_AUTH_PARENT */ in ceph_fill_dirfrag() 278 mds = diri_auth; in ceph_fill_dirfrag() 281 if (ndist == 0 && mds == diri_auth) { in ceph_fill_dirfrag() 296 frag->mds = -1; in ceph_fill_dirfrag() 314 frag->mds = mds; in ceph_fill_dirfrag()
|
| A D | snap.c | 906 int mds = session->s_mds; in ceph_handle_snap() local 931 dout("handle_snap from mds%d op %s split %llx tracelen %d\n", mds, in ceph_handle_snap() 1041 pr_err("corrupt snap message from mds%d\n", mds); in ceph_handle_snap()
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| A D | mds.rst | 61 architecture section: :ref:`Documentation/x86/mds.rst <mds>`. 94 /sys/devices/system/cpu/vulnerabilities/mds 137 The state in the mds sysfs file reflects this situation accordingly. 251 time with the option "mds=". The valid arguments for this option are: 261 full,nosmt The same as mds=full, with SMT disabled on vulnerable 268 Not specifying this option is equivalent to "mds=full". For processors 270 specifying just "mds=off" without an accompanying "tsx_async_abort=off"
|
| A D | index.rst | 14 mds
|
| A D | special-register-buffer-data-sampling.rst | 7 Documentation/admin-guide/hw-vuln/mds.rst techniques to
|
| A D | tsx_async_abort.rst | 177 "tsx_async_abort=off" without an accompanying "mds=off" will have no
|
| /linux/fs/nfs/ |
| A D | write.c | 869 atomic_long_inc(&cinfo->mds->ncommit); in nfs_request_add_commit_list_locked() 914 atomic_long_dec(&cinfo->mds->ncommit); in nfs_request_remove_commit_list() 922 cinfo->mds = &NFS_I(inode)->commit_info; in nfs_init_cinfo_from_inode() 1031 return atomic_long_read(&cinfo->mds->ncommit); in nfs_reqs_to_commit() 1075 if (!atomic_long_read(&cinfo->mds->ncommit)) in nfs_scan_commit() 1078 if (atomic_long_read(&cinfo->mds->ncommit) > 0) { in nfs_scan_commit() 1780 nfs_commit_begin(cinfo->mds); in nfs_init_commit() 1898 nfs_commit_end(cinfo.mds); in nfs_commit_release_pages() 1941 nfs_commit_begin(cinfo.mds); in __nfs_commit_inode() 1960 nfs_commit_end(cinfo.mds); in __nfs_commit_inode() [all …]
|
| A D | direct.c | 190 cinfo->mds = &dreq->mds_cinfo; in nfs_init_cinfo_from_dreq() 533 nfs_scan_commit_list(&cinfo->mds->list, list, cinfo, 0); in nfs_direct_write_scan_commit_list() 623 if (nfs_commit_end(cinfo.mds)) in nfs_direct_commit_complete()
|
| /linux/Documentation/x86/ |
| A D | index.rst | 28 mds
|
| A D | tsx_async_abort.rst | 31 :ref:`Documentation/admin-guide/hw-vuln/mds.rst <mds>`.
|
| A D | mds.rst | 117 mds=off is supplied on the kernel command line 129 If the CPU is affected and mds=off is not supplied on the kernel command
|
| /linux/net/dsa/ |
| A D | dsa2.c | 1217 struct dsa_switch *mds, *ds = dp->ds; in dsa_get_tag_protocol() local 1227 mds = mdp->ds; in dsa_get_tag_protocol() 1228 mdp_upstream = dsa_upstream_port(mds, mdp->index); in dsa_get_tag_protocol() 1229 tag_protocol = mds->ops->get_tag_protocol(mds, mdp_upstream, in dsa_get_tag_protocol()
|
| /linux/drivers/media/platform/ |
| A D | aspeed-video.c | 795 u32 mds; in aspeed_video_get_resolution() local 846 mds = aspeed_video_read(video, VE_MODE_DETECT_STATUS); in aspeed_video_get_resolution() 853 det->vbackporch = ((mds & VE_MODE_DETECT_V_LINES) >> in aspeed_video_get_resolution() 864 det->hbackporch = (mds & VE_MODE_DETECT_H_PIXELS) - in aspeed_video_get_resolution()
|
| /linux/drivers/base/ |
| A D | cpu.c | 572 static DEVICE_ATTR(mds, 0444, cpu_show_mds, NULL);
|
| /linux/include/linux/ceph/ |
| A D | ceph_fs.h | 782 __le32 mds; member
|
| /linux/include/linux/ |
| A D | nfs_xdr.h | 1648 struct nfs_mds_commit_info *mds; member
|
| /linux/Documentation/ABI/testing/ |
| A D | sysfs-devices-system-cpu | 519 /sys/devices/system/cpu/vulnerabilities/mds
|
| /linux/Documentation/admin-guide/ |
| A D | kernel-parameters.txt | 2789 mds= [X86,INTEL] 2810 On TAA-affected machines, mds=off can be prevented by 2817 mds=full. 2819 For details see: Documentation/admin-guide/hw-vuln/mds.rst 3027 mds=off [X86] 3051 mds=full,nosmt [X86] 5909 this mitigation, you need to specify mds=off too.
|