Home
last modified time | relevance | path

Searched full:profile (Results 1 – 25 of 618) sorted by relevance

12345678910>>...25

/linux/block/
H A Dblk-crypto-profile.c14 * construct a crypto profile, then associate it with the disk's request_queue.
27 #include <linux/blk-crypto-profile.h>
42 struct blk_crypto_profile *profile; member
45 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) in blk_crypto_hw_enter() argument
48 * Calling into the driver requires profile->lock held and the device in blk_crypto_hw_enter()
50 * and release profile->lock via blk_crypto_reprogram_all_keys(). in blk_crypto_hw_enter()
52 if (profile->dev) in blk_crypto_hw_enter()
53 pm_runtime_get_sync(profile->dev); in blk_crypto_hw_enter()
54 down_write(&profile->lock); in blk_crypto_hw_enter()
57 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) in blk_crypto_hw_exit() argument
[all …]
H A Dblk-crypto-sysfs.c9 #include <linux/blk-crypto-profile.h>
15 struct blk_crypto_profile *profile; member
20 ssize_t (*show)(struct blk_crypto_profile *profile,
26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; in kobj_to_crypto_profile()
34 static ssize_t hw_wrapped_keys_show(struct blk_crypto_profile *profile, in hw_wrapped_keys_show() argument
41 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, in max_dun_bits_show() argument
44 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); in max_dun_bits_show()
47 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, in num_keyslots_show() argument
50 return sysfs_emit(page, "%u\n", profile->num_slots); in num_keyslots_show()
53 static ssize_t raw_keys_show(struct blk_crypto_profile *profile, in raw_keys_show() argument
[all …]
/linux/drivers/infiniband/hw/mthca/
H A Dmthca_profile.c77 struct mthca_resource *profile; in mthca_make_profile() local
80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); in mthca_make_profile()
81 if (!profile) in mthca_make_profile()
84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; in mthca_make_profile()
85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; in mthca_make_profile()
86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; in mthca_make_profile()
87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; in mthca_make_profile()
88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; in mthca_make_profile()
89 profile[MTHCA_RES_EEEC].size = dev_lim->eeec_entry_sz; in mthca_make_profile()
90 profile[MTHCA_RES_EQ].size = dev_lim->eqc_entry_sz; in mthca_make_profile()
[all …]
/linux/security/apparmor/
H A Dpolicy.c11 * task is confined by. Every task in the system has a profile attached
15 * Each profile exists in a profile namespace which is a container of
16 * visible profiles. Each namespace contains a special "unconfined" profile,
19 * Namespace and profile names can be written together in either
21 * :namespace:profile - used by kernel interfaces for easy detection
22 * namespace://profile - used by policy
24 * Profile names can not start with : or @ or ^ and may not contain \0
26 * Reserved profile names
27 * unconfined - special automatically generated unconfined profile
28 * inherit - special name to indicate profile inheritance
[all …]
H A Ddomain.c31 static const char * const CONFLICTING_ATTACH_STR = "conflicting profile attachments";
33 "conflicting profile attachments - ix fallback";
35 "conflicting profile attachments - ux fallback";
38 * may_change_ptraced_domain - check if can change profile on ptraced task
40 * @to_label: profile to change to (NOT NULL)
87 /* match a profile and its associated ns component if needed
89 * If a subns profile is not to be matched should be prescreened with
92 static inline aa_state_t match_component(struct aa_profile *profile, in match_component() argument
96 struct aa_ruleset *rules = profile->label.rules[0]; in match_component()
101 if (profile->ns == tp->ns) in match_component()
[all …]
H A Daf_unix.c172 static aa_state_t match_label(struct aa_profile *profile, in match_label() argument
178 AA_BUG(!profile); in match_label()
191 return aa_do_perms(profile, rule->policy, state, request, p, ad); in match_label()
197 * v6 - semantics are handled by mapping in profile load
201 static int profile_create_perm(struct aa_profile *profile, int family, in profile_create_perm() argument
205 struct aa_ruleset *rules = profile->label.rules[0]; in profile_create_perm()
208 AA_BUG(!profile); in profile_create_perm()
209 AA_BUG(profile_unconfined(profile)); in profile_create_perm()
217 return aa_do_perms(profile, rules->policy, state, AA_MAY_CREATE, in profile_create_perm()
221 return aa_profile_af_perm(profile, ad, AA_MAY_CREATE, family, type, in profile_create_perm()
[all …]
H A Dmount.c119 * @profile: the profile being enforced (NOT NULL)
135 struct aa_profile *profile, const char *op, in audit_mount() argument
147 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in audit_mount()
165 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_mount()
166 AUDIT_MODE(profile) != AUDIT_ALL) in audit_mount()
184 return aa_audit(audit_type, profile, &ad, audit_cb); in audit_mount()
281 static int path_flags(struct aa_profile *profile, const struct path *path) in path_flags() argument
283 AA_BUG(!profile); in path_flags()
286 return profile->path_flags | in path_flags()
293 * @profile: the confining profile
[all …]
H A Dcapability.c58 * @profile: profile being tested for confinement (NOT NULL)
67 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, in audit_caps() argument
72 struct aa_ruleset *rules = profile->label.rules[0]; in audit_caps()
80 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && in audit_caps()
84 } else if (KILL_MODE(profile) || in audit_caps()
88 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_caps()
89 AUDIT_MODE(profile) != AUDIT_ALL) { in audit_caps()
99 if (COMPLAIN_MODE(profile)) in audit_caps()
109 return aa_audit(type, profile, ad, audit_cb); in audit_caps()
113 * profile_capable - test if profile allows use of capability @cap
[all …]
H A Dpolicy_unpack.c54 * @new: profile if it has been allocated (MAYBE NULL)
55 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL)
56 * @name: name of the profile being manipulated (MAYBE NULL)
67 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local
79 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &ad, audit_cb); in audit_iface()
454 * unpack_trans_table - unpack a profile transition table
535 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument
545 profile->attach.xattr_count = size; in unpack_xattrs()
546 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs()
547 if (!profile->attach.xattrs) in unpack_xattrs()
[all …]
H A Dapparmorfs.c102 * mangle_name - mangle a profile name to std profile layout form
103 * @name: profile name to mangle (NOT NULL)
612 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, in profile_query_cb() argument
615 struct aa_ruleset *rules = profile->label.rules[0]; in profile_query_cb()
619 if (profile_unconfined(profile)) in profile_query_cb()
648 aa_apply_modes_to_perms(profile, &tmp); in profile_query_cb()
678 struct aa_profile *profile; in query_data() local
713 label_for_each_confined(i, label, profile) { in query_data()
714 if (!profile->data) in query_data()
717 data = rhashtable_lookup_fast(profile->data, &key, in query_data()
[all …]
H A Dfile.c82 * @profile: the profile being enforced (NOT NULL)
96 struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument
117 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in aa_audit_file()
136 AUDIT_MODE(profile) != AUDIT_NOQUIET && in aa_audit_file()
137 AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit_file()
145 return aa_audit(type, profile, &ad, file_audit_cb); in aa_audit_file()
153 struct aa_profile *profile; in path_name() local
160 fn_for_each_confined(label, profile, in path_name()
162 profile, &nullperms, op, request, *name, in path_name()
222 struct aa_profile *profile, const char *name, in __aa_path_perm() argument
[all …]
H A Daudit.c120 struct aa_profile *profile = labels_profile(label); in audit_pre() local
122 if (profile->ns != root_ns) { in audit_pre()
125 profile->ns->base.hname); in audit_pre()
127 audit_log_format(ab, " profile="); in audit_pre()
128 audit_log_untrustedstring(ab, profile->base.hname); in audit_pre()
156 * aa_audit - Log a profile based audit event to the audit subsystem
158 * @profile: profile to check against (NOT NULL)
166 int aa_audit(int type, struct aa_profile *profile, in aa_audit() argument
170 AA_BUG(!profile); in aa_audit()
174 if (AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit()
[all …]
H A Dipc.c79 struct aa_profile *profile, in profile_signal_perm() argument
83 struct aa_ruleset *rules = profile->label.rules[0]; in profile_signal_perm()
87 if (profile_unconfined(profile)) in profile_signal_perm()
92 /* TODO: secondary cache check <profile, profile, perm> */ in profile_signal_perm()
97 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
98 aa_apply_modes_to_perms(profile, &perms); in profile_signal_perm()
99 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb); in profile_signal_perm()
106 struct aa_profile *profile; in aa_may_signal() local
111 return xcheck_labels(sender, target, profile, in aa_may_signal()
112 profile_signal_perm(subj_cred, profile, target, in aa_may_signal()
[all …]
/linux/drivers/net/ethernet/mellanox/mlx4/
H A Dprofile.c84 struct mlx4_resource *profile; in mlx4_make_profile() local
88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); in mlx4_make_profile()
89 if (!profile) in mlx4_make_profile()
111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; in mlx4_make_profile()
112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; in mlx4_make_profile()
113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; in mlx4_make_profile()
114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; in mlx4_make_profile()
115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; in mlx4_make_profile()
116 profile[MLX4_RES_CQ].size = dev_cap->cqc_entry_sz; in mlx4_make_profile()
117 profile[MLX4_RES_EQ].size = dev_cap->eqc_entry_sz; in mlx4_make_profile()
[all …]
/linux/drivers/net/ethernet/intel/i40e/
H A Di40e_ddp.c28 * @a: new profile info
29 * @b: old profile info
43 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already
45 * @pinfo: DDP profile information structure
47 * checks if DDP profile loaded already.
48 * Returns >0 if the profile exists.
49 * Returns 0 if the profile is absent.
75 * @new: new profile info
76 * @old: old profile info
100 * @pinfo: DDP profile information structure
[all …]
/linux/security/apparmor/include/
H A Dpolicy.h77 APPARMOR_UNCONFINED, /* profile set to unconfined */
162 * @caps: capabilities for the profile
163 * @rlimits: rlimits for the profile
199 * @base - base components of the profile (name, refcount, lists, lock ...)
200 * @parent: parent of profile
201 * @ns: namespace the profile is in
202 * @rename: optional profile name that this profile renamed
204 * @audit: the auditing mode of the profile
205 * @mode: the enforcement mode of the profile
209 * @attach: attachment rules for the profile
[all …]
/linux/drivers/acpi/
H A Dplatform_profile.c3 /* Platform profile sysfs interface */
47 * _commmon_choices_show - Show the available profile choices
48 * @choices: The available profile choices
69 * _store_class_profile - Set the profile for a class device
71 * @data: The profile to set
89 * _notify_class_profile - Notify the class device of a profile change
100 sysfs_notify(&handler->dev.kobj, NULL, "profile"); in _notify_class_profile()
107 * get_class_profile - Show the current profile for a class device
109 * @profile: The profile to return
114 enum platform_profile_option *profile) in get_class_profile() argument
[all …]
/linux/Documentation/ABI/obsolete/
H A Dsysfs-driver-hid-roccat-ryos5 profile will be read next. The data has to be 3 bytes long.
9 …config num>.<interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/ryos/roccatryos<minor>/profile
13 press of a button. profile holds index of actual profile.
14 This value is persistent, so its value determines the profile
16 When written, the device activates the set profile immediately.
25 a specific profile. Profile index is included in written data.
28 which profile to read.
35 function keys for a specific profile. Profile index is included
38 which profile to read.
45 keys for a specific profile. Profile index is included in
[all …]
H A Dsysfs-driver-hid-roccat-isku6 profile. This value is persistent, so its equivalent to the
7 profile that's active when the device is powered on next time.
8 When written, this file sets the number of the startup profile
9 and the device activates this profile immediately.
25 Profile number for which this settings occur is included in
28 which profile to read.
35 capslock key for a specific profile. Profile number is included
38 which profile to read.
45 easyzone keys for a specific profile. Profile number is included
48 which profile to read.
[all …]
H A Dsysfs-driver-hid-roccat-savu5 press of a button. A profile is split into general settings and
8 respective profile buttons to the mouse. The data has to be
11 Which profile to write is determined by the profile number
14 which profile to read.
21 profile will be read next. The data has to be 3 bytes long.
29 press of a button. A profile is split into general settings and
30 button settings. A profile holds information like resolution,
32 When written, this file lets one write the respective profile
35 Which profile to write is determined by the profile number
52 keystrokes for a specific button for a specific profile.
[all …]
H A Dsysfs-driver-hid-roccat-koneplus6 profile. This value is persistent, so its equivalent to the
7 profile that's active when the mouse is powered on next time.
8 When written, this file sets the number of the startup profile
9 and the mouse activates this profile immediately.
17 profile. This value is persistent, so its equivalent to the
18 profile that's active when the mouse is powered on next time.
19 When written, this file sets the number of the startup profile
20 and the mouse activates this profile immediately.
50 button for a specific profile. Button and profile numbers are
59 press of a button. A profile is split in settings and buttons.
[all …]
H A Dsysfs-driver-hid-roccat-kovaplus16 profile.
17 When written, the mouse activates this profile immediately.
18 The profile that's active when powered down is the same that's
66 press of a button. A profile is split in settings and buttons.
68 When written, this file lets one write the respective profile
71 Which profile to write is determined by the profile number
74 which profile to read.
77 …e num>/<hid-bus>:<vendor-id>:<product-id>.<num>/kovaplus/roccatkovaplus<minor>/profile[1-5]_buttons
81 press of a button. A profile is split in settings and buttons.
83 When read, these files return the respective profile buttons.
[all …]
H A Dsysfs-driver-hid-roccat-pyra25 Description: When read, this file returns the number of the actual profile in
55 press of a button. A profile is split in settings and buttons.
57 When written, this file lets one write the respective profile
60 Which profile to write is determined by the profile number
63 which profile to read.
66 …interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/pyra/roccatpyra<minor>/profile[1-5]_buttons
70 press of a button. A profile is split in settings and buttons.
72 When read, these files return the respective profile buttons.
75 Write control to select profile and read profile_buttons instead.
82 press of a button. A profile is split in settings and buttons.
[all …]
H A Dsysfs-driver-hid-roccat-konepure5 press of a button. actual_profile holds number of actual profile.
6 This value is persistent, so its value determines the profile
8 When written, the mouse activates the set profile immediately.
17 profile will be read next. The data has to be 3 bytes long.
35 button for a specific profile. Button and profile numbers are
44 press of a button. A profile is split in settings and buttons.
46 When written, this file lets one write the respective profile
49 Which profile to write is determined by the profile number
52 which profile to read.
59 press of a button. A profile is split in settings and buttons.
[all …]
/linux/drivers/mmc/host/
H A Dcqhci-crypto.c9 #include <linux/blk-crypto-profile.h>
26 cqhci_host_from_crypto_profile(struct blk_crypto_profile *profile) in cqhci_host_from_crypto_profile() argument
28 return mmc_from_crypto_profile(profile)->cqe_private; in cqhci_host_from_crypto_profile()
54 static int cqhci_crypto_keyslot_program(struct blk_crypto_profile *profile, in cqhci_crypto_keyslot_program() argument
59 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); in cqhci_crypto_keyslot_program()
112 static int cqhci_crypto_keyslot_evict(struct blk_crypto_profile *profile, in cqhci_crypto_keyslot_evict() argument
116 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); in cqhci_crypto_keyslot_evict()
165 struct blk_crypto_profile *profile = &mmc->crypto_profile; in cqhci_crypto_init() local
197 dev, profile, cq_host->crypto_capabilities.config_count + 1); in cqhci_crypto_init()
201 profile->ll_ops = cqhci_crypto_ops; in cqhci_crypto_init()
[all …]

12345678910>>...25