Home
last modified time | relevance | path

Searched full:profile (Results 1 – 25 of 711) sorted by relevance

12345678910>>...29

/Linux-v6.1/block/
Dblk-crypto-profile.c14 * construct a crypto profile, then associate it with the disk's request_queue.
27 #include <linux/blk-crypto-profile.h>
41 struct blk_crypto_profile *profile; member
44 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) in blk_crypto_hw_enter() argument
47 * Calling into the driver requires profile->lock held and the device in blk_crypto_hw_enter()
49 * and release profile->lock via blk_crypto_reprogram_all_keys(). in blk_crypto_hw_enter()
51 if (profile->dev) in blk_crypto_hw_enter()
52 pm_runtime_get_sync(profile->dev); in blk_crypto_hw_enter()
53 down_write(&profile->lock); in blk_crypto_hw_enter()
56 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) in blk_crypto_hw_exit() argument
[all …]
Dblk-crypto-sysfs.c9 #include <linux/blk-crypto-profile.h>
15 struct blk_crypto_profile *profile; member
20 ssize_t (*show)(struct blk_crypto_profile *profile,
26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; in kobj_to_crypto_profile()
34 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, in max_dun_bits_show() argument
37 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); in max_dun_bits_show()
40 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, in num_keyslots_show() argument
43 return sysfs_emit(page, "%u\n", profile->num_slots); in num_keyslots_show()
72 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); in blk_crypto_mode_is_visible() local
76 if (profile->modes_supported[mode_num]) in blk_crypto_mode_is_visible()
[all …]
/Linux-v6.1/drivers/infiniband/hw/mthca/
Dmthca_profile.c77 struct mthca_resource *profile; in mthca_make_profile() local
80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); in mthca_make_profile()
81 if (!profile) in mthca_make_profile()
84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; in mthca_make_profile()
85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; in mthca_make_profile()
86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; in mthca_make_profile()
87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; in mthca_make_profile()
88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; in mthca_make_profile()
89 profile[MTHCA_RES_EEEC].size = dev_lim->eeec_entry_sz; in mthca_make_profile()
90 profile[MTHCA_RES_EQ].size = dev_lim->eqc_entry_sz; in mthca_make_profile()
[all …]
/Linux-v6.1/security/apparmor/
Dpolicy.c11 * task is confined by. Every task in the system has a profile attached
15 * Each profile exists in a profile namespace which is a container of
16 * visible profiles. Each namespace contains a special "unconfined" profile,
19 * Namespace and profile names can be written together in either
21 * :namespace:profile - used by kernel interfaces for easy detection
22 * namespace://profile - used by policy
24 * Profile names can not start with : or @ or ^ and may not contain \0
26 * Reserved profile names
27 * unconfined - special automatically generated unconfined profile
28 * inherit - special name to indicate profile inheritance
[all …]
Ddomain.c51 * may_change_ptraced_domain - check if can change profile on ptraced task
52 * @to_label: profile to change to (NOT NULL)
93 /* match a profile and its associated ns component if needed
95 * If a subns profile is not to be matched should be prescreened with
98 static inline unsigned int match_component(struct aa_profile *profile, in match_component() argument
105 state = aa_dfa_match(profile->file.dfa, state, "&"); in match_component()
106 if (profile->ns == tp->ns) in match_component()
107 return aa_dfa_match(profile->file.dfa, state, tp->base.hname); in match_component()
109 /* try matching with namespace name and then profile */ in match_component()
110 ns_name = aa_ns_name(profile->ns, tp->ns, true); in match_component()
[all …]
Dpolicy_unpack.c66 * aa_ext is the read of the buffer containing the serialized profile. The
96 * @new: profile if it has been allocated (MAYBE NULL)
97 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL)
98 * @name: name of the profile being manipulated (MAYBE NULL)
109 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local
121 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &sa, audit_cb); in audit_iface()
474 * unpack_trans_table - unpack a profile transition table
476 * @profile: profile to add the accept table to (NOT NULL)
480 static bool unpack_trans_table(struct aa_ext *e, struct aa_profile *profile) in unpack_trans_table() argument
492 profile->file.trans.table = kcalloc(size, sizeof(char *), in unpack_trans_table()
[all …]
Dcapability.c33 struct aa_profile *profile; member
55 * @profile: profile being tested for confinement (NOT NULL)
64 static int audit_caps(struct common_audit_data *sa, struct aa_profile *profile, in audit_caps() argument
74 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && in audit_caps()
75 !cap_raised(profile->caps.audit, cap))) in audit_caps()
78 } else if (KILL_MODE(profile) || in audit_caps()
79 cap_raised(profile->caps.kill, cap)) { in audit_caps()
81 } else if (cap_raised(profile->caps.quiet, cap) && in audit_caps()
82 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_caps()
83 AUDIT_MODE(profile) != AUDIT_ALL) { in audit_caps()
[all …]
Dmount.c115 * @profile: the profile being enforced (NOT NULL)
130 static int audit_mount(struct aa_profile *profile, const char *op, in audit_mount() argument
142 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in audit_mount()
160 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_mount()
161 AUDIT_MODE(profile) != AUDIT_ALL) in audit_mount()
178 return aa_audit(audit_type, profile, &sa, audit_cb); in audit_mount()
292 static int path_flags(struct aa_profile *profile, const struct path *path) in path_flags() argument
294 AA_BUG(!profile); in path_flags()
297 return profile->path_flags | in path_flags()
303 * @profile: the confining profile
[all …]
Dnet.c108 int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa, in aa_profile_af_perm() argument
118 if (profile_unconfined(profile)) in aa_profile_af_perm()
120 state = PROFILE_MEDIATES(profile, AA_CLASS_NET); in aa_profile_af_perm()
126 state = aa_dfa_match_len(profile->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm()
128 aa_compute_perms(profile->policy.dfa, state, &perms); in aa_profile_af_perm()
129 aa_apply_modes_to_perms(profile, &perms); in aa_profile_af_perm()
131 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_profile_af_perm()
137 struct aa_profile *profile; in aa_af_perm() local
140 return fn_for_each_confined(label, profile, in aa_af_perm()
141 aa_profile_af_perm(profile, &sa, request, family, in aa_af_perm()
[all …]
Dfile.c79 * @profile: the profile being enforced (NOT NULL)
92 int aa_audit_file(struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument
113 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in aa_audit_file()
132 AUDIT_MODE(profile) != AUDIT_NOQUIET && in aa_audit_file()
133 AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit_file()
141 return aa_audit(type, profile, &sa, file_audit_cb); in aa_audit_file()
161 struct aa_profile *profile; in path_name() local
168 fn_for_each_confined(label, profile, in path_name()
169 aa_audit_file(profile, &nullperms, op, request, *name, in path_name()
221 * done at profile load in aa_compute_fperms()
[all …]
Dipc.c77 static int profile_signal_perm(struct aa_profile *profile, in profile_signal_perm() argument
84 if (profile_unconfined(profile) || in profile_signal_perm()
85 !PROFILE_MEDIATES(profile, AA_CLASS_SIGNAL)) in profile_signal_perm()
89 /* TODO: secondary cache check <profile, profile, perm> */ in profile_signal_perm()
90 state = aa_dfa_next(profile->policy.dfa, in profile_signal_perm()
91 profile->policy.start[AA_CLASS_SIGNAL], in profile_signal_perm()
93 aa_label_match(profile, peer, state, false, request, &perms); in profile_signal_perm()
94 aa_apply_modes_to_perms(profile, &perms); in profile_signal_perm()
95 return aa_check_perms(profile, &perms, request, sa, audit_signal_cb); in profile_signal_perm()
100 struct aa_profile *profile; in aa_may_signal() local
[all …]
Dapparmorfs.c102 * mangle_name - mangle a profile name to std profile layout form
103 * @name: profile name to mangle (NOT NULL)
611 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, in profile_query_cb() argument
618 if (profile_unconfined(profile)) in profile_query_cb()
620 if (profile->file.dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb()
621 dfa = profile->file.dfa; in profile_query_cb()
622 state = aa_dfa_match_len(dfa, profile->file.start, in profile_query_cb()
629 } else if (profile->policy.dfa) { in profile_query_cb()
630 if (!PROFILE_MEDIATES(profile, *match_str)) in profile_query_cb()
632 dfa = profile->policy.dfa; in profile_query_cb()
[all …]
Dresource.c45 * @profile: profile being enforced (NOT NULL)
52 static int audit_resource(struct aa_profile *profile, unsigned int resource, in audit_resource() argument
64 return aa_audit(AUDIT_APPARMOR_AUTO, profile, &sa, audit_cb); in audit_resource()
81 static int profile_setrlimit(struct aa_profile *profile, unsigned int resource, in profile_setrlimit() argument
86 if (profile->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit()
87 profile->rlimits.limits[resource].rlim_max) in profile_setrlimit()
89 return audit_resource(profile, resource, new_rlim->rlim_max, NULL, NULL, in profile_setrlimit()
107 struct aa_profile *profile; in aa_task_setrlimit() local
118 * the same profile or that the task setting the resource of another in aa_task_setrlimit()
124 error = fn_for_each(label, profile, in aa_task_setrlimit()
[all …]
Daudit.c78 struct aa_profile *profile = labels_profile(label); in audit_pre() local
80 if (profile->ns != root_ns) { in audit_pre()
83 profile->ns->base.hname); in audit_pre()
85 audit_log_format(ab, " profile="); in audit_pre()
86 audit_log_untrustedstring(ab, profile->base.hname); in audit_pre()
113 * aa_audit - Log a profile based audit event to the audit subsystem
115 * @profile: profile to check against (NOT NULL)
123 int aa_audit(int type, struct aa_profile *profile, struct common_audit_data *sa, in aa_audit() argument
126 AA_BUG(!profile); in aa_audit()
130 if (AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit()
[all …]
/Linux-v6.1/drivers/net/ethernet/mellanox/mlx4/
Dprofile.c84 struct mlx4_resource *profile; in mlx4_make_profile() local
88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); in mlx4_make_profile()
89 if (!profile) in mlx4_make_profile()
111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; in mlx4_make_profile()
112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; in mlx4_make_profile()
113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; in mlx4_make_profile()
114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; in mlx4_make_profile()
115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; in mlx4_make_profile()
116 profile[MLX4_RES_CQ].size = dev_cap->cqc_entry_sz; in mlx4_make_profile()
117 profile[MLX4_RES_EQ].size = dev_cap->eqc_entry_sz; in mlx4_make_profile()
[all …]
/Linux-v6.1/drivers/net/ethernet/intel/i40e/
Di40e_ddp.c10 * @a: new profile info
11 * @b: old profile info
25 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already
27 * @pinfo: DDP profile information structure
29 * checks if DDP profile loaded already.
30 * Returns >0 if the profile exists.
31 * Returns 0 if the profile is absent.
57 * @new: new profile info
58 * @old: old profile info
82 * @pinfo: DDP profile information structure
[all …]
/Linux-v6.1/security/apparmor/include/
Dpolicy.h69 APPARMOR_UNCONFINED, /* profile set to unconfined */
99 * @base - base components of the profile (name, refcount, lists, lock ...)
100 * @label - label this profile is an extension of
101 * @parent: parent of profile
102 * @ns: namespace the profile is in
103 * @rename: optional profile name that this profile renamed
107 * @audit: the auditing mode of the profile
108 * @mode: the enforcement mode of the profile
114 * @caps: capabilities for the profile
115 * @rlimits: rlimits for the profile
[all …]
/Linux-v6.1/Documentation/ABI/obsolete/
Dsysfs-driver-hid-roccat-ryos5 profile will be read next. The data has to be 3 bytes long.
9 …config num>.<interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/ryos/roccatryos<minor>/profile
13 press of a button. profile holds index of actual profile.
14 This value is persistent, so its value determines the profile
16 When written, the device activates the set profile immediately.
25 a specific profile. Profile index is included in written data.
28 which profile to read.
35 function keys for a specific profile. Profile index is included
38 which profile to read.
45 keys for a specific profile. Profile index is included in
[all …]
Dsysfs-driver-hid-roccat-isku6 profile. This value is persistent, so its equivalent to the
7 profile that's active when the device is powered on next time.
8 When written, this file sets the number of the startup profile
9 and the device activates this profile immediately.
25 Profile number for which this settings occur is included in
28 which profile to read.
35 capslock key for a specific profile. Profile number is included
38 which profile to read.
45 easyzone keys for a specific profile. Profile number is included
48 which profile to read.
[all …]
Dsysfs-driver-hid-roccat-savu5 press of a button. A profile is split into general settings and
8 respective profile buttons to the mouse. The data has to be
11 Which profile to write is determined by the profile number
14 which profile to read.
21 profile will be read next. The data has to be 3 bytes long.
29 press of a button. A profile is split into general settings and
30 button settings. A profile holds information like resolution,
32 When written, this file lets one write the respective profile
35 Which profile to write is determined by the profile number
52 keystrokes for a specific button for a specific profile.
[all …]
Dsysfs-driver-hid-roccat-koneplus6 profile. This value is persistent, so its equivalent to the
7 profile that's active when the mouse is powered on next time.
8 When written, this file sets the number of the startup profile
9 and the mouse activates this profile immediately.
17 profile. This value is persistent, so its equivalent to the
18 profile that's active when the mouse is powered on next time.
19 When written, this file sets the number of the startup profile
20 and the mouse activates this profile immediately.
50 button for a specific profile. Button and profile numbers are
59 press of a button. A profile is split in settings and buttons.
[all …]
Dsysfs-driver-hid-roccat-kovaplus16 profile.
17 When written, the mouse activates this profile immediately.
18 The profile that's active when powered down is the same that's
66 press of a button. A profile is split in settings and buttons.
68 When written, this file lets one write the respective profile
71 Which profile to write is determined by the profile number
74 which profile to read.
77 …e num>/<hid-bus>:<vendor-id>:<product-id>.<num>/kovaplus/roccatkovaplus<minor>/profile[1-5]_buttons
81 press of a button. A profile is split in settings and buttons.
83 When read, these files return the respective profile buttons.
[all …]
Dsysfs-driver-hid-roccat-pyra25 Description: When read, this file returns the number of the actual profile in
55 press of a button. A profile is split in settings and buttons.
57 When written, this file lets one write the respective profile
60 Which profile to write is determined by the profile number
63 which profile to read.
66 …interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/pyra/roccatpyra<minor>/profile[1-5]_buttons
70 press of a button. A profile is split in settings and buttons.
72 When read, these files return the respective profile buttons.
75 Write control to select profile and read profile_buttons instead.
82 press of a button. A profile is split in settings and buttons.
[all …]
/Linux-v6.1/drivers/gpu/drm/amd/pm/powerplay/hwmgr/
Dppatomfwctrl.c282 struct atom_asic_profiling_info_v4_1 *profile; in pp_atomfwctrl_get_avfs_information() local
286 profile = (struct atom_asic_profiling_info_v4_1 *) in pp_atomfwctrl_get_avfs_information()
290 if (!profile) in pp_atomfwctrl_get_avfs_information()
293 format_revision = ((struct atom_common_table_header *)profile)->format_revision; in pp_atomfwctrl_get_avfs_information()
294 content_revision = ((struct atom_common_table_header *)profile)->content_revision; in pp_atomfwctrl_get_avfs_information()
297 param->ulMaxVddc = le32_to_cpu(profile->maxvddc); in pp_atomfwctrl_get_avfs_information()
298 param->ulMinVddc = le32_to_cpu(profile->minvddc); in pp_atomfwctrl_get_avfs_information()
300 le32_to_cpu(profile->avfs_meannsigma_acontant0); in pp_atomfwctrl_get_avfs_information()
302 le32_to_cpu(profile->avfs_meannsigma_acontant1); in pp_atomfwctrl_get_avfs_information()
304 le32_to_cpu(profile->avfs_meannsigma_acontant2); in pp_atomfwctrl_get_avfs_information()
[all …]
/Linux-v6.1/Documentation/userspace-api/
Dsysfs-platform_profile.rst2 Platform Profile Selection (e.g. /sys/firmware/acpi/platform_profile)
16 API for selecting the platform profile of these automatic mechanisms.
18 Note that this API is only for selecting the platform profile, it is
23 Specifically when selecting a high performance profile the actual achieved
31 profile will adjust (power consumption, heat generation, etc) this API
34 a fixed set of profile names. Drivers *must* map their internal profile
37 If there is no good match when mapping then a new profile name may be
38 added. Drivers which wish to introduce new profile names must:
40 1. Explain why the existing profile names canot be used.
41 2. Add the new profile name, along with a clear description of the

12345678910>>...29