/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/net/mlx4/ |
H A D | profile.c | 84 struct mlx4_resource *profile; local 88 profile = kzalloc(MLX4_RES_NUM * sizeof *profile, GFP_KERNEL); 89 if (!profile) 92 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; 93 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; 94 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; 95 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; 96 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; 97 profile[MLX4_RES_C [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/net/mlx4/ |
H A D | profile.c | 84 struct mlx4_resource *profile; local 88 profile = kzalloc(MLX4_RES_NUM * sizeof *profile, GFP_KERNEL); 89 if (!profile) 92 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; 93 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; 94 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; 95 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; 96 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; 97 profile[MLX4_RES_C [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/infiniband/hw/mthca/ |
H A D | mthca_profile.c | 79 struct mthca_resource *profile; local 83 profile = kzalloc(MTHCA_RES_NUM * sizeof *profile, GFP_KERNEL); 84 if (!profile) 87 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; 88 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; 89 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; 90 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; 91 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; 92 profile[MTHCA_RES_EEE [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/infiniband/hw/mthca/ |
H A D | mthca_profile.c | 79 struct mthca_resource *profile; local 83 profile = kzalloc(MTHCA_RES_NUM * sizeof *profile, GFP_KERNEL); 84 if (!profile) 87 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; 88 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; 89 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; 90 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; 91 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; 92 profile[MTHCA_RES_EEE [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/apparmor/ |
H A D | capability.c | 31 struct aa_profile *profile; member in struct:audit_cache 51 * @profile: profile confining task (NOT NULL) 61 static int audit_caps(struct aa_profile *profile, struct task_struct *task, argument 75 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && 76 !cap_raised(profile->caps.audit, cap))) 79 } else if (KILL_MODE(profile) || 80 cap_raised(profile->caps.kill, cap)) { 82 } else if (cap_raised(profile->caps.quiet, cap) && 83 AUDIT_MODE(profile) ! 113 profile_capable(struct aa_profile *profile, int cap) argument 129 aa_capable(struct task_struct *task, struct aa_profile *profile, int cap, int audit) argument [all...] |
H A D | context.c | 17 * the aa_task_cxt.profile, both of which are required and are not allowed 19 * to each cred (which is reference count). The profile pointed to by 50 aa_put_profile(cxt->profile); 66 aa_get_profile(new->profile); 73 * @profile: new profile (NOT NULL) 77 int aa_replace_current_profile(struct aa_profile *profile) argument 81 BUG_ON(!profile); 83 if (cxt->profile == profile) 119 aa_set_current_onexec(struct aa_profile *profile) argument 145 aa_set_current_hat(struct aa_profile *profile, u64 token) argument [all...] |
H A D | audit.c | 132 if (sa->aad.profile) { 133 struct aa_profile *profile = sa->aad.profile; local 139 if (profile->ns != root_ns) { 141 audit_log_untrustedstring(ab, profile->ns->base.hname); 143 audit_log_format(ab, " profile="); 144 audit_log_untrustedstring(ab, profile->base.hname); 168 * aa_audit - Log a profile based audit event to the audit subsystem 170 * @profile: profile t 179 aa_audit(int type, struct aa_profile *profile, gfp_t gfp, struct common_audit_data *sa, void (*cb) (struct audit_buffer *, void *)) argument [all...] |
H A D | policy.c | 20 /* root profile namespace */ 31 * @name: hname to find the base profile name component of (NOT NULL) 33 * Returns: the tail (base profile name) name component of an hname 243 * free_namespace - free a profile namespace 247 * namespace was referenced by a profile confining a task, 289 * aa_find_namespace - look up a profile namespace on the namespace list 324 /* if name isn't specified the profile is loaded to the current ns */ 366 * __list_add_profile - add a profile to a list 368 * @profile: the profile t 374 __list_add_profile(struct list_head *list, struct aa_profile *profile) argument 394 __list_remove_profile(struct aa_profile *profile) argument 450 __remove_profile(struct aa_profile *profile) argument 467 struct aa_profile *profile, *tmp; local 573 struct aa_profile *profile; local 605 struct aa_profile *profile = NULL; local 652 free_profile(struct aa_profile *profile) argument 738 struct aa_profile *profile; local 765 struct aa_profile *profile = NULL; local 798 struct aa_profile *profile = NULL; local 826 struct aa_profile *profile; local 844 replacement_allowed(struct aa_profile *profile, int noreplace, const char **info) argument 867 __add_new_profile(struct aa_namespace *ns, struct aa_policy *policy, struct aa_profile *profile) argument 1053 struct aa_profile *profile = NULL; local [all...] |
H A D | domain.c | 52 * may_change_ptraced_domain - check if can change profile on ptraced task 53 * @task: task we want to change profile of (NOT NULL) 54 * @to_profile: profile to change to (NOT NULL) 93 * @profile: the current profile (NOT NULL) 95 * @name: the name of the profile to change to (NOT NULL) 101 static struct file_perms change_profile_perms(struct aa_profile *profile, argument 110 if (unconfined(profile)) { 114 } else if (!profile->file.dfa) { 116 } else if ((ns == profile 149 struct aa_profile *profile, *candidate = NULL; local 182 struct aa_profile *profile; local 245 x_table_lookup(struct aa_profile *profile, u32 xindex) argument 306 x_to_profile(struct aa_profile *profile, const char *name, u32 xindex) argument 346 struct aa_profile *profile, *new_profile = NULL; local 543 struct aa_profile *profile = __aa_current_profile(); local 604 struct aa_profile *profile, *previous_profile, *hat = NULL; local 730 struct aa_profile *profile, *target = NULL; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/apparmor/ |
H A D | capability.c | 31 struct aa_profile *profile; member in struct:audit_cache 51 * @profile: profile confining task (NOT NULL) 61 static int audit_caps(struct aa_profile *profile, struct task_struct *task, argument 75 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && 76 !cap_raised(profile->caps.audit, cap))) 79 } else if (KILL_MODE(profile) || 80 cap_raised(profile->caps.kill, cap)) { 82 } else if (cap_raised(profile->caps.quiet, cap) && 83 AUDIT_MODE(profile) ! 113 profile_capable(struct aa_profile *profile, int cap) argument 129 aa_capable(struct task_struct *task, struct aa_profile *profile, int cap, int audit) argument [all...] |
H A D | context.c | 17 * the aa_task_cxt.profile, both of which are required and are not allowed 19 * to each cred (which is reference count). The profile pointed to by 50 aa_put_profile(cxt->profile); 66 aa_get_profile(new->profile); 73 * @profile: new profile (NOT NULL) 77 int aa_replace_current_profile(struct aa_profile *profile) argument 81 BUG_ON(!profile); 83 if (cxt->profile == profile) 119 aa_set_current_onexec(struct aa_profile *profile) argument 145 aa_set_current_hat(struct aa_profile *profile, u64 token) argument [all...] |
H A D | audit.c | 132 if (sa->aad.profile) { 133 struct aa_profile *profile = sa->aad.profile; local 139 if (profile->ns != root_ns) { 141 audit_log_untrustedstring(ab, profile->ns->base.hname); 143 audit_log_format(ab, " profile="); 144 audit_log_untrustedstring(ab, profile->base.hname); 168 * aa_audit - Log a profile based audit event to the audit subsystem 170 * @profile: profile t 179 aa_audit(int type, struct aa_profile *profile, gfp_t gfp, struct common_audit_data *sa, void (*cb) (struct audit_buffer *, void *)) argument [all...] |
H A D | policy.c | 20 /* root profile namespace */ 31 * @name: hname to find the base profile name component of (NOT NULL) 33 * Returns: the tail (base profile name) name component of an hname 243 * free_namespace - free a profile namespace 247 * namespace was referenced by a profile confining a task, 289 * aa_find_namespace - look up a profile namespace on the namespace list 324 /* if name isn't specified the profile is loaded to the current ns */ 366 * __list_add_profile - add a profile to a list 368 * @profile: the profile t 374 __list_add_profile(struct list_head *list, struct aa_profile *profile) argument 394 __list_remove_profile(struct aa_profile *profile) argument 450 __remove_profile(struct aa_profile *profile) argument 467 struct aa_profile *profile, *tmp; local 573 struct aa_profile *profile; local 605 struct aa_profile *profile = NULL; local 652 free_profile(struct aa_profile *profile) argument 738 struct aa_profile *profile; local 765 struct aa_profile *profile = NULL; local 798 struct aa_profile *profile = NULL; local 826 struct aa_profile *profile; local 844 replacement_allowed(struct aa_profile *profile, int noreplace, const char **info) argument 867 __add_new_profile(struct aa_namespace *ns, struct aa_policy *policy, struct aa_profile *profile) argument 1053 struct aa_profile *profile = NULL; local [all...] |
H A D | domain.c | 52 * may_change_ptraced_domain - check if can change profile on ptraced task 53 * @task: task we want to change profile of (NOT NULL) 54 * @to_profile: profile to change to (NOT NULL) 93 * @profile: the current profile (NOT NULL) 95 * @name: the name of the profile to change to (NOT NULL) 101 static struct file_perms change_profile_perms(struct aa_profile *profile, argument 110 if (unconfined(profile)) { 114 } else if (!profile->file.dfa) { 116 } else if ((ns == profile 149 struct aa_profile *profile, *candidate = NULL; local 182 struct aa_profile *profile; local 245 x_table_lookup(struct aa_profile *profile, u32 xindex) argument 306 x_to_profile(struct aa_profile *profile, const char *name, u32 xindex) argument 346 struct aa_profile *profile, *new_profile = NULL; local 543 struct aa_profile *profile = __aa_current_profile(); local 604 struct aa_profile *profile, *previous_profile, *hat = NULL; local 730 struct aa_profile *profile, *target = NULL; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/apparmor/include/ |
H A D | context.h | 28 * as the profile reference is now stored in the f_cred. However the 58 * @profile: the current profile (NOT NULL) 59 * @exec: profile to transition to on next exec (MAYBE NULL) 60 * @previous: profile the task may return to (MAYBE NULL) 63 * Contains the task's current profile (which could change due to 69 struct aa_profile *profile; member in struct:aa_task_cxt 79 int aa_replace_current_profile(struct aa_profile *profile); 80 int aa_set_current_onexec(struct aa_profile *profile); 81 int aa_set_current_hat(struct aa_profile *profile, u6 140 struct aa_profile *profile; local [all...] |
H A D | procattr.h | 21 int aa_getprocattr(struct aa_profile *profile, char **string);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/apparmor/include/ |
H A D | context.h | 28 * as the profile reference is now stored in the f_cred. However the 58 * @profile: the current profile (NOT NULL) 59 * @exec: profile to transition to on next exec (MAYBE NULL) 60 * @previous: profile the task may return to (MAYBE NULL) 63 * Contains the task's current profile (which could change due to 69 struct aa_profile *profile; member in struct:aa_task_cxt 79 int aa_replace_current_profile(struct aa_profile *profile); 80 int aa_set_current_onexec(struct aa_profile *profile); 81 int aa_set_current_hat(struct aa_profile *profile, u6 140 struct aa_profile *profile; local [all...] |
H A D | procattr.h | 21 int aa_getprocattr(struct aa_profile *profile, char **string);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/packaging/SGI/ |
H A D | samba.rc | 11 PROFILE_SAMBAD=/usr/samba/bin/smbd.profile 14 PROFILE_NMBD=/usr/samba/bin/nmbd.profile 33 if test "$enable_profiling" -o "$1" = "profile" ; then 40 start|profile) 51 $SMBCONTROL smbd profile on > /dev/null 2>&1 52 $SMBCONTROL nmbd profile on > /dev/null 2>&1 60 $KILLALL -15 smbd.profile nmbd.profile 65 echo "usage: /etc/init.d/samba {start|stop|profile}"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/packaging/SGI/ |
H A D | samba.rc | 11 PROFILE_SAMBAD=/usr/samba/bin/smbd.profile 14 PROFILE_NMBD=/usr/samba/bin/nmbd.profile 33 if test "$enable_profiling" -o "$1" = "profile" ; then 40 start|profile) 51 $SMBCONTROL smbd profile on > /dev/null 2>&1 52 $SMBCONTROL nmbd profile on > /dev/null 2>&1 60 $KILLALL -15 smbd.profile nmbd.profile 65 echo "usage: /etc/init.d/samba {start|stop|profile}"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/packaging/SGI/ |
H A D | samba.rc | 11 PROFILE_SAMBAD=/usr/samba/bin/smbd.profile 14 PROFILE_NMBD=/usr/samba/bin/nmbd.profile 33 if test "$enable_profiling" -o "$1" = "profile" ; then 40 start|profile) 51 $SMBCONTROL smbd profile on > /dev/null 2>&1 52 $SMBCONTROL nmbd profile on > /dev/null 2>&1 60 $KILLALL -15 smbd.profile nmbd.profile 65 echo "usage: /etc/init.d/samba {start|stop|profile}"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/packaging/SGI/ |
H A D | samba.rc | 11 PROFILE_SAMBAD=/usr/samba/bin/smbd.profile 14 PROFILE_NMBD=/usr/samba/bin/nmbd.profile 33 if test "$enable_profiling" -o "$1" = "profile" ; then 40 start|profile) 51 $SMBCONTROL smbd profile on > /dev/null 2>&1 52 $SMBCONTROL nmbd profile on > /dev/null 2>&1 60 $KILLALL -15 smbd.profile nmbd.profile 65 echo "usage: /etc/init.d/samba {start|stop|profile}"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/packaging/SGI/ |
H A D | samba.rc | 11 PROFILE_SAMBAD=/usr/samba/bin/smbd.profile 14 PROFILE_NMBD=/usr/samba/bin/nmbd.profile 33 if test "$enable_profiling" -o "$1" = "profile" ; then 40 start|profile) 51 $SMBCONTROL smbd profile on > /dev/null 2>&1 52 $SMBCONTROL nmbd profile on > /dev/null 2>&1 60 $KILLALL -15 smbd.profile nmbd.profile 65 echo "usage: /etc/init.d/samba {start|stop|profile}"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/packaging/SGI/ |
H A D | samba.rc | 11 PROFILE_SAMBAD=/usr/samba/bin/smbd.profile 14 PROFILE_NMBD=/usr/samba/bin/nmbd.profile 33 if test "$enable_profiling" -o "$1" = "profile" ; then 40 start|profile) 51 $SMBCONTROL smbd profile on > /dev/null 2>&1 52 $SMBCONTROL nmbd profile on > /dev/null 2>&1 60 $KILLALL -15 smbd.profile nmbd.profile 65 echo "usage: /etc/init.d/samba {start|stop|profile}"
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/toolchains/hndtools-armeabi-2013.11/arm-none-eabi/include/c++/4.8.1/profile/ |
H A D | base.h | 24 /** @file profile/base.h 26 * This file is a GNU profile extension to the Standard C++ Library. 35 #include <profile/impl/profiler.h> 41 * @brief GNU profile code, replaces standard behavior with profile behavior. 50 * @brief GNU profile code for public use. 54 // Import all the profile versions of components in namespace std.
|