/linux-master/block/ |
H A D | blk-crypto-profile.c | 14 * construct a crypto profile, then associate it with the disk's request_queue. 27 #include <linux/blk-crypto-profile.h> 42 struct blk_crypto_profile *profile; member in struct:blk_crypto_keyslot 45 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) argument 48 * Calling into the driver requires profile->lock held and the device 50 * and release profile->lock via blk_crypto_reprogram_all_keys(). 52 if (profile->dev) 53 pm_runtime_get_sync(profile->dev); 54 down_write(&profile->lock); 57 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) argument 74 blk_crypto_profile_init(struct blk_crypto_profile *profile, unsigned int num_slots) argument 139 blk_crypto_profile_destroy_callback(void *profile) argument 155 devm_blk_crypto_profile_init(struct device *dev, struct blk_crypto_profile *profile, unsigned int num_slots) argument 171 blk_crypto_hash_bucket_for_key(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument 181 struct blk_crypto_profile *profile = slot->profile; local 190 blk_crypto_find_keyslot(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument 205 blk_crypto_find_and_grab_keyslot(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument 248 blk_crypto_get_keyslot(struct blk_crypto_profile *profile, const struct blk_crypto_key *key, struct blk_crypto_keyslot **slot_ptr) argument 327 struct blk_crypto_profile *profile = slot->profile; local 346 __blk_crypto_cfg_supported(struct blk_crypto_profile *profile, const struct blk_crypto_config *cfg) argument 363 __blk_crypto_evict_key(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument 418 blk_crypto_reprogram_all_keys(struct blk_crypto_profile *profile) argument 441 blk_crypto_profile_destroy(struct blk_crypto_profile *profile) argument 453 blk_crypto_register(struct blk_crypto_profile *profile, struct request_queue *q) argument [all...] |
H A D | blk-crypto-sysfs.c | 9 #include <linux/blk-crypto-profile.h> 15 struct blk_crypto_profile *profile; member in struct:blk_crypto_kobj 20 ssize_t (*show)(struct blk_crypto_profile *profile, 26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; 34 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, argument 37 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); 40 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, argument 43 return sysfs_emit(page, "%u\n", profile->num_slots); 72 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); local 76 if (profile 81 blk_crypto_mode_show(struct blk_crypto_profile *profile, struct blk_crypto_attr *attr, char *page) argument 104 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); local [all...] |
/linux-master/drivers/infiniband/hw/mthca/ |
H A D | mthca_profile.c | 77 struct mthca_resource *profile; local 80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); 81 if (!profile) 84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; 85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; 86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; 87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; 88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; 89 profile[MTHCA_RES_EEE [all...] |
/linux-master/drivers/net/ethernet/mellanox/mlx4/ |
H A D | profile.c | 84 struct mlx4_resource *profile; local 88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); 89 if (!profile) 111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; 112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; 113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; 114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; 115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; 116 profile[MLX4_RES_C [all...] |
/linux-master/security/apparmor/ |
H A D | capability.c | 33 struct aa_profile *profile; member in struct:audit_cache 55 * @profile: profile being tested for confinement (NOT NULL) 64 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, argument 67 struct aa_ruleset *rules = list_first_entry(&profile->rules, 76 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && 80 } else if (KILL_MODE(profile) || 84 AUDIT_MODE(profile) != AUDIT_NOQUIET && 85 AUDIT_MODE(profile) != AUDIT_ALL) { 92 if (profile 116 profile_capable(struct aa_profile *profile, int cap, unsigned int opts, struct apparmor_audit_data *ad) argument 155 struct aa_profile *profile; local [all...] |
H A D | policy.c | 11 * task is confined by. Every task in the system has a profile attached 15 * Each profile exists in a profile namespace which is a container of 16 * visible profiles. Each namespace contains a special "unconfined" profile, 19 * Namespace and profile names can be written together in either 21 * :namespace:profile - used by kernel interfaces for easy detection 22 * namespace://profile - used by policy 26 * Reserved profile names 27 * unconfined - special automatically generated unconfined profile 28 * inherit - special name to indicate profile inheritanc 147 __add_profile(struct list_head *list, struct aa_profile *profile) argument 176 __list_remove_profile(struct aa_profile *profile) argument 192 __remove_profile(struct aa_profile *profile) argument 214 struct aa_profile *profile, *tmp; local 279 aa_free_profile(struct aa_profile *profile) argument 334 struct aa_profile *profile; local 418 struct aa_profile *profile; local 447 struct aa_profile *profile = NULL; local 482 struct aa_profile *parent, *profile = NULL; local 530 struct aa_profile *profile = NULL; local 567 struct aa_profile *profile; local 591 struct aa_profile *profile; local 620 struct aa_profile *profile; local 665 struct aa_profile *p, *profile; local 731 replacement_allowed(struct aa_profile *profile, int noreplace, const char **info) argument 906 __list_lookup_parent(struct list_head *lh, struct aa_profile *profile) argument 1322 struct aa_profile *profile = NULL; local [all...] |
H A D | domain.c | 33 * may_change_ptraced_domain - check if can change profile on ptraced task 35 * @to_label: profile to change to (NOT NULL) 82 /* match a profile and its associated ns component if needed 84 * If a subns profile is not to be matched should be prescreened with 87 static inline aa_state_t match_component(struct aa_profile *profile, argument 91 struct aa_ruleset *rules = list_first_entry(&profile->rules, 97 if (profile->ns == tp->ns) 100 /* try matching with namespace name and then profile */ 101 ns_name = aa_ns_name(profile->ns, tp->ns, true); 110 * @profile 124 label_compound_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument 186 label_components_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) argument 249 label_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument 283 change_profile_perms(struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, aa_state_t start, struct aa_perms *perms) argument 306 aa_xattrs_match(const struct linux_binprm *bprm, struct aa_profile *profile, aa_state_t state) argument 391 struct aa_profile *profile, *candidate = NULL; local 513 x_table_lookup(struct aa_profile *profile, u32 xindex, const char **name) argument 562 x_to_label(struct aa_profile *profile, const struct linux_binprm *bprm, const char *name, u32 xindex, const char **lookupname, const char **info) argument 631 profile_transition(const struct cred *subj_cred, struct aa_profile *profile, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) argument 733 profile_onexec(const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) argument 816 struct aa_profile *profile; local 878 struct aa_profile *profile; local 1011 build_change_hat(const struct cred *subj_cred, struct aa_profile *profile, const char *name, bool sibling) argument 1065 struct aa_profile *profile, *root, *hat = NULL; local 1182 struct aa_profile *profile; local 1290 change_profile_perms_wrapper(const char *op, const char *name, const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, struct aa_perms *perms) argument 1332 struct aa_profile *profile; local [all...] |
H A D | ipc.c | 79 struct aa_profile *profile, 83 struct aa_ruleset *rules = list_first_entry(&profile->rules, 88 if (profile_unconfined(profile) || 89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) 94 /* TODO: secondary cache check <profile, profile, perm> */ 98 aa_label_match(profile, rules, peer, state, false, request, &perms); 99 aa_apply_modes_to_perms(profile, &perms); 100 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb); 107 struct aa_profile *profile; local 78 profile_signal_perm(const struct cred *cred, struct aa_profile *profile, struct aa_label *peer, u32 request, struct apparmor_audit_data *ad) argument [all...] |
H A D | mount.c | 117 * @profile: the profile being enforced (NOT NULL) 133 struct aa_profile *profile, const char *op, 145 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) 163 AUDIT_MODE(profile) != AUDIT_NOQUIET && 164 AUDIT_MODE(profile) != AUDIT_ALL) 182 return aa_audit(audit_type, profile, &ad, audit_cb); 279 static int path_flags(struct aa_profile *profile, const struct path *path) argument 281 AA_BUG(!profile); 284 return profile 132 audit_mount(const struct cred *subj_cred, struct aa_profile *profile, const char *op, const char *name, const char *src_name, const char *type, const char *trans, unsigned long flags, const void *data, u32 request, struct aa_perms *perms, const char *info, int error) argument 303 match_mnt_path_str(const struct cred *subj_cred, struct aa_profile *profile, const struct path *mntpath, char *buffer, const char *devname, const char *type, unsigned long flags, void *data, bool binary, const char *devinfo) argument 365 match_mnt(const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, const struct path *devpath, char *devbuffer, const char *type, unsigned long flags, void *data, bool binary) argument 398 struct aa_profile *profile; local 424 struct aa_profile *profile; local 462 struct aa_profile *profile; local 489 struct aa_profile *profile; local 539 struct aa_profile *profile; local 601 profile_umount(const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer) argument 639 struct aa_profile *profile; local 662 build_pivotroot(const struct cred *subj_cred, struct aa_profile *profile, const struct path *new_path, char *new_buffer, const struct path *old_path, char *old_buffer) argument 722 struct aa_profile *profile; local [all...] |
H A D | audit.c | 120 struct aa_profile *profile = labels_profile(label); local 122 if (profile->ns != root_ns) { 125 profile->ns->base.hname); 127 audit_log_format(ab, " profile="); 128 audit_log_untrustedstring(ab, profile->base.hname); 156 * aa_audit - Log a profile based audit event to the audit subsystem 158 * @profile: profile to check against (NOT NULL) 166 int aa_audit(int type, struct aa_profile *profile, argument 170 AA_BUG(!profile); [all...] |
H A D | crypto.c | 61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, argument 74 profile->hash = kzalloc(apparmor_hash_size, GFP_KERNEL); 75 if (!profile->hash) 89 error = crypto_shash_final(desc, profile->hash); 96 kfree(profile->hash); 97 profile->hash = NULL; 112 AA_ERROR("failed to setup profile sha256 hashing: %d\n", error);
|
H A D | net.c | 109 int aa_profile_af_perm(struct aa_profile *profile, argument 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, 122 if (profile_unconfined(profile)) 133 aa_apply_modes_to_perms(profile, &perms); 135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); 141 struct aa_profile *profile; local 144 return fn_for_each_confined(label, profile, 145 aa_profile_af_perm(profile, &ad, request, family, 161 struct aa_profile *profile; local 165 error = fn_for_each_confined(label, profile, 221 aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, struct apparmor_audit_data *ad) argument 259 struct aa_profile *profile; local [all...] |
H A D | resource.c | 47 * @profile: profile being enforced (NOT NULL) 57 struct aa_profile *profile, unsigned int resource, 71 return aa_audit(AUDIT_APPARMOR_AUTO, profile, &ad, audit_cb); 89 struct aa_profile *profile, unsigned int resource, 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, 99 return audit_resource(subj_cred, profile, resource, new_rlim->rlim_max, 119 struct aa_profile *profile; local 130 * the same profile or that the task setting the resource of another 136 error = fn_for_each(label, profile, 56 audit_resource(const struct cred *subj_cred, struct aa_profile *profile, unsigned int resource, unsigned long value, struct aa_label *peer, const char *info, int error) argument 88 profile_setrlimit(const struct cred *subj_cred, struct aa_profile *profile, unsigned int resource, struct rlimit *new_rlim) argument [all...] |
H A D | task.c | 227 struct aa_profile *profile, 231 struct aa_ruleset *rules = list_first_entry(&profile->rules, 237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, 239 aa_apply_modes_to_perms(profile, &perms); 240 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb); 266 /* profile uses the old style capability check for ptrace */ 293 struct aa_profile *profile; local 297 return xcheck_labels(tracer, tracee, profile, 298 profile_tracer_perm(tracer_cred, profile, tracee, 300 profile_tracee_perm(tracee_cred, profile, trace 226 profile_ptrace_perm(const struct cred *cred, struct aa_profile *profile, struct aa_label *peer, u32 request, struct apparmor_audit_data *ad) argument 316 aa_profile_ns_perm(struct aa_profile *profile, struct apparmor_audit_data *ad, u32 request) argument [all...] |
H A D | file.c | 81 * @profile: the profile being enforced (NOT NULL) 95 struct aa_profile *profile, struct aa_perms *perms, 116 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) 135 AUDIT_MODE(profile) != AUDIT_NOQUIET && 136 AUDIT_MODE(profile) != AUDIT_ALL) 144 return aa_audit(type, profile, &ad, file_audit_cb); 165 struct aa_profile *profile; local 172 fn_for_each_confined(label, profile, 174 profile, 94 aa_audit_file(const struct cred *subj_cred, struct aa_profile *profile, struct aa_perms *perms, const char *op, u32 request, const char *name, const char *target, struct aa_label *tlabel, kuid_t ouid, const char *info, int error) argument 228 __aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument 249 profile_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument 288 struct aa_profile *profile; local 326 profile_path_link(const struct cred *subj_cred, struct aa_profile *profile, const struct path *link, char *buffer, const struct path *target, char *buffer2, struct path_cond *cond) argument 444 struct aa_profile *profile; local 489 struct aa_profile *profile; local [all...] |
/linux-master/include/linux/ |
H A D | blk-crypto-profile.h | 19 * encryption. All functions may sleep, are serialized by profile->lock, and 20 * are never called while profile->dev (if set) is runtime-suspended. 37 int (*keyslot_program)(struct blk_crypto_profile *profile, 57 int (*keyslot_evict)(struct blk_crypto_profile *profile, 63 * struct blk_crypto_profile - inline encryption profile for a device 133 int blk_crypto_profile_init(struct blk_crypto_profile *profile, 137 struct blk_crypto_profile *profile, 142 void blk_crypto_reprogram_all_keys(struct blk_crypto_profile *profile); 144 void blk_crypto_profile_destroy(struct blk_crypto_profile *profile);
|
H A D | platform_profile.h | 3 * Platform profile sysfs interface 32 enum platform_profile_option *profile); 34 enum platform_profile_option profile);
|
/linux-master/security/apparmor/include/ |
H A D | crypto.h | 18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, 25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, argument
|
H A D | domain.h | 25 struct aa_label *x_table_lookup(struct aa_profile *profile, u32 xindex,
|
/linux-master/tools/testing/selftests/drivers/net/mlxsw/spectrum/ |
H A D | resource_scale.sh | 43 for profile in $KVD_PROFILES; do 45 devlink_sp_resource_kvd_profile_set $profile 47 log_test "'$current_test' [$profile] setting" 55 log_test_skip "'$current_test' [$profile] should_fail=$should_fail test" 65 log_test "'$current_test' [$profile] $target" 72 log_test "'$current_test' [$profile] $target traffic test" 76 log_test "'$current_test' [$profile] overflow $target"
|
/linux-master/drivers/media/dvb-frontends/cxd2880/ |
H A D | cxd2880_tnrdmd_dvbt.h | 19 enum cxd2880_dvbt_profile profile; member in struct:cxd2880_dvbt_tune_param
|
/linux-master/kernel/time/ |
H A D | tick-legacy.c | 8 #include <linux/profile.h>
|
/linux-master/drivers/scsi/ |
H A D | sd_dif.c | 52 bi.profile = &t10_pi_type3_ip; 54 bi.profile = &t10_pi_type1_ip; 59 bi.profile = &t10_pi_type3_crc; 61 bi.profile = &t10_pi_type1_crc; 79 bi.profile->name, bi.tag_size);
|
/linux-master/sound/soc/sof/ |
H A D | fw-file-profile.c | 15 struct sof_loadable_file_profile *profile, 24 fw_filename = kasprintf(GFP_KERNEL, "%s/%s", profile->fw_path, 25 profile->fw_name); 53 } else if (fw_ipc_type != profile->ipc_type) { 56 fw_filename, fw_ipc_type, profile->ipc_type); 67 struct sof_loadable_file_profile *profile) 73 if (!profile->tplg_path || !profile->tplg_name) 76 tplg_filename = kasprintf(GFP_KERNEL, "%s/%s", profile->tplg_path, 77 profile 14 sof_test_firmware_file(struct device *dev, struct sof_loadable_file_profile *profile, enum sof_ipc_type *ipc_type_to_adjust) argument 66 sof_test_topology_file(struct device *dev, struct sof_loadable_file_profile *profile) argument 265 sof_print_profile_info(struct snd_sof_dev *sdev, enum sof_ipc_type ipc_type, struct sof_loadable_file_profile *profile) argument [all...] |
/linux-master/drivers/mmc/host/ |
H A D | cqhci-crypto.c | 9 #include <linux/blk-crypto-profile.h> 26 cqhci_host_from_crypto_profile(struct blk_crypto_profile *profile) argument 29 container_of(profile, struct mmc_host, crypto_profile); 61 static int cqhci_crypto_keyslot_program(struct blk_crypto_profile *profile, argument 66 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); 119 static int cqhci_crypto_keyslot_evict(struct blk_crypto_profile *profile, argument 123 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); 172 struct blk_crypto_profile *profile = &mmc->crypto_profile; local 203 err = devm_blk_crypto_profile_init(dev, profile, num_keyslots); 207 profile [all...] |