Searched refs:profile (Results 1 - 25 of 313) sorted by relevance

1234567891011>>

/linux-master/block/
H A Dblk-crypto-profile.c14 * construct a crypto profile, then associate it with the disk's request_queue.
27 #include <linux/blk-crypto-profile.h>
42 struct blk_crypto_profile *profile; member in struct:blk_crypto_keyslot
45 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) argument
48 * Calling into the driver requires profile->lock held and the device
50 * and release profile->lock via blk_crypto_reprogram_all_keys().
52 if (profile->dev)
53 pm_runtime_get_sync(profile->dev);
54 down_write(&profile->lock);
57 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) argument
74 blk_crypto_profile_init(struct blk_crypto_profile *profile, unsigned int num_slots) argument
139 blk_crypto_profile_destroy_callback(void *profile) argument
155 devm_blk_crypto_profile_init(struct device *dev, struct blk_crypto_profile *profile, unsigned int num_slots) argument
171 blk_crypto_hash_bucket_for_key(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument
181 struct blk_crypto_profile *profile = slot->profile; local
190 blk_crypto_find_keyslot(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument
205 blk_crypto_find_and_grab_keyslot(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument
248 blk_crypto_get_keyslot(struct blk_crypto_profile *profile, const struct blk_crypto_key *key, struct blk_crypto_keyslot **slot_ptr) argument
327 struct blk_crypto_profile *profile = slot->profile; local
346 __blk_crypto_cfg_supported(struct blk_crypto_profile *profile, const struct blk_crypto_config *cfg) argument
363 __blk_crypto_evict_key(struct blk_crypto_profile *profile, const struct blk_crypto_key *key) argument
418 blk_crypto_reprogram_all_keys(struct blk_crypto_profile *profile) argument
441 blk_crypto_profile_destroy(struct blk_crypto_profile *profile) argument
453 blk_crypto_register(struct blk_crypto_profile *profile, struct request_queue *q) argument
[all...]
H A Dblk-crypto-sysfs.c9 #include <linux/blk-crypto-profile.h>
15 struct blk_crypto_profile *profile; member in struct:blk_crypto_kobj
20 ssize_t (*show)(struct blk_crypto_profile *profile,
26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile;
34 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, argument
37 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported);
40 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, argument
43 return sysfs_emit(page, "%u\n", profile->num_slots);
72 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); local
76 if (profile
81 blk_crypto_mode_show(struct blk_crypto_profile *profile, struct blk_crypto_attr *attr, char *page) argument
104 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); local
[all...]
/linux-master/drivers/infiniband/hw/mthca/
H A Dmthca_profile.c77 struct mthca_resource *profile; local
80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL);
81 if (!profile)
84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz;
85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz;
86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz;
87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz;
88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz;
89 profile[MTHCA_RES_EEE
[all...]
/linux-master/drivers/net/ethernet/mellanox/mlx4/
H A Dprofile.c84 struct mlx4_resource *profile; local
88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL);
89 if (!profile)
111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz;
112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz;
113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz;
114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz;
115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz;
116 profile[MLX4_RES_C
[all...]
/linux-master/security/apparmor/
H A Dcapability.c33 struct aa_profile *profile; member in struct:audit_cache
55 * @profile: profile being tested for confinement (NOT NULL)
64 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, argument
67 struct aa_ruleset *rules = list_first_entry(&profile->rules,
76 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) &&
80 } else if (KILL_MODE(profile) ||
84 AUDIT_MODE(profile) != AUDIT_NOQUIET &&
85 AUDIT_MODE(profile) != AUDIT_ALL) {
92 if (profile
116 profile_capable(struct aa_profile *profile, int cap, unsigned int opts, struct apparmor_audit_data *ad) argument
155 struct aa_profile *profile; local
[all...]
H A Dpolicy.c11 * task is confined by. Every task in the system has a profile attached
15 * Each profile exists in a profile namespace which is a container of
16 * visible profiles. Each namespace contains a special "unconfined" profile,
19 * Namespace and profile names can be written together in either
21 * :namespace:profile - used by kernel interfaces for easy detection
22 * namespace://profile - used by policy
26 * Reserved profile names
27 * unconfined - special automatically generated unconfined profile
28 * inherit - special name to indicate profile inheritanc
147 __add_profile(struct list_head *list, struct aa_profile *profile) argument
176 __list_remove_profile(struct aa_profile *profile) argument
192 __remove_profile(struct aa_profile *profile) argument
214 struct aa_profile *profile, *tmp; local
279 aa_free_profile(struct aa_profile *profile) argument
334 struct aa_profile *profile; local
418 struct aa_profile *profile; local
447 struct aa_profile *profile = NULL; local
482 struct aa_profile *parent, *profile = NULL; local
530 struct aa_profile *profile = NULL; local
567 struct aa_profile *profile; local
591 struct aa_profile *profile; local
620 struct aa_profile *profile; local
665 struct aa_profile *p, *profile; local
731 replacement_allowed(struct aa_profile *profile, int noreplace, const char **info) argument
906 __list_lookup_parent(struct list_head *lh, struct aa_profile *profile) argument
1322 struct aa_profile *profile = NULL; local
[all...]
H A Ddomain.c33 * may_change_ptraced_domain - check if can change profile on ptraced task
35 * @to_label: profile to change to (NOT NULL)
82 /* match a profile and its associated ns component if needed
84 * If a subns profile is not to be matched should be prescreened with
87 static inline aa_state_t match_component(struct aa_profile *profile, argument
91 struct aa_ruleset *rules = list_first_entry(&profile->rules,
97 if (profile->ns == tp->ns)
100 /* try matching with namespace name and then profile */
101 ns_name = aa_ns_name(profile->ns, tp->ns, true);
110 * @profile
124 label_compound_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument
186 label_components_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t start, bool subns, u32 request, struct aa_perms *perms) argument
249 label_match(struct aa_profile *profile, struct aa_label *label, bool stack, aa_state_t state, bool subns, u32 request, struct aa_perms *perms) argument
283 change_profile_perms(struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, aa_state_t start, struct aa_perms *perms) argument
306 aa_xattrs_match(const struct linux_binprm *bprm, struct aa_profile *profile, aa_state_t state) argument
391 struct aa_profile *profile, *candidate = NULL; local
513 x_table_lookup(struct aa_profile *profile, u32 xindex, const char **name) argument
562 x_to_label(struct aa_profile *profile, const struct linux_binprm *bprm, const char *name, u32 xindex, const char **lookupname, const char **info) argument
631 profile_transition(const struct cred *subj_cred, struct aa_profile *profile, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) argument
733 profile_onexec(const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) argument
816 struct aa_profile *profile; local
878 struct aa_profile *profile; local
1011 build_change_hat(const struct cred *subj_cred, struct aa_profile *profile, const char *name, bool sibling) argument
1065 struct aa_profile *profile, *root, *hat = NULL; local
1182 struct aa_profile *profile; local
1290 change_profile_perms_wrapper(const char *op, const char *name, const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *target, bool stack, u32 request, struct aa_perms *perms) argument
1332 struct aa_profile *profile; local
[all...]
H A Dipc.c79 struct aa_profile *profile,
83 struct aa_ruleset *rules = list_first_entry(&profile->rules,
88 if (profile_unconfined(profile) ||
89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL))
94 /* TODO: secondary cache check <profile, profile, perm> */
98 aa_label_match(profile, rules, peer, state, false, request, &perms);
99 aa_apply_modes_to_perms(profile, &perms);
100 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb);
107 struct aa_profile *profile; local
78 profile_signal_perm(const struct cred *cred, struct aa_profile *profile, struct aa_label *peer, u32 request, struct apparmor_audit_data *ad) argument
[all...]
H A Dmount.c117 * @profile: the profile being enforced (NOT NULL)
133 struct aa_profile *profile, const char *op,
145 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL))
163 AUDIT_MODE(profile) != AUDIT_NOQUIET &&
164 AUDIT_MODE(profile) != AUDIT_ALL)
182 return aa_audit(audit_type, profile, &ad, audit_cb);
279 static int path_flags(struct aa_profile *profile, const struct path *path) argument
281 AA_BUG(!profile);
284 return profile
132 audit_mount(const struct cred *subj_cred, struct aa_profile *profile, const char *op, const char *name, const char *src_name, const char *type, const char *trans, unsigned long flags, const void *data, u32 request, struct aa_perms *perms, const char *info, int error) argument
303 match_mnt_path_str(const struct cred *subj_cred, struct aa_profile *profile, const struct path *mntpath, char *buffer, const char *devname, const char *type, unsigned long flags, void *data, bool binary, const char *devinfo) argument
365 match_mnt(const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, const struct path *devpath, char *devbuffer, const char *type, unsigned long flags, void *data, bool binary) argument
398 struct aa_profile *profile; local
424 struct aa_profile *profile; local
462 struct aa_profile *profile; local
489 struct aa_profile *profile; local
539 struct aa_profile *profile; local
601 profile_umount(const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer) argument
639 struct aa_profile *profile; local
662 build_pivotroot(const struct cred *subj_cred, struct aa_profile *profile, const struct path *new_path, char *new_buffer, const struct path *old_path, char *old_buffer) argument
722 struct aa_profile *profile; local
[all...]
H A Daudit.c120 struct aa_profile *profile = labels_profile(label); local
122 if (profile->ns != root_ns) {
125 profile->ns->base.hname);
127 audit_log_format(ab, " profile=");
128 audit_log_untrustedstring(ab, profile->base.hname);
156 * aa_audit - Log a profile based audit event to the audit subsystem
158 * @profile: profile to check against (NOT NULL)
166 int aa_audit(int type, struct aa_profile *profile, argument
170 AA_BUG(!profile);
[all...]
H A Dcrypto.c61 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start, argument
74 profile->hash = kzalloc(apparmor_hash_size, GFP_KERNEL);
75 if (!profile->hash)
89 error = crypto_shash_final(desc, profile->hash);
96 kfree(profile->hash);
97 profile->hash = NULL;
112 AA_ERROR("failed to setup profile sha256 hashing: %d\n", error);
H A Dnet.c109 int aa_profile_af_perm(struct aa_profile *profile, argument
113 struct aa_ruleset *rules = list_first_entry(&profile->rules,
122 if (profile_unconfined(profile))
133 aa_apply_modes_to_perms(profile, &perms);
135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb);
141 struct aa_profile *profile; local
144 return fn_for_each_confined(label, profile,
145 aa_profile_af_perm(profile, &ad, request, family,
161 struct aa_profile *profile; local
165 error = fn_for_each_confined(label, profile,
221 aa_secmark_perm(struct aa_profile *profile, u32 request, u32 secid, struct apparmor_audit_data *ad) argument
259 struct aa_profile *profile; local
[all...]
H A Dresource.c47 * @profile: profile being enforced (NOT NULL)
57 struct aa_profile *profile, unsigned int resource,
71 return aa_audit(AUDIT_APPARMOR_AUTO, profile, &ad, audit_cb);
89 struct aa_profile *profile, unsigned int resource,
92 struct aa_ruleset *rules = list_first_entry(&profile->rules,
99 return audit_resource(subj_cred, profile, resource, new_rlim->rlim_max,
119 struct aa_profile *profile; local
130 * the same profile or that the task setting the resource of another
136 error = fn_for_each(label, profile,
56 audit_resource(const struct cred *subj_cred, struct aa_profile *profile, unsigned int resource, unsigned long value, struct aa_label *peer, const char *info, int error) argument
88 profile_setrlimit(const struct cred *subj_cred, struct aa_profile *profile, unsigned int resource, struct rlimit *new_rlim) argument
[all...]
H A Dtask.c227 struct aa_profile *profile,
231 struct aa_ruleset *rules = list_first_entry(&profile->rules,
237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request,
239 aa_apply_modes_to_perms(profile, &perms);
240 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb);
266 /* profile uses the old style capability check for ptrace */
293 struct aa_profile *profile; local
297 return xcheck_labels(tracer, tracee, profile,
298 profile_tracer_perm(tracer_cred, profile, tracee,
300 profile_tracee_perm(tracee_cred, profile, trace
226 profile_ptrace_perm(const struct cred *cred, struct aa_profile *profile, struct aa_label *peer, u32 request, struct apparmor_audit_data *ad) argument
316 aa_profile_ns_perm(struct aa_profile *profile, struct apparmor_audit_data *ad, u32 request) argument
[all...]
H A Dfile.c81 * @profile: the profile being enforced (NOT NULL)
95 struct aa_profile *profile, struct aa_perms *perms,
116 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL))
135 AUDIT_MODE(profile) != AUDIT_NOQUIET &&
136 AUDIT_MODE(profile) != AUDIT_ALL)
144 return aa_audit(type, profile, &ad, file_audit_cb);
165 struct aa_profile *profile; local
172 fn_for_each_confined(label, profile,
174 profile,
94 aa_audit_file(const struct cred *subj_cred, struct aa_profile *profile, struct aa_perms *perms, const char *op, u32 request, const char *name, const char *target, struct aa_label *tlabel, kuid_t ouid, const char *info, int error) argument
228 __aa_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const char *name, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument
249 profile_path_perm(const char *op, const struct cred *subj_cred, struct aa_profile *profile, const struct path *path, char *buffer, u32 request, struct path_cond *cond, int flags, struct aa_perms *perms) argument
288 struct aa_profile *profile; local
326 profile_path_link(const struct cred *subj_cred, struct aa_profile *profile, const struct path *link, char *buffer, const struct path *target, char *buffer2, struct path_cond *cond) argument
444 struct aa_profile *profile; local
489 struct aa_profile *profile; local
[all...]
/linux-master/include/linux/
H A Dblk-crypto-profile.h19 * encryption. All functions may sleep, are serialized by profile->lock, and
20 * are never called while profile->dev (if set) is runtime-suspended.
37 int (*keyslot_program)(struct blk_crypto_profile *profile,
57 int (*keyslot_evict)(struct blk_crypto_profile *profile,
63 * struct blk_crypto_profile - inline encryption profile for a device
133 int blk_crypto_profile_init(struct blk_crypto_profile *profile,
137 struct blk_crypto_profile *profile,
142 void blk_crypto_reprogram_all_keys(struct blk_crypto_profile *profile);
144 void blk_crypto_profile_destroy(struct blk_crypto_profile *profile);
H A Dplatform_profile.h3 * Platform profile sysfs interface
32 enum platform_profile_option *profile);
34 enum platform_profile_option profile);
/linux-master/security/apparmor/include/
H A Dcrypto.h18 int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
25 static inline int aa_calc_profile_hash(struct aa_profile *profile, u32 version, argument
H A Ddomain.h25 struct aa_label *x_table_lookup(struct aa_profile *profile, u32 xindex,
/linux-master/tools/testing/selftests/drivers/net/mlxsw/spectrum/
H A Dresource_scale.sh43 for profile in $KVD_PROFILES; do
45 devlink_sp_resource_kvd_profile_set $profile
47 log_test "'$current_test' [$profile] setting"
55 log_test_skip "'$current_test' [$profile] should_fail=$should_fail test"
65 log_test "'$current_test' [$profile] $target"
72 log_test "'$current_test' [$profile] $target traffic test"
76 log_test "'$current_test' [$profile] overflow $target"
/linux-master/drivers/media/dvb-frontends/cxd2880/
H A Dcxd2880_tnrdmd_dvbt.h19 enum cxd2880_dvbt_profile profile; member in struct:cxd2880_dvbt_tune_param
/linux-master/kernel/time/
H A Dtick-legacy.c8 #include <linux/profile.h>
/linux-master/drivers/scsi/
H A Dsd_dif.c52 bi.profile = &t10_pi_type3_ip;
54 bi.profile = &t10_pi_type1_ip;
59 bi.profile = &t10_pi_type3_crc;
61 bi.profile = &t10_pi_type1_crc;
79 bi.profile->name, bi.tag_size);
/linux-master/sound/soc/sof/
H A Dfw-file-profile.c15 struct sof_loadable_file_profile *profile,
24 fw_filename = kasprintf(GFP_KERNEL, "%s/%s", profile->fw_path,
25 profile->fw_name);
53 } else if (fw_ipc_type != profile->ipc_type) {
56 fw_filename, fw_ipc_type, profile->ipc_type);
67 struct sof_loadable_file_profile *profile)
73 if (!profile->tplg_path || !profile->tplg_name)
76 tplg_filename = kasprintf(GFP_KERNEL, "%s/%s", profile->tplg_path,
77 profile
14 sof_test_firmware_file(struct device *dev, struct sof_loadable_file_profile *profile, enum sof_ipc_type *ipc_type_to_adjust) argument
66 sof_test_topology_file(struct device *dev, struct sof_loadable_file_profile *profile) argument
265 sof_print_profile_info(struct snd_sof_dev *sdev, enum sof_ipc_type ipc_type, struct sof_loadable_file_profile *profile) argument
[all...]
/linux-master/drivers/mmc/host/
H A Dcqhci-crypto.c9 #include <linux/blk-crypto-profile.h>
26 cqhci_host_from_crypto_profile(struct blk_crypto_profile *profile) argument
29 container_of(profile, struct mmc_host, crypto_profile);
61 static int cqhci_crypto_keyslot_program(struct blk_crypto_profile *profile, argument
66 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile);
119 static int cqhci_crypto_keyslot_evict(struct blk_crypto_profile *profile, argument
123 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile);
172 struct blk_crypto_profile *profile = &mmc->crypto_profile; local
203 err = devm_blk_crypto_profile_init(dev, profile, num_keyslots);
207 profile
[all...]

Completed in 378 milliseconds

1234567891011>>