/linux-6.12.1/block/ |
D | blk-crypto-profile.c | 14 * construct a crypto profile, then associate it with the disk's request_queue. 27 #include <linux/blk-crypto-profile.h> 42 struct blk_crypto_profile *profile; member 45 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) in blk_crypto_hw_enter() argument 48 * Calling into the driver requires profile->lock held and the device in blk_crypto_hw_enter() 50 * and release profile->lock via blk_crypto_reprogram_all_keys(). in blk_crypto_hw_enter() 52 if (profile->dev) in blk_crypto_hw_enter() 53 pm_runtime_get_sync(profile->dev); in blk_crypto_hw_enter() 54 down_write(&profile->lock); in blk_crypto_hw_enter() 57 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) in blk_crypto_hw_exit() argument [all …]
|
D | blk-crypto-sysfs.c | 9 #include <linux/blk-crypto-profile.h> 15 struct blk_crypto_profile *profile; member 20 ssize_t (*show)(struct blk_crypto_profile *profile, 26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; in kobj_to_crypto_profile() 34 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, in max_dun_bits_show() argument 37 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); in max_dun_bits_show() 40 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, in num_keyslots_show() argument 43 return sysfs_emit(page, "%u\n", profile->num_slots); in num_keyslots_show() 72 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); in blk_crypto_mode_is_visible() local 76 if (profile->modes_supported[mode_num]) in blk_crypto_mode_is_visible() [all …]
|
/linux-6.12.1/drivers/infiniband/hw/mthca/ |
D | mthca_profile.c | 77 struct mthca_resource *profile; in mthca_make_profile() local 80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); in mthca_make_profile() 81 if (!profile) in mthca_make_profile() 84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; in mthca_make_profile() 85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; in mthca_make_profile() 86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; in mthca_make_profile() 87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; in mthca_make_profile() 88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; in mthca_make_profile() 89 profile[MTHCA_RES_EEEC].size = dev_lim->eeec_entry_sz; in mthca_make_profile() 90 profile[MTHCA_RES_EQ].size = dev_lim->eqc_entry_sz; in mthca_make_profile() [all …]
|
/linux-6.12.1/security/apparmor/ |
D | policy.c | 11 * task is confined by. Every task in the system has a profile attached 15 * Each profile exists in a profile namespace which is a container of 16 * visible profiles. Each namespace contains a special "unconfined" profile, 19 * Namespace and profile names can be written together in either 21 * :namespace:profile - used by kernel interfaces for easy detection 22 * namespace://profile - used by policy 24 * Profile names can not start with : or @ or ^ and may not contain \0 26 * Reserved profile names 27 * unconfined - special automatically generated unconfined profile 28 * inherit - special name to indicate profile inheritance [all …]
|
D | domain.c | 33 * may_change_ptraced_domain - check if can change profile on ptraced task 35 * @to_label: profile to change to (NOT NULL) 82 /* match a profile and its associated ns component if needed 84 * If a subns profile is not to be matched should be prescreened with 87 static inline aa_state_t match_component(struct aa_profile *profile, in match_component() argument 91 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_component() 97 if (profile->ns == tp->ns) in match_component() 100 /* try matching with namespace name and then profile */ in match_component() 101 ns_name = aa_ns_name(profile->ns, tp->ns, true); in match_component() 110 * @profile: profile to find perms for [all …]
|
D | capability.c | 33 struct aa_profile *profile; member 55 * @profile: profile being tested for confinement (NOT NULL) 64 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, in audit_caps() argument 67 struct aa_ruleset *rules = list_first_entry(&profile->rules, in audit_caps() 76 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && in audit_caps() 80 } else if (KILL_MODE(profile) || in audit_caps() 84 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_caps() 85 AUDIT_MODE(profile) != AUDIT_ALL) { in audit_caps() 92 if (profile == ent->profile && cap_raised(ent->caps, cap)) { in audit_caps() 94 if (COMPLAIN_MODE(profile)) in audit_caps() [all …]
|
D | mount.c | 119 * @profile: the profile being enforced (NOT NULL) 135 struct aa_profile *profile, const char *op, in audit_mount() argument 147 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in audit_mount() 165 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_mount() 166 AUDIT_MODE(profile) != AUDIT_ALL) in audit_mount() 184 return aa_audit(audit_type, profile, &ad, audit_cb); in audit_mount() 281 static int path_flags(struct aa_profile *profile, const struct path *path) in path_flags() argument 283 AA_BUG(!profile); in path_flags() 286 return profile->path_flags | in path_flags() 293 * @profile: the confining profile [all …]
|
D | policy_unpack.c | 53 * @new: profile if it has been allocated (MAYBE NULL) 54 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL) 55 * @name: name of the profile being manipulated (MAYBE NULL) 66 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local 78 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &ad, audit_cb); in audit_iface() 453 * unpack_trans_table - unpack a profile transition table 534 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument 544 profile->attach.xattr_count = size; in unpack_xattrs() 545 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 546 if (!profile->attach.xattrs) in unpack_xattrs() [all …]
|
D | file.c | 81 * @profile: the profile being enforced (NOT NULL) 95 struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument 116 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in aa_audit_file() 135 AUDIT_MODE(profile) != AUDIT_NOQUIET && in aa_audit_file() 136 AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit_file() 144 return aa_audit(type, profile, &ad, file_audit_cb); in aa_audit_file() 152 struct aa_profile *profile; in path_name() local 159 fn_for_each_confined(label, profile, in path_name() 161 profile, &nullperms, op, request, *name, in path_name() 216 struct aa_profile *profile, const char *name, in __aa_path_perm() argument [all …]
|
D | apparmorfs.c | 102 * mangle_name - mangle a profile name to std profile layout form 103 * @name: profile name to mangle (NOT NULL) 612 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, in profile_query_cb() argument 615 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_query_cb() 620 if (profile_unconfined(profile)) in profile_query_cb() 640 aa_apply_modes_to_perms(profile, &tmp); in profile_query_cb() 670 struct aa_profile *profile; in query_data() local 705 label_for_each_confined(i, label, profile) { in query_data() 706 if (!profile->data) in query_data() 709 data = rhashtable_lookup_fast(profile->data, &key, in query_data() [all …]
|
D | ipc.c | 79 struct aa_profile *profile, in profile_signal_perm() argument 83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() 88 if (profile_unconfined(profile) || in profile_signal_perm() 89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm() 94 /* TODO: secondary cache check <profile, profile, perm> */ in profile_signal_perm() 98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm() 99 aa_apply_modes_to_perms(profile, &perms); in profile_signal_perm() 100 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb); in profile_signal_perm() 107 struct aa_profile *profile; in aa_may_signal() local 112 return xcheck_labels(sender, target, profile, in aa_may_signal() [all …]
|
D | net.c | 109 int aa_profile_af_perm(struct aa_profile *profile, in aa_profile_af_perm() argument 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() 122 if (profile_unconfined(profile)) in aa_profile_af_perm() 133 aa_apply_modes_to_perms(profile, &perms); in aa_profile_af_perm() 135 return aa_check_perms(profile, &perms, request, ad, audit_net_cb); in aa_profile_af_perm() 141 struct aa_profile *profile; in aa_af_perm() local 144 return fn_for_each_confined(label, profile, in aa_af_perm() 145 aa_profile_af_perm(profile, &ad, request, family, in aa_af_perm() 161 struct aa_profile *profile; in aa_label_sk_perm() local 165 error = fn_for_each_confined(label, profile, in aa_label_sk_perm() [all …]
|
D | lib.c | 49 * aa_split_fqname - split a fqname into a profile and namespace name 50 * @fqname: a full qualified name in namespace profile format (NOT NULL) 53 * Returns: profile name or NULL if one is not specified 55 * Split a namespace name from a profile name (see policy.c for naming 77 /* a ns name without a following profile is allowed */ in aa_split_fqname() 130 /* a ns name without a following profile is allowed */ in aa_splitn_fqname() 142 * aa_info_message - log a none profile related status message 306 * aa_apply_modes_to_perms - apply namespace and profile flags to perms 307 * @profile: that perms where computed from 310 * TODO: split into profile and ns based flags for when accumulating perms [all …]
|
/linux-6.12.1/drivers/net/ethernet/mellanox/mlx4/ |
D | profile.c | 84 struct mlx4_resource *profile; in mlx4_make_profile() local 88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); in mlx4_make_profile() 89 if (!profile) in mlx4_make_profile() 111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; in mlx4_make_profile() 112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; in mlx4_make_profile() 113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; in mlx4_make_profile() 114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; in mlx4_make_profile() 115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; in mlx4_make_profile() 116 profile[MLX4_RES_CQ].size = dev_cap->cqc_entry_sz; in mlx4_make_profile() 117 profile[MLX4_RES_EQ].size = dev_cap->eqc_entry_sz; in mlx4_make_profile() [all …]
|
/linux-6.12.1/drivers/net/ethernet/intel/i40e/ |
D | i40e_ddp.c | 28 * @a: new profile info 29 * @b: old profile info 43 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already 45 * @pinfo: DDP profile information structure 47 * checks if DDP profile loaded already. 48 * Returns >0 if the profile exists. 49 * Returns 0 if the profile is absent. 75 * @new: new profile info 76 * @old: old profile info 100 * @pinfo: DDP profile information structure [all …]
|
/linux-6.12.1/security/apparmor/include/ |
D | policy.h | 72 APPARMOR_UNCONFINED, /* profile set to unconfined */ 157 * @caps: capabilities for the profile 158 * @rlimits: rlimits for the profile 195 * @base - base components of the profile (name, refcount, lists, lock ...) 196 * @label - label this profile is an extension of 197 * @parent: parent of profile 198 * @ns: namespace the profile is in 199 * @rename: optional profile name that this profile renamed 201 * @audit: the auditing mode of the profile 202 * @mode: the enforcement mode of the profile [all …]
|
/linux-6.12.1/Documentation/ABI/obsolete/ |
D | sysfs-driver-hid-roccat-ryos | 5 profile will be read next. The data has to be 3 bytes long. 9 …config num>.<interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/ryos/roccatryos<minor>/profile 13 press of a button. profile holds index of actual profile. 14 This value is persistent, so its value determines the profile 16 When written, the device activates the set profile immediately. 25 a specific profile. Profile index is included in written data. 28 which profile to read. 35 function keys for a specific profile. Profile index is included 38 which profile to read. 45 keys for a specific profile. Profile index is included in [all …]
|
D | sysfs-driver-hid-roccat-isku | 6 profile. This value is persistent, so its equivalent to the 7 profile that's active when the device is powered on next time. 8 When written, this file sets the number of the startup profile 9 and the device activates this profile immediately. 25 Profile number for which this settings occur is included in 28 which profile to read. 35 capslock key for a specific profile. Profile number is included 38 which profile to read. 45 easyzone keys for a specific profile. Profile number is included 48 which profile to read. [all …]
|
D | sysfs-driver-hid-roccat-savu | 5 press of a button. A profile is split into general settings and 8 respective profile buttons to the mouse. The data has to be 11 Which profile to write is determined by the profile number 14 which profile to read. 21 profile will be read next. The data has to be 3 bytes long. 29 press of a button. A profile is split into general settings and 30 button settings. A profile holds information like resolution, 32 When written, this file lets one write the respective profile 35 Which profile to write is determined by the profile number 52 keystrokes for a specific button for a specific profile. [all …]
|
D | sysfs-driver-hid-roccat-koneplus | 6 profile. This value is persistent, so its equivalent to the 7 profile that's active when the mouse is powered on next time. 8 When written, this file sets the number of the startup profile 9 and the mouse activates this profile immediately. 17 profile. This value is persistent, so its equivalent to the 18 profile that's active when the mouse is powered on next time. 19 When written, this file sets the number of the startup profile 20 and the mouse activates this profile immediately. 50 button for a specific profile. Button and profile numbers are 59 press of a button. A profile is split in settings and buttons. [all …]
|
D | sysfs-driver-hid-roccat-kovaplus | 16 profile. 17 When written, the mouse activates this profile immediately. 18 The profile that's active when powered down is the same that's 66 press of a button. A profile is split in settings and buttons. 68 When written, this file lets one write the respective profile 71 Which profile to write is determined by the profile number 74 which profile to read. 77 …e num>/<hid-bus>:<vendor-id>:<product-id>.<num>/kovaplus/roccatkovaplus<minor>/profile[1-5]_buttons 81 press of a button. A profile is split in settings and buttons. 83 When read, these files return the respective profile buttons. [all …]
|
D | sysfs-driver-hid-roccat-pyra | 25 Description: When read, this file returns the number of the actual profile in 55 press of a button. A profile is split in settings and buttons. 57 When written, this file lets one write the respective profile 60 Which profile to write is determined by the profile number 63 which profile to read. 66 …interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/pyra/roccatpyra<minor>/profile[1-5]_buttons 70 press of a button. A profile is split in settings and buttons. 72 When read, these files return the respective profile buttons. 75 Write control to select profile and read profile_buttons instead. 82 press of a button. A profile is split in settings and buttons. [all …]
|
/linux-6.12.1/drivers/platform/surface/ |
D | surface_platform_profile.c | 3 * Surface Platform Profile / Performance Mode driver for Surface System 17 // Enum for the platform performance profile sent to the TMP module. 25 // Enum for the fan profile sent to the FAN module. This fan profile is 27 // not a typo, they differ from the performance profile indices. 36 __le32 profile; member 73 *p = le32_to_cpu(info.profile); in ssam_tmp_profile_get() 86 const u8 profile = p; in ssam_fan_profile_set() local 88 return ssam_retry(__ssam_fan_profile_set, sdev->ctrl, &profile); in ssam_fan_profile_set() 107 dev_err(&sdev->dev, "invalid performance profile: %d", p); in convert_ssam_tmp_to_profile() 130 WARN(true, "unsupported platform profile"); in convert_profile_to_ssam_tmp() [all …]
|
/linux-6.12.1/drivers/gpu/drm/amd/pm/powerplay/hwmgr/ |
D | ppatomfwctrl.c | 282 struct atom_asic_profiling_info_v4_1 *profile; in pp_atomfwctrl_get_avfs_information() local 286 profile = (struct atom_asic_profiling_info_v4_1 *) in pp_atomfwctrl_get_avfs_information() 290 if (!profile) in pp_atomfwctrl_get_avfs_information() 293 format_revision = ((struct atom_common_table_header *)profile)->format_revision; in pp_atomfwctrl_get_avfs_information() 294 content_revision = ((struct atom_common_table_header *)profile)->content_revision; in pp_atomfwctrl_get_avfs_information() 297 param->ulMaxVddc = le32_to_cpu(profile->maxvddc); in pp_atomfwctrl_get_avfs_information() 298 param->ulMinVddc = le32_to_cpu(profile->minvddc); in pp_atomfwctrl_get_avfs_information() 300 le32_to_cpu(profile->avfs_meannsigma_acontant0); in pp_atomfwctrl_get_avfs_information() 302 le32_to_cpu(profile->avfs_meannsigma_acontant1); in pp_atomfwctrl_get_avfs_information() 304 le32_to_cpu(profile->avfs_meannsigma_acontant2); in pp_atomfwctrl_get_avfs_information() [all …]
|
/linux-6.12.1/drivers/acpi/ |
D | platform_profile.c | 3 /* Platform profile sysfs interface */ 56 enum platform_profile_option profile = PLATFORM_PROFILE_BALANCED; in platform_profile_show() local 68 err = cur_profile->profile_get(cur_profile, &profile); in platform_profile_show() 73 /* Check that profile is valid index */ in platform_profile_show() 74 if (WARN_ON((profile < 0) || (profile >= ARRAY_SIZE(profile_names)))) in platform_profile_show() 77 return sysfs_emit(buf, "%s\n", profile_names[profile]); in platform_profile_show() 95 /* Scan for a matching profile */ in platform_profile_store() 102 /* Check that platform supports this profile choice */ in platform_profile_store() 141 enum platform_profile_option profile; in platform_profile_cycle() local 154 err = cur_profile->profile_get(cur_profile, &profile); in platform_profile_cycle() [all …]
|