/linux/block/ |
H A D | blk-crypto-profile.c | 14 * construct a crypto profile, then associate it with the disk's request_queue. 27 #include <linux/blk-crypto-profile.h> 42 struct blk_crypto_profile *profile; member 45 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) in blk_crypto_hw_enter() argument 48 * Calling into the driver requires profile->lock held and the device in blk_crypto_hw_enter() 50 * and release profile->lock via blk_crypto_reprogram_all_keys(). in blk_crypto_hw_enter() 52 if (profile->dev) in blk_crypto_hw_enter() 53 pm_runtime_get_sync(profile->dev); in blk_crypto_hw_enter() 54 down_write(&profile->lock); in blk_crypto_hw_enter() 57 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) in blk_crypto_hw_exit() argument 74 blk_crypto_profile_init(struct blk_crypto_profile * profile,unsigned int num_slots) blk_crypto_profile_init() argument 139 blk_crypto_profile_destroy_callback(void * profile) blk_crypto_profile_destroy_callback() argument 156 devm_blk_crypto_profile_init(struct device * dev,struct blk_crypto_profile * profile,unsigned int num_slots) devm_blk_crypto_profile_init() argument 171 blk_crypto_hash_bucket_for_key(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) blk_crypto_hash_bucket_for_key() argument 181 struct blk_crypto_profile *profile = slot->profile; blk_crypto_remove_slot_from_lru_list() local 190 blk_crypto_find_keyslot(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) blk_crypto_find_keyslot() argument 205 blk_crypto_find_and_grab_keyslot(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) blk_crypto_find_and_grab_keyslot() argument 248 blk_crypto_get_keyslot(struct blk_crypto_profile * profile,const struct blk_crypto_key * key,struct blk_crypto_keyslot ** slot_ptr) blk_crypto_get_keyslot() argument 327 struct blk_crypto_profile *profile = slot->profile; blk_crypto_put_keyslot() local 346 __blk_crypto_cfg_supported(struct blk_crypto_profile * profile,const struct blk_crypto_config * cfg) __blk_crypto_cfg_supported() argument 365 __blk_crypto_evict_key(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) __blk_crypto_evict_key() argument 420 blk_crypto_reprogram_all_keys(struct blk_crypto_profile * profile) blk_crypto_reprogram_all_keys() argument 443 blk_crypto_profile_destroy(struct blk_crypto_profile * profile) blk_crypto_profile_destroy() argument 455 blk_crypto_register(struct blk_crypto_profile * profile,struct request_queue * q) blk_crypto_register() argument 488 struct blk_crypto_profile *profile = blk_crypto_derive_sw_secret() local 506 blk_crypto_import_key(struct blk_crypto_profile * profile,const u8 * raw_key,size_t raw_key_size,u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]) blk_crypto_import_key() argument 526 blk_crypto_generate_key(struct blk_crypto_profile * profile,u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]) blk_crypto_generate_key() argument 544 blk_crypto_prepare_key(struct blk_crypto_profile * profile,const u8 * lt_key,size_t lt_key_size,u8 eph_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]) blk_crypto_prepare_key() argument [all...] |
H A D | blk-crypto-sysfs.c | 9 #include <linux/blk-crypto-profile.h> 15 struct blk_crypto_profile *profile; member 20 ssize_t (*show)(struct blk_crypto_profile *profile, 26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; in kobj_to_crypto_profile() 34 static ssize_t hw_wrapped_keys_show(struct blk_crypto_profile *profile, in hw_wrapped_keys_show() argument 41 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, in max_dun_bits_show() argument 44 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); in max_dun_bits_show() 47 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, in num_keyslots_show() argument 50 return sysfs_emit(page, "%u\n", profile->num_slots); in num_keyslots_show() 53 static ssize_t raw_keys_show(struct blk_crypto_profile *profile, in raw_keys_show() argument 71 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); blk_crypto_is_visible() local 107 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); blk_crypto_mode_is_visible() local 116 blk_crypto_mode_show(struct blk_crypto_profile * profile,struct blk_crypto_attr * attr,char * page) blk_crypto_mode_show() argument 139 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); blk_crypto_attr_show() local [all...] |
/linux/drivers/infiniband/hw/mthca/ |
H A D | mthca_profile.c | 77 struct mthca_resource *profile; in mthca_make_profile() local 80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); in mthca_make_profile() 81 if (!profile) in mthca_make_profile() 84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; in mthca_make_profile() 85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; in mthca_make_profile() 86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; in mthca_make_profile() 87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; in mthca_make_profile() 88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; in mthca_make_profile() 89 profile[MTHCA_RES_EEE in mthca_make_profile() [all...] |
/linux/drivers/net/ethernet/mellanox/mlx4/ |
H A D | profile.c | 84 struct mlx4_resource *profile; in mlx4_make_profile() local 88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); in mlx4_make_profile() 89 if (!profile) in mlx4_make_profile() 111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; in mlx4_make_profile() 112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; in mlx4_make_profile() 113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; in mlx4_make_profile() 114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; in mlx4_make_profile() 115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; in mlx4_make_profile() 116 profile[MLX4_RES_C in mlx4_make_profile() [all...] |
/linux/security/apparmor/ |
H A D | policy.c | 11 * task is confined by. Every task in the system has a profile attached 15 * Each profile exists in a profile namespace which is a container of 16 * visible profiles. Each namespace contains a special "unconfined" profile, 19 * Namespace and profile names can be written together in either 21 * :namespace:profile - used by kernel interfaces for easy detection 22 * namespace://profile - used by policy 26 * Reserved profile names 27 * unconfined - special automatically generated unconfined profile 28 * inherit - special name to indicate profile inheritanc 146 __add_profile(struct list_head * list,struct aa_profile * profile) __add_profile() argument 175 __list_remove_profile(struct aa_profile * profile) __list_remove_profile() argument 191 __remove_profile(struct aa_profile * profile) __remove_profile() argument 213 struct aa_profile *profile, *tmp; __aa_profile_list_release() local 279 aa_free_profile(struct aa_profile * profile) aa_free_profile() argument 332 struct aa_profile *profile; aa_alloc_profile() local 376 ANY_RULE_MEDIATES(struct aa_profile * profile,unsigned char class) ANY_RULE_MEDIATES() argument 392 aa_compute_profile_mediates(struct aa_profile * profile) aa_compute_profile_mediates() argument 452 struct aa_profile *profile; aa_find_child() local 481 struct aa_profile *profile = NULL; __lookup_parent() local 516 struct aa_profile *parent, *profile = NULL; __create_missing_ancestors() local 564 struct aa_profile *profile = NULL; __lookupn_profile() local 601 struct aa_profile *profile; aa_lookupn_profile() local 620 struct aa_profile *profile; aa_fqlookupn_profile() local 649 struct aa_profile *profile; aa_alloc_null() local 697 struct aa_profile *p, *profile; aa_new_learning_profile() local 763 replacement_allowed(struct aa_profile * profile,int noreplace,const char ** info) replacement_allowed() argument 939 __list_lookup_parent(struct list_head * lh,struct aa_profile * profile) __list_lookup_parent() argument 1354 struct aa_profile *profile = NULL; aa_remove_profiles() local [all...] |
H A D | domain.c | 31 static const char * const CONFLICTING_ATTACH_STR = "conflicting profile attachments"; 33 "conflicting profile attachments - ix fallback"; 35 "conflicting profile attachments - ux fallback"; 38 * may_change_ptraced_domain - check if can change profile on ptraced task 40 * @to_label: profile to change to (NOT NULL) 87 /* match a profile and its associated ns component if needed 89 * If a subns profile is not to be matched should be prescreened with 92 static inline aa_state_t match_component(struct aa_profile *profile, in match_component() argument 96 struct aa_ruleset *rules = profile->label.rules[0]; in match_component() 101 if (profile in match_component() 128 label_compound_match(struct aa_profile * profile,struct aa_label * label,bool stack,aa_state_t state,bool subns,u32 request,struct aa_perms * perms) label_compound_match() argument 190 label_components_match(struct aa_profile * profile,struct aa_label * label,bool stack,aa_state_t start,bool subns,u32 request,struct aa_perms * perms) label_components_match() argument 254 label_match(struct aa_profile * profile,struct aa_label * label,bool stack,aa_state_t state,bool subns,u32 request,struct aa_perms * perms) label_match() argument 288 change_profile_perms(struct aa_profile * profile,struct aa_label * target,bool stack,u32 request,aa_state_t start,struct aa_perms * perms) change_profile_perms() argument 312 aa_xattrs_match(const struct linux_binprm * bprm,struct aa_profile * profile,aa_state_t state) aa_xattrs_match() argument 395 struct aa_profile *profile, *candidate = NULL; find_attach() local 517 x_table_lookup(struct aa_profile * profile,u32 xindex,const char ** name) x_table_lookup() argument 568 x_to_label(struct aa_profile * profile,const struct linux_binprm * bprm,const char * name,u32 xindex,const char ** lookupname,const char ** info) x_to_label() argument 660 profile_transition(const struct cred * subj_cred,struct aa_profile * profile,const struct linux_binprm * bprm,char * buffer,struct path_cond * cond,bool * secure_exec) profile_transition() argument 793 profile_onexec(const struct cred * subj_cred,struct aa_profile * profile,struct aa_label * onexec,bool stack,const struct linux_binprm * bprm,char * buffer,struct path_cond * cond,bool * secure_exec) profile_onexec() argument 874 struct aa_profile *profile; handle_onexec() local 922 struct aa_profile *profile; apparmor_bprm_creds_for_exec() local 1056 build_change_hat(const struct cred * subj_cred,struct aa_profile * profile,const char * name,bool sibling) build_change_hat() argument 1109 struct aa_profile *profile, *root, *hat = NULL; change_hat() local 1226 struct aa_profile *profile; aa_change_hat() local 1352 change_profile_perms_wrapper(const char * op,const char * name,const struct cred * subj_cred,struct aa_profile * profile,struct aa_label * target,bool stack,u32 request,struct aa_perms * perms) change_profile_perms_wrapper() argument 1391 struct aa_profile *profile; aa_change_profile() local [all...] |
H A D | af_unix.c | 172 static aa_state_t match_label(struct aa_profile *profile, in match_label() argument 178 AA_BUG(!profile); in match_label() 191 return aa_do_perms(profile, rule->policy, state, request, p, ad); in match_label() 197 * v6 - semantics are handled by mapping in profile load 201 static int profile_create_perm(struct aa_profile *profile, int family, in profile_create_perm() argument 205 struct aa_ruleset *rules = profile->label.rules[0]; in profile_create_perm() 208 AA_BUG(!profile); in profile_create_perm() 209 AA_BUG(profile_unconfined(profile)); in profile_create_perm() 217 return aa_do_perms(profile, rules->policy, state, AA_MAY_CREATE, in profile_create_perm() 221 return aa_profile_af_perm(profile, a in profile_create_perm() 225 profile_sk_perm(struct aa_profile * profile,struct apparmor_audit_data * ad,u32 request,struct sock * sk,struct path * path) profile_sk_perm() argument 254 profile_bind_perm(struct aa_profile * profile,struct sock * sk,struct apparmor_audit_data * ad) profile_bind_perm() argument 285 profile_listen_perm(struct aa_profile * profile,struct sock * sk,int backlog,struct apparmor_audit_data * ad) profile_listen_perm() argument 321 profile_accept_perm(struct aa_profile * profile,struct sock * sk,struct apparmor_audit_data * ad) profile_accept_perm() argument 351 profile_opt_perm(struct aa_profile * profile,u32 request,struct sock * sk,int optname,struct apparmor_audit_data * ad) profile_opt_perm() argument 388 profile_peer_perm(struct aa_profile * profile,u32 request,struct sock * sk,struct path * path,struct sockaddr_un * peer_addr,int peer_addrlen,struct path * peer_path,struct aa_label * peer_label,struct apparmor_audit_data * ad) profile_peer_perm() argument 433 struct aa_profile *profile; aa_unix_create_perm() local 451 struct aa_profile *profile; aa_unix_label_sk_perm() local 490 struct aa_profile *profile; aa_unix_bind_perm() local 529 struct aa_profile *profile; aa_unix_listen_perm() local 550 struct aa_profile *profile; aa_unix_accept_perm() local 583 struct aa_profile *profile; aa_unix_opt_perm() local 606 struct aa_profile *profile; unix_peer_perm() local [all...] |
H A D | capability.c | 58 * @profile: profile being tested for confinement (NOT NULL) 67 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, in audit_caps() argument 72 struct aa_ruleset *rules = profile->label.rules[0]; in audit_caps() 80 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && in audit_caps() 84 } else if (KILL_MODE(profile) || in audit_caps() 88 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_caps() 89 AUDIT_MODE(profile) != AUDIT_ALL) { in audit_caps() 99 if (COMPLAIN_MODE(profile)) in audit_caps() 109 return aa_audit(type, profile, a in audit_caps() 121 profile_capable(struct aa_profile * profile,int cap,unsigned int opts,struct apparmor_audit_data * ad) profile_capable() argument 182 struct aa_profile *profile; aa_capable() local 194 aa_profile_capget(struct aa_profile * profile) aa_profile_capget() argument [all...] |
H A D | file.c | 82 * @profile: the profile being enforced (NOT NULL) 96 struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument 117 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in aa_audit_file() 136 AUDIT_MODE(profile) != AUDIT_NOQUIET && in aa_audit_file() 137 AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit_file() 145 return aa_audit(type, profile, &ad, file_audit_cb); in aa_audit_file() 153 struct aa_profile *profile; in path_name() local 160 fn_for_each_confined(label, profile, in path_name() 162 profile, in path_name() 222 __aa_path_perm(const char * op,const struct cred * subj_cred,struct aa_profile * profile,const char * name,u32 request,struct path_cond * cond,int flags,struct aa_perms * perms) __aa_path_perm() argument 243 profile_path_perm(const char * op,const struct cred * subj_cred,struct aa_profile * profile,const struct path * path,char * buffer,u32 request,struct path_cond * cond,int flags,struct aa_perms * perms) profile_path_perm() argument 281 struct aa_profile *profile; aa_path_perm() local 320 profile_path_link(const struct cred * subj_cred,struct aa_profile * profile,const struct path * link,char * buffer,const struct path * target,char * buffer2,struct path_cond * cond) profile_path_link() argument 438 struct aa_profile *profile; aa_path_link() local 483 struct aa_profile *profile; __file_path_perm() local [all...] |
H A D | audit.c | 120 struct aa_profile *profile = labels_profile(label); in audit_pre() local 122 if (profile->ns != root_ns) { in audit_pre() 125 profile->ns->base.hname); in audit_pre() 127 audit_log_format(ab, " profile="); in audit_pre() 128 audit_log_untrustedstring(ab, profile->base.hname); in audit_pre() 156 * aa_audit - Log a profile based audit event to the audit subsystem 158 * @profile: profile to check against (NOT NULL) 166 int aa_audit(int type, struct aa_profile *profile, in aa_audit() argument 170 AA_BUG(!profile); in aa_audit() [all...] |
H A D | policy_unpack.c | 54 * @new: profile if it has been allocated (MAYBE NULL) 55 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL) 56 * @name: name of the profile being manipulated (MAYBE NULL) 67 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local 79 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &ad, audit_cb); in audit_iface() 454 * unpack_trans_table - unpack a profile transition table 535 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument 545 profile->attach.xattr_count = size; in unpack_xattrs() 546 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs() 547 if (!profile in unpack_xattrs() 847 struct aa_profile *profile = NULL; unpack_profile() local 1287 verify_profile(struct aa_profile * profile) verify_profile() argument 1460 struct aa_profile *profile = NULL; aa_unpack() local [all...] |
H A D | ipc.c | 79 struct aa_profile *profile, in profile_signal_perm() argument 83 struct aa_ruleset *rules = profile->label.rules[0]; in profile_signal_perm() 87 if (profile_unconfined(profile)) in profile_signal_perm() 92 /* TODO: secondary cache check <profile, profile, perm> */ in profile_signal_perm() 97 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm() 98 aa_apply_modes_to_perms(profile, &perms); in profile_signal_perm() 99 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb); in profile_signal_perm() 106 struct aa_profile *profile; in aa_may_signal() local 111 return xcheck_labels(sender, target, profile, in aa_may_signal() [all...] |
H A D | apparmorfs.c | 102 * mangle_name - mangle a profile name to std profile layout form 103 * @name: profile name to mangle (NOT NULL) 612 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, in profile_query_cb() argument 615 struct aa_ruleset *rules = profile->label.rules[0]; in profile_query_cb() 619 if (profile_unconfined(profile)) in profile_query_cb() 648 aa_apply_modes_to_perms(profile, &tmp); in profile_query_cb() 678 struct aa_profile *profile; in query_data() local 713 label_for_each_confined(i, label, profile) { in query_data() 714 if (!profile in query_data() 767 struct aa_profile *profile; query_label() local 1082 struct aa_profile *profile = labels_profile(label); seq_profile_name_show() local 1093 struct aa_profile *profile = labels_profile(label); seq_profile_mode_show() local 1104 struct aa_profile *profile = labels_profile(label); seq_profile_attach_show() local 1120 struct aa_profile *profile = labels_profile(label); seq_profile_hash_show() local 1172 struct aa_profile *profile; seq_ns_nsstacked_show() local 1526 __aafs_profile_rmdir(struct aa_profile * profile) __aafs_profile_rmdir() argument 1575 create_profile_file(struct dentry * dir,const char * name,struct aa_profile * profile,const struct file_operations * fops) create_profile_file() argument 1589 profile_depth(struct aa_profile * profile) profile_depth() argument 1633 struct aa_profile *profile; rawdata_get_link_base() local 1690 __aafs_profile_mkdir(struct aa_profile * profile,struct dentry * parent) __aafs_profile_mkdir() argument 2196 next_profile(struct aa_ns * root,struct aa_profile * profile) next_profile() argument 2217 struct aa_profile *profile = NULL; p_start() local 2245 struct aa_profile *profile = p; p_next() local 2261 struct aa_profile *profile = p; p_stop() local 2281 struct aa_profile *profile = (struct aa_profile *)p; seq_show_profile() local [all...] |
H A D | task.c | 227 struct aa_profile *profile, in profile_ptrace_perm() argument 231 struct aa_ruleset *rules = profile->label.rules[0]; in profile_ptrace_perm() 236 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm() 238 aa_apply_modes_to_perms(profile, &perms); in profile_ptrace_perm() 239 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb); in profile_ptrace_perm() 265 /* profile uses the old style capability check for ptrace */ in profile_tracer_perm() 292 struct aa_profile *profile; in aa_may_ptrace() local 296 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace() 297 profile_tracer_perm(tracer_cred, profile, tracee, in aa_may_ptrace() 299 profile_tracee_perm(tracee_cred, profile, trace in aa_may_ptrace() 315 aa_profile_ns_perm(struct aa_profile * profile,struct apparmor_audit_data * ad,u32 request) aa_profile_ns_perm() argument [all...] |
H A D | resource.c | 47 * @profile: profile being enforced (NOT NULL) 57 struct aa_profile *profile, unsigned int resource, in audit_resource() argument 71 return aa_audit(AUDIT_APPARMOR_AUTO, profile, &ad, audit_cb); in audit_resource() 89 struct aa_profile *profile, unsigned int resource, in profile_setrlimit() argument 92 struct aa_ruleset *rules = profile->label.rules[0]; in profile_setrlimit() 98 return audit_resource(subj_cred, profile, resource, new_rlim->rlim_max, in profile_setrlimit() 118 struct aa_profile *profile; in aa_task_setrlimit() local 129 * the same profile or that the task setting the resource of another in aa_task_setrlimit() 135 error = fn_for_each(label, profile, in aa_task_setrlimit() [all...] |
/linux/include/linux/ |
H A D | blk-crypto-profile.h | 19 * encryption. All functions may sleep, are serialized by profile->lock, and 20 * are never called while profile->dev (if set) is runtime-suspended. 37 int (*keyslot_program)(struct blk_crypto_profile *profile, 57 int (*keyslot_evict)(struct blk_crypto_profile *profile, 71 int (*derive_sw_secret)(struct blk_crypto_profile *profile, 85 int (*import_key)(struct blk_crypto_profile *profile, 99 int (*generate_key)(struct blk_crypto_profile *profile, 113 int (*prepare_key)(struct blk_crypto_profile *profile, 119 * struct blk_crypto_profile - inline encryption profile for a device 195 int blk_crypto_profile_init(struct blk_crypto_profile *profile, [all...] |
/linux/Documentation/userspace-api/ |
H A D | sysfs-platform_profile.rst | 16 API for selecting the platform profile of these automatic mechanisms. 18 Note that this API is only for selecting the platform profile, it is 23 Specifically, when selecting a high performance profile the actual achieved 31 profile will adjust (power consumption, heat generation, etc) this API 34 a fixed set of profile names. Drivers *must* map their internal profile 37 If there is no good match when mapping then a new profile name may be 38 added. Drivers which wish to introduce new profile names must: 40 1. Explain why the existing profile names cannot be used. 41 2. Add the new profile nam [all...] |
/linux/Documentation/ABI/testing/ |
H A D | sysfs-class-platform-profile | 1 What: /sys/class/platform-profile/platform-profile-X/name 8 What: /sys/class/platform-profile/platform-profile-X/choices 14 Drivers must use the following standard profile-names: 26 custom Driver defined custom profile 31 What: /sys/class/platform-profile/platform-profile-X/profile 34 Description: Reading this file gives the current selected profile fo [all...] |
/linux/drivers/mmc/host/ |
H A D | cqhci-crypto.c | 9 #include <linux/blk-crypto-profile.h> 26 cqhci_host_from_crypto_profile(struct blk_crypto_profile *profile) in cqhci_host_from_crypto_profile() argument 28 return mmc_from_crypto_profile(profile)->cqe_private; in cqhci_host_from_crypto_profile() 54 static int cqhci_crypto_keyslot_program(struct blk_crypto_profile *profile, in cqhci_crypto_keyslot_program() argument 59 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); in cqhci_crypto_keyslot_program() 112 static int cqhci_crypto_keyslot_evict(struct blk_crypto_profile *profile, in cqhci_crypto_keyslot_evict() argument 116 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); in cqhci_crypto_keyslot_evict() 165 struct blk_crypto_profile *profile = &mmc->crypto_profile; in cqhci_crypto_init() local 197 dev, profile, cq_host->crypto_capabilities.config_count + 1); in cqhci_crypto_init() 201 profile in cqhci_crypto_init() [all...] |
/linux/Documentation/ABI/obsolete/ |
H A D | sysfs-driver-hid-roccat-savu | 5 press of a button. A profile is split into general settings and 8 respective profile buttons to the mouse. The data has to be 11 Which profile to write is determined by the profile number 14 which profile to read. 21 profile will be read next. The data has to be 3 bytes long. 29 press of a button. A profile is split into general settings and 30 button settings. A profile holds information like resolution, 32 When written, this file lets one write the respective profile 35 Which profile t [all...] |
H A D | sysfs-driver-hid-roccat-koneplus | 6 profile. This value is persistent, so its equivalent to the 7 profile that's active when the mouse is powered on next time. 8 When written, this file sets the number of the startup profile 9 and the mouse activates this profile immediately. 17 profile. This value is persistent, so its equivalent to the 18 profile that's active when the mouse is powered on next time. 19 When written, this file sets the number of the startup profile 20 and the mouse activates this profile immediately. 50 button for a specific profile. Button and profile number [all...] |
H A D | sysfs-driver-hid-roccat-kovaplus | 16 profile. 17 When written, the mouse activates this profile immediately. 18 The profile that's active when powered down is the same that's 66 press of a button. A profile is split in settings and buttons. 68 When written, this file lets one write the respective profile 71 Which profile to write is determined by the profile number 74 which profile to read. 77 What: /sys/bus/usb/devices/<busnum>-<devnum>:<config num>.<interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/kovaplus/roccatkovaplus<minor>/profile[1-5]_buttons 81 press of a button. A profile i [all...] |
/linux/drivers/acpi/ |
H A D | platform_profile.c | 3 /* Platform profile sysfs interface */ 47 * _commmon_choices_show - Show the available profile choices 48 * @choices: The available profile choices 69 * _store_class_profile - Set the profile for a class device 71 * @data: The profile to set 89 * _notify_class_profile - Notify the class device of a profile change 100 sysfs_notify(&handler->dev.kobj, NULL, "profile"); in _notify_class_profile() 107 * get_class_profile - Show the current profile for a class device 109 * @profile: The profile t 114 get_class_profile(struct device * dev,enum platform_profile_option * profile) get_class_profile() argument 181 enum platform_profile_option profile = PLATFORM_PROFILE_LAST; profile_show() local 336 enum platform_profile_option *profile = data; _aggregate_profiles() local 361 enum platform_profile_option *profile = data; _store_and_notify() local 382 enum platform_profile_option profile = PLATFORM_PROFILE_LAST; platform_profile_show() local 500 enum platform_profile_option profile = PLATFORM_PROFILE_LAST; platform_profile_cycle() local [all...] |
/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum/ |
H A D | resource_scale.sh | 43 for profile in $KVD_PROFILES; do 45 devlink_sp_resource_kvd_profile_set $profile 47 log_test "'$current_test' [$profile] setting" 64 log_test "'$current_test' [$profile] $target" 71 log_test "'$current_test' [$profile] $target traffic test" 75 log_test "'$current_test' [$profile] overflow $target"
|
/linux/Documentation/dev-tools/ |
H A D | autofdo.rst | 9 is a type of profile-guided optimization (PGO) used to enhance the 19 profile. Acquiring an AutoFDO profile can be done in several ways. 27 The AutoFDO profile often encapsulates the program's behavior. If the 28 performance-critical codes are architecture-independent, the profile 30 instance, using the profile generated on Intel architecture to build 33 There are two methods for acquiring a representative profile: 35 (2) Generate the profile using a representative load test. 37 AutoFDO profile, the compiler only modifies the dwarf information in 40 collect the perf profile [all...] |