Home
last modified time | relevance | path

Searched refs:profile (Results 1 – 25 of 360) sorted by relevance

12345678910>>...15

/linux/block/
H A Dblk-crypto-profile.c14 * construct a crypto profile, then associate it with the disk's request_queue.
27 #include <linux/blk-crypto-profile.h>
42 struct blk_crypto_profile *profile; member
45 static inline void blk_crypto_hw_enter(struct blk_crypto_profile *profile) in blk_crypto_hw_enter() argument
48 * Calling into the driver requires profile->lock held and the device in blk_crypto_hw_enter()
50 * and release profile->lock via blk_crypto_reprogram_all_keys(). in blk_crypto_hw_enter()
52 if (profile->dev) in blk_crypto_hw_enter()
53 pm_runtime_get_sync(profile->dev); in blk_crypto_hw_enter()
54 down_write(&profile->lock); in blk_crypto_hw_enter()
57 static inline void blk_crypto_hw_exit(struct blk_crypto_profile *profile) in blk_crypto_hw_exit() argument
74 blk_crypto_profile_init(struct blk_crypto_profile * profile,unsigned int num_slots) blk_crypto_profile_init() argument
139 blk_crypto_profile_destroy_callback(void * profile) blk_crypto_profile_destroy_callback() argument
156 devm_blk_crypto_profile_init(struct device * dev,struct blk_crypto_profile * profile,unsigned int num_slots) devm_blk_crypto_profile_init() argument
171 blk_crypto_hash_bucket_for_key(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) blk_crypto_hash_bucket_for_key() argument
181 struct blk_crypto_profile *profile = slot->profile; blk_crypto_remove_slot_from_lru_list() local
190 blk_crypto_find_keyslot(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) blk_crypto_find_keyslot() argument
205 blk_crypto_find_and_grab_keyslot(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) blk_crypto_find_and_grab_keyslot() argument
248 blk_crypto_get_keyslot(struct blk_crypto_profile * profile,const struct blk_crypto_key * key,struct blk_crypto_keyslot ** slot_ptr) blk_crypto_get_keyslot() argument
327 struct blk_crypto_profile *profile = slot->profile; blk_crypto_put_keyslot() local
346 __blk_crypto_cfg_supported(struct blk_crypto_profile * profile,const struct blk_crypto_config * cfg) __blk_crypto_cfg_supported() argument
365 __blk_crypto_evict_key(struct blk_crypto_profile * profile,const struct blk_crypto_key * key) __blk_crypto_evict_key() argument
420 blk_crypto_reprogram_all_keys(struct blk_crypto_profile * profile) blk_crypto_reprogram_all_keys() argument
443 blk_crypto_profile_destroy(struct blk_crypto_profile * profile) blk_crypto_profile_destroy() argument
455 blk_crypto_register(struct blk_crypto_profile * profile,struct request_queue * q) blk_crypto_register() argument
488 struct blk_crypto_profile *profile = blk_crypto_derive_sw_secret() local
506 blk_crypto_import_key(struct blk_crypto_profile * profile,const u8 * raw_key,size_t raw_key_size,u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]) blk_crypto_import_key() argument
526 blk_crypto_generate_key(struct blk_crypto_profile * profile,u8 lt_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]) blk_crypto_generate_key() argument
544 blk_crypto_prepare_key(struct blk_crypto_profile * profile,const u8 * lt_key,size_t lt_key_size,u8 eph_key[BLK_CRYPTO_MAX_HW_WRAPPED_KEY_SIZE]) blk_crypto_prepare_key() argument
[all...]
H A Dblk-crypto-sysfs.c9 #include <linux/blk-crypto-profile.h>
15 struct blk_crypto_profile *profile; member
20 ssize_t (*show)(struct blk_crypto_profile *profile,
26 return container_of(kobj, struct blk_crypto_kobj, kobj)->profile; in kobj_to_crypto_profile()
34 static ssize_t hw_wrapped_keys_show(struct blk_crypto_profile *profile, in hw_wrapped_keys_show() argument
41 static ssize_t max_dun_bits_show(struct blk_crypto_profile *profile, in max_dun_bits_show() argument
44 return sysfs_emit(page, "%u\n", 8 * profile->max_dun_bytes_supported); in max_dun_bits_show()
47 static ssize_t num_keyslots_show(struct blk_crypto_profile *profile, in num_keyslots_show() argument
50 return sysfs_emit(page, "%u\n", profile->num_slots); in num_keyslots_show()
53 static ssize_t raw_keys_show(struct blk_crypto_profile *profile, in raw_keys_show() argument
71 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); blk_crypto_is_visible() local
107 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); blk_crypto_mode_is_visible() local
116 blk_crypto_mode_show(struct blk_crypto_profile * profile,struct blk_crypto_attr * attr,char * page) blk_crypto_mode_show() argument
139 struct blk_crypto_profile *profile = kobj_to_crypto_profile(kobj); blk_crypto_attr_show() local
[all...]
/linux/drivers/infiniband/hw/mthca/
H A Dmthca_profile.c77 struct mthca_resource *profile; in mthca_make_profile() local
80 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); in mthca_make_profile()
81 if (!profile) in mthca_make_profile()
84 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; in mthca_make_profile()
85 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; in mthca_make_profile()
86 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; in mthca_make_profile()
87 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; in mthca_make_profile()
88 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; in mthca_make_profile()
89 profile[MTHCA_RES_EEE in mthca_make_profile()
[all...]
/linux/drivers/net/ethernet/mellanox/mlx4/
H A Dprofile.c84 struct mlx4_resource *profile; in mlx4_make_profile() local
88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); in mlx4_make_profile()
89 if (!profile) in mlx4_make_profile()
111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; in mlx4_make_profile()
112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; in mlx4_make_profile()
113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; in mlx4_make_profile()
114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; in mlx4_make_profile()
115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; in mlx4_make_profile()
116 profile[MLX4_RES_C in mlx4_make_profile()
[all...]
/linux/security/apparmor/
H A Dpolicy.c11 * task is confined by. Every task in the system has a profile attached
15 * Each profile exists in a profile namespace which is a container of
16 * visible profiles. Each namespace contains a special "unconfined" profile,
19 * Namespace and profile names can be written together in either
21 * :namespace:profile - used by kernel interfaces for easy detection
22 * namespace://profile - used by policy
26 * Reserved profile names
27 * unconfined - special automatically generated unconfined profile
28 * inherit - special name to indicate profile inheritanc
146 __add_profile(struct list_head * list,struct aa_profile * profile) __add_profile() argument
175 __list_remove_profile(struct aa_profile * profile) __list_remove_profile() argument
191 __remove_profile(struct aa_profile * profile) __remove_profile() argument
213 struct aa_profile *profile, *tmp; __aa_profile_list_release() local
279 aa_free_profile(struct aa_profile * profile) aa_free_profile() argument
332 struct aa_profile *profile; aa_alloc_profile() local
376 ANY_RULE_MEDIATES(struct aa_profile * profile,unsigned char class) ANY_RULE_MEDIATES() argument
392 aa_compute_profile_mediates(struct aa_profile * profile) aa_compute_profile_mediates() argument
452 struct aa_profile *profile; aa_find_child() local
481 struct aa_profile *profile = NULL; __lookup_parent() local
516 struct aa_profile *parent, *profile = NULL; __create_missing_ancestors() local
564 struct aa_profile *profile = NULL; __lookupn_profile() local
601 struct aa_profile *profile; aa_lookupn_profile() local
620 struct aa_profile *profile; aa_fqlookupn_profile() local
649 struct aa_profile *profile; aa_alloc_null() local
697 struct aa_profile *p, *profile; aa_new_learning_profile() local
763 replacement_allowed(struct aa_profile * profile,int noreplace,const char ** info) replacement_allowed() argument
939 __list_lookup_parent(struct list_head * lh,struct aa_profile * profile) __list_lookup_parent() argument
1354 struct aa_profile *profile = NULL; aa_remove_profiles() local
[all...]
H A Ddomain.c31 static const char * const CONFLICTING_ATTACH_STR = "conflicting profile attachments";
33 "conflicting profile attachments - ix fallback";
35 "conflicting profile attachments - ux fallback";
38 * may_change_ptraced_domain - check if can change profile on ptraced task
40 * @to_label: profile to change to (NOT NULL)
87 /* match a profile and its associated ns component if needed
89 * If a subns profile is not to be matched should be prescreened with
92 static inline aa_state_t match_component(struct aa_profile *profile, in match_component() argument
96 struct aa_ruleset *rules = profile->label.rules[0]; in match_component()
101 if (profile in match_component()
128 label_compound_match(struct aa_profile * profile,struct aa_label * label,bool stack,aa_state_t state,bool subns,u32 request,struct aa_perms * perms) label_compound_match() argument
190 label_components_match(struct aa_profile * profile,struct aa_label * label,bool stack,aa_state_t start,bool subns,u32 request,struct aa_perms * perms) label_components_match() argument
254 label_match(struct aa_profile * profile,struct aa_label * label,bool stack,aa_state_t state,bool subns,u32 request,struct aa_perms * perms) label_match() argument
288 change_profile_perms(struct aa_profile * profile,struct aa_label * target,bool stack,u32 request,aa_state_t start,struct aa_perms * perms) change_profile_perms() argument
312 aa_xattrs_match(const struct linux_binprm * bprm,struct aa_profile * profile,aa_state_t state) aa_xattrs_match() argument
395 struct aa_profile *profile, *candidate = NULL; find_attach() local
517 x_table_lookup(struct aa_profile * profile,u32 xindex,const char ** name) x_table_lookup() argument
568 x_to_label(struct aa_profile * profile,const struct linux_binprm * bprm,const char * name,u32 xindex,const char ** lookupname,const char ** info) x_to_label() argument
660 profile_transition(const struct cred * subj_cred,struct aa_profile * profile,const struct linux_binprm * bprm,char * buffer,struct path_cond * cond,bool * secure_exec) profile_transition() argument
793 profile_onexec(const struct cred * subj_cred,struct aa_profile * profile,struct aa_label * onexec,bool stack,const struct linux_binprm * bprm,char * buffer,struct path_cond * cond,bool * secure_exec) profile_onexec() argument
874 struct aa_profile *profile; handle_onexec() local
922 struct aa_profile *profile; apparmor_bprm_creds_for_exec() local
1056 build_change_hat(const struct cred * subj_cred,struct aa_profile * profile,const char * name,bool sibling) build_change_hat() argument
1109 struct aa_profile *profile, *root, *hat = NULL; change_hat() local
1226 struct aa_profile *profile; aa_change_hat() local
1352 change_profile_perms_wrapper(const char * op,const char * name,const struct cred * subj_cred,struct aa_profile * profile,struct aa_label * target,bool stack,u32 request,struct aa_perms * perms) change_profile_perms_wrapper() argument
1391 struct aa_profile *profile; aa_change_profile() local
[all...]
H A Daf_unix.c172 static aa_state_t match_label(struct aa_profile *profile, in match_label() argument
178 AA_BUG(!profile); in match_label()
191 return aa_do_perms(profile, rule->policy, state, request, p, ad); in match_label()
197 * v6 - semantics are handled by mapping in profile load
201 static int profile_create_perm(struct aa_profile *profile, int family, in profile_create_perm() argument
205 struct aa_ruleset *rules = profile->label.rules[0]; in profile_create_perm()
208 AA_BUG(!profile); in profile_create_perm()
209 AA_BUG(profile_unconfined(profile)); in profile_create_perm()
217 return aa_do_perms(profile, rules->policy, state, AA_MAY_CREATE, in profile_create_perm()
221 return aa_profile_af_perm(profile, a in profile_create_perm()
225 profile_sk_perm(struct aa_profile * profile,struct apparmor_audit_data * ad,u32 request,struct sock * sk,struct path * path) profile_sk_perm() argument
254 profile_bind_perm(struct aa_profile * profile,struct sock * sk,struct apparmor_audit_data * ad) profile_bind_perm() argument
285 profile_listen_perm(struct aa_profile * profile,struct sock * sk,int backlog,struct apparmor_audit_data * ad) profile_listen_perm() argument
321 profile_accept_perm(struct aa_profile * profile,struct sock * sk,struct apparmor_audit_data * ad) profile_accept_perm() argument
351 profile_opt_perm(struct aa_profile * profile,u32 request,struct sock * sk,int optname,struct apparmor_audit_data * ad) profile_opt_perm() argument
388 profile_peer_perm(struct aa_profile * profile,u32 request,struct sock * sk,struct path * path,struct sockaddr_un * peer_addr,int peer_addrlen,struct path * peer_path,struct aa_label * peer_label,struct apparmor_audit_data * ad) profile_peer_perm() argument
433 struct aa_profile *profile; aa_unix_create_perm() local
451 struct aa_profile *profile; aa_unix_label_sk_perm() local
490 struct aa_profile *profile; aa_unix_bind_perm() local
529 struct aa_profile *profile; aa_unix_listen_perm() local
550 struct aa_profile *profile; aa_unix_accept_perm() local
583 struct aa_profile *profile; aa_unix_opt_perm() local
606 struct aa_profile *profile; unix_peer_perm() local
[all...]
H A Dcapability.c58 * @profile: profile being tested for confinement (NOT NULL)
67 static int audit_caps(struct apparmor_audit_data *ad, struct aa_profile *profile, in audit_caps() argument
72 struct aa_ruleset *rules = profile->label.rules[0]; in audit_caps()
80 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && in audit_caps()
84 } else if (KILL_MODE(profile) || in audit_caps()
88 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_caps()
89 AUDIT_MODE(profile) != AUDIT_ALL) { in audit_caps()
99 if (COMPLAIN_MODE(profile)) in audit_caps()
109 return aa_audit(type, profile, a in audit_caps()
121 profile_capable(struct aa_profile * profile,int cap,unsigned int opts,struct apparmor_audit_data * ad) profile_capable() argument
182 struct aa_profile *profile; aa_capable() local
194 aa_profile_capget(struct aa_profile * profile) aa_profile_capget() argument
[all...]
H A Dfile.c82 * @profile: the profile being enforced (NOT NULL)
96 struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument
117 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in aa_audit_file()
136 AUDIT_MODE(profile) != AUDIT_NOQUIET && in aa_audit_file()
137 AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit_file()
145 return aa_audit(type, profile, &ad, file_audit_cb); in aa_audit_file()
153 struct aa_profile *profile; in path_name() local
160 fn_for_each_confined(label, profile, in path_name()
162 profile, in path_name()
222 __aa_path_perm(const char * op,const struct cred * subj_cred,struct aa_profile * profile,const char * name,u32 request,struct path_cond * cond,int flags,struct aa_perms * perms) __aa_path_perm() argument
243 profile_path_perm(const char * op,const struct cred * subj_cred,struct aa_profile * profile,const struct path * path,char * buffer,u32 request,struct path_cond * cond,int flags,struct aa_perms * perms) profile_path_perm() argument
281 struct aa_profile *profile; aa_path_perm() local
320 profile_path_link(const struct cred * subj_cred,struct aa_profile * profile,const struct path * link,char * buffer,const struct path * target,char * buffer2,struct path_cond * cond) profile_path_link() argument
438 struct aa_profile *profile; aa_path_link() local
483 struct aa_profile *profile; __file_path_perm() local
[all...]
H A Daudit.c120 struct aa_profile *profile = labels_profile(label); in audit_pre() local
122 if (profile->ns != root_ns) { in audit_pre()
125 profile->ns->base.hname); in audit_pre()
127 audit_log_format(ab, " profile="); in audit_pre()
128 audit_log_untrustedstring(ab, profile->base.hname); in audit_pre()
156 * aa_audit - Log a profile based audit event to the audit subsystem
158 * @profile: profile to check against (NOT NULL)
166 int aa_audit(int type, struct aa_profile *profile, in aa_audit() argument
170 AA_BUG(!profile); in aa_audit()
[all...]
H A Dpolicy_unpack.c54 * @new: profile if it has been allocated (MAYBE NULL)
55 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL)
56 * @name: name of the profile being manipulated (MAYBE NULL)
67 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local
79 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &ad, audit_cb); in audit_iface()
454 * unpack_trans_table - unpack a profile transition table
535 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument
545 profile->attach.xattr_count = size; in unpack_xattrs()
546 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs()
547 if (!profile in unpack_xattrs()
847 struct aa_profile *profile = NULL; unpack_profile() local
1287 verify_profile(struct aa_profile * profile) verify_profile() argument
1460 struct aa_profile *profile = NULL; aa_unpack() local
[all...]
H A Dipc.c79 struct aa_profile *profile, in profile_signal_perm() argument
83 struct aa_ruleset *rules = profile->label.rules[0]; in profile_signal_perm()
87 if (profile_unconfined(profile)) in profile_signal_perm()
92 /* TODO: secondary cache check <profile, profile, perm> */ in profile_signal_perm()
97 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
98 aa_apply_modes_to_perms(profile, &perms); in profile_signal_perm()
99 return aa_check_perms(profile, &perms, request, ad, audit_signal_cb); in profile_signal_perm()
106 struct aa_profile *profile; in aa_may_signal() local
111 return xcheck_labels(sender, target, profile, in aa_may_signal()
[all...]
H A Dapparmorfs.c102 * mangle_name - mangle a profile name to std profile layout form
103 * @name: profile name to mangle (NOT NULL)
612 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, in profile_query_cb() argument
615 struct aa_ruleset *rules = profile->label.rules[0]; in profile_query_cb()
619 if (profile_unconfined(profile)) in profile_query_cb()
648 aa_apply_modes_to_perms(profile, &tmp); in profile_query_cb()
678 struct aa_profile *profile; in query_data() local
713 label_for_each_confined(i, label, profile) { in query_data()
714 if (!profile in query_data()
767 struct aa_profile *profile; query_label() local
1082 struct aa_profile *profile = labels_profile(label); seq_profile_name_show() local
1093 struct aa_profile *profile = labels_profile(label); seq_profile_mode_show() local
1104 struct aa_profile *profile = labels_profile(label); seq_profile_attach_show() local
1120 struct aa_profile *profile = labels_profile(label); seq_profile_hash_show() local
1172 struct aa_profile *profile; seq_ns_nsstacked_show() local
1526 __aafs_profile_rmdir(struct aa_profile * profile) __aafs_profile_rmdir() argument
1575 create_profile_file(struct dentry * dir,const char * name,struct aa_profile * profile,const struct file_operations * fops) create_profile_file() argument
1589 profile_depth(struct aa_profile * profile) profile_depth() argument
1633 struct aa_profile *profile; rawdata_get_link_base() local
1690 __aafs_profile_mkdir(struct aa_profile * profile,struct dentry * parent) __aafs_profile_mkdir() argument
2196 next_profile(struct aa_ns * root,struct aa_profile * profile) next_profile() argument
2217 struct aa_profile *profile = NULL; p_start() local
2245 struct aa_profile *profile = p; p_next() local
2261 struct aa_profile *profile = p; p_stop() local
2281 struct aa_profile *profile = (struct aa_profile *)p; seq_show_profile() local
[all...]
H A Dtask.c227 struct aa_profile *profile, in profile_ptrace_perm() argument
231 struct aa_ruleset *rules = profile->label.rules[0]; in profile_ptrace_perm()
236 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm()
238 aa_apply_modes_to_perms(profile, &perms); in profile_ptrace_perm()
239 return aa_check_perms(profile, &perms, request, ad, audit_ptrace_cb); in profile_ptrace_perm()
265 /* profile uses the old style capability check for ptrace */ in profile_tracer_perm()
292 struct aa_profile *profile; in aa_may_ptrace() local
296 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace()
297 profile_tracer_perm(tracer_cred, profile, tracee, in aa_may_ptrace()
299 profile_tracee_perm(tracee_cred, profile, trace in aa_may_ptrace()
315 aa_profile_ns_perm(struct aa_profile * profile,struct apparmor_audit_data * ad,u32 request) aa_profile_ns_perm() argument
[all...]
H A Dresource.c47 * @profile: profile being enforced (NOT NULL)
57 struct aa_profile *profile, unsigned int resource, in audit_resource() argument
71 return aa_audit(AUDIT_APPARMOR_AUTO, profile, &ad, audit_cb); in audit_resource()
89 struct aa_profile *profile, unsigned int resource, in profile_setrlimit() argument
92 struct aa_ruleset *rules = profile->label.rules[0]; in profile_setrlimit()
98 return audit_resource(subj_cred, profile, resource, new_rlim->rlim_max, in profile_setrlimit()
118 struct aa_profile *profile; in aa_task_setrlimit() local
129 * the same profile or that the task setting the resource of another in aa_task_setrlimit()
135 error = fn_for_each(label, profile, in aa_task_setrlimit()
[all...]
/linux/include/linux/
H A Dblk-crypto-profile.h19 * encryption. All functions may sleep, are serialized by profile->lock, and
20 * are never called while profile->dev (if set) is runtime-suspended.
37 int (*keyslot_program)(struct blk_crypto_profile *profile,
57 int (*keyslot_evict)(struct blk_crypto_profile *profile,
71 int (*derive_sw_secret)(struct blk_crypto_profile *profile,
85 int (*import_key)(struct blk_crypto_profile *profile,
99 int (*generate_key)(struct blk_crypto_profile *profile,
113 int (*prepare_key)(struct blk_crypto_profile *profile,
119 * struct blk_crypto_profile - inline encryption profile for a device
195 int blk_crypto_profile_init(struct blk_crypto_profile *profile,
[all...]
/linux/Documentation/userspace-api/
H A Dsysfs-platform_profile.rst16 API for selecting the platform profile of these automatic mechanisms.
18 Note that this API is only for selecting the platform profile, it is
23 Specifically, when selecting a high performance profile the actual achieved
31 profile will adjust (power consumption, heat generation, etc) this API
34 a fixed set of profile names. Drivers *must* map their internal profile
37 If there is no good match when mapping then a new profile name may be
38 added. Drivers which wish to introduce new profile names must:
40 1. Explain why the existing profile names cannot be used.
41 2. Add the new profile nam
[all...]
/linux/Documentation/ABI/testing/
H A Dsysfs-class-platform-profile1 What: /sys/class/platform-profile/platform-profile-X/name
8 What: /sys/class/platform-profile/platform-profile-X/choices
14 Drivers must use the following standard profile-names:
26 custom Driver defined custom profile
31 What: /sys/class/platform-profile/platform-profile-X/profile
34 Description: Reading this file gives the current selected profile fo
[all...]
/linux/drivers/mmc/host/
H A Dcqhci-crypto.c9 #include <linux/blk-crypto-profile.h>
26 cqhci_host_from_crypto_profile(struct blk_crypto_profile *profile) in cqhci_host_from_crypto_profile() argument
28 return mmc_from_crypto_profile(profile)->cqe_private; in cqhci_host_from_crypto_profile()
54 static int cqhci_crypto_keyslot_program(struct blk_crypto_profile *profile, in cqhci_crypto_keyslot_program() argument
59 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); in cqhci_crypto_keyslot_program()
112 static int cqhci_crypto_keyslot_evict(struct blk_crypto_profile *profile, in cqhci_crypto_keyslot_evict() argument
116 struct cqhci_host *cq_host = cqhci_host_from_crypto_profile(profile); in cqhci_crypto_keyslot_evict()
165 struct blk_crypto_profile *profile = &mmc->crypto_profile; in cqhci_crypto_init() local
197 dev, profile, cq_host->crypto_capabilities.config_count + 1); in cqhci_crypto_init()
201 profile in cqhci_crypto_init()
[all...]
/linux/Documentation/ABI/obsolete/
H A Dsysfs-driver-hid-roccat-savu5 press of a button. A profile is split into general settings and
8 respective profile buttons to the mouse. The data has to be
11 Which profile to write is determined by the profile number
14 which profile to read.
21 profile will be read next. The data has to be 3 bytes long.
29 press of a button. A profile is split into general settings and
30 button settings. A profile holds information like resolution,
32 When written, this file lets one write the respective profile
35 Which profile t
[all...]
H A Dsysfs-driver-hid-roccat-koneplus6 profile. This value is persistent, so its equivalent to the
7 profile that's active when the mouse is powered on next time.
8 When written, this file sets the number of the startup profile
9 and the mouse activates this profile immediately.
17 profile. This value is persistent, so its equivalent to the
18 profile that's active when the mouse is powered on next time.
19 When written, this file sets the number of the startup profile
20 and the mouse activates this profile immediately.
50 button for a specific profile. Button and profile number
[all...]
H A Dsysfs-driver-hid-roccat-kovaplus16 profile.
17 When written, the mouse activates this profile immediately.
18 The profile that's active when powered down is the same that's
66 press of a button. A profile is split in settings and buttons.
68 When written, this file lets one write the respective profile
71 Which profile to write is determined by the profile number
74 which profile to read.
77 What: /sys/bus/usb/devices/<busnum>-<devnum>:<config num>.<interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/kovaplus/roccatkovaplus<minor>/profile[1-5]_buttons
81 press of a button. A profile i
[all...]
/linux/drivers/acpi/
H A Dplatform_profile.c3 /* Platform profile sysfs interface */
47 * _commmon_choices_show - Show the available profile choices
48 * @choices: The available profile choices
69 * _store_class_profile - Set the profile for a class device
71 * @data: The profile to set
89 * _notify_class_profile - Notify the class device of a profile change
100 sysfs_notify(&handler->dev.kobj, NULL, "profile"); in _notify_class_profile()
107 * get_class_profile - Show the current profile for a class device
109 * @profile: The profile t
114 get_class_profile(struct device * dev,enum platform_profile_option * profile) get_class_profile() argument
181 enum platform_profile_option profile = PLATFORM_PROFILE_LAST; profile_show() local
336 enum platform_profile_option *profile = data; _aggregate_profiles() local
361 enum platform_profile_option *profile = data; _store_and_notify() local
382 enum platform_profile_option profile = PLATFORM_PROFILE_LAST; platform_profile_show() local
500 enum platform_profile_option profile = PLATFORM_PROFILE_LAST; platform_profile_cycle() local
[all...]
/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum/
H A Dresource_scale.sh43 for profile in $KVD_PROFILES; do
45 devlink_sp_resource_kvd_profile_set $profile
47 log_test "'$current_test' [$profile] setting"
64 log_test "'$current_test' [$profile] $target"
71 log_test "'$current_test' [$profile] $target traffic test"
75 log_test "'$current_test' [$profile] overflow $target"
/linux/Documentation/dev-tools/
H A Dautofdo.rst9 is a type of profile-guided optimization (PGO) used to enhance the
19 profile. Acquiring an AutoFDO profile can be done in several ways.
27 The AutoFDO profile often encapsulates the program's behavior. If the
28 performance-critical codes are architecture-independent, the profile
30 instance, using the profile generated on Intel architecture to build
33 There are two methods for acquiring a representative profile:
35 (2) Generate the profile using a representative load test.
37 AutoFDO profile, the compiler only modifies the dwarf information in
40 collect the perf profile
[all...]

12345678910>>...15