/kernel/linux/linux-5.10/drivers/infiniband/hw/mthca/ |
D | mthca_profile.c | 79 struct mthca_resource *profile; in mthca_make_profile() local 82 profile = kcalloc(MTHCA_RES_NUM, sizeof(*profile), GFP_KERNEL); in mthca_make_profile() 83 if (!profile) in mthca_make_profile() 86 profile[MTHCA_RES_QP].size = dev_lim->qpc_entry_sz; in mthca_make_profile() 87 profile[MTHCA_RES_EEC].size = dev_lim->eec_entry_sz; in mthca_make_profile() 88 profile[MTHCA_RES_SRQ].size = dev_lim->srq_entry_sz; in mthca_make_profile() 89 profile[MTHCA_RES_CQ].size = dev_lim->cqc_entry_sz; in mthca_make_profile() 90 profile[MTHCA_RES_EQP].size = dev_lim->eqpc_entry_sz; in mthca_make_profile() 91 profile[MTHCA_RES_EEEC].size = dev_lim->eeec_entry_sz; in mthca_make_profile() 92 profile[MTHCA_RES_EQ].size = dev_lim->eqc_entry_sz; in mthca_make_profile() [all …]
|
/kernel/linux/linux-5.10/security/apparmor/ |
D | policy.c | 11 * task is confined by. Every task in the system has a profile attached 15 * Each profile exists in a profile namespace which is a container of 16 * visible profiles. Each namespace contains a special "unconfined" profile, 19 * Namespace and profile names can be written together in either 21 * :namespace:profile - used by kernel interfaces for easy detection 22 * namespace://profile - used by policy 24 * Profile names can not start with : or @ or ^ and may not contain \0 26 * Reserved profile names 27 * unconfined - special automatically generated unconfined profile 28 * inherit - special name to indicate profile inheritance [all …]
|
D | domain.c | 50 * may_change_ptraced_domain - check if can change profile on ptraced task 51 * @to_label: profile to change to (NOT NULL) 92 /* match a profile and its associated ns component if needed 94 * If a subns profile is not to be matched should be prescreened with 97 static inline unsigned int match_component(struct aa_profile *profile, in match_component() argument 104 state = aa_dfa_match(profile->file.dfa, state, "&"); in match_component() 105 if (profile->ns == tp->ns) in match_component() 106 return aa_dfa_match(profile->file.dfa, state, tp->base.hname); in match_component() 108 /* try matching with namespace name and then profile */ in match_component() 109 ns_name = aa_ns_name(profile->ns, tp->ns, true); in match_component() [all …]
|
D | capability.c | 33 struct aa_profile *profile; member 55 * @profile: profile being tested for confinement (NOT NULL) 64 static int audit_caps(struct common_audit_data *sa, struct aa_profile *profile, in audit_caps() argument 74 if (likely((AUDIT_MODE(profile) != AUDIT_ALL) && in audit_caps() 75 !cap_raised(profile->caps.audit, cap))) in audit_caps() 78 } else if (KILL_MODE(profile) || in audit_caps() 79 cap_raised(profile->caps.kill, cap)) { in audit_caps() 81 } else if (cap_raised(profile->caps.quiet, cap) && in audit_caps() 82 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_caps() 83 AUDIT_MODE(profile) != AUDIT_ALL) { in audit_caps() [all …]
|
D | policy_unpack.c | 66 * aa_ext is the read of the buffer containing the serialized profile. The 96 * @new: profile if it has been allocated (MAYBE NULL) 97 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL) 98 * @name: name of the profile being manipulated (MAYBE NULL) 109 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local 121 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &sa, audit_cb); in audit_iface() 471 * unpack_trans_table - unpack a profile transition table 473 * @profile: profile to add the accept table to (NOT NULL) 477 static bool unpack_trans_table(struct aa_ext *e, struct aa_profile *profile) in unpack_trans_table() argument 489 profile->file.trans.table = kcalloc(size, sizeof(char *), in unpack_trans_table() [all …]
|
D | mount.c | 115 * @profile: the profile being enforced (NOT NULL) 130 static int audit_mount(struct aa_profile *profile, const char *op, in audit_mount() argument 142 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in audit_mount() 160 AUDIT_MODE(profile) != AUDIT_NOQUIET && in audit_mount() 161 AUDIT_MODE(profile) != AUDIT_ALL) in audit_mount() 178 return aa_audit(audit_type, profile, &sa, audit_cb); in audit_mount() 293 static int path_flags(struct aa_profile *profile, const struct path *path) in path_flags() argument 295 AA_BUG(!profile); in path_flags() 298 return profile->path_flags | in path_flags() 304 * @profile: the confining profile [all …]
|
D | net.c | 108 int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa, in aa_profile_af_perm() argument 118 if (profile_unconfined(profile)) in aa_profile_af_perm() 120 state = PROFILE_MEDIATES(profile, AA_CLASS_NET); in aa_profile_af_perm() 126 state = aa_dfa_match_len(profile->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm() 128 aa_compute_perms(profile->policy.dfa, state, &perms); in aa_profile_af_perm() 129 aa_apply_modes_to_perms(profile, &perms); in aa_profile_af_perm() 131 return aa_check_perms(profile, &perms, request, sa, audit_net_cb); in aa_profile_af_perm() 137 struct aa_profile *profile; in aa_af_perm() local 140 return fn_for_each_confined(label, profile, in aa_af_perm() 141 aa_profile_af_perm(profile, &sa, request, family, in aa_af_perm() [all …]
|
D | ipc.c | 63 static int profile_ptrace_perm(struct aa_profile *profile, in profile_ptrace_perm() argument 70 aa_profile_match_label(profile, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm() 72 aa_apply_modes_to_perms(profile, &perms); in profile_ptrace_perm() 73 return aa_check_perms(profile, &perms, request, sa, audit_ptrace_cb); in profile_ptrace_perm() 97 /* profile uses the old style capability check for ptrace */ in profile_tracer_perm() 121 struct aa_profile *profile; in aa_may_ptrace() local 125 return xcheck_labels(tracer, tracee, profile, in aa_may_ptrace() 126 profile_tracer_perm(profile, tracee, request, &sa), in aa_may_ptrace() 127 profile_tracee_perm(profile, tracer, xrequest, &sa)); in aa_may_ptrace() 187 static int profile_signal_perm(struct aa_profile *profile, in profile_signal_perm() argument [all …]
|
D | apparmorfs.c | 99 * aa_mangle_name - mangle a profile name to std profile layout form 100 * @name: profile name to mangle (NOT NULL) 608 static void profile_query_cb(struct aa_profile *profile, struct aa_perms *perms, in profile_query_cb() argument 615 if (profile_unconfined(profile)) in profile_query_cb() 617 if (profile->file.dfa && *match_str == AA_CLASS_FILE) { in profile_query_cb() 618 dfa = profile->file.dfa; in profile_query_cb() 619 state = aa_dfa_match_len(dfa, profile->file.start, in profile_query_cb() 626 } else if (profile->policy.dfa) { in profile_query_cb() 627 if (!PROFILE_MEDIATES(profile, *match_str)) in profile_query_cb() 629 dfa = profile->policy.dfa; in profile_query_cb() [all …]
|
D | file.c | 77 * @profile: the profile being enforced (NOT NULL) 90 int aa_audit_file(struct aa_profile *profile, struct aa_perms *perms, in aa_audit_file() argument 111 if (unlikely(AUDIT_MODE(profile) == AUDIT_ALL)) in aa_audit_file() 130 AUDIT_MODE(profile) != AUDIT_NOQUIET && in aa_audit_file() 131 AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit_file() 139 return aa_audit(type, profile, &sa, file_audit_cb); in aa_audit_file() 159 struct aa_profile *profile; in path_name() local 166 fn_for_each_confined(label, profile, in path_name() 167 aa_audit_file(profile, &nullperms, op, request, *name, in path_name() 219 * done at profile load in aa_compute_fperms() [all …]
|
D | resource.c | 45 * @profile: profile being enforced (NOT NULL) 52 static int audit_resource(struct aa_profile *profile, unsigned int resource, in audit_resource() argument 64 return aa_audit(AUDIT_APPARMOR_AUTO, profile, &sa, audit_cb); in audit_resource() 81 static int profile_setrlimit(struct aa_profile *profile, unsigned int resource, in profile_setrlimit() argument 86 if (profile->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 87 profile->rlimits.limits[resource].rlim_max) in profile_setrlimit() 89 return audit_resource(profile, resource, new_rlim->rlim_max, NULL, NULL, in profile_setrlimit() 107 struct aa_profile *profile; in aa_task_setrlimit() local 118 * the same profile or that the task setting the resource of another in aa_task_setrlimit() 124 error = fn_for_each(label, profile, in aa_task_setrlimit() [all …]
|
D | audit.c | 78 struct aa_profile *profile = labels_profile(label); in audit_pre() local 80 if (profile->ns != root_ns) { in audit_pre() 83 profile->ns->base.hname); in audit_pre() 85 audit_log_format(ab, " profile="); in audit_pre() 86 audit_log_untrustedstring(ab, profile->base.hname); in audit_pre() 113 * aa_audit - Log a profile based audit event to the audit subsystem 115 * @profile: profile to check against (NOT NULL) 123 int aa_audit(int type, struct aa_profile *profile, struct common_audit_data *sa, in aa_audit() argument 126 AA_BUG(!profile); in aa_audit() 130 if (AUDIT_MODE(profile) != AUDIT_ALL) in aa_audit() [all …]
|
D | lib.c | 29 * aa_split_fqname - split a fqname into a profile and namespace name 30 * @fqname: a full qualified name in namespace profile format (NOT NULL) 33 * Returns: profile name or NULL if one is not specified 35 * Split a namespace name from a profile name (see policy.c for naming 57 /* a ns name without a following profile is allowed */ in aa_split_fqname() 109 /* a ns name without a following profile is allowed */ in aa_splitn_fqname() 121 * aa_info_message - log a none profile related status message 284 * aa_apply_modes_to_perms - apply namespace and profile flags to perms 285 * @profile: that perms where computed from 288 * TODO: split into profile and ns based flags for when accumulating perms [all …]
|
D | label.c | 29 * profiles - each profile is a label 72 /* requires profile list write lock held */ 127 * profile_cmp - profile comparison for set ordering 128 * @a: profile to compare (NOT NULL) 129 * @b: profile to compare (NOT NULL) 317 struct aa_profile *profile; in aa_label_destroy() local 322 label_for_each(i, label, profile) { in aa_label_destroy() 323 aa_put_profile(profile); in aa_label_destroy() 413 * aa_label_alloc - allocate a label with a profile vector of @size length 414 * @size: size of profile vector in the label [all …]
|
/kernel/linux/linux-5.10/drivers/net/ethernet/mellanox/mlx4/ |
D | profile.c | 84 struct mlx4_resource *profile; in mlx4_make_profile() local 88 profile = kcalloc(MLX4_RES_NUM, sizeof(*profile), GFP_KERNEL); in mlx4_make_profile() 89 if (!profile) in mlx4_make_profile() 111 profile[MLX4_RES_QP].size = dev_cap->qpc_entry_sz; in mlx4_make_profile() 112 profile[MLX4_RES_RDMARC].size = dev_cap->rdmarc_entry_sz; in mlx4_make_profile() 113 profile[MLX4_RES_ALTC].size = dev_cap->altc_entry_sz; in mlx4_make_profile() 114 profile[MLX4_RES_AUXC].size = dev_cap->aux_entry_sz; in mlx4_make_profile() 115 profile[MLX4_RES_SRQ].size = dev_cap->srq_entry_sz; in mlx4_make_profile() 116 profile[MLX4_RES_CQ].size = dev_cap->cqc_entry_sz; in mlx4_make_profile() 117 profile[MLX4_RES_EQ].size = dev_cap->eqc_entry_sz; in mlx4_make_profile() [all …]
|
/kernel/linux/linux-5.10/security/apparmor/include/ |
D | policy.h | 65 APPARMOR_UNCONFINED, /* profile set to unconfined */ 95 * @base - base components of the profile (name, refcount, lists, lock ...) 96 * @label - label this profile is an extension of 97 * @parent: parent of profile 98 * @ns: namespace the profile is in 99 * @rename: optional profile name that this profile renamed 103 * @audit: the auditing mode of the profile 104 * @mode: the enforcement mode of the profile 110 * @caps: capabilities for the profile 111 * @rlimits: rlimits for the profile [all …]
|
/kernel/linux/linux-5.10/drivers/net/ethernet/intel/i40e/ |
D | i40e_ddp.c | 10 * @a: new profile info 11 * @b: old profile info 25 * i40e_ddp_does_profile_exist - checks if DDP profile loaded already 27 * @pinfo: DDP profile information structure 29 * checks if DDP profile loaded already. 30 * Returns >0 if the profile exists. 31 * Returns 0 if the profile is absent. 57 * @new: new profile info 58 * @old: old profile info 82 * @pinfo: DDP profile information structure [all …]
|
/kernel/linux/linux-5.10/Documentation/ABI/obsolete/ |
D | sysfs-driver-hid-roccat-ryos | 5 profile will be read next. The data has to be 3 bytes long. 9 …config num>.<interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/ryos/roccatryos<minor>/profile 13 press of a button. profile holds index of actual profile. 14 This value is persistent, so its value determines the profile 16 When written, the device activates the set profile immediately. 25 a specific profile. Profile index is included in written data. 28 which profile to read. 35 function keys for a specific profile. Profile index is included 38 which profile to read. 45 keys for a specific profile. Profile index is included in [all …]
|
D | sysfs-driver-hid-roccat-isku | 6 profile. This value is persistent, so its equivalent to the 7 profile that's active when the device is powered on next time. 8 When written, this file sets the number of the startup profile 9 and the device activates this profile immediately. 25 Profile number for which this settings occur is included in 28 which profile to read. 35 capslock key for a specific profile. Profile number is included 38 which profile to read. 45 easyzone keys for a specific profile. Profile number is included 48 which profile to read. [all …]
|
D | sysfs-driver-hid-roccat-savu | 5 press of a button. A profile is split into general settings and 8 respective profile buttons to the mouse. The data has to be 11 Which profile to write is determined by the profile number 14 which profile to read. 21 profile will be read next. The data has to be 3 bytes long. 29 press of a button. A profile is split into general settings and 30 button settings. A profile holds information like resolution, 32 When written, this file lets one write the respective profile 35 Which profile to write is determined by the profile number 52 keystrokes for a specific button for a specific profile. [all …]
|
D | sysfs-driver-hid-roccat-koneplus | 6 profile. This value is persistent, so its equivalent to the 7 profile that's active when the mouse is powered on next time. 8 When written, this file sets the number of the startup profile 9 and the mouse activates this profile immediately. 17 profile. This value is persistent, so its equivalent to the 18 profile that's active when the mouse is powered on next time. 19 When written, this file sets the number of the startup profile 20 and the mouse activates this profile immediately. 50 button for a specific profile. Button and profile numbers are 59 press of a button. A profile is split in settings and buttons. [all …]
|
D | sysfs-driver-hid-roccat-kovaplus | 16 profile. 17 When written, the mouse activates this profile immediately. 18 The profile that's active when powered down is the same that's 66 press of a button. A profile is split in settings and buttons. 68 When written, this file lets one write the respective profile 71 Which profile to write is determined by the profile number 74 which profile to read. 77 …e num>/<hid-bus>:<vendor-id>:<product-id>.<num>/kovaplus/roccatkovaplus<minor>/profile[1-5]_buttons 81 press of a button. A profile is split in settings and buttons. 83 When read, these files return the respective profile buttons. [all …]
|
D | sysfs-driver-hid-roccat-pyra | 25 Description: When read, this file returns the number of the actual profile in 55 press of a button. A profile is split in settings and buttons. 57 When written, this file lets one write the respective profile 60 Which profile to write is determined by the profile number 63 which profile to read. 66 …interface num>/<hid-bus>:<vendor-id>:<product-id>.<num>/pyra/roccatpyra<minor>/profile[1-5]_buttons 70 press of a button. A profile is split in settings and buttons. 72 When read, these files return the respective profile buttons. 75 Write control to select profile and read profile_buttons instead. 82 press of a button. A profile is split in settings and buttons. [all …]
|
D | sysfs-driver-hid-roccat-konepure | 5 press of a button. actual_profile holds number of actual profile. 6 This value is persistent, so its value determines the profile 8 When written, the mouse activates the set profile immediately. 17 profile will be read next. The data has to be 3 bytes long. 35 button for a specific profile. Button and profile numbers are 44 press of a button. A profile is split in settings and buttons. 46 When written, this file lets one write the respective profile 49 Which profile to write is determined by the profile number 52 which profile to read. 59 press of a button. A profile is split in settings and buttons. [all …]
|
/kernel/linux/linux-5.10/drivers/gpu/drm/amd/pm/powerplay/hwmgr/ |
D | ppatomfwctrl.c | 282 struct atom_asic_profiling_info_v4_1 *profile; in pp_atomfwctrl_get_avfs_information() local 286 profile = (struct atom_asic_profiling_info_v4_1 *) in pp_atomfwctrl_get_avfs_information() 290 if (!profile) in pp_atomfwctrl_get_avfs_information() 293 format_revision = ((struct atom_common_table_header *)profile)->format_revision; in pp_atomfwctrl_get_avfs_information() 294 content_revision = ((struct atom_common_table_header *)profile)->content_revision; in pp_atomfwctrl_get_avfs_information() 297 param->ulMaxVddc = le32_to_cpu(profile->maxvddc); in pp_atomfwctrl_get_avfs_information() 298 param->ulMinVddc = le32_to_cpu(profile->minvddc); in pp_atomfwctrl_get_avfs_information() 300 le32_to_cpu(profile->avfs_meannsigma_acontant0); in pp_atomfwctrl_get_avfs_information() 302 le32_to_cpu(profile->avfs_meannsigma_acontant1); in pp_atomfwctrl_get_avfs_information() 304 le32_to_cpu(profile->avfs_meannsigma_acontant2); in pp_atomfwctrl_get_avfs_information() [all …]
|