/kernel/linux/linux-5.10/block/ |
D | keyslot-manager.c | 43 struct blk_keyslot_manager *ksm; member 46 static inline void blk_ksm_hw_enter(struct blk_keyslot_manager *ksm) in blk_ksm_hw_enter() argument 53 if (ksm->dev) in blk_ksm_hw_enter() 54 pm_runtime_get_sync(ksm->dev); in blk_ksm_hw_enter() 55 down_write(&ksm->lock); in blk_ksm_hw_enter() 58 static inline void blk_ksm_hw_exit(struct blk_keyslot_manager *ksm) in blk_ksm_hw_exit() argument 60 up_write(&ksm->lock); in blk_ksm_hw_exit() 61 if (ksm->dev) in blk_ksm_hw_exit() 62 pm_runtime_put_sync(ksm->dev); in blk_ksm_hw_exit() 75 int blk_ksm_init(struct blk_keyslot_manager *ksm, unsigned int num_slots) in blk_ksm_init() argument [all …]
|
D | blk-crypto.c | 221 return blk_ksm_get_slot_for_key(rq->q->ksm, rq->crypt_ctx->bc_key, in __blk_crypto_init_request() 283 if (blk_ksm_crypto_cfg_supported(bio->bi_disk->queue->ksm, in __blk_crypto_bio_prep() 360 blk_ksm_crypto_cfg_supported(q->ksm, cfg); in blk_crypto_config_supported() 381 if (blk_ksm_crypto_cfg_supported(q->ksm, &key->crypto_cfg)) in blk_crypto_start_using_key() 402 if (blk_ksm_crypto_cfg_supported(q->ksm, &key->crypto_cfg)) in blk_crypto_evict_key() 403 return blk_ksm_evict_key(q->ksm, key); in blk_crypto_evict_key()
|
D | blk-crypto-fallback.c | 105 static int blk_crypto_keyslot_program(struct blk_keyslot_manager *ksm, in blk_crypto_keyslot_program() argument 128 static int blk_crypto_keyslot_evict(struct blk_keyslot_manager *ksm, in blk_crypto_keyslot_evict() argument
|
D | blk-integrity.c | 412 if (disk->queue->ksm) { in blk_integrity_register()
|
/kernel/linux/linux-5.10/Documentation/ABI/testing/ |
D | sysfs-kernel-mm-ksm | 1 What: /sys/kernel/mm/ksm 7 What: /sys/kernel/mm/ksm/full_scans 8 What: /sys/kernel/mm/ksm/pages_shared 9 What: /sys/kernel/mm/ksm/pages_sharing 10 What: /sys/kernel/mm/ksm/pages_to_scan 11 What: /sys/kernel/mm/ksm/pages_unshared 12 What: /sys/kernel/mm/ksm/pages_volatile 13 What: /sys/kernel/mm/ksm/run 14 What: /sys/kernel/mm/ksm/sleep_millisecs 36 run: write 0 to disable ksm, read 0 while ksm is disabled. [all …]
|
/kernel/linux/linux-5.10/include/linux/ |
D | keyslot-manager.h | 28 int (*keyslot_program)(struct blk_keyslot_manager *ksm, 31 int (*keyslot_evict)(struct blk_keyslot_manager *ksm, 86 int blk_ksm_init(struct blk_keyslot_manager *ksm, unsigned int num_slots); 88 blk_status_t blk_ksm_get_slot_for_key(struct blk_keyslot_manager *ksm, 96 bool blk_ksm_crypto_cfg_supported(struct blk_keyslot_manager *ksm, 99 int blk_ksm_evict_key(struct blk_keyslot_manager *ksm, 102 void blk_ksm_reprogram_all_keys(struct blk_keyslot_manager *ksm); 104 void blk_ksm_destroy(struct blk_keyslot_manager *ksm);
|
D | blkdev.h | 485 struct blk_keyslot_manager *ksm; member 1860 bool blk_ksm_register(struct blk_keyslot_manager *ksm, struct request_queue *q); 1866 static inline bool blk_ksm_register(struct blk_keyslot_manager *ksm, in blk_ksm_register() argument
|
/kernel/linux/linux-5.10/drivers/scsi/ufs/ |
D | ufshcd-crypto.c | 51 static int ufshcd_crypto_keyslot_program(struct blk_keyslot_manager *ksm, in ufshcd_crypto_keyslot_program() argument 55 struct ufs_hba *hba = container_of(ksm, struct ufs_hba, ksm); in ufshcd_crypto_keyslot_program() 108 static int ufshcd_crypto_keyslot_evict(struct blk_keyslot_manager *ksm, in ufshcd_crypto_keyslot_evict() argument 112 struct ufs_hba *hba = container_of(ksm, struct ufs_hba, ksm); in ufshcd_crypto_keyslot_evict() 123 blk_ksm_reprogram_all_keys(&hba->ksm); in ufshcd_crypto_enable() 182 err = blk_ksm_init(&hba->ksm, in ufshcd_hba_init_crypto_capabilities() 187 hba->ksm.ksm_ll_ops = ufshcd_ksm_ops; in ufshcd_hba_init_crypto_capabilities() 189 hba->ksm.max_dun_bytes_supported = 8; in ufshcd_hba_init_crypto_capabilities() 190 hba->ksm.dev = hba->dev; in ufshcd_hba_init_crypto_capabilities() 205 hba->ksm.crypto_modes_supported[blk_mode_num] |= in ufshcd_hba_init_crypto_capabilities() [all …]
|
D | ufshcd.h | 809 struct blk_keyslot_manager ksm; member
|
/kernel/linux/linux-5.10/Documentation/admin-guide/mm/ |
D | ksm.rst | 11 added to the Linux kernel in 2.6.32. See ``mm/ksm.c`` for its implementation, 78 The KSM daemon is controlled by sysfs files in ``/sys/kernel/mm/ksm/``, 83 e.g. ``echo 100 > /sys/kernel/mm/ksm/pages_to_scan``. 89 e.g. ``echo 20 > /sys/kernel/mm/ksm/sleep_millisecs`` 95 When set to 0, ksm merges only pages which physically reside 104 when there are no ksm shared pages in the system: set run 2 to 112 * set to 1 to run ksmd e.g. ``echo 1 > /sys/kernel/mm/ksm/run``, 160 The effectiveness of KSM and MADV_MERGEABLE is shown in ``/sys/kernel/mm/ksm/``:
|
D | index.rst | 32 ksm
|
/kernel/linux/linux-5.10/Documentation/vm/ |
D | ksm.rst | 8 added to the Linux kernel in 2.6.32. See ``mm/ksm.c`` for its implementation, 11 The userspace interface of KSM is described in :ref:`Documentation/admin-guide/mm/ksm.rst <admin_gu… 19 .. kernel-doc:: mm/ksm.c 82 .. kernel-doc:: mm/ksm.c
|
D | index.rst | 41 ksm
|
/kernel/linux/linux-5.10/mm/ |
D | Makefile | 83 obj-$(CONFIG_KSM) += ksm.o
|
D | Kconfig | 367 See Documentation/vm/ksm.rst for more information: KSM is inactive 369 root has set /sys/kernel/mm/ksm/run to 1 (if CONFIG_SYSFS is set).
|
/kernel/linux/linux-5.10/Documentation/block/ |
D | inline-encryption.rst | 197 field in the ksm to point to the `struct device` for the KSM to use for runtime
|