/* * osd_sec.h - OSD security manager API * * Copyright (C) 2008 Panasas Inc. All rights reserved. * * Authors: * Boaz Harrosh * Benny Halevy * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 * */ #ifndef __OSD_SEC_H__ #define __OSD_SEC_H__ #include #include /* * Contains types and constants of osd capabilities and security * encoding/decoding. * API is trying to keep security abstract so initiator of an object * based pNFS client knows as little as possible about security and * capabilities. It is the Server's osd-initiator place to know more. * Also can be used by osd-target. */ void osd_sec_encode_caps(void *caps, ...);/* NI */ void osd_sec_init_nosec_doall_caps(void *caps, const struct osd_obj_id *obj, bool is_collection, const bool is_v1); bool osd_is_sec_alldata(struct osd_security_parameters *sec_params); /* Conditionally sign the CDB according to security setting in ocdb * with cap_key */ void osd_sec_sign_cdb(struct osd_cdb *ocdb, const u8 *cap_key); /* Unconditionally sign the BIO data with cap_key. * Check for osd_is_sec_alldata() was done prior to calling this. */ void osd_sec_sign_data(void *data_integ, struct bio *bio, const u8 *cap_key); /* Version independent copy of caps into the cdb */ void osd_set_caps(struct osd_cdb *cdb, const void *caps); #endif /* ndef __OSD_SEC_H__ */ class='sub right'>Tobias Klauser
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2017-01-31 23:58:38 +0100
committerIngo Molnar <mingo@kernel.org>2017-02-01 08:37:27 +0100
commitdd86e373e09fb16b83e8adf5c48c421a4ca76468 (patch)
tree55703c2ea8584e303e342090614e0aab3509ab21 /include/dt-bindings/clock/hix5hd2-clock.h
parent0b3589be9b98994ce3d5aeca52445d1f5627c4ba (diff)
perf/x86/intel/rapl: Make package handling more robust
The package management code in RAPL relies on package mapping being available before a CPU is started. This changed with: 9d85eb9119f4 ("x86/smpboot: Make logical package management more robust") because the ACPI/BIOS information turned out to be unreliable, but that left RAPL in broken state. This was not noticed because on a regular boot all CPUs are online before RAPL is initialized. A possible fix would be to reintroduce the mess which allocates a package data structure in CPU prepare and when it turns out to already exist in starting throw it away later in the CPU online callback. But that's a horrible hack and not required at all because RAPL becomes functional for perf only in the CPU online callback. That's correct because user space is not yet informed about the CPU being onlined, so nothing caan rely on RAPL being available on that particular CPU. Move the allocation to the CPU online callback and simplify the hotplug handling. At this point the package mapping is established and correct. This also adds a missing check for available package data in the event_init() function. Reported-by: Yasuaki Ishimatsu <yasu.isimatu@gmail.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Arnaldo Carvalho de Melo <acme@redhat.com> Cc: Jiri Olsa <jolsa@redhat.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Sebastian Siewior <bigeasy@linutronix.de> Cc: Stephane Eranian <eranian@google.com> Cc: Vince Weaver <vincent.weaver@maine.edu> Fixes: 9d85eb9119f4 ("x86/smpboot: Make logical package management more robust") Link: http://lkml.kernel.org/r/20170131230141.212593966@linutronix.de Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'include/dt-bindings/clock/hix5hd2-clock.h')