| /linux/tools/testing/selftests/net/ |
| A D | xfrm_policy_add_speed.sh | 23 local policies 26 policies=0 38 policies=$((policies+1)) 39 [ "$policies" -gt "$max" ] && return 43 policies=$((policies+1)) 44 [ "$policies" -gt "$max" ] && return 67 policies=$(wc -l < "$tmp") 68 printf "Inserted %-06s policies in $result ms\n" $policies 71 if [ "$have" -ne "$policies" ]; then 72 echo "WARNING: mismatch, have $have policies, expected $policies"
|
| /linux/net/netlink/ |
| A D | policy.c | 24 } policies[] __counted_by(n_alloc); member 38 if (state->policies[i].policy == policy && in add_policy() 39 state->policies[i].maxtype == maxtype) in add_policy() 42 if (!state->policies[i].policy) { in add_policy() 43 state->policies[i].policy = policy; in add_policy() 44 state->policies[i].maxtype = maxtype; in add_policy() 57 memset(&state->policies[old_n_alloc], 0, in add_policy() 60 state->policies[old_n_alloc].policy = policy; in add_policy() 61 state->policies[old_n_alloc].maxtype = maxtype; in add_policy() 92 if (state->policies[i].policy == policy && in netlink_policy_dump_get_policy_idx() [all …]
|
| /linux/drivers/gpu/drm/xe/ |
| A D | xe_guc_ads.c | 109 struct guc_policies policies; member 454 ads_blob_write(ads, policies.dpc_promote_time, in guc_policies_init() 456 ads_blob_write(ads, policies.max_num_work_items, in guc_policies_init() 463 ads_blob_write(ads, policies.is_valid, 1); in guc_policies_init() 842 struct guc_policies *policies; in xe_guc_ads_scheduler_policy_toggle_reset() local 846 policies = kmalloc(sizeof(*policies), GFP_KERNEL); in xe_guc_ads_scheduler_policy_toggle_reset() 847 if (!policies) in xe_guc_ads_scheduler_policy_toggle_reset() 850 policies->dpc_promote_time = ads_blob_read(ads, policies.dpc_promote_time); in xe_guc_ads_scheduler_policy_toggle_reset() 851 policies->max_num_work_items = ads_blob_read(ads, policies.max_num_work_items); in xe_guc_ads_scheduler_policy_toggle_reset() 852 policies->is_valid = 1; in xe_guc_ads_scheduler_policy_toggle_reset() [all …]
|
| /linux/tools/testing/selftests/cpufreq/ |
| A D | cpufreq.sh | 31 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 32 for policy in $policies; do 39 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 40 for policy in $policies; do
|
| /linux/tools/testing/selftests/amd-pstate/ |
| A D | run.sh | 77 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 78 for policy in $policies; do 90 policies=$(awk '{print $1}' $OUTFILE.backup_governor.log) 91 for policy in $policies; do 105 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 106 for policy in $policies; do
|
| /linux/Documentation/admin-guide/mm/ |
| A D | numa_memory_policy.rst | 15 Memory policies should not be confused with cpusets 88 VMA policies have a few complicating details: 100 * VMA policies are shared between all tasks that share a 105 space is discarded and recreated on exec*(), VMA policies 107 applications may use VMA policies. 125 application installs shared policies the same way as VMA 129 range of a task's address space, shared policies apply 400 used for non-shared policies. For this reason, shared policies are marked 402 for shared policies. 405 shared policies in a tree structure under spinlock, shared policies are [all …]
|
| /linux/security/ipe/ |
| A D | Kconfig | 29 is deployed via the $securityfs/ipe/policies/$policy_name/active 60 policies. The property evaluates to TRUE when a file from a dm-verity 69 policies. The property evaluates to TRUE when a file from a dm-verity 80 policies. The property evaluates to TRUE when a file is fsverity 91 policies. The property evaluates to TRUE when a file is fsverity
|
| /linux/tools/perf/trace/beauty/ |
| A D | sched_policy.c | 22 const char *policies[] = { in syscall_arg__scnprintf_sched_policy() local 31 printed = scnprintf(bf, size, "%s%s", show_prefix ? prefix : "", policies[policy]); in syscall_arg__scnprintf_sched_policy()
|
| /linux/Documentation/admin-guide/LSM/ |
| A D | ipe.rst | 39 checks, allowing IPE to enforce policies that trust files protected by 152 uniquely identify policies to deploy new policies vs update existing 153 policies. 197 enforcing the configurable policies at startup, around reading and 225 policies must be signed by a certificate that chains to the 241 Deploying the policies is done through securityfs, through the 290 ``/sys/kernel/security/ipe/policies/$policy_name/active``. 293 echo 1 > "/sys/kernel/security/ipe/policies/Ex_Policy/active" 300 ``/sys/kernel/security/ipe/policies/$policy_name/delete``. 387 along with the version and the hash digest of the two policies. [all …]
|
| A D | SELinux.rst | 6 to use the distro-provided policies, or install the
|
| /linux/kernel/ |
| A D | Kconfig.preempt | 142 allows scheduling policies to be implemented as BPF programs to 146 iteration of new scheduling policies. 148 implement policies that are not applicable to general-purpose 151 scheduling policies in production environments. 155 wish to implement scheduling policies. The struct_ops structure
|
| /linux/Documentation/filesystems/ |
| A D | fscrypt.rst | 148 Limitations of v1 policies 169 policies on all new encrypted directories. 259 DIRECT_KEY policies 281 other v2 encryption policies. 283 IV_INO_LBLK_64 policies 298 IV_INO_LBLK_32 policies 592 For new encrypted directories, use v2 policies. 614 policies`_. 616 policies`_. 874 policies, then ``key_spec.type`` must contain [all …]
|
| /linux/drivers/gpu/drm/i915/gt/uc/ |
| A D | intel_guc_ads.c | 64 struct guc_policies policies; member 167 ads_blob_write(guc, policies.dpc_promote_time, in guc_policies_init() 169 ads_blob_write(guc, policies.max_num_work_items, in guc_policies_init() 175 ads_blob_write(guc, policies.global_flags, global_flags); in guc_policies_init() 176 ads_blob_write(guc, policies.is_valid, 1); in guc_policies_init() 187 ads_blob_read(guc, policies.dpc_promote_time)); in intel_guc_ads_print_policy_info() 189 ads_blob_read(guc, policies.max_num_work_items)); in intel_guc_ads_print_policy_info() 191 ads_blob_read(guc, policies.global_flags)); in intel_guc_ads_print_policy_info() 925 offsetof(struct __guc_ads_blob, policies)); in __guc_ads_init()
|
| /linux/drivers/net/wireless/silabs/wfx/ |
| A D | data_tx.c | 152 struct wfx_tx_policy *policies = wvif->tx_policy_cache.cache; in wfx_tx_policy_upload() local 159 is_used = memzcmp(policies[i].rates, sizeof(policies[i].rates)); in wfx_tx_policy_upload() 160 if (!policies[i].uploaded && is_used) in wfx_tx_policy_upload() 164 policies[i].uploaded = true; in wfx_tx_policy_upload() 165 memcpy(tmp_rates, policies[i].rates, sizeof(tmp_rates)); in wfx_tx_policy_upload()
|
| /linux/Documentation/admin-guide/device-mapper/ |
| A D | index.rst | 8 cache-policies
|
| A D | cache-policies.rst | 2 Guidance for writing policies 7 makes it easier to write the policies. 26 Overview of supplied cache replacement policies
|
| /linux/Documentation/security/ |
| A D | ipe.rst | 153 The first issue is one of code maintenance and duplication. To author policies, 164 and the original file itself to try to understand what policies have been deployed 165 on this system and what policies have not. For a single user, this may be alright, 166 as old policies can be discarded almost immediately after the update takes hold. 169 this quickly becomes an issue, as stale policies from years ago may be present, 243 policies to be updated without updating the kernel). 270 minimum required version across all policies that can be active on 277 need to be aware of this, and ensure the new secure policies are 288 that were critical to its function. In this system, three types of policies 357 policies.
|
| /linux/Documentation/ABI/removed/ |
| A D | raw1394 | 7 to implement sensible device security policies, and its low level
|
| /linux/security/landlock/ |
| A D | Kconfig | 11 tailored access control policies. A Landlock security policy is a
|
| /linux/drivers/acpi/dptf/ |
| A D | Kconfig | 11 a coordinated approach for different policies to effect the hardware
|
| /linux/Documentation/bpf/ |
| A D | map_sockmap.rst | 89 This helper is used in programs implementing policies at the socket level. If 169 This helper is used in programs implementing policies at the socket level. If 185 This helper is used in programs implementing policies at the skb socket level. 201 For socket policies, apply the verdict of the BPF program to the next (number 221 For socket policies, prevent the execution of the verdict BPF program for 236 For socket policies, pull in non-linear data from user space for ``msg`` and set
|
| /linux/Documentation/userspace-api/media/mediactl/ |
| A D | media-controller-intro.rst | 31 implementing policies that belong to userspace.
|
| /linux/Documentation/ABI/testing/ |
| A D | configfs-stp-policy | 5 This group contains policies mandating Master/Channel allocation
|
| /linux/drivers/ras/ |
| A D | Kconfig | 47 platform-specific policies.
|
| /linux/Documentation/process/ |
| A D | index.rst | 76 The documents below describe our policies around the handling of a couple
|