/linux-6.12.1/tools/testing/selftests/net/ |
D | xfrm_policy_add_speed.sh | 23 local policies 26 policies=0 38 policies=$((policies+1)) 39 [ "$policies" -gt "$max" ] && return 43 policies=$((policies+1)) 44 [ "$policies" -gt "$max" ] && return 67 policies=$(wc -l < "$tmp") 68 printf "Inserted %-06s policies in $result ms\n" $policies 71 if [ "$have" -ne "$policies" ]; then 72 echo "WARNING: mismatch, have $have policies, expected $policies"
|
/linux-6.12.1/net/netlink/ |
D | policy.c | 24 } policies[] __counted_by(n_alloc); member 38 if (state->policies[i].policy == policy && in add_policy() 39 state->policies[i].maxtype == maxtype) in add_policy() 42 if (!state->policies[i].policy) { in add_policy() 43 state->policies[i].policy = policy; in add_policy() 44 state->policies[i].maxtype = maxtype; in add_policy() 50 state = krealloc(state, struct_size(state, policies, n_alloc), in add_policy() 57 memset(&state->policies[old_n_alloc], 0, in add_policy() 58 flex_array_size(state, policies, n_alloc - old_n_alloc)); in add_policy() 60 state->policies[old_n_alloc].policy = policy; in add_policy() [all …]
|
/linux-6.12.1/drivers/gpu/drm/xe/ |
D | xe_guc_ads.c | 109 struct guc_policies policies; member 454 ads_blob_write(ads, policies.dpc_promote_time, in guc_policies_init() 456 ads_blob_write(ads, policies.max_num_work_items, in guc_policies_init() 462 ads_blob_write(ads, policies.global_flags, global_flags); in guc_policies_init() 463 ads_blob_write(ads, policies.is_valid, 1); in guc_policies_init() 718 offsetof(struct __guc_ads_blob, policies)); in xe_guc_ads_populate_minimal() 752 offsetof(struct __guc_ads_blob, policies)); in xe_guc_ads_populate() 842 struct guc_policies *policies; in xe_guc_ads_scheduler_policy_toggle_reset() local 846 policies = kmalloc(sizeof(*policies), GFP_KERNEL); in xe_guc_ads_scheduler_policy_toggle_reset() 847 if (!policies) in xe_guc_ads_scheduler_policy_toggle_reset() [all …]
|
/linux-6.12.1/tools/testing/selftests/cpufreq/ |
D | cpufreq.sh | 31 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 32 for policy in $policies; do 39 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 40 for policy in $policies; do
|
/linux-6.12.1/tools/testing/selftests/amd-pstate/ |
D | run.sh | 77 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 78 for policy in $policies; do 90 policies=$(awk '{print $1}' $OUTFILE.backup_governor.log) 91 for policy in $policies; do 105 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 106 for policy in $policies; do
|
/linux-6.12.1/Documentation/admin-guide/mm/ |
D | numa_memory_policy.rst | 15 Memory policies should not be confused with cpusets 18 memory may be allocated by a set of processes. Memory policies are a 20 both cpusets and policies are applied to a task, the restrictions of the cpuset 61 In a multi-threaded task, task policies apply only to the thread 88 VMA policies have a few complicating details: 100 * VMA policies are shared between all tasks that share a 103 fork(). However, because VMA policies refer to a specific 105 space is discarded and recreated on exec*(), VMA policies 107 applications may use VMA policies. 123 Conceptually, shared policies apply to "memory objects" mapped [all …]
|
/linux-6.12.1/security/ipe/ |
D | Kconfig | 29 is deployed via the $securityfs/ipe/policies/$policy_name/active 60 policies. The property evaluates to TRUE when a file from a dm-verity 69 policies. The property evaluates to TRUE when a file from a dm-verity 80 policies. The property evaluates to TRUE when a file is fsverity 91 policies. The property evaluates to TRUE when a file is fsverity
|
/linux-6.12.1/tools/perf/trace/beauty/ |
D | sched_policy.c | 22 const char *policies[] = { in syscall_arg__scnprintf_sched_policy() local 31 printed = scnprintf(bf, size, "%s%s", show_prefix ? prefix : "", policies[policy]); in syscall_arg__scnprintf_sched_policy()
|
/linux-6.12.1/Documentation/admin-guide/LSM/ |
D | ipe.rst | 28 unchangeable over time. For example, IPE policies can be crafted to trust 35 integrity and trust. For example, IPE allows the definition of policies 39 checks, allowing IPE to enforce policies that trust files protected by 152 uniquely identify policies to deploy new policies vs update existing 153 policies. 192 preserve older policies being compatible with newer kernels that can introduce 197 enforcing the configurable policies at startup, around reading and 221 Policies can be deployed from userspace through securityfs. These policies 223 authorization of the policies (prohibiting an attacker from gaining 225 policies must be signed by a certificate that chains to the [all …]
|
D | SELinux.rst | 6 to use the distro-provided policies, or install the
|
/linux-6.12.1/kernel/ |
D | Kconfig.preempt | 142 allows scheduling policies to be implemented as BPF programs to 146 iteration of new scheduling policies. 148 implement policies that are not applicable to general-purpose 151 scheduling policies in production environments. 155 wish to implement scheduling policies. The struct_ops structure
|
/linux-6.12.1/Documentation/filesystems/ |
D | fscrypt.rst | 148 Limitations of v1 policies 151 v1 encryption policies have some weaknesses with respect to online 167 All the above problems are fixed with v2 encryption policies. For 169 policies on all new encrypted directories. 212 the key is used for v1 encryption policies or for v2 encryption 213 policies. Users **must not** use the same key for both v1 and v2 214 encryption policies. (No real-world attack is currently known on this 218 For v1 encryption policies, the KDF only supports deriving per-file 224 For v2 encryption policies, the KDF is HKDF-SHA512. The master key is 259 DIRECT_KEY policies [all …]
|
/linux-6.12.1/drivers/gpu/drm/i915/gt/uc/ |
D | intel_guc_ads.c | 64 struct guc_policies policies; member 167 ads_blob_write(guc, policies.dpc_promote_time, in guc_policies_init() 169 ads_blob_write(guc, policies.max_num_work_items, in guc_policies_init() 175 ads_blob_write(guc, policies.global_flags, global_flags); in guc_policies_init() 176 ads_blob_write(guc, policies.is_valid, 1); in guc_policies_init() 187 ads_blob_read(guc, policies.dpc_promote_time)); in intel_guc_ads_print_policy_info() 189 ads_blob_read(guc, policies.max_num_work_items)); in intel_guc_ads_print_policy_info() 191 ads_blob_read(guc, policies.global_flags)); in intel_guc_ads_print_policy_info() 925 offsetof(struct __guc_ads_blob, policies)); in __guc_ads_init()
|
/linux-6.12.1/drivers/net/wireless/silabs/wfx/ |
D | data_tx.c | 152 struct wfx_tx_policy *policies = wvif->tx_policy_cache.cache; in wfx_tx_policy_upload() local 159 is_used = memzcmp(policies[i].rates, sizeof(policies[i].rates)); in wfx_tx_policy_upload() 160 if (!policies[i].uploaded && is_used) in wfx_tx_policy_upload() 164 policies[i].uploaded = true; in wfx_tx_policy_upload() 165 memcpy(tmp_rates, policies[i].rates, sizeof(tmp_rates)); in wfx_tx_policy_upload()
|
/linux-6.12.1/Documentation/admin-guide/device-mapper/ |
D | index.rst | 8 cache-policies
|
D | cache-policies.rst | 2 Guidance for writing policies 7 makes it easier to write the policies. 26 Overview of supplied cache replacement policies
|
/linux-6.12.1/Documentation/security/ |
D | ipe.rst | 153 The first issue is one of code maintenance and duplication. To author policies, 164 and the original file itself to try to understand what policies have been deployed 165 on this system and what policies have not. For a single user, this may be alright, 166 as old policies can be discarded almost immediately after the update takes hold. 169 this quickly becomes an issue, as stale policies from years ago may be present, 243 policies to be updated without updating the kernel). 270 minimum required version across all policies that can be active on 277 need to be aware of this, and ensure the new secure policies are 288 that were critical to its function. In this system, three types of policies 357 policies.
|
/linux-6.12.1/Documentation/ABI/removed/ |
D | raw1394 | 7 to implement sensible device security policies, and its low level
|
/linux-6.12.1/drivers/acpi/dptf/ |
D | Kconfig | 11 a coordinated approach for different policies to effect the hardware
|
/linux-6.12.1/security/landlock/ |
D | Kconfig | 11 tailored access control policies. A Landlock security policy is a
|
/linux-6.12.1/Documentation/bpf/ |
D | map_sockmap.rst | 89 This helper is used in programs implementing policies at the socket level. If 169 This helper is used in programs implementing policies at the socket level. If 185 This helper is used in programs implementing policies at the skb socket level. 201 For socket policies, apply the verdict of the BPF program to the next (number 221 For socket policies, prevent the execution of the verdict BPF program for 236 For socket policies, pull in non-linear data from user space for ``msg`` and set
|
/linux-6.12.1/Documentation/userspace-api/media/mediactl/ |
D | media-controller-intro.rst | 31 implementing policies that belong to userspace.
|
/linux-6.12.1/Documentation/ABI/testing/ |
D | configfs-stp-policy | 5 This group contains policies mandating Master/Channel allocation
|
/linux-6.12.1/drivers/ras/ |
D | Kconfig | 47 platform-specific policies.
|
/linux-6.12.1/Documentation/process/ |
D | index.rst | 76 The documents below describe our policies around the handling of a couple
|