/linux-6.12.1/security/apparmor/include/ |
D | perms.h | 73 u32 subtree; /* allow perm on full subtree only when allow is set */ member 119 accum->subtree |= addend->subtree & ~addend->deny; in aa_perms_accum_raw() 146 accum->subtree &= addend->subtree & ~accum->deny; in aa_perms_accum()
|
/linux-6.12.1/lib/ |
D | rbtree_test.c | 225 u32 subtree, max = node->val; in check_augmented() local 227 subtree = rb_entry(node->rb.rb_left, struct test_node, in check_augmented() 229 if (max < subtree) in check_augmented() 230 max = subtree; in check_augmented() 233 subtree = rb_entry(node->rb.rb_right, struct test_node, in check_augmented() 235 if (max < subtree) in check_augmented() 236 max = subtree; in check_augmented()
|
/linux-6.12.1/Documentation/core-api/ |
D | rbtree.rst | 234 the contents of all nodes in the subtree rooted at N. This data can 267 - A copy callback, which copies the augmented value for a given subtree 268 to a newly assigned subtree root. 271 subtree to a newly assigned subtree root AND recomputes the augmented 272 information for the former subtree root. 318 * Some nodes in left subtree satisfy Cond2.
|
D | assoc_array.rst | 441 the metadata key prefix must be in the subtree that the metadata pointer points 486 When the number of objects in the subtree rooted at a node falls to 16 or 487 fewer, then the subtree will be collapsed down to a single node - and this will 516 3. Insertion replacing part of a subtree that we haven't yet entered. This 517 may involve replacement of part of that subtree - but that won't affect 535 could see the new node. The entire collapsed subtree is thrown away
|
/linux-6.12.1/tools/testing/selftests/kvm/lib/ |
D | sparsebit.c | 276 static struct node *node_copy_subtree(const struct node *subtree) in node_copy_subtree() argument 287 root->idx = subtree->idx; in node_copy_subtree() 288 root->mask = subtree->mask; in node_copy_subtree() 289 root->num_after = subtree->num_after; in node_copy_subtree() 292 if (subtree->left) { in node_copy_subtree() 293 root->left = node_copy_subtree(subtree->left); in node_copy_subtree() 297 if (subtree->right) { in node_copy_subtree() 298 root->right = node_copy_subtree(subtree->right); in node_copy_subtree()
|
/linux-6.12.1/Documentation/filesystems/nfs/ |
D | exporting.rst | 69 subtree is successfully reconnected to root. Until then dentries 70 in such subtree are retained only as long as there are references; 191 EXPORT_OP_NOSUBTREECHK - disallow subtree checking on this fs 197 inode to ensure that it's within an exported subtree. This is an 199 This flag exempts the filesystem from subtree checking and causes 200 exportfs to get back an error if it tries to enable subtree checking
|
/linux-6.12.1/net/ipv6/ |
D | ip6_fib.c | 1426 if (!rcu_access_pointer(fn->subtree)) { in fib6_add() 1468 rcu_assign_pointer(fn->subtree, sfn); in fib6_add() 1597 struct fib6_node *subtree = FIB6_SUBTREE(fn); in fib6_node_lookup_1() local 1599 if (subtree || fn->fn_flags & RTN_RTINFO) { in fib6_node_lookup_1() 1610 if (subtree) { in fib6_node_lookup_1() 1612 sfn = fib6_node_lookup_1(subtree, in fib6_node_lookup_1() 1740 struct fib6_node *subtree = FIB6_SUBTREE(fn); in fib6_locate() local 1742 if (subtree) { in fib6_locate() 1743 fn = fib6_locate_1(subtree, saddr, src_len, in fib6_locate() 1867 RCU_INIT_POINTER(pn->subtree, NULL); in fib6_repair_tree()
|
/linux-6.12.1/include/net/ |
D | ip6_fib.h | 72 struct fib6_node __rcu *subtree; member 116 #define FIB6_SUBTREE(fn) (rcu_dereference_protected((fn)->subtree, 1))
|
/linux-6.12.1/Documentation/sound/designs/ |
D | procfile.rst | 14 Each card has its subtree cardX, where X is from 0 to 7. The 70 this subtree is described later.
|
/linux-6.12.1/Documentation/filesystems/ |
D | sharedsubtree.rst | 24 that got mounted recently. Shared subtree semantics provide the necessary 33 Shared subtree provides four different flavors of mounts; struct vfsmount to be 442 then the subtree under the unbindable mount is pruned in the new 685 Q2. Why can't the shared subtree be implemented using exportfs? 688 shared subtree can do. I cannot imagine a way to implement the 694 locations within the same subtree. 696 if one rbind mounts a tree within the same subtree 'n' times
|
D | vfs.rst | 202 ->mount() may choose to return a subtree of existing filesystem - it 1404 the daemon go past and construct the subtree there. 0 should be
|
D | path-lookup.rst | 432 escape that subtree. It works a bit like a local ``chroot()``.
|
/linux-6.12.1/fs/ext4/ |
D | indirect.c | 1350 int subtree = 1; in ext4_ind_remove_space() local 1354 subtree = 0; in ext4_ind_remove_space() 1359 if (!subtree) { in ext4_ind_remove_space()
|
/linux-6.12.1/scripts/dtc/ |
D | dtx_diff | 44 If DTx is a directory, it is treated as a DT subtree, such as
|
/linux-6.12.1/Documentation/admin-guide/ |
D | cgroup-v2.rst | 198 behaviour without this option is to include subtree counts. 246 cgroup's subtree. 314 a subtree while still maintaining the common resource domain for them. 322 of a threaded subtree, that is, the nearest ancestor which is not 324 serves as the resource domain for the entire subtree. 326 Inside a threaded subtree, threads of a process can be put in 332 consumptions of the subtree, it is considered to have internal 340 domain, a domain which is serving as the domain of a threaded subtree, 382 subtree. 385 subtree, and, while the threads can be scattered across the subtree, [all …]
|
/linux-6.12.1/Documentation/translations/zh_CN/core-api/ |
D | rbtree.rst | 280 * Some nodes in left subtree satisfy Cond2.
|
/linux-6.12.1/security/apparmor/ |
D | policy_unpack.c | 654 aa_unpack_u32(e, &perm->subtree, NULL) && in unpack_perm() 1194 if (perm->subtree & ~perm->allow) in verify_perm()
|
/linux-6.12.1/Documentation/firmware-guide/acpi/ |
D | namespace.rst | 198 sysfs as directories in the subtree under /sys/devices/LNXSYSTM:00. The
|
/linux-6.12.1/Documentation/admin-guide/cgroup-v1/ |
D | blkio-controller.rst | 70 to the whole subtree while all statistics are local to the IOs
|
/linux-6.12.1/fs/ |
D | namespace.c | 3079 static bool check_for_nsfs_mounts(struct mount *subtree) in check_for_nsfs_mounts() argument 3085 for (p = subtree; p; p = next_mnt(p, subtree)) in check_for_nsfs_mounts()
|
/linux-6.12.1/Documentation/driver-api/ |
D | vfio.rst | 493 subtree that can be treated as a unit for the purposes of partitioning and
|
/linux-6.12.1/Documentation/RCU/Design/Memory-Ordering/ |
D | Tree-RCU-Memory-Ordering.rst | 468 subtree headed by that ``rcu_node`` structure. A key point is that if a
|
/linux-6.12.1/Documentation/networking/ |
D | can.rst | 1500 - Andrey Volkov (kernel subtree structure, ioctls, MSCAN driver)
|