| /linux/security/landlock/ |
| H A D | domain.h | 73 * struct landlock_hierarchy - Node in a domain hierarchy 127 int landlock_init_hierarchy_log(struct landlock_hierarchy *const hierarchy); 130 landlock_free_hierarchy_details(struct landlock_hierarchy *const hierarchy) in landlock_free_hierarchy_details() argument 132 if (!hierarchy || !hierarchy->details) in landlock_free_hierarchy_details() 135 put_pid(hierarchy->details->pid); in landlock_free_hierarchy_details() 136 kfree(hierarchy->details); in landlock_free_hierarchy_details() 142 landlock_init_hierarchy_log(struct landlock_hierarchy *const hierarchy) in landlock_init_hierarchy_log() argument 148 landlock_free_hierarchy_details(struct landlock_hierarchy *const hierarchy) in landlock_free_hierarchy_details() argument 155 landlock_get_hierarchy(struct landlock_hierarchy *const hierarchy) in landlock_get_hierarchy() argument 157 if (hierarchy) in landlock_get_hierarchy() [all …]
|
| H A D | audit.c | 105 static void log_domain(struct landlock_hierarchy *const hierarchy) in log_domain() 110 if (READ_ONCE(hierarchy->log_status) == LANDLOCK_LOG_RECORDED) in log_domain() 119 WARN_ON_ONCE(hierarchy->id == 0); in log_domain() 123 hierarchy->id, pid_nr(hierarchy->details->pid), in log_domain() 124 hierarchy->details->uid); in log_domain() 125 audit_log_untrustedstring(ab, hierarchy->details->exe_path); in log_domain() 127 audit_log_untrustedstring(ab, hierarchy->details->comm); in log_domain() 134 WRITE_ONCE(hierarchy->log_status, LANDLOCK_LOG_RECORDED); in log_domain() 140 struct landlock_hierarchy *hierarchy in get_hierarchy() 104 log_domain(struct landlock_hierarchy * const hierarchy) log_domain() argument 139 struct landlock_hierarchy *hierarchy = domain->hierarchy; get_hierarchy() local 445 landlock_log_drop_domain(const struct landlock_hierarchy * const hierarchy) landlock_log_drop_domain() argument [all...] |
| H A D | domain.c | 111 * @hierarchy: The hierarchy to initialize. 116 * @hierarchy->parent and @hierarchy->usage should already be set. 120 int landlock_init_hierarchy_log(struct landlock_hierarchy *const hierarchy) in landlock_init_hierarchy_log() argument 128 hierarchy->details = details; in landlock_init_hierarchy_log() 129 hierarchy->id = landlock_get_id_range(1); in landlock_init_hierarchy_log() 130 hierarchy->log_status = LANDLOCK_LOG_PENDING; in landlock_init_hierarchy_log() 131 hierarchy->log_same_exec = true; in landlock_init_hierarchy_log() 132 hierarchy->log_new_exec = false; in landlock_init_hierarchy_log() 133 atomic64_set(&hierarchy->num_denials, 0); in landlock_init_hierarchy_log()
|
| H A D | task.c | 56 for (walker = child->hierarchy; walker; walker = walker->parent) { in domain_scope_le() 57 if (walker == parent->hierarchy) in domain_scope_le() 58 /* @parent is in the scoped hierarchy of @child. */ in domain_scope_le() 192 client_walker = client->hierarchy; in domain_is_scoped() 203 server_walker = server ? server->hierarchy : NULL; in domain_is_scoped() 206 * Walks client's parent domains down to the same hierarchy level in domain_is_scoped() 217 * Walks server's parent domains down to the same hierarchy level as in domain_is_scoped() 227 * hierarchy. If the client is scoped, the request is in domain_is_scoped()
|
| H A D | ruleset.c | 49 * hierarchy = NULL in create_ruleset() 372 if (WARN_ON_ONCE(!dst || !dst->hierarchy)) in merge_ruleset() 470 if (WARN_ON_ONCE(!parent->hierarchy)) { in inherit_ruleset() 474 landlock_get_hierarchy(parent->hierarchy); in inherit_ruleset() 475 child->hierarchy->parent = parent->hierarchy; in inherit_ruleset() 498 landlock_put_hierarchy(ruleset->hierarchy); in free_ruleset() 563 new_dom->hierarchy = in landlock_merge_ruleset() 564 kzalloc_obj(*new_dom->hierarchy, GFP_KERNEL_ACCOUNT); in landlock_merge_ruleset() 565 if (!new_dom->hierarchy) in landlock_merge_ruleset() 568 refcount_set(&new_dom->hierarchy->usage, 1); in landlock_merge_ruleset() [all …]
|
| /linux/net/shaper/ |
| H A D | shaper.c | 205 * Acquires the lock protecting the hierarchy (instance lock for netdev). 289 struct net_shaper_hierarchy *hierarchy; in net_shaper_lookup() local 291 hierarchy = net_shaper_hierarchy_rcu(binding); in net_shaper_lookup() 292 if (!hierarchy || xa_get_mark(&hierarchy->shapers, index, in net_shaper_lookup() 296 return xa_load(&hierarchy->shapers, index); in net_shaper_lookup() 299 /* Allocate on demand the per device shaper's hierarchy container. 300 * Called under the lock protecting the hierarchy (instance lock for netdev) 305 struct net_shaper_hierarchy *hierarchy = net_shaper_hierarchy(binding); in net_shaper_hierarchy_setup() local 307 if (hierarchy) in net_shaper_hierarchy_setup() 308 return hierarchy; in net_shaper_hierarchy_setup() [all …]
|
| /linux/Documentation/admin-guide/media/ |
| H A D | dvb_intro.rst | 153 HIERARCHY = NONE 181 HIERARCHY = NONE 196 HIERARCHY = NONE 211 HIERARCHY = NONE 226 HIERARCHY = NONE 241 HIERARCHY = NONE 256 HIERARCHY = NONE 271 HIERARCHY = NONE 286 HIERARCHY = NONE 301 HIERARCHY = NONE [all …]
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | cgroups.rst | 60 A *hierarchy* is a set of cgroups arranged in a tree, such that 62 hierarchy, and a set of subsystems; each subsystem has system-specific 63 state attached to each cgroup in the hierarchy. Each hierarchy has 67 cgroups. Each hierarchy is a partition of all tasks in the system. 72 a cgroup. Those creations and assignments only affect the hierarchy 101 Multiple hierarchy support is provided to allow for situations where 104 hierarchy to be a natural division of tasks, without having to handle 110 separate hierarchy; at the other extreme, all subsystems 111 would be attached to the same hierarchy. 149 With only a single hierarchy, he now would potentially have to create [all …]
|
| H A D | pids.rst | 8 The process number controller is used to allow a cgroup hierarchy to stop any 13 preventable in the scope of a cgroup hierarchy by allowing resource limiting of 32 limit in the hierarchy is followed). 50 Then we create a hierarchy, set limits and attach processes to it:: 69 not be able to overcome the most stringent limit in the hierarchy (in this case,
|
| H A D | devices.rst | 57 4. Hierarchy 60 device cgroups maintain hierarchy by making sure a cgroup never has more 123 4.1 Hierarchy (internal implementation) 130 to devices will be propagated down the hierarchy.
|
| /linux/drivers/powercap/ |
| H A D | dtpm.c | 330 * dtpm_unregister - Unregister a dtpm node from the hierarchy tree 344 * dtpm_register - Register a dtpm node in the hierarchy tree 350 * is the root node of the hierarchy. If the root node already exists, 415 static struct dtpm *dtpm_setup_virtual(const struct dtpm_node *hierarchy, in dtpm_setup_virtual() argument 426 ret = dtpm_register(hierarchy->name, dtpm, parent); in dtpm_setup_virtual() 429 hierarchy->name, ret); in dtpm_setup_virtual() 437 static struct dtpm *dtpm_setup_dt(const struct dtpm_node *hierarchy, in dtpm_setup_dt() argument 443 np = of_find_node_by_path(hierarchy->name); in dtpm_setup_dt() 445 pr_err("Failed to find '%s'\n", hierarchy->name); in dtpm_setup_dt() 478 static int dtpm_for_each_child(const struct dtpm_node *hierarchy, in dtpm_for_each_child() argument [all …]
|
| /linux/drivers/media/dvb-frontends/ |
| H A D | as102_fe.c | 125 switch (c->hierarchy) { in as102_fe_set_frontend() 127 tune_args.hierarchy = HIER_NONE; in as102_fe_set_frontend() 130 tune_args.hierarchy = HIER_ALPHA_1; in as102_fe_set_frontend() 133 tune_args.hierarchy = HIER_ALPHA_2; in as102_fe_set_frontend() 136 tune_args.hierarchy = HIER_ALPHA_4; in as102_fe_set_frontend() 139 tune_args.hierarchy = HIER_UNKNOWN; in as102_fe_set_frontend() 149 * Detect a hierarchy selection in as102_fe_set_frontend() 152 if ((tune_args.hierarchy != HIER_NONE) && in as102_fe_set_frontend() 169 tune_args.hierarchy, in as102_fe_set_frontend() 209 /* extract hierarchy */ in as102_fe_get_frontend() [all …]
|
| H A D | as102_fe_types.h | 19 /* hierarchy priority selection values */ 30 /* hierarchy available values */ 101 uint8_t hierarchy; member 117 /* hierarchy selection */ 121 /* hierarchy */ 122 uint8_t hierarchy; member
|
| H A D | dib3000mb.c | 224 switch (c->hierarchy) { in dib3000mb_set_frontend() 226 deb_setf("hierarchy: none\n"); in dib3000mb_set_frontend() 229 deb_setf("hierarchy: alpha=1\n"); in dib3000mb_set_frontend() 233 deb_setf("hierarchy: alpha=2\n"); in dib3000mb_set_frontend() 237 deb_setf("hierarchy: alpha=4\n"); in dib3000mb_set_frontend() 241 deb_setf("hierarchy: alpha=auto\n"); in dib3000mb_set_frontend() 247 if (c->hierarchy == HIERARCHY_NONE) { in dib3000mb_set_frontend() 251 } else if (c->hierarchy != HIERARCHY_AUTO) { in dib3000mb_set_frontend() 328 c->hierarchy == HIERARCHY_AUTO || in dib3000mb_set_frontend() 504 c->hierarchy = HIERARCHY_NONE; in dib3000mb_get_frontend() [all …]
|
| H A D | l64781.c | 157 if (p->hierarchy != HIERARCHY_NONE && in apply_frontend_param() 175 if ((int)p->hierarchy < HIERARCHY_NONE || in apply_frontend_param() 176 p->hierarchy > HIERARCHY_4) in apply_frontend_param() 200 if (p->hierarchy != HIERARCHY_NONE) in apply_frontend_param() 203 val0x06 = (p->hierarchy << 2) | p->modulation; in apply_frontend_param() 323 p->hierarchy = HIERARCHY_NONE; in get_frontend() 326 p->hierarchy = HIERARCHY_1; in get_frontend() 329 p->hierarchy = HIERARCHY_2; in get_frontend() 332 p->hierarchy = HIERARCHY_4; in get_frontend() 335 printk("Unexpected value for hierarchy\n"); in get_frontend()
|
| H A D | stv0367_priv.h | 106 FE_TER_HIER_NONE, /*Hierarchy None*/ 107 FE_TER_HIER_LOW_PRIO, /*Hierarchy : Low Priority*/ 108 FE_TER_HIER_HIGH_PRIO, /*Hierarchy : High Priority*/ 109 FE_TER_HIER_PRIO_ANY /*Hierarchy :Any*/
|
| H A D | mt352.c | 201 if (op->hierarchy == HIERARCHY_AUTO || in mt352_set_parameters() 202 op->hierarchy == HIERARCHY_NONE) in mt352_set_parameters() 251 switch (op->hierarchy) { in mt352_set_parameters() 373 op->hierarchy = HIERARCHY_NONE; in mt352_get_parameters() 376 op->hierarchy = HIERARCHY_1; in mt352_get_parameters() 379 op->hierarchy = HIERARCHY_2; in mt352_get_parameters() 382 op->hierarchy = HIERARCHY_4; in mt352_get_parameters() 385 op->hierarchy = HIERARCHY_AUTO; in mt352_get_parameters()
|
| H A D | zl10353.c | 258 if (c->hierarchy == HIERARCHY_AUTO || in zl10353_set_parameters() 259 c->hierarchy == HIERARCHY_NONE) in zl10353_set_parameters() 308 switch (c->hierarchy) { in zl10353_set_parameters() 427 c->hierarchy = HIERARCHY_NONE; in zl10353_get_parameters() 430 c->hierarchy = HIERARCHY_1; in zl10353_get_parameters() 433 c->hierarchy = HIERARCHY_2; in zl10353_get_parameters() 436 c->hierarchy = HIERARCHY_4; in zl10353_get_parameters() 439 c->hierarchy = HIERARCHY_AUTO; in zl10353_get_parameters()
|
| /linux/tools/perf/tests/shell/ |
| H A D | perf-report-hierarchy.sh | 2 # perf report --hierarchy 31 echo "perf report --hierarchy" 33 perf_data="${temp_dir}/perf-report-hierarchy-perf.data" 35 perf report --hierarchy -i "${perf_data}" > /dev/null 36 echo "perf report --hierarchy test [Success]"
|
| /linux/kernel/time/ |
| H A D | timer_migration.c | 22 * The timer migration mechanism is built on a hierarchy of groups. The 50 * hierarchy up to the point where it is assigned the migrator role or if 77 * propagated up the hierarchy so hand over from other leaves can happen at 78 * all hierarchy levels w/o doing a search. 81 * duties up to the top level of the hierarchy (LVL2 in the example). It 91 * just won't participate in the hierarchy management anymore. Destroying 138 * walk the hierarchy. 153 * has to walk the hierarchy. Both CPUs (CPU0 and CPU1) now walk the 154 * hierarchy to perform the needed update from their point of view. The 169 * step 2) through the hierarchy to GRP1:0 before CPU0 (step 1) did. The [all …]
|
| /linux/drivers/net/ethernet/mellanox/mlx5/core/ |
| H A D | rl.c | 37 bool mlx5_qos_tsar_type_supported(struct mlx5_core_dev *dev, int type, u8 hierarchy) in mlx5_qos_tsar_type_supported() argument 41 switch (hierarchy) { in mlx5_qos_tsar_type_supported() 66 bool mlx5_qos_element_type_supported(struct mlx5_core_dev *dev, int type, u8 hierarchy) in mlx5_qos_element_type_supported() argument 70 switch (hierarchy) { in mlx5_qos_element_type_supported() 100 int mlx5_create_scheduling_element_cmd(struct mlx5_core_dev *dev, u8 hierarchy, in mlx5_create_scheduling_element_cmd() argument 113 hierarchy); in mlx5_create_scheduling_element_cmd() 125 int mlx5_modify_scheduling_element_cmd(struct mlx5_core_dev *dev, u8 hierarchy, in mlx5_modify_scheduling_element_cmd() argument 141 hierarchy); in mlx5_modify_scheduling_element_cmd() 147 int mlx5_destroy_scheduling_element_cmd(struct mlx5_core_dev *dev, u8 hierarchy, in mlx5_destroy_scheduling_element_cmd() argument 157 hierarchy); in mlx5_destroy_scheduling_element_cmd()
|
| /linux/fs/9p/ |
| H A D | v9fs.h | 21 * @V9FS_ACCESS_SINGLE: only the mounting user can access the hierarchy 96 * @uname: string user name to mount hierarchy as 97 * @aname: mount specifier for remote hierarchy 99 * @dfltuid: default numeric userid to mount hierarchy as 100 * @dfltgid: default numeric groupid to mount hierarchy as 101 * @uid: if %V9FS_ACCESS_SINGLE, the numeric uid which mounted the hierarchy 125 char *aname; /* name of remote hierarchy being mounted */
|
| /linux/Documentation/admin-guide/ |
| H A D | cgroup-v2.rst | 117 distribute system resources along the hierarchy in a controlled and 123 distributing a specific type of system resource along the hierarchy 138 sub-hierarchy of the cgroup. When a controller is enabled on a nested 140 restrictions set closer to the root in the hierarchy can not be 150 Unlike v1, cgroup v2 has only single hierarchy. The cgroup v2 151 hierarchy can be mounted with the following mount command:: 156 controllers which support v2 and are not bound to a v1 hierarchy are 157 automatically bound to the v2 hierarchy and show up at the root. 158 Controllers which are not in active use in the v2 hierarchy can be 159 bound to other hierarchies. This allows mixing v2 hierarchy with the [all …]
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 39 For these rules, the object is a file hierarchy, 151 executing the file hierarchy ``/usr``. Without another rule, write actions 264 It is recommended to set access rights to file hierarchy leaves as much as 266 read-only hierarchy and ``~/tmp/`` as a read-write hierarchy, compared to 267 ``~/`` as a read-only hierarchy and ``~/tmp/`` as a read-write hierarchy. 306 A bind mount mirrors a source file hierarchy to a destination. The destination 307 hierarchy is then composed of the exact same files, on which Landlock rules can 315 the mount point. This merge hierarchy may include files from the upper and 316 lower layers, but modifications performed on the merge hierarchy only reflect 320 OverlayFS layer will not restrict the resulted merged hierarchy, and vice versa. [all …]
|
| /linux/drivers/usb/gadget/function/ |
| H A D | uvc_configfs.c | 197 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ \ 221 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ \ 316 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ \ 408 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ in uvcg_default_processing_bm_controls_show() 477 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ \ 578 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ in uvcg_default_camera_bm_controls_show() 650 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ \ 685 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ in uvcg_default_output_b_source_id_show() 716 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ in uvcg_default_output_b_source_id_store() 1195 mutex_lock(su_mutex); /* for navigating configfs hierarchy */ in uvcg_extension_allow_link() [all …]
|