/linux/tools/testing/selftests/net/ |
H A D | xfrm_policy_add_speed.sh | 23 local policies 26 policies=0 38 policies=$((policies+1)) 39 [ "$policies" -gt "$max" ] && return 43 policies=$((policies+1)) 44 [ "$policies" -gt "$max" ] && return 67 policies=$(wc -l < "$tmp") 68 printf "Inserted %-06s policies in $result ms\n" $policies 71 if [ "$have" -ne "$policies" ]; then 72 echo "WARNING: mismatch, have $have policies, expected $policies"
|
H A D | xfrm_policy.sh | 58 # add policies with different netmasks, to make sure kernel carries 59 # the policies contained within new netmask over when search tree is 67 # policies it carries need to be merged with the existing one(s). 97 # the sub-tree. As no duplicates are allowed, policies in 109 # similar to above: add policies (with partially random address), with shrinking prefixes. 151 # policies that are not supposed to match any packets generated in this test. 289 # insert non-overlapping policies in a random order and check that 446 # insert block policies with adjacent/overlapping netmasks 449 check_exceptions "exceptions and block policies" 459 check_exceptions "exceptions and block policies after hresh changes" [all …]
|
H A D | srv6_hl2encap_red_l2vpn_test.sh | 17 # i) The SRv6 H.L2Encaps.Red behavior applies SRv6 Policies on traffic 83 # SRv6 Policies 86 # An SRv6 ingress router applies SRv6 policies to the traffic received from a 96 # handled by rt-1 which applies the following SRv6 Policies: 106 # policies: 534 # set the SRv6 Policies at the ingress router
|
/linux/Documentation/admin-guide/mm/ |
H A D | numa_memory_policy.rst | 15 Memory policies should not be confused with cpusets 18 memory may be allocated by a set of processes. Memory policies are a 20 both cpusets and policies are applied to a task, the restrictions of the cpuset 21 takes priority. See :ref:`Memory Policies and cpusets <mem_pol_and_cpusets>` 27 Scope of Memory Policies 61 In a multi-threaded task, task policies apply only to the thread 88 VMA policies have a few complicating details: 100 * VMA policies are shared between all tasks that share a 103 fork(). However, because VMA policies refer to a specific 105 space is discarded and recreated on exec*(), VMA policies [all …]
|
/linux/net/netlink/ |
H A D | policy.c | 24 } policies[] __counted_by(n_alloc); member 38 if (state->policies[i].policy == policy && in add_policy() 39 state->policies[i].maxtype == maxtype) in add_policy() 42 if (!state->policies[i].policy) { in add_policy() 43 state->policies[i].policy = policy; in add_policy() 44 state->policies[i].maxtype = maxtype; in add_policy() 50 state = krealloc(state, struct_size(state, policies, n_alloc), in add_policy() 57 memset(&state->policies[old_n_alloc], 0, in add_policy() 58 flex_array_size(state, policies, n_alloc - old_n_alloc)); in add_policy() 60 state->policies[old_n_allo in add_policy() [all...] |
/linux/Documentation/filesystems/ |
H A D | fscrypt.rst | 171 Limitations of v1 policies 174 v1 encryption policies have some weaknesses with respect to online 190 All the above problems are fixed with v2 encryption policies. For 192 policies on all new encrypted directories. 239 the key is used for v1 encryption policies or for v2 encryption 240 policies. Users **must not** use the same key for both v1 and v2 241 encryption policies. (No real-world attack is currently known on this 245 For v1 encryption policies, the KDF only supports deriving per-file 251 For v2 encryption policies, the KDF is HKDF-SHA512. The master key is 286 DIRECT_KEY policies [all …]
|
/linux/security/ipe/ |
H A D | Kconfig | 30 is deployed via the $securityfs/ipe/policies/$policy_name/active 61 policies. The property evaluates to TRUE when a file from a dm-verity 70 policies. The property evaluates to TRUE when a file from a dm-verity 81 policies. The property evaluates to TRUE when a file is fsverity 92 policies. The property evaluates to TRUE when a file is fsverity
|
H A D | policy_fs.c | 33 * read_pkcs7() - Read handler for "ipe/policies/$name/pkcs7". 77 * read_policy() - Read handler for "ipe/policies/$name/policy". 115 * read_name() - Read handler for "ipe/policies/$name/name". 153 * read_version() - Read handler for "ipe/policies/$name/version". 196 * setactive() - Write handler for "ipe/policies/$name/active". 243 * getactive() - Read handler for "ipe/policies/$name/active". 281 * update_policy() - Write handler for "ipe/policies/$name/update". 333 * delete_policy() - write handler for "ipe/policies/$name/delete".
|
/linux/kernel/ |
H A D | Kconfig.preempt | 172 allows scheduling policies to be implemented as BPF programs to 176 iteration of new scheduling policies. 178 implement policies that are not applicable to general-purpose 181 scheduling policies in production environments. 185 wish to implement scheduling policies. The struct_ops structure
|
/linux/Documentation/security/ |
H A D | ipe.rst | 134 1. Policies were not readable by humans, usually requiring a binary 153 The first issue is one of code maintenance and duplication. To author policies, 164 and the original file itself to try to understand what policies have been deployed 165 on this system and what policies have not. For a single user, this may be alright, 166 as old policies can be discarded almost immediately after the update takes hold. 169 this quickly becomes an issue, as stale policies from years ago may be present, 243 policies to be updated without updating the kernel). 270 minimum required version across all policies that can be active on 277 need to be aware of this, and ensure the new secure policies are 288 that were critical to its function. In this system, three types of policies [all …]
|
/linux/tools/testing/selftests/amd-pstate/ |
H A D | run.sh | 77 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 78 for policy in $policies; do 90 policies=$(awk '{print $1}' $OUTFILE.backup_governor.log) 91 for policy in $policies; do 105 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 106 for policy in $policies; do
|
/linux/Documentation/admin-guide/LSM/ |
H A D | ipe.rst | 28 unchangeable over time. For example, IPE policies can be crafted to trust 35 integrity and trust. For example, IPE allows the definition of policies 39 checks, allowing IPE to enforce policies that trust files protected by 152 uniquely identify policies to deploy new policies vs update existing 153 policies. 192 preserve older policies being compatible with newer kernels that can introduce 197 enforcing the configurable policies at startup, around reading and 218 Deploying Policies 221 Policies can be deployed from userspace through securityfs. These policies 223 authorization of the policies (prohibiting an attacker from gaining [all …]
|
/linux/include/uapi/linux/ |
H A D | mempolicy.h | 3 * NUMA memory policies for Linux. 18 /* Policies */ 64 #define MPOL_F_SHARED (1 << 0) /* identify shared policies */
|
/linux/tools/testing/selftests/cpufreq/ |
H A D | cpufreq.sh | 31 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 32 for policy in $policies; do 39 policies=$(ls $CPUFREQROOT| grep "policy[0-9].*") 40 for policy in $policies; do
|
/linux/drivers/gpu/drm/xe/ |
H A D | xe_gt_sriov_pf_policy_types.h | 12 * struct xe_gt_sriov_guc_policies - GuC SR-IOV policies. 25 * @guc: GuC scheduling policies.
|
/linux/tools/perf/trace/beauty/ |
H A D | sched_policy.c | 22 const char *policies[] = { in syscall_arg__scnprintf_sched_policy() local 31 printed = scnprintf(bf, size, "%s%s", show_prefix ? prefix : "", policies[policy]); in syscall_arg__scnprintf_sched_policy()
|
/linux/Documentation/admin-guide/device-mapper/ |
H A D | cache-policies.rst | 2 Guidance for writing policies 7 makes it easier to write the policies. 26 Overview of supplied cache replacement policies
|
H A D | cache.rst | 158 Policies will have different tunables, specific to each one, so we 160 messages are used. Refer to cache-policies.txt. 199 See cache-policies.txt for details. 295 Policies will have different tunables, specific to each one, so we
|
/linux/drivers/gpu/drm/i915/gt/uc/ |
H A D | intel_guc_ads.c | 64 struct guc_policies policies; member 167 ads_blob_write(guc, policies.dpc_promote_time, in guc_policies_init() 169 ads_blob_write(guc, policies.max_num_work_items, in guc_policies_init() 175 ads_blob_write(guc, policies.global_flags, global_flags); in guc_policies_init() 176 ads_blob_write(guc, policies.is_valid, 1); in guc_policies_init() 185 drm_printf(dp, "Global scheduling policies:\n"); in intel_guc_ads_print_policy_info() 187 ads_blob_read(guc, policies.dpc_promote_time)); in intel_guc_ads_print_policy_info() 189 ads_blob_read(guc, policies.max_num_work_items)); in intel_guc_ads_print_policy_info() 191 ads_blob_read(guc, policies.global_flags)); in intel_guc_ads_print_policy_info() 893 /* GuC scheduling policies */ in __guc_ads_init() [all …]
|
/linux/fs/crypto/ |
H A D | policy.c | 23 * fscrypt_policies_equal() - check whether two encryption policies are the same 67 * (and later) encryption policies. 69 * Do *not* add anything new here, since v1 encryption policies are deprecated. 210 "v1 policies can't be used on casefolded directories"); in fscrypt_supported_v1_policy() 589 /* Extended ioctl version; can get policies of any version */ 679 * encryption policy. Compare the cached policies if the keys are in fscrypt_has_permitted_context() 801 * times), then this function will verify that the policies are the same. 854 * fscrypt_dummy_policies_equal() - check whether two dummy policies are equal 858 * Return: %true if the dummy policies are both set and equal, or both unset.
|
H A D | keysetup_v1.c | 3 * Key setup for v1 encryption policies 18 * - Handling policies with the DIRECT_KEY flag set using a master key table 31 /* Table of keys referenced by DIRECT_KEY policies */
|
/linux/tools/power/cpupower/man/ |
H A D | cpupower-set.1 | 11 registers affecting processor power saving policies. 65 Available policies can be found with
|
/linux/include/linux/ |
H A D | mempolicy.h | 3 * NUMA memory policies for Linux. 74 * Currently only needed for shared policies. 110 * Tree of shared policies for a shared memory region.
|
/linux/drivers/net/wireless/silabs/wfx/ |
H A D | data_tx.c | 152 struct wfx_tx_policy *policies = wvif->tx_policy_cache.cache; in wfx_tx_policy_upload() local 159 is_used = memzcmp(policies[i].rates, sizeof(policies[i].rates)); in wfx_tx_policy_upload() 160 if (!policies[i].uploaded && is_used) in wfx_tx_policy_upload() 164 policies[i].uploaded = true; in wfx_tx_policy_upload() 165 memcpy(tmp_rates, policies[i].rates, sizeof(tmp_rates)); in wfx_tx_policy_upload()
|
/linux/Documentation/bpf/ |
H A D | map_sockmap.rst | 89 This helper is used in programs implementing policies at the socket level. If 169 This helper is used in programs implementing policies at the socket level. If 185 This helper is used in programs implementing policies at the skb socket level. 201 For socket policies, apply the verdict of the BPF program to the next (number 221 For socket policies, prevent the execution of the verdict BPF program for 236 For socket policies, pull in non-linear data from user space for ``msg`` and set
|