| /linux/drivers/base/ |
| H A D | attribute_container.c | 76 klist_init(&cont->containers, internal_container_klist_get, in attribute_container_register() 96 spin_lock(&cont->containers.k_lock); in attribute_container_unregister() 97 if (!list_empty(&cont->containers.k_list)) in attribute_container_unregister() 102 spin_unlock(&cont->containers.k_lock); in attribute_container_unregister() 172 klist_add_tail(&ic->node, &cont->containers); in attribute_container_add_device() 222 klist_for_each_entry(ic, &cont->containers, node, &iter) { in attribute_container_remove_device() 252 klist_for_each_entry(ic, &cont->containers, node, &iter) { in do_attribute_container_device_trigger_safe() 269 klist_for_each_entry(ic, &cont->containers, node, &iter) { in do_attribute_container_device_trigger_safe() 370 klist_for_each_entry(ic, &cont->containers, node, &iter) { in attribute_container_device_trigger() 489 klist_for_each_entry(ic, &cont->containers, node, &iter) { in attribute_container_find_class_device()
|
| /linux/drivers/gpu/drm/omapdrm/ |
| H A D | omap_dmm_tiler.c | 37 static struct tcm *containers[TILFMT_NFORMATS]; variable 557 ret = tcm_reserve_2d(containers[fmt], w, h, align, -1, slot_bytes, in tiler_reserve_2d() 583 if (tcm_reserve_1d(containers[TILFMT_PAGE], num_pages, in tiler_reserve_1d() 933 containers[TILFMT_8BIT] = omap_dmm->tcm[0]; in omap_dmm_probe() 934 containers[TILFMT_16BIT] = omap_dmm->tcm[0]; in omap_dmm_probe() 935 containers[TILFMT_32BIT] = omap_dmm->tcm[0]; in omap_dmm_probe() 941 containers[TILFMT_PAGE] = omap_dmm->tcm[1]; in omap_dmm_probe() 945 containers[TILFMT_PAGE] = omap_dmm->tcm[0]; in omap_dmm_probe()
|
| /linux/Documentation/networking/ |
| H A D | netfilter-sysctl.rst | 15 with LOG target; this aims to prevent containers from flooding host
|
| /linux/Documentation/security/tpm/ |
| H A D | tpm_vtpm_proxy.rst | 9 proxy device driver for Linux containers.
|
| /linux/Documentation/driver-api/cxl/allocation/ |
| H A D | page-allocator.rst | 48 containers to limit the accessibility of certain NUMA nodes for tasks in that
|
| /linux/Documentation/dev-tools/ |
| H A D | container.rst | 12 this can already be done by users who are familiar with containers, having a 191 <https://gitlab.com/gtucker/korg-containers>`__ by running ``make
|
| /linux/Documentation/filesystems/ext4/ |
| H A D | allocators.rst | 44 groups; these mini-containers are used as outlined above to try to
|
| /linux/Documentation/admin-guide/nfs/ |
| H A D | nfs-client.rst | 58 containers unless it is overridden by a value written to
|
| /linux/Documentation/arch/powerpc/ |
| H A D | dexcr.rst | 176 default value of the DEXCR, for example allowing containers to run with different
|
| /linux/Documentation/filesystems/ |
| H A D | idmappings.rst | 557 workloads. For a more complex but common example, consider two containers 558 started on the host. To completely prevent the two containers from affecting 560 for the two containers:: 573 to both containers currently can't. 611 between two containers with different idmappings. 613 aren't mountable inside containers. And not having them mountable might be
|
| /linux/tools/perf/python/ |
| H A D | ilist.py | 14 from textual.containers import Horizontal, HorizontalGroup, Vertical, VerticalScroll
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-firmware-acpi | 72 devices supported by ACPI, such as containers, memory modules,
|
| /linux/Documentation/filesystems/nfs/ |
| H A D | client-identifier.rst | 158 distinction between network namespaces (containers) when the
|
| /linux/drivers/gpu/drm/amd/pm/ |
| H A D | amdgpu_pm.c | 75 struct od_feature_container containers[MAX_NUM_OF_SUBSETS]; member 4443 .containers = { 4610 for (i = 0; i < ARRAY_SIZE(amdgpu_od_set.containers); i++) { in amdgpu_od_set_init() 4611 container = &amdgpu_od_set.containers[i]; in amdgpu_od_set_init()
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | cgroups.rst | 682 in containers and systemd for assorted meta data like main PID in a cgroup
|
| /linux/init/ |
| H A D | Kconfig | 1407 This allows containers, i.e. vservers, to use user namespaces 1423 pid namespaces. This is a building block of containers.
|