Home
last modified time | relevance | path

Searched refs:policies (Results 1 – 40 of 40) sorted by relevance

/linux-4.4.14/Documentation/vm/
Dnuma_memory_policy.txt11 Memory policies should not be confused with cpusets
14 memory may be allocated by a set of processes. Memory policies are a
16 both cpusets and policies are applied to a task, the restrictions of the cpuset
50 In a multi-threaded task, task policies apply only to the thread
72 VMA policies have a few complicating details:
83 VMA policies are shared between all tasks that share a virtual address
85 they are inherited across fork(). However, because VMA policies refer
87 space is discarded and recreated on exec*(), VMA policies are NOT
89 use VMA policies.
102 Shared Policy: Conceptually, shared policies apply to "memory objects"
[all …]
Dzswap.txt84 Zswap seeks to be simple in its policies. Sysfs attributes allow for one user
Dfrontswap.txt21 conform to certain policies as follows:
148 backend, such as zcache, must implement policies to carefully (but
/linux-4.4.14/Documentation/serial/
D00-INDEX16 - guide to the locking policies of the tty layer.
Dtty.txt4 Your guide to the ancient and twisted locking policies of the tty layer and
/linux-4.4.14/Documentation/ABI/testing/
Dsysfs-fs-f2fs45 policies.
52 policies.
Dconfigfs-stp-policy5 This group contains policies mandating Master/Channel allocation
/linux-4.4.14/Documentation/ABI/removed/
Draw13947 to implement sensible device security policies, and its low level
/linux-4.4.14/Documentation/security/
DSELinux.txt2 to use the distro-provided policies, or install the
Dcredentials.txt228 rules (policies) that say what operations a task with one label may do to
/linux-4.4.14/block/
DKconfig97 the IO rate to a device. IO rate policies are per cgroup and
99 cgroups and specifying per device IO rate policies.
/linux-4.4.14/fs/nfsd/
DKconfig103 SELinux and Smack to label files to facilitate enforcement of their policies.
107 Smack policies on NFSv4 files, say N.
/linux-4.4.14/Documentation/device-mapper/
Dcache-policies.txt1 Guidance for writing policies
6 makes it easier to write the policies.
25 Overview of supplied cache replacement policies
Dcache.txt158 messages are used. Refer to cache-policies.txt.
194 See cache-policies.txt for details.
/linux-4.4.14/net/xfrm/
DKconfig28 one, two policies can be applied to the same packet at once.
/linux-4.4.14/drivers/staging/lustre/lustre/ptlrpc/
Dsec.c62 static struct ptlrpc_sec_policy *policies[SPTLRPC_POLICY_MAX] = { variable
78 if (unlikely(policies[number])) { in sptlrpc_register_policy()
82 policies[number] = policy; in sptlrpc_register_policy()
97 if (unlikely(policies[number] == NULL)) { in sptlrpc_unregister_policy()
103 LASSERT(policies[number] == policy); in sptlrpc_unregister_policy()
104 policies[number] = NULL; in sptlrpc_unregister_policy()
126 policy = policies[number]; in sptlrpc_wireflavor2policy()
/linux-4.4.14/arch/metag/mm/
DKconfig48 memory policies to be used for prioritizing and controlling
/linux-4.4.14/Documentation/cgroups/
Dpids.txt22 Organisational operations are not blocked by cgroup policies, so it is possible
Dblkio-controller.txt6 a need of various kinds of IO control policies (like proportional BW, max BW)
9 and based on user options switch IO policies in the background.
11 Currently two IO control policies are implemented. First one is proportional
343 Common files among various policies
Dunified-hierarchy.txt460 independent of which policies are enabled. Each line in the
/linux-4.4.14/Documentation/scheduler/
Dsched-design-CFS.txt115 5. Scheduling policies
117 CFS implements three scheduling policies:
Dsched-stats.txt152 under the scheduler's policies. A simple version of such a program is
Dsched-deadline.txt484 SCHED_{OTHER,FIFO,RR,DEADLINE} scheduling policies and their related
/linux-4.4.14/Documentation/filesystems/
Df2fs.txt93 - Support greedy and cost-benefit algorithms for victim selection policies
216 updates in f2fs. There are five policies:
224 F2FS_IPU_UTIL and F2FS_IPU_SSR_UTIL policies.
569 F2FS supports two victim selection policies: greedy and cost-benefit algorithms.
Dtmpfs.txt105 NUMA memory allocation policies have optional flags that can be used in
/linux-4.4.14/security/selinux/
DKconfig62 policies. If unsure, say Y. With this option enabled, the
/linux-4.4.14/Documentation/usb/
Dhotplug.txt25 Those triggered actions must support a system's administrative policies;
/linux-4.4.14/arch/sh/mm/
DKconfig120 memory policies to be used for prioritizing and controlling
/linux-4.4.14/Documentation/netlabel/
Ddraft-ietf-cipso-ipsecurity-01.txt54 to support multiple security policies. This Internet Draft provides the
56 security policy. Support for additional security policies shall be
510 policies may require both incoming and outgoing datagrams be checked against
/linux-4.4.14/Documentation/arm/Samsung-S3C24XX/
DOverview.txt139 Read the kernel patch submission policies as well as the
/linux-4.4.14/Documentation/misc-devices/mei/
Dmei.txt37 on policies set by a remote management console
/linux-4.4.14/Documentation/networking/
Ddccp.txt52 during an established connection are not supported). Currently, two policies are
Dbonding.txt238 The bandwidth and count selection policies permit failover of
547 Specifies one of the bonding policies. The default is
584 policies may be selected via the xmit_hash_policy option,
605 policies may be 802.3ad compliant, particularly in
1586 system administrator. The output port is simply selected using the policies of
1589 slightly more complex policies. For example, to reach a web server over a
Dpacket_mmap.txt586 Currently implemented fanout policies are:
/linux-4.4.14/net/netfilter/
DKconfig122 extension. This allows you to attach timeout policies to flow
348 policies to flows, instead of using the global timeout policy.
1142 It enables you to express policies like `10kpps for any given
/linux-4.4.14/Documentation/devicetree/bindings/arm/
Didle-states.txt11 wfi to power gating) according to OS PM policies. The CPU states representing
/linux-4.4.14/Documentation/development-process/
D4.Coding20 Documentation/CodingStyle. For much of that time, the policies described
/linux-4.4.14/Documentation/nvdimm/
Dnvdimm.txt134 that userspace can exploit to implement policies like "only interface
/linux-4.4.14/Documentation/sysctl/
Dvm.txt812 node unless explicitly overridden by memory policies or cpuset
/linux-4.4.14/init/
DKconfig967 system to halt without being limited by other cgroup policies. The
1126 policies.