Home
last modified time | relevance | path

Searched refs:processes (Results 1 – 25 of 482) sorted by relevance

12345678910>>...20

/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/php/php/
H A Dphp-fpm.conf66 ; Time limit for child processes to wait for a reaction on signals from master.
72 ; The maximum number of processes FPM will fork. This has been design to control
73 ; the global number of processes when using dynamic PM within a lot of pools.
114 ; Multiple pools of child processes may be started with different listening
137 ; Unix user/group of processes
219 ; The number of child processes created on startup.
224 ; The desired minimum number of idle server processes.
229 ; The desired maximum number of idle server processes.
257 ; idle processes - the number of idle processes;
258 ; active processes - the number of active processes;
[all …]
H A Dphp-fpm.service16 # so this service cannot access the global directories and other processes cannot
20 # Mounts the /usr, /boot, and /etc directories read-only for processes invoked by this unit.
23 # Sets up a new /dev namespace for the executed processes and only adds API pseudo devices
34 # /proc/acpi, /proc/timer_stats, /proc/fs and /proc/irq will be made read-only to all processes
41 # made read-only to all processes of the unit. Except for container managers no services should
49 # Restricts the set of socket address families accessible to the processes of this unit.
/openbmc/linux/Documentation/admin-guide/
H A Dperf-security.rst11 monitored processes. The data leakage is possible both in scenarios of
52 To perform security checks, the Linux implementation splits processes
53 into two categories [6]_ : a) privileged processes (whose effective user
55 processes (whose effective UID is nonzero). Privileged processes bypass
57 monitoring is fully available to privileged processes without access,
60 Unprivileged processes are subject to a full security permission check
66 independently enabled and disabled on per-thread basis for processes and
69 Unprivileged processes with enabled CAP_PERFMON capability are treated
70 as privileged processes with respect to perf_events performance
79 processes but CAP_SYS_ADMIN usage for secure monitoring and observability
[all …]
/openbmc/openbmc/poky/meta/lib/oeqa/sdk/
H A Dtestsdk.py91 processes = d.getVar("TESTIMAGE_NUMBER_THREADS") or d.getVar("BB_NUMBER_THREADS")
92 if processes:
97 processes = None
122 if processes:
123 result = tc.runTests(processes=int(processes))
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/collectd/collectd/
H A D0001-Remove-including-sys-sysctl.h-on-glibc-based-systems.patch20 src/processes.c | 2 +-
24 diff --git a/src/processes.c b/src/processes.c
26 --- a/src/processes.c
27 +++ b/src/processes.c
/openbmc/openbmc/poky/meta/lib/oeqa/selftest/
H A Dcontext.py38 def __init__(self, suite, processes, setupfunc, removefunc, bb_vars): argument
40 self.processes = processes
156 def prepareSuite(self, suites, processes): argument
157 if processes:
160 …return ConcurrentTestSuite(suites, processes, self.setup_builddir, self.removebuilddir, self.bb_va…
162 …return NonConcurrentTestSuite(suites, processes, self.setup_builddir, self.removebuilddir, self.bb…
164 def runTests(self, processes=None, machine=None, skips=[]): argument
165 return super(OESelftestTestContext, self).runTests(processes, skips)
207 processes = int(parameter)
208 if processes:
[all …]
/openbmc/openbmc/poky/scripts/pybootchartgui/
H A DREADME.pybootchart8 formats. Bootchart collects information about the processes, their
22 A typical boot sequence consists of several hundred processes. Since
24 way, tree pruning is utilized. Idle background processes and
25 short-lived processes are removed. Similar processes running in
/openbmc/openbmc/poky/meta/recipes-extended/psmisc/
H A Dpsmisc_23.7.bb1 SUMMARY = "Utilities for managing processes on your system"
3 DESCRIPTION = "The psmisc package contains utilities for managing processes on your \
5 structure of all of the running processes on your system. The killall \
7 processes identified by name. The fuser command identifies the PIDs \
8 of processes that are using specified files or filesystems."
/openbmc/qemu/gdbstub/
H A Dsystem.c44 g_free(gdbserver_state.processes); in reset_gdbserver_state()
45 gdbserver_state.processes = NULL; in reset_gdbserver_state()
93 s->processes[i].attached = !i; in gdb_chr_event()
284 s->processes = g_renew(GDBProcess, s->processes, ++s->process_num); in find_cpu_clusters()
286 process = &s->processes[s->process_num - 1]; in find_cpu_clusters()
322 if (gdbserver_state.processes) { in create_processes()
324 qsort(gdbserver_state.processes, in create_processes()
326 sizeof(gdbserver_state.processes[0]), in create_processes()
/openbmc/linux/tools/testing/selftests/powerpc/benchmarks/
H A Dcontext_switch.c279 static int processes; variable
285 if (!processes) in mutex_lock()
306 if (!processes) in mutex_unlock()
323 if (!processes) { in futex_setup()
390 { "process", no_argument, &processes, 1 },
463 if (processes) in main()
475 printf("Using %s with ", processes ? "processes" : "threads"); in main()
/openbmc/u-boot/tools/binman/
H A Dbinman39 def RunTests(debug, processes, args): argument
81 if use_concurrent and processes != 1:
83 fork_for_tests(processes or multiprocessing.cpu_count()))
134 ret_code = RunTests(options.debug, options.processes, args[1:])
H A Dbinman.py39 def RunTests(debug, processes, args): argument
81 if use_concurrent and processes != 1:
83 fork_for_tests(processes or multiprocessing.cpu_count()))
134 ret_code = RunTests(options.debug, options.processes, args[1:])
/openbmc/linux/Documentation/admin-guide/cgroup-v1/
H A Dpids.rst21 number of processes currently in the cgroup is given by pids.current.
25 be smaller than pids.current, or attaching enough processes to the cgroup such
49 Then we create a hierarchy, set limits and attach processes to it::
63 # ( /bin/echo "Here's some processes for you." | cat )
78 # ( /bin/echo "Here's some processes for you." | cat )
83 processes from being forked at all (note that the shell itself counts towards
H A Drdma.rst20 set of processes can use. These processes are grouped using RDMA controller.
22 RDMA controller defines two resources which can be limited for processes of a
34 of processes can be limited. Through this controller different rdma
52 of the child processes which shares the address space, rdma resources are
57 deleted after processes migrated. This allow progress migration as well with
/openbmc/linux/tools/power/cpupower/
H A DTODO15 - Fork as many processes as there are CPUs in case the
18 -> Execute start measures via the forked processes on
21 -> Execute stop measures via the forked processes on
/openbmc/qemu/docs/interop/
H A Ddbus.rst8 QEMU may be running with various helper processes involved:
9 - vhost-user* processes (gpu, virtfs, input, etc...)
17 Having several processes allows stricter security rules, as well as
25 Using a bus, helper processes can discover and communicate with each
52 processes that are connected to it. It is thus a good idea to run
/openbmc/linux/Documentation/admin-guide/LSM/
H A DYama.rst16 running state of any of their processes. For example, if one application
18 attach to other running processes (e.g. Firefox, SSH sessions, GPG agent,
43 Firefox's crash handlers, and by Wine for allowing only Wine processes
68 only processes with ``CAP_SYS_PTRACE`` may use ptrace, either with
72 no processes may use ptrace with ``PTRACE_ATTACH`` nor via
H A DSafeSetID.rst13 In absence of file capabilities, processes spawned on a Linux system that need
22 While it is possible to implement a tree of processes by giving full
24 tree of processes under non-root user(s) in the first place. Specifically,
44 processes as different uids, but its undesirable to give the daemon a
60 fork(), parent processes specifying custom environment variables or command line
61 args for spawned child processes, or inheritance of file handles across a
114 setgroups() calls for processes with CAP_SETGID restrictions. Until we add
/openbmc/linux/Documentation/power/
H A Dfreezing-of-tasks.rst10 The freezing of tasks is a mechanism by which user space processes and some
19 PF_NOFREEZE unset (all user space processes and some kernel threads) are
29 fake signal to all user space processes, and wakes up all the kernel threads.
36 kernel/freezer.c & include/linux/freezer.h). User space processes are generally
43 For user space processes try_to_freeze() is called automatically from the
118 processes, but if any of the kernel threads may cause something like this
130 3. The third reason is to prevent user space processes and some kernel threads
160 4. Another reason for freezing tasks is to prevent user space processes from
162 space processes should not notice that such a system-wide operation has
183 space processes:
[all …]
/openbmc/linux/Documentation/security/
H A Dlandlock.rst16 kernel and other processes point of view. Landlock's interface must therefore
19 Landlock is designed to be usable by unprivileged processes while following the
24 Any user can enforce Landlock rulesets on their processes. They are merged and
41 processes.
43 only impact the processes requesting them.
82 processes (e.g. through a Unix domain socket). Such access rights will then be
/openbmc/google-misc/subprojects/metrics-ipmi-blobs/
H A DREADME.md11 4. Status of the top 10 processes: cmdline, utime, stime
12 5. File descriptor of top 10 processes: cmdline, file descriptor count
/openbmc/linux/security/landlock/
H A DKconfig8 Landlock is a sandboxing mechanism that enables processes to restrict
13 configured and enforced by any processes for themselves using the
/openbmc/openbmc/poky/scripts/pybootchartgui/pybootchartgui/tests/
H A Dparser_test.py44 processes = samples.process_map
45 sorted_processes = [processes[k] for k in sorted(processes.keys())]
/openbmc/openbmc/poky/meta/recipes-devtools/perl/files/
H A Derrno_ver.diff5 long-running processes.
10 processes embedding perl when upgrading to a newer version,
/openbmc/qemu/qga/
H A Dcommands.c108 QTAILQ_HEAD(, GuestExecInfo) processes;
110 .processes = QTAILQ_HEAD_INITIALIZER(guest_exec_state.processes),
129 QTAILQ_INSERT_TAIL(&guest_exec_state.processes, gei, next); in guest_exec_info_add()
138 QTAILQ_FOREACH(gei, &guest_exec_state.processes, next) { in guest_exec_info_find()
218 QTAILQ_REMOVE(&guest_exec_state.processes, gei, next); in qmp_guest_exec_status()

12345678910>>...20