/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-kernel-mm-damon | 29 file updates contents of schemes stats files of the kdamond. 141 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/nr_schemes 146 of the context named '0' to 'N-1' under the schemes/ directory. 148 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/action 154 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/sz/min 160 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/sz/max 166 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/nr_accesses/… 172 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/nr_accesses/… 178 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/age/min 184 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/access_pattern/age/max [all …]
|
/openbmc/linux/Documentation/translations/zh_CN/admin-guide/mm/damon/ |
H A D | usage.rst | 75 │ │ │ │ │ schemes/nr_schemes 138 ``targets``, 和 ``schemes``)。 198 contexts/<N>/schemes/ 208 schemes/<N>/ 226 schemes/<N>/access_pattern/ 236 schemes/<N>/quotas/ 255 schemes/<N>/watermarks/ 273 schemes/<N>/stats/ 284 schemes/<N>/tried_regions/ 314 # echo 1 > kdamonds/0/contexts/0/schemes/nr_schemes [all …]
|
H A D | start.rst | 124 $ damo schemes -c test_scheme <pid of your workload>
|
/openbmc/phosphor-misc/http-redirect/ |
H A D | test.awk | 158 function mkabsuris(uris, host, ports, schemes, scheme, port) 160 mkschemes(schemes) 162 for (scheme in schemes) 164 add(uris, schemes[scheme] "://" host ports[port] ) 167 function mkschemes(schemes, h, t1, t2, p, hs, ts, ps) { 176 add(schemes, hs[h] ts[t1] ts[t2] ps[p])
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libusbgx/ |
H A D | libusbgx_git.bb | 23 PACKAGECONFIG ??= "examples gadget-schemes libconfig" 26 PACKAGECONFIG[gadget-schemes] = "--enable-gadget-schemes,--disable-gadget-schemes"
|
/openbmc/linux/mm/damon/ |
H A D | dbgfs.c | 193 static void free_schemes_arr(struct damos **schemes, ssize_t nr_schemes) in free_schemes_arr() argument 198 kfree(schemes[i]); in free_schemes_arr() 199 kfree(schemes); in free_schemes_arr() 235 struct damos *scheme, **schemes; in str_to_schemes() local 241 schemes = kmalloc_array(max_nr_schemes, sizeof(scheme), in str_to_schemes() 243 if (!schemes) in str_to_schemes() 286 schemes[*nr_schemes] = scheme; in str_to_schemes() 289 return schemes; in str_to_schemes() 291 free_schemes_arr(schemes, *nr_schemes); in str_to_schemes() 300 struct damos **schemes; in dbgfs_schemes_write() local [all …]
|
H A D | sysfs-schemes.c | 1388 void damon_sysfs_schemes_rm_dirs(struct damon_sysfs_schemes *schemes) in damon_sysfs_schemes_rm_dirs() argument 1390 struct damon_sysfs_scheme **schemes_arr = schemes->schemes_arr; in damon_sysfs_schemes_rm_dirs() 1393 for (i = 0; i < schemes->nr; i++) { in damon_sysfs_schemes_rm_dirs() 1397 schemes->nr = 0; in damon_sysfs_schemes_rm_dirs() 1399 schemes->schemes_arr = NULL; in damon_sysfs_schemes_rm_dirs() 1402 static int damon_sysfs_schemes_add_dirs(struct damon_sysfs_schemes *schemes, in damon_sysfs_schemes_add_dirs() argument 1408 damon_sysfs_schemes_rm_dirs(schemes); in damon_sysfs_schemes_add_dirs() 1416 schemes->schemes_arr = schemes_arr; in damon_sysfs_schemes_add_dirs() 1421 damon_sysfs_schemes_rm_dirs(schemes); in damon_sysfs_schemes_add_dirs() 1426 &damon_sysfs_scheme_ktype, &schemes->kobj, in damon_sysfs_schemes_add_dirs() [all …]
|
H A D | sysfs.c | 637 struct damon_sysfs_schemes *schemes; member 694 struct damon_sysfs_schemes *schemes = damon_sysfs_schemes_alloc(); in damon_sysfs_context_set_schemes() local 697 if (!schemes) in damon_sysfs_context_set_schemes() 699 err = kobject_init_and_add(&schemes->kobj, &damon_sysfs_schemes_ktype, in damon_sysfs_context_set_schemes() 702 kobject_put(&schemes->kobj); in damon_sysfs_context_set_schemes() 705 context->schemes = schemes; in damon_sysfs_context_set_schemes() 741 damon_sysfs_schemes_rm_dirs(context->schemes); in damon_sysfs_context_rm_dirs() 742 kobject_put(&context->schemes->kobj); in damon_sysfs_context_rm_dirs() 1275 kdamond->contexts->contexts_arr[0]->schemes, ctx); in damon_sysfs_upd_schemes_stats() 1287 kdamond->contexts->contexts_arr[0]->schemes, ctx, in damon_sysfs_upd_schemes_regions_start() [all …]
|
H A D | Makefile | 6 obj-$(CONFIG_DAMON_SYSFS) += sysfs-common.o sysfs-schemes.o sysfs.o
|
H A D | sysfs-common.h | 37 void damon_sysfs_schemes_rm_dirs(struct damon_sysfs_schemes *schemes);
|
H A D | core.c | 359 list_add_tail(&s->list, &ctx->schemes); in damon_add_scheme() 464 INIT_LIST_HEAD(&ctx->schemes); in damon_new_ctx() 604 void damon_set_schemes(struct damon_ctx *ctx, struct damos **schemes, in damon_set_schemes() argument 613 damon_add_scheme(ctx, schemes[i]); in damon_set_schemes() 1478 if (!list_empty(&ctx->schemes)) in kdamond_fn()
|
H A D | reclaim.c | 178 if (!list_empty(&ctx->schemes)) { in damon_reclaim_apply_parameters()
|
/openbmc/linux/include/linux/ |
H A D | damon.h | 559 struct list_head schemes; member 604 list_for_each_entry(s, &(ctx)->schemes, list) 607 list_for_each_entry_safe(s, next, &(ctx)->schemes, list) 659 struct damos **schemes, ssize_t nr_schemes);
|
/openbmc/linux/Documentation/admin-guide/mm/damon/ |
H A D | usage.rst | 78 │ │ │ │ │ schemes/nr_schemes 163 and three directories (``monitoring_attrs``, ``targets``, and ``schemes``) 258 contexts/<N>/schemes/ 262 <damon_design_damos>`). Users can get and set the schemes by reading from and 269 schemes/<N>/ 300 schemes/<N>/access_pattern/ 313 schemes/<N>/quotas/ 336 schemes/<N>/watermarks/ 355 schemes/<N>/filters/ 405 schemes/<N>/stats/ [all …]
|
H A D | start.rst | 125 $ sudo damo schemes --damos_access_rate 0 0 --damos_sz_region 4K max \
|
/openbmc/openbmc/meta-openembedded/meta-python/recipes-devtools/python/ |
H A D | python3-custom-inherit_2.4.1.bb | 1 SUMMARY = "A Python package that provides customized docstring inheritance schemes between derived …
|
H A D | python3-passlib_1.7.4.bb | 1 SUMMARY = "comprehensive password hashing framework supporting over 30 schemes"
|
/openbmc/u-boot/doc/ |
H A D | README.nand | 238 Though higher ECC schemes have more capability to detect and correct 242 SoC cannot support BCHx_HW ECC schemes. 244 With higher ECC schemes, more OOB/Spare area is required to 255 3 for HAM1_xx ecc schemes 256 7 for BCH4_xx ecc schemes 257 14 for BCH8_xx ecc schemes 258 26 for BCH16_xx ecc schemes
|
/openbmc/linux/drivers/net/ethernet/freescale/fman/ |
H A D | fman_keygen.c | 230 struct keygen_scheme schemes[FM_KG_MAX_NUM_OF_SCHEMES]; member 423 if (!keygen->schemes[i].used) { in get_free_scheme_id() 445 return &keygen->schemes[scheme_id]; in get_scheme()
|
/openbmc/linux/Documentation/arch/mips/ |
H A D | booting.rst | 8 Both schemes are supported; CONFIG_BOOT_RAW=y and CONFIG_NO_EXCEPT_FILL=y,
|
/openbmc/linux/Documentation/mm/damon/ |
H A D | design.rst | 236 One straightforward approach for such schemes would be profile-guided 246 effective, and therefore widely be used. However, implementing such schemes 254 Schemes (DAMOS). It lets users specify their desired schemes at a high 289 The access pattern of the schemes' interest. The patterns are constructed with 360 is activated. If all schemes are deactivated by the watermarks, the monitoring 377 To let users optimize DAMOS schemes with such special knowledge, DAMOS provides 389 list. Hence, users can apply specific schemes to only anonymous pages,
|
/openbmc/linux/security/smack/ |
H A D | Kconfig | 13 of other mandatory security schemes.
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | ODC-By-1.0 | 103 3.2 Compulsory license schemes. For the avoidance of doubt: 105 …a. Non-waivable compulsory license schemes. In those jurisdictions in which the right to collect r… 107 …b. Waivable compulsory license schemes. In those jurisdictions in which the right to collect royal… 109 …schemes. The Licensor waives the right to collect royalties, whether individually or, in the event…
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 348 Computer systems employ a variety of schemes to constrain how information is 349 shared among the people and services using the machine. Some of these schemes 351 access to pieces of data. These schemes are called discretionary access 353 of the user. Other schemes do not leave the decision regarding what a user or 354 program can access up to users or programs. These schemes are called mandatory 502 be "born" highly classified. To accommodate such schemes Smack includes a 552 schemes and concepts from other systems. Most often, the other systems are 650 of systems that use compatible labeling schemes, and the DOI specified on the
|
/openbmc/u-boot/doc/device-tree-bindings/reset/ |
H A D | reset.txt | 17 are dictated by the binding of the reset provider, although common schemes
|