/linux-6.12.1/security/loadpin/ |
D | loadpin.c | 46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 58 .procname = "enforce", 59 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 261 enforce ? "" : "not "); in loadpin_init() 446 module_param(enforce, int, 0); 447 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
D | Kconfig | 15 bool "Enforce LoadPin at boot" 21 If selected, LoadPin will enforce pinning at boot. If not 23 "loadpin.enforce=1".
|
/linux-6.12.1/security/ipe/ |
D | fs.c | 70 * setenforce() - Write handler for the securityfs node, "ipe/enforce" 89 old_value = READ_ONCE(enforce); in setenforce() 96 WRITE_ONCE(enforce, new_value); in setenforce() 103 * getenforce() - Read handler for the securityfs node, "ipe/enforce" 116 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce() 211 enforce_node = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
|
D | eval.c | 23 bool enforce = true; variable 378 if (!READ_ONCE(enforce)) in ipe_evaluate_event() 392 module_param(enforce, bool, 0400); 393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
|
D | audit.c | 143 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match() 273 * @new_enforce: The new value enforce to be set. 274 * @old_enforce: The old value currently in enforce.
|
D | eval.h | 19 extern bool enforce;
|
/linux-6.12.1/Documentation/admin-guide/LSM/ |
D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
/linux-6.12.1/fs/btrfs/ |
D | qgroup.h | 386 enum btrfs_qgroup_rsv_type type, bool enforce); 388 enum btrfs_qgroup_rsv_type type, bool enforce, 392 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 396 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 399 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 404 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
/linux-6.12.1/tools/arch/riscv/include/asm/ |
D | barrier.h | 16 /* These barriers need to enforce ordering on both devices and memory. */ 21 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux-6.12.1/drivers/gpu/drm/i915/display/ |
D | intel_fb_bo.c | 33 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init() 64 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
|
/linux-6.12.1/arch/riscv/include/asm/ |
D | barrier.h | 22 /* These barriers need to enforce ordering on both devices or memory. */ 27 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux-6.12.1/security/integrity/ |
D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 82 The .machine keyring can be configured to enforce CA restriction
|
/linux-6.12.1/kernel/livepatch/ |
D | transition.c | 196 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state() 200 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state() 390 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch() 615 * Enforce the order of the task->patch_state initializations and the in klp_init_transition() 619 * Also enforce the order of the klp_target_state write and future in klp_init_transition() 686 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
|
D | patch.c | 74 * In the enable path, enforce the order of the ops->func_stack and in klp_ftrace_handler() 89 * Enforce the order of the func->transition and in klp_ftrace_handler()
|
/linux-6.12.1/arch/x86/kvm/vmx/ |
D | sgx.c | 165 /* Enforce restriction of access to the PROVISIONKEY. */ in __handle_encls_ecreate() 175 * Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. Note in __handle_encls_ecreate() 191 /* Enforce CPUID restriction on max enclave size. */ in __handle_encls_ecreate() 275 * enforce restriction of access to the PROVISIONKEY. in handle_encls_ecreate() 437 * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
|
/linux-6.12.1/Documentation/hwmon/ |
D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
/linux-6.12.1/arch/powerpc/include/asm/ |
D | plpks.h | 18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce 19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
|
/linux-6.12.1/arch/arc/include/asm/ |
D | shmparam.h | 12 /* Enforce SHMLBA in shmat */
|
/linux-6.12.1/arch/x86/configs/ |
D | hardening.config | 13 # Enforce CET Indirect Branch Tracking in the kernel.
|
/linux-6.12.1/arch/arm/include/asm/ |
D | shmparam.h | 13 * Enforce SHMLBA in shmat
|
/linux-6.12.1/scripts/gdb/linux/ |
D | symbols.py | 33 # enforce update if object file is not found 175 # enforce update
|
/linux-6.12.1/arch/xtensa/include/asm/ |
D | fixmap.h | 31 /* Enforce that FIXADDR_START is PMD aligned to handle cache aliasing */
|
/linux-6.12.1/arch/powerpc/mm/book3s64/ |
D | pkeys.c | 440 * We only want to enforce protection keys on the current thread because we 444 * So do not enforce things if the VMA is not from the current mm, or if we are 453 * Do not enforce our key-permissions on a foreign vma. in arch_vma_access_permitted()
|
/linux-6.12.1/arch/x86/include/asm/ |
D | mmu_context.h | 242 * We only want to enforce protection keys on the current process 247 * So do not enforce things if the VMA is not from the current
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | btf_dedup_split.c | 16 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_simple() 134 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_fwd_resolve() 232 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_struct_duped() 335 btf__set_pointer_size(btf, 8); /* enforce 64-bit arch */ in btf_add_dup_struct_in_cu()
|