Home
last modified time | relevance | path

Searched full:enforce (Results 1 – 25 of 675) sorted by relevance

12345678910>>...27

/linux-6.12.1/security/loadpin/
Dloadpin.c46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable
58 .procname = "enforce",
59 .data = &enforce,
120 if (enforce) { in loadpin_sb_free_security()
145 if (!enforce) { in loadpin_check()
178 if (unlikely(!enforce)) { in loadpin_check()
261 enforce ? "" : "not "); in loadpin_init()
446 module_param(enforce, int, 0);
447 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
DKconfig15 bool "Enforce LoadPin at boot"
21 If selected, LoadPin will enforce pinning at boot. If not
23 "loadpin.enforce=1".
/linux-6.12.1/security/ipe/
Dfs.c70 * setenforce() - Write handler for the securityfs node, "ipe/enforce"
89 old_value = READ_ONCE(enforce); in setenforce()
96 WRITE_ONCE(enforce, new_value); in setenforce()
103 * getenforce() - Read handler for the securityfs node, "ipe/enforce"
116 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce()
211 enforce_node = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
Deval.c23 bool enforce = true; variable
378 if (!READ_ONCE(enforce)) in ipe_evaluate_event()
392 module_param(enforce, bool, 0400);
393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
Daudit.c143 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match()
273 * @new_enforce: The new value enforce to be set.
274 * @old_enforce: The old value currently in enforce.
Deval.h19 extern bool enforce;
/linux-6.12.1/Documentation/admin-guide/LSM/
DLoadPin.rst9 and/or unchangeable filesystem to enforce module and firmware loading
14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at
15 boot ("``loadpin.enforce=0``").
/linux-6.12.1/fs/btrfs/
Dqgroup.h386 enum btrfs_qgroup_rsv_type type, bool enforce);
388 enum btrfs_qgroup_rsv_type type, bool enforce,
392 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument
396 enforce, false); in btrfs_qgroup_reserve_meta_pertrans()
399 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument
404 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
/linux-6.12.1/tools/arch/riscv/include/asm/
Dbarrier.h16 /* These barriers need to enforce ordering on both devices and memory. */
21 /* These barriers do not need to enforce ordering on devices, just memory. */
/linux-6.12.1/drivers/gpu/drm/i915/display/
Dintel_fb_bo.c33 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
64 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
/linux-6.12.1/arch/riscv/include/asm/
Dbarrier.h22 /* These barriers need to enforce ordering on both devices or memory. */
27 /* These barriers do not need to enforce ordering on devices, just memory. */
/linux-6.12.1/security/integrity/
DKconfig78 bool "Enforce Machine Keyring CA Restrictions"
82 The .machine keyring can be configured to enforce CA restriction
/linux-6.12.1/kernel/livepatch/
Dtransition.c196 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state()
200 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state()
390 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch()
615 * Enforce the order of the task->patch_state initializations and the in klp_init_transition()
619 * Also enforce the order of the klp_target_state write and future in klp_init_transition()
686 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
Dpatch.c74 * In the enable path, enforce the order of the ops->func_stack and in klp_ftrace_handler()
89 * Enforce the order of the func->transition and in klp_ftrace_handler()
/linux-6.12.1/arch/x86/kvm/vmx/
Dsgx.c165 /* Enforce restriction of access to the PROVISIONKEY. */ in __handle_encls_ecreate()
175 * Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. Note in __handle_encls_ecreate()
191 /* Enforce CPUID restriction on max enclave size. */ in __handle_encls_ecreate()
275 * enforce restriction of access to the PROVISIONKEY. in handle_encls_ecreate()
437 * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
/linux-6.12.1/Documentation/hwmon/
Docc.rst121 Maximum power cap that the OCC can enforce in
123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
/linux-6.12.1/arch/powerpc/include/asm/
Dplpks.h18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce
19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
/linux-6.12.1/arch/arc/include/asm/
Dshmparam.h12 /* Enforce SHMLBA in shmat */
/linux-6.12.1/arch/x86/configs/
Dhardening.config13 # Enforce CET Indirect Branch Tracking in the kernel.
/linux-6.12.1/arch/arm/include/asm/
Dshmparam.h13 * Enforce SHMLBA in shmat
/linux-6.12.1/scripts/gdb/linux/
Dsymbols.py33 # enforce update if object file is not found
175 # enforce update
/linux-6.12.1/arch/xtensa/include/asm/
Dfixmap.h31 /* Enforce that FIXADDR_START is PMD aligned to handle cache aliasing */
/linux-6.12.1/arch/powerpc/mm/book3s64/
Dpkeys.c440 * We only want to enforce protection keys on the current thread because we
444 * So do not enforce things if the VMA is not from the current mm, or if we are
453 * Do not enforce our key-permissions on a foreign vma. in arch_vma_access_permitted()
/linux-6.12.1/arch/x86/include/asm/
Dmmu_context.h242 * We only want to enforce protection keys on the current process
247 * So do not enforce things if the VMA is not from the current
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dbtf_dedup_split.c16 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_simple()
134 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_fwd_resolve()
232 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_struct_duped()
335 btf__set_pointer_size(btf, 8); /* enforce 64-bit arch */ in btf_add_dup_struct_in_cu()

12345678910>>...27