/linux-6.12.1/drivers/net/wireless/intel/iwlwifi/cfg/ |
D | 22000.c | 188 * so we need to restrict the size of transmitted aggregation to the 224 * so we need to restrict the size of transmitted aggregation to the 237 * so we need to restrict the size of transmitted aggregation to the 250 * so we need to restrict the size of transmitted aggregation to the 262 * so we need to restrict the size of transmitted aggregation to the 275 * so we need to restrict the size of transmitted aggregation to the 288 * so we need to restrict the size of transmitted aggregation to the 300 * so we need to restrict the size of transmitted aggregation to the 314 * so we need to restrict the size of transmitted aggregation to the 327 * so we need to restrict the size of transmitted aggregation to the [all …]
|
/linux-6.12.1/certs/ |
D | system_keyring.c | 36 * restrict_link_by_builtin_trusted - Restrict keyring addition by built-in CA 42 * Restrict the addition of keys into a keyring based on the key-to-be-added 55 * restrict_link_by_digsig_builtin - Restrict digitalSignature key additions by the built-in keyring 61 * Restrict the addition of keys into a keyring based on the key-to-be-added 76 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring 83 * Restrict the addition of keys into a keyring based on the key-to-be-added 107 * restrict_link_by_digsig_builtin_and_secondary - Restrict by digitalSignature. 113 * Restrict the addition of keys into a keyring based on the key-to-be-added 196 * restrict_link_by_builtin_secondary_and_machine - Restrict keyring addition. 202 * Restrict the addition of keys into a keyring based on the key-to-be-added
|
/linux-6.12.1/tools/testing/selftests/bpf/progs/ |
D | btf_dump_test_case_syntax.c | 67 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v… 226 void * restrict g;
|
/linux-6.12.1/Documentation/userspace-api/ |
D | landlock.rst | 19 any process, including unprivileged ones, to securely restrict themselves. 33 perform. A set of rules is aggregated in a ruleset, which can then restrict 194 The next step is to restrict the current thread from gaining more privileges 202 perror("Failed to restrict privileges"); 274 be tied, either via the source or the destination path. These rules restrict 275 access when they are encountered on a path, which means that they can restrict 286 OverlayFS layer will not restrict the resulted merged hierarchy, and vice versa. 319 Similar to the implicit `Ptrace restrictions`_, we may want to further restrict 495 restrict such paths with dedicated ruleset flags. 545 restrict access to files, also implies inheritance of the ruleset restrictions [all …]
|
/linux-6.12.1/include/uapi/linux/ |
D | landlock.h | 141 * These flags enable to restrict a sandboxed process to a set of actions on 238 * It is currently not possible to restrict some file-related actions 243 * Future Landlock evolutions will enable to restrict them. 270 * These flags enable to restrict a sandboxed process to a set of network 296 * - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from 299 * - %LANDLOCK_SCOPE_SIGNAL: Restrict a sandboxed process from sending a signal
|
D | btf.h | 45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT, 71 BTF_KIND_RESTRICT = 11, /* Restrict */
|
D | tiocl.h | 33 #define TIOCL_SETKMSGREDIRECT 11 /* restrict kernel messages to a vt */
|
/linux-6.12.1/crypto/asymmetric_keys/ |
D | restrict.c | 54 * restrict_link_by_signature - Restrict additions to a ring of public keys 116 * restrict_link_by_ca - Restrict additions to a ring of CA keys 156 * restrict_link_by_digsig - Restrict additions to a ring of digsig keys 311 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public 338 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
|
/linux-6.12.1/arch/arm64/kvm/hyp/include/nvhe/ |
D | fixed_config.h | 47 * Restrict to the following *unsigned* features for protected VMs: 89 * Restrict to the following *unsigned* features for protected VMs: 187 /* Restrict pointer authentication to the basic version. */
|
/linux-6.12.1/scripts/genksyms/ |
D | keywords.c | 28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO 32 { "restrict", RESTRICT_KEYW },
|
/linux-6.12.1/Documentation/devicetree/bindings/leds/ |
D | richtek,rt8515.yaml | 64 the device tree, you can further restrict the maximum 76 the device tree, you can further restrict the maximum
|
/linux-6.12.1/Documentation/crypto/ |
D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 348 2) Restrict using the kernel builtin and secondary trusted keyrings 359 3) Restrict using a separate key or keyring 383 # Create and restrict a keyring for the certificate chain 404 # Restrict the keyring that already has root1.cert linked. The cert
|
/linux-6.12.1/samples/landlock/ |
D | sandboxer.c | 315 " - \"a\" to restrict opening abstract unix sockets\n" 316 " - \"s\" to restrict sending signals\n" 394 * should then fall back to not restrict themselves at all if in main() 476 perror("Failed to restrict privileges"); in main()
|
/linux-6.12.1/include/uapi/sound/ |
D | asequencer.h | 393 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */ 394 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */ 395 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */ 396 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */ 398 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */ 400 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | btf_write.c | 54 /* PTR/CONST/VOLATILE/RESTRICT */ in gen_btf() 63 id = btf__add_const(btf, 5); /* points forward to restrict */ in gen_btf() 85 "[5] RESTRICT '(anon)' type_id=4", "raw_dump"); in gen_btf() 371 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add() 430 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add_btf() 465 "[27] RESTRICT '(anon)' type_id=26", in test_btf_add_btf()
|
D | btf_field_iter.c | 71 btf__add_restrict(btf, 3); /* [12] restrict int *; */ in test_btf_field_iter() 110 "[12] RESTRICT '(anon)' type_id=3", in test_btf_field_iter()
|
D | btf_distill.c | 111 btf__add_restrict(btf2, 7); /* [21] restrict union (anon) */ in test_distilled_base() 115 btf__add_ptr(btf2, 11); /* [25] restrict enum64 (anon) */ in test_distilled_base() 161 "[21] RESTRICT '(anon)' type_id=7", in test_distilled_base() 195 "[11] RESTRICT '(anon)' type_id=21", in test_distilled_base() 260 "[21] RESTRICT '(anon)' type_id=31", in test_distilled_base()
|
/linux-6.12.1/tools/build/feature/ |
D | test-scandirat.c | 9 // expects non-NULL, arg3 is 'restrict' so "pointers" have to be different in main()
|
/linux-6.12.1/tools/include/uapi/linux/ |
D | btf.h | 45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT, 71 BTF_KIND_RESTRICT = 11, /* Restrict */
|
/linux-6.12.1/security/safesetid/ |
D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those
|
/linux-6.12.1/drivers/media/i2c/ |
D | aptina-pll.c | 97 * restrict the number of mf values to be checked. in aptina_pll_calculate() 99 * Furthermore, conditions (4) and (5) only restrict the range of in aptina_pll_calculate()
|
/linux-6.12.1/Documentation/devicetree/bindings/iommu/ |
D | xen,grant-dma.yaml | 16 The binding is required to restrict memory access using Xen grant mappings.
|
/linux-6.12.1/security/landlock/ |
D | Kconfig | 9 Landlock is a sandboxing mechanism that enables processes to restrict
|
/linux-6.12.1/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 4 SafeSetID is an LSM module that gates the setid family of syscalls to restrict 29 generally feasible way in Linux to restrict the potential UIDs that a user can
|
/linux-6.12.1/Documentation/mm/ |
D | numa.rst | 106 System administrators and application designers can restrict a task's migration 113 System administrators can restrict the CPUs and nodes' memories that a non-
|