Home
last modified time | relevance | path

Searched full:restrict (Results 1 – 25 of 376) sorted by relevance

12345678910>>...16

/linux-6.12.1/drivers/net/wireless/intel/iwlwifi/cfg/
D22000.c188 * so we need to restrict the size of transmitted aggregation to the
224 * so we need to restrict the size of transmitted aggregation to the
237 * so we need to restrict the size of transmitted aggregation to the
250 * so we need to restrict the size of transmitted aggregation to the
262 * so we need to restrict the size of transmitted aggregation to the
275 * so we need to restrict the size of transmitted aggregation to the
288 * so we need to restrict the size of transmitted aggregation to the
300 * so we need to restrict the size of transmitted aggregation to the
314 * so we need to restrict the size of transmitted aggregation to the
327 * so we need to restrict the size of transmitted aggregation to the
[all …]
/linux-6.12.1/certs/
Dsystem_keyring.c36 * restrict_link_by_builtin_trusted - Restrict keyring addition by built-in CA
42 * Restrict the addition of keys into a keyring based on the key-to-be-added
55 * restrict_link_by_digsig_builtin - Restrict digitalSignature key additions by the built-in keyring
61 * Restrict the addition of keys into a keyring based on the key-to-be-added
76 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring
83 * Restrict the addition of keys into a keyring based on the key-to-be-added
107 * restrict_link_by_digsig_builtin_and_secondary - Restrict by digitalSignature.
113 * Restrict the addition of keys into a keyring based on the key-to-be-added
196 * restrict_link_by_builtin_secondary_and_machine - Restrict keyring addition.
202 * Restrict the addition of keys into a keyring based on the key-to-be-added
/linux-6.12.1/tools/testing/selftests/bpf/progs/
Dbtf_dump_test_case_syntax.c67 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v…
226 void * restrict g;
/linux-6.12.1/Documentation/userspace-api/
Dlandlock.rst19 any process, including unprivileged ones, to securely restrict themselves.
33 perform. A set of rules is aggregated in a ruleset, which can then restrict
194 The next step is to restrict the current thread from gaining more privileges
202 perror("Failed to restrict privileges");
274 be tied, either via the source or the destination path. These rules restrict
275 access when they are encountered on a path, which means that they can restrict
286 OverlayFS layer will not restrict the resulted merged hierarchy, and vice versa.
319 Similar to the implicit `Ptrace restrictions`_, we may want to further restrict
495 restrict such paths with dedicated ruleset flags.
545 restrict access to files, also implies inheritance of the ruleset restrictions
[all …]
/linux-6.12.1/include/uapi/linux/
Dlandlock.h141 * These flags enable to restrict a sandboxed process to a set of actions on
238 * It is currently not possible to restrict some file-related actions
243 * Future Landlock evolutions will enable to restrict them.
270 * These flags enable to restrict a sandboxed process to a set of network
296 * - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from
299 * - %LANDLOCK_SCOPE_SIGNAL: Restrict a sandboxed process from sending a signal
Dbtf.h45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT,
71 BTF_KIND_RESTRICT = 11, /* Restrict */
Dtiocl.h33 #define TIOCL_SETKMSGREDIRECT 11 /* restrict kernel messages to a vt */
/linux-6.12.1/crypto/asymmetric_keys/
Drestrict.c54 * restrict_link_by_signature - Restrict additions to a ring of public keys
116 * restrict_link_by_ca - Restrict additions to a ring of CA keys
156 * restrict_link_by_digsig - Restrict additions to a ring of digsig keys
311 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public
338 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
/linux-6.12.1/arch/arm64/kvm/hyp/include/nvhe/
Dfixed_config.h47 * Restrict to the following *unsigned* features for protected VMs:
89 * Restrict to the following *unsigned* features for protected VMs:
187 /* Restrict pointer authentication to the basic version. */
/linux-6.12.1/scripts/genksyms/
Dkeywords.c28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO
32 { "restrict", RESTRICT_KEYW },
/linux-6.12.1/Documentation/devicetree/bindings/leds/
Drichtek,rt8515.yaml64 the device tree, you can further restrict the maximum
76 the device tree, you can further restrict the maximum
/linux-6.12.1/Documentation/crypto/
Dasymmetric-keys.rst338 1) Restrict using the kernel builtin trusted keyring
348 2) Restrict using the kernel builtin and secondary trusted keyrings
359 3) Restrict using a separate key or keyring
383 # Create and restrict a keyring for the certificate chain
404 # Restrict the keyring that already has root1.cert linked. The cert
/linux-6.12.1/samples/landlock/
Dsandboxer.c315 " - \"a\" to restrict opening abstract unix sockets\n"
316 " - \"s\" to restrict sending signals\n"
394 * should then fall back to not restrict themselves at all if in main()
476 perror("Failed to restrict privileges"); in main()
/linux-6.12.1/include/uapi/sound/
Dasequencer.h393 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */
394 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */
395 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */
396 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */
398 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */
400 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dbtf_write.c54 /* PTR/CONST/VOLATILE/RESTRICT */ in gen_btf()
63 id = btf__add_const(btf, 5); /* points forward to restrict */ in gen_btf()
85 "[5] RESTRICT '(anon)' type_id=4", "raw_dump"); in gen_btf()
371 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add()
430 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add_btf()
465 "[27] RESTRICT '(anon)' type_id=26", in test_btf_add_btf()
Dbtf_field_iter.c71 btf__add_restrict(btf, 3); /* [12] restrict int *; */ in test_btf_field_iter()
110 "[12] RESTRICT '(anon)' type_id=3", in test_btf_field_iter()
Dbtf_distill.c111 btf__add_restrict(btf2, 7); /* [21] restrict union (anon) */ in test_distilled_base()
115 btf__add_ptr(btf2, 11); /* [25] restrict enum64 (anon) */ in test_distilled_base()
161 "[21] RESTRICT '(anon)' type_id=7", in test_distilled_base()
195 "[11] RESTRICT '(anon)' type_id=21", in test_distilled_base()
260 "[21] RESTRICT '(anon)' type_id=31", in test_distilled_base()
/linux-6.12.1/tools/build/feature/
Dtest-scandirat.c9 // expects non-NULL, arg3 is 'restrict' so "pointers" have to be different in main()
/linux-6.12.1/tools/include/uapi/linux/
Dbtf.h45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT,
71 BTF_KIND_RESTRICT = 11, /* Restrict */
/linux-6.12.1/security/safesetid/
DKconfig9 restrict UID/GID transitions from a given UID/GID to only those
/linux-6.12.1/drivers/media/i2c/
Daptina-pll.c97 * restrict the number of mf values to be checked. in aptina_pll_calculate()
99 * Furthermore, conditions (4) and (5) only restrict the range of in aptina_pll_calculate()
/linux-6.12.1/Documentation/devicetree/bindings/iommu/
Dxen,grant-dma.yaml16 The binding is required to restrict memory access using Xen grant mappings.
/linux-6.12.1/security/landlock/
DKconfig9 Landlock is a sandboxing mechanism that enables processes to restrict
/linux-6.12.1/Documentation/admin-guide/LSM/
DSafeSetID.rst4 SafeSetID is an LSM module that gates the setid family of syscalls to restrict
29 generally feasible way in Linux to restrict the potential UIDs that a user can
/linux-6.12.1/Documentation/mm/
Dnuma.rst106 System administrators and application designers can restrict a task's migration
113 System administrators can restrict the CPUs and nodes' memories that a non-

12345678910>>...16