/linux/Documentation/driver-api/cxl/platform/example-configurations/ |
H A D | flexible.rst | 51 Restrictions : 0006 66 Restrictions : 0006 80 Restrictions : 0006 94 Restrictions : 0006 108 Restrictions : 0006 122 Restrictions : 0006 136 Restrictions : 0006
|
H A D | one-dev-per-hb.rst | 47 Restrictions : 0006 61 Restrictions : 0006
|
/linux/io_uring/ |
H A D | register.c | 109 struct io_restriction *restrictions) in io_parse_restrictions() argument 133 __set_bit(res[i].register_op, restrictions->register_op); in io_parse_restrictions() 138 __set_bit(res[i].sqe_op, restrictions->sqe_op); in io_parse_restrictions() 141 restrictions->sqe_flags_allowed = res[i].sqe_flags; in io_parse_restrictions() 144 restrictions->sqe_flags_required = res[i].sqe_flags; in io_parse_restrictions() 163 /* Restrictions allowed only if rings started disabled */ in io_register_restrictions() 167 /* We allow only a single restrictions registration */ in io_register_restrictions() 168 if (ctx->restrictions.registered) in io_register_restrictions() 171 ret = io_parse_restrictions(arg, nr_args, &ctx->restrictions); in io_register_restrictions() 172 /* Reset all restrictions if an error happened */ in io_register_restrictions() [all …]
|
/linux/Documentation/gpu/amdgpu/display/ |
H A D | mpo-overview.rst | 62 every DCN has different restrictions; here, we are just trying to provide the 65 Plane Restrictions 68 AMDGPU imposes restrictions on the use of DRM planes in the driver. 71 restrictions: 83 Cursor Restrictions 86 Before we start to describe some restrictions around cursor and MPO, see the 184 many more restrictions for a multi-display scenario. The below example shows a
|
/linux/arch/arm64/kvm/hyp/nvhe/ |
H A D | sys_regs.c | 186 * restrictions for protected VMs. 190 const struct pvm_ftr_bits restrictions[]) in get_restricted_features() argument 195 for (i = 0; restrictions[i].width != 0; i++) { in get_restricted_features() 196 bool (*vm_supported)(const struct kvm *) = restrictions[i].vm_supported; in get_restricted_features() 197 bool sign = restrictions[i].sign; in get_restricted_features() 198 int shift = restrictions[i].shift; in get_restricted_features() 199 int width = restrictions[i].width; in get_restricted_features() 204 u64 pvm_max = restrictions[i].max_val; in get_restricted_features()
|
/linux/Documentation/firmware-guide/acpi/ |
H A D | acpi-lid.rst | 22 exceptional buggy platforms, special restrictions and exceptions should be 23 taken into account. This document describes the restrictions and the 27 Restrictions of the returning value of the _LID control method 39 Restrictions of the lid state change notifications
|
/linux/Documentation/userspace-api/ |
H A D | landlock.rst | 58 space may not know each other's supported restrictions), hence the need 221 security policy; only adding more restrictions is allowed. These threads are 294 restrictions from its parent. This is similar to seccomp inheritance (cf. 307 Ptrace restrictions 311 then be subject to additional restrictions when manipulating another process. 319 Similar to the implicit `Ptrace restrictions`_, we may want to further restrict 478 Threads sandboxed with filesystem restrictions cannot modify filesystem 491 restricted. However, thanks to the `ptrace restrictions`_, access to such 544 restrict access to files, also implies inheritance of the ruleset restrictions 681 Using user space processes to enforce restrictions on kernel resources can lead [all …]
|
/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 6 system-wide allowlist. These restrictions also prohibit the given UIDs/GIDs 37 additional restrictions imposed by this LSM would mean it is a "safer" version 114 setgroups() calls for processes with CAP_SETGID restrictions. Until we add 116 policies add no meaningful security. setgroups() restrictions will be enforced
|
H A D | Yama.rst | 45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)`` 75 The original children-only logic was based on the restrictions in grsecurity.
|
/linux/Documentation/devicetree/bindings/interrupt-controller/ |
H A D | msi.txt | 22 MSI controllers may have restrictions on permitted payloads. 70 If a device has restrictions on the allocation of MSIs, these restrictions
|
/linux/include/video/ |
H A D | imx-ipu-image-convert.h | 44 * ipu_image_convert_adjust() - adjust input/output images to IPU restrictions. 57 * and rotation mode meet IPU restrictions. 63 * Returns 0 if the formats and rotation mode meet IPU restrictions,
|
/linux/Documentation/mm/ |
H A D | highmem.rst | 88 come with restrictions about the pointers validity. Contrary to kmap() 108 restrictions imposed on kmap_local_page(). Furthermore, the code between 134 restrictions imposed on kmap_local_page(). In particular, it is necessary to 141 restrictions on preemption or migration. It comes with an overhead as mapping
|
/linux/Documentation/gpu/rfc/ |
H A D | i915_small_bar.rst | 37 Error Capture restrictions 39 With error capture we have two new restrictions:
|
/linux/drivers/net/wireless/intel/iwlwifi/fw/api/ |
H A D | power.h | 289 * @per_chain: per chain restrictions 299 * @per_chain: per chain restrictions 312 * @per_chain: per chain restrictions 333 * @per_chain: per chain restrictions 370 * @per_band: per band restrictions 391 * @per_chain: per chain restrictions 410 * @per_chain: per chain restrictions
|
/linux/security/integrity/ |
H A D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 83 on any key added to it. By default no restrictions are in place
|
/linux/Documentation/arch/powerpc/ |
H A D | vas-api.rst | 105 error codes and restrictions. 162 restrictions. 174 Only restrictions on mmap for a NX-GZIP device fd are: 179 Refer to mmap(2) man page for additional details/restrictions.
|
/linux/Documentation/misc-devices/ |
H A D | xilinx_sdfec.rst | 138 Setting the order can only be done if the following restrictions are met: 155 Adding LDPC codes can only be done if the following restrictions are met: 166 Adding Turbo decode can only be done if the following restrictions are met: 186 Bypassing the SD-FEC can only be done if the following restrictions are met:
|
/linux/Documentation/core-api/ |
H A D | memory-allocation.rst | 84 driver for a device with such restrictions, avoid using these flags. 85 And even with hardware with restrictions it is preferable to use 164 will be retried with `vmalloc`. There are restrictions on which GFP
|
/linux/drivers/cxl/ |
H A D | acpi.c | 112 static unsigned long cfmws_to_decoder_flags(int restrictions) in cfmws_to_decoder_flags() argument 116 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_TYPE2) in cfmws_to_decoder_flags() 118 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_TYPE3) in cfmws_to_decoder_flags() 120 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_VOLATILE) in cfmws_to_decoder_flags() 122 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_PMEM) in cfmws_to_decoder_flags() 124 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_FIXED) in cfmws_to_decoder_flags() 439 cxld->flags = cfmws_to_decoder_flags(cfmws->restrictions); in DEFINE_FREE()
|
/linux/arch/m68k/math-emu/ |
H A D | fp_emu.h | 21 * required INSTEAD OF the above restrictions. (This clause is 23 * the restrictions contained in a BSD-style copyright.)
|
/linux/security/landlock/ |
H A D | fs.c | 402 * Check that a destination file hierarchy has more restrictions than a source 425 * Checks if the destination restrictions are a in no_more_access() 428 * restrictions(parent2) >= restrictions(child1) in no_more_access() 441 * Checks inverted restrictions for RENAME_EXCHANGE: in no_more_access() 442 * restrictions(parent1) >= restrictions(child2) in no_more_access() 542 * infer most of the filesystem restrictions from their domain. To in test_no_more_access() 744 * This helper first checks that the destination has a superset of restrictions 846 * least as much as restrictions on the destination than on the in is_access_to_paths_allowed() 1112 * if the destination one has more (or the same) restrictions as the source 1244 * hierarchy is not a superset of restrictions of the source directory in current_check_refer_path()
|
/linux/tools/testing/cxl/test/ |
H A D | cxl.c | 213 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 228 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 243 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 258 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 273 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 288 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 305 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 321 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 337 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 |
|
/linux/LICENSES/dual/ |
H A D | copyleft-next-0.3.1 | 55 4. Condition Against Further Restrictions; Inbound License Compatibility 58 restrictions on the exercise of rights in the Covered Work granted under 60 restrictions result from Your compliance with conditions or obligations
|
/linux/drivers/gpu/drm/ |
H A D | drm_encoder.c | 43 * userspace to infer cloning and connector/CRTC restrictions. Unfortunately 45 * top of that the exposed restrictions are too simple for today's hardware, and 46 * the recommended way to infer restrictions is by using the
|
/linux/security/safesetid/ |
H A D | lsm.c | 196 /* Do nothing if there are no setuid restrictions for our old RUID. */ in safesetid_task_fix_setuid() 220 /* Do nothing if there are no setgid restrictions for our old RGID. */ in safesetid_task_fix_setgid() 243 /* Do nothing if there are no setgid restrictions for our old RGID. */ in safesetid_task_fix_setgroups()
|