/linux/security/loadpin/ |
H A D | loadpin.c | 46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 58 .procname = "enforce", 59 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 261 enforce ? "" : "not "); in loadpin_init() 442 module_param(enforce, int, 0); 443 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
/linux/security/ipe/ |
H A D | fs.c | 67 * setenforce() - Write handler for the securityfs node, "ipe/enforce" 86 old_value = READ_ONCE(enforce); in setenforce() 93 WRITE_ONCE(enforce, new_value); in setenforce() 100 * getenforce() - Read handler for the securityfs node, "ipe/enforce" 113 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce() 216 dentry = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
|
H A D | eval.c | 23 bool enforce = true; variable 378 if (!READ_ONCE(enforce)) in ipe_evaluate_event() 392 module_param(enforce, bool, 0400); 393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
|
H A D | audit.c | 145 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match() 259 * @new_enforce: The new value enforce to be set. in ipe_audit_policy_load() 260 * @old_enforce: The old value currently in enforce. in ipe_audit_policy_load()
|
H A D | eval.h | 19 extern bool enforce;
|
/linux/Documentation/admin-guide/LSM/ |
H A D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
/linux/fs/btrfs/ |
H A D | qgroup.h | 396 enum btrfs_qgroup_rsv_type type, bool enforce); 398 enum btrfs_qgroup_rsv_type type, bool enforce, 402 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 406 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 409 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 414 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
/linux/tools/arch/riscv/include/asm/ |
H A D | barrier.h | 16 /* These barriers need to enforce ordering on both devices and memory. */ 21 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux/Documentation/userspace-api/ |
H A D | check_exec.rst | 10 are intended for script interpreters and dynamic linkers to enforce a 31 set to 1 (i.e. always enforce restrictions). 75 Programs should only enforce consistent restrictions according to the
|
/linux/arch/riscv/include/asm/ |
H A D | barrier.h | 17 /* These barriers need to enforce ordering on both devices or memory. */ 22 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux/security/integrity/ |
H A D | Kconfig | 79 bool "Enforce Machine Keyring CA Restrictions" 83 The .machine keyring can be configured to enforce CA restriction
|
/linux/kernel/livepatch/ |
H A D | transition.c | 187 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state() 191 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state() 373 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch() 594 * Enforce the order of the task->patch_state initializations and the in klp_init_transition() 598 * Also enforce the order of the klp_target_state write and future in klp_init_transition() 665 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
|
H A D | patch.c | 74 * In the enable path, enforce the order of the ops->func_stack and in klp_ftrace_handler() 89 * Enforce the order of the func->transition and in klp_ftrace_handler()
|
/linux/Documentation/hwmon/ |
H A D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
/linux/arch/powerpc/include/asm/ |
H A D | plpks.h | 18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce 19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
|
/linux/kernel/ |
H A D | Kconfig.preempt | 107 bool "Enforce softirq synchronisation on PREEMPT_RT" 110 Enforce synchronisation across the softirqs context. On PREEMPT_RT
|
/linux/arch/arc/include/asm/ |
H A D | shmparam.h | 12 /* Enforce SHMLBA in shmat */
|
/linux/arch/x86/configs/ |
H A D | hardening.config | 13 # Enforce CET Indirect Branch Tracking in the kernel.
|
/linux/arch/arm/include/asm/ |
H A D | shmparam.h | 13 * Enforce SHMLBA in shmat
|
/linux/arch/powerpc/mm/book3s64/ |
H A D | pkeys.c | 440 * We only want to enforce protection keys on the current thread because we 444 * So do not enforce things if the VMA is not from the current mm, or if we are 453 * Do not enforce our key-permissions on a foreign vma. in arch_vma_access_permitted()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | btf_dedup_split.c | 16 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_simple() 134 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_fwd_resolve() 232 btf__set_pointer_size(btf1, 8); /* enforce 64-bit arch */ in test_split_struct_duped() 335 btf__set_pointer_size(btf, 8); /* enforce 64-bit arch */ in btf_add_dup_struct_in_cu()
|
/linux/arch/xtensa/include/asm/ |
H A D | fixmap.h | 31 /* Enforce that FIXADDR_START is PMD aligned to handle cache aliasing */
|
/linux/net/rds/ |
H A D | ib_frmr.c | 43 /* enforce order of ibmr->u.frmr.fr_state update in rds_transition_frwr_state() 301 /* enforce order of frmr->fr_inv update in rds_ib_post_inv() 354 /* enforce order of frmr->{fr_reg,fr_inv} update in rds_ib_mr_cqe_handler()
|
/linux/Documentation/devicetree/bindings/mtd/partitions/ |
H A D | brcm,trx.txt | 18 TRX doesn't enforce any strict partition boundaries or size limits. All
|
/linux/Documentation/devicetree/bindings/display/panel/ |
H A D | sony,acx424akp.yaml | 32 enforce-video-mode: true
|