| /linux/rust/syn/ |
| H A D | restriction.rs | 8 /// `pub(restricted)`. 20 /// A visibility level restricted to some path: `pub(self)` or 22 Restricted(VisRestricted), 30 /// A visibility level restricted to some path: `pub(self)` or 50 // FieldMutability::Restricted(MutRestricted) 111 // field as a restricted visibility, causing a parse error. in parse_pub() 115 return Ok(Visibility::Restricted(VisRestricted { in parse_pub() 127 return Ok(Visibility::Restricted(VisRestricted { in parse_pub() 162 Visibility::Restricted(vis_restricted) => vis_restricted.to_tokens(tokens), in to_tokens()
|
| /linux/security/landlock/ |
| H A D | domain.h | 43 * @pid: PID of the task that initially restricted itself. It still 49 * @uid: UID of the task that initially restricted itself, at creation time. 53 * @comm: Command line of the task that initially restricted itself, at 58 * @exe_path: Executable path of the task that initially restricted
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | rsb.rst | 191 Restricted RSB Alternate (RRSBA) 194 Some newer Intel CPUs have Restricted RSB Alternate (RRSBA) behavior, 197 restricted to the current domain when eIBRS is enabled: 199 * "Restricted RSB Alternate (RRSBA) behavior allows alternate branch 202 alternate predictors are restricted to those belonging to the 242 …Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw… 246 …Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw…
|
| H A D | spectre.rst | 219 x86 CPUs with Enhanced Indirect Branch Restricted Speculation 226 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature 389 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is 404 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks 415 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks 521 On x86, indirect branch restricted speculation is turned on by default 645 restricted.
|
| /linux/drivers/video/fbdev/kyro/ |
| H A D | STG4000InitDevice.c | 71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */ 72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */ 73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */ 75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */ 172 * Check it's within restricted VCO range in ProgramClock() 174 * above the restricted range, then test in ProgramClock()
|
| /linux/arch/powerpc/include/asm/ |
| H A D | perf_event_fsl_emb.h | 28 * can hold restricted events, or zero if there are no 29 * restricted events.
|
| /linux/drivers/firmware/efi/ |
| H A D | cper_cxl.c | 14 "Restricted CXL Device", 15 "Restricted CXL Host Downstream Port", 37 * is used to refer to Restricted CXL Device, CXL Device, CXL in cxl_cper_print_prot_err()
|
| /linux/include/asm-generic/bitops/ |
| H A D | instrumented-atomic.h | 24 * restricted to acting on a single-word quantity. 53 * restricted to acting on a single-word quantity.
|
| /linux/include/linux/can/ |
| H A D | can-ml.h | 25 * are not restricted to be used by modules with a GPL compatible license. 53 #define CAN_CAP_RO BIT(3) /* read-only mode (LISTEN/RESTRICTED) */
|
| /linux/include/uapi/xen/ |
| H A D | evtchn.h | 93 * Once a file descriptor has been restricted it cannot be 94 * de-restricted, and must be closed and re-opened. Event channels
|
| /linux/arch/x86/include/uapi/asm/ |
| H A D | debugreg.h | 23 * Note, with the introduction of Bus Lock Detection (BLD) and Restricted 30 * restricted transactional memory. #DB occurred inside an RTM region
|
| /linux/tools/testing/selftests/tty/ |
| H A D | tty_tiocsti_test.c | 79 const int legacy_tiocsti; /* 0=restricted, 1=permissive */ in FIXTURE_VARIANT() 93 * | 0 (restricted) | true | SUCCESS | - | 94 * | 0 (restricted) | false | FAILURE | -EIO | 179 * | 0 (restricted) | true | SUCCESS | - | 180 * | 0 (restricted) | false | FAILURE | -EIO |
|
| /linux/kernel/dma/ |
| H A D | Kconfig | 109 bool "DMA Restricted Pool" 112 This enables support for restricted DMA pools which provide a level of
|
| /linux/security/apparmor/ |
| H A D | policy_compat.c | 160 /* DFAs are restricted from having a state_count of less than 2 */ in compute_fperms() 184 /* DFAs are restricted from having a state_count of less than 2 */ in compute_xmatch_perms() 259 /* DFAs are restricted from having a state_count of less than 2 */ in compute_perms()
|
| /linux/drivers/of/ |
| H A D | device.c | 55 * restricted-dma-pool region is allowed. in of_dma_set_restricted_buffer() 57 if (of_device_is_compatible(it.node, "restricted-dma-pool") && in of_dma_set_restricted_buffer() 60 dev_warn(dev, "failed to initialise \"restricted-dma-pool\" memory node\n"); in of_dma_set_restricted_buffer()
|
| /linux/include/linux/ |
| H A D | rational.h | 9 * pll configuration taking into account restricted register size
|
| /linux/tools/perf/bench/ |
| H A D | mem-memset-x86-64-asm.S | 13 * the ELF stack should not be restricted at all and set it RWX.
|
| H A D | mem-memcpy-x86-64-asm.S | 18 * the ELF stack should not be restricted at all and set it RWX.
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_scatterlist.c | 99 /* restricted by sg_alloc_table */ in i915_rsgt_from_mm_node() 187 /* restricted by sg_alloc_table */ in i915_rsgt_from_buddy_resource()
|
| /linux/arch/x86/include/asm/ |
| H A D | crash_reserve.h | 14 * 64-bit kdump kernels need to be restricted to be under 64 TB, which is
|
| /linux/drivers/net/fddi/ |
| H A D | defza.h | 458 u32 rtoken_timeout; /* default restricted token timeout 503 u32 rtoken_timeout; /* restricted token timeout 532 u32 rtoken_timeout; /* restricted token timeout */ 586 #define FZA_PRH0_TKN_TYPE_RST 0x10 /* use a restricted token */ 629 #define FZA_PRH1_TKN_SEND_RST 0x10 /* send a restricted token */ 784 uint rtoken_timeout; /* restricted token timeout */
|
| /linux/block/partitions/ |
| H A D | atari.h | 10 * modified for ICD/Supra partitioning scheme restricted to at most 12
|
| /linux/samples/ |
| H A D | Kconfig | 170 restricted by a user-defined filesystem access control policy. 255 as mount API and statx(). Note that this is restricted to the x86
|
| /linux/arch/x86/lib/ |
| H A D | usercopy.c | 22 * from NMI context. Despite the name it is not restricted to be called
|
| /linux/Documentation/userspace-api/media/mediactl/ |
| H A D | media-controller-model.rst | 25 interact with other entities. Data (not restricted to video) produced
|