| /linux/rust/syn/ |
| H A D | restriction.rs | 8 /// `pub(restricted)`. 20 /// A visibility level restricted to some path: `pub(self)` or 22 Restricted(VisRestricted), 30 /// A visibility level restricted to some path: `pub(self)` or 50 // FieldMutability::Restricted(MutRestricted) 111 // field as a restricted visibility, causing a parse error. in parse_pub() 115 return Ok(Visibility::Restricted(VisRestricted { in parse_pub() 127 return Ok(Visibility::Restricted(VisRestricted { in parse_pub() 162 Visibility::Restricted(vis_restricted) => vis_restricted.to_tokens(tokens), in to_tokens()
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | rsb.rst | 191 Restricted RSB Alternate (RRSBA) 194 Some newer Intel CPUs have Restricted RSB Alternate (RRSBA) behavior, 197 restricted to the current domain when eIBRS is enabled: 199 * "Restricted RSB Alternate (RRSBA) behavior allows alternate branch 202 alternate predictors are restricted to those belonging to the 242 …Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw… 246 …Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw…
|
| H A D | spectre.rst | 219 x86 CPUs with Enhanced Indirect Branch Restricted Speculation 226 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature 389 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is 404 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks 415 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks 521 On x86, indirect branch restricted speculation is turned on by default 645 restricted.
|
| /linux/security/landlock/ |
| H A D | domain.h | 43 * @pid: PID of the task that initially restricted itself. It still 49 * @uid: UID of the task that initially restricted itself, at creation time. 53 * @comm: Command line of the task that initially restricted itself, at 58 * @exe_path: Executable path of the task that initially restricted
|
| /linux/drivers/video/fbdev/kyro/ |
| H A D | STG4000InitDevice.c | 71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */ 72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */ 73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */ 75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */ 172 * Check it's within restricted VCO range in ProgramClock() 174 * above the restricted range, then test in ProgramClock()
|
| /linux/arch/powerpc/include/asm/ |
| H A D | perf_event_fsl_emb.h | 28 * can hold restricted events, or zero if there are no 29 * restricted events.
|
| /linux/drivers/firmware/efi/ |
| H A D | cper_cxl.c | 14 "Restricted CXL Device", 15 "Restricted CXL Host Downstream Port", 37 * is used to refer to Restricted CXL Device, CXL Device, CXL in cxl_cper_print_prot_err()
|
| /linux/include/asm-generic/bitops/ |
| H A D | instrumented-atomic.h | 24 * restricted to acting on a single-word quantity. 53 * restricted to acting on a single-word quantity.
|
| /linux/include/linux/can/ |
| H A D | can-ml.h | 25 * are not restricted to be used by modules with a GPL compatible license. 53 #define CAN_CAP_RO BIT(3) /* read-only mode (LISTEN/RESTRICTED) */
|
| /linux/include/uapi/xen/ |
| H A D | evtchn.h | 93 * Once a file descriptor has been restricted it cannot be 94 * de-restricted, and must be closed and re-opened. Event channels
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 253 now restricted and this policy will be enforced on all its subsequently created 375 be restricted. This works for both datagram and stream sockets. 582 Access to regular files and directories can be restricted by Landlock, 586 restricted. Likewise, some special kernel filesystems such as nsfs, which can 588 restricted. However, thanks to the `ptrace restrictions`_, access to such 589 sensitive ``/proc`` files are automatically restricted according to domain 607 Kernel memory allocated to create rulesets is accounted and can be restricted 642 from a parent to its hierarchy. Because files are identified and restricted by
|
| /linux/arch/x86/include/uapi/asm/ |
| H A D | debugreg.h | 23 * Note, with the introduction of Bus Lock Detection (BLD) and Restricted 30 * restricted transactional memory. #DB occurred inside an RTM region
|
| /linux/tools/testing/selftests/tty/ |
| H A D | tty_tiocsti_test.c | 79 const int legacy_tiocsti; /* 0=restricted, 1=permissive */ in FIXTURE_VARIANT() 93 * | 0 (restricted) | true | SUCCESS | - | 94 * | 0 (restricted) | false | FAILURE | -EIO | 179 * | 0 (restricted) | true | SUCCESS | - | 180 * | 0 (restricted) | false | FAILURE | -EIO |
|
| /linux/drivers/of/ |
| H A D | device.c | 55 * restricted-dma-pool region is allowed. in of_dma_set_restricted_buffer() 57 if (of_device_is_compatible(it.node, "restricted-dma-pool") && in of_dma_set_restricted_buffer() 60 dev_warn(dev, "failed to initialise \"restricted-dma-pool\" memory node\n"); in of_dma_set_restricted_buffer()
|
| /linux/security/apparmor/ |
| H A D | policy_compat.c | 160 /* DFAs are restricted from having a state_count of less than 2 */ in compute_fperms() 184 /* DFAs are restricted from having a state_count of less than 2 */ in compute_xmatch_perms() 259 /* DFAs are restricted from having a state_count of less than 2 */ in compute_perms()
|
| /linux/kernel/dma/ |
| H A D | Kconfig | 112 bool "DMA Restricted Pool" 115 This enables support for restricted DMA pools which provide a level of
|
| /linux/drivers/net/fddi/ |
| H A D | defza.h | 458 u32 rtoken_timeout; /* default restricted token timeout 503 u32 rtoken_timeout; /* restricted token timeout 532 u32 rtoken_timeout; /* restricted token timeout */ 586 #define FZA_PRH0_TKN_TYPE_RST 0x10 /* use a restricted token */ 629 #define FZA_PRH1_TKN_SEND_RST 0x10 /* send a restricted token */ 784 uint rtoken_timeout; /* restricted token timeout */
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_scatterlist.c | 99 /* restricted by sg_alloc_table */ in i915_rsgt_from_mm_node() 187 /* restricted by sg_alloc_table */ in i915_rsgt_from_buddy_resource()
|
| /linux/include/linux/ |
| H A D | rational.h | 9 * pll configuration taking into account restricted register size
|
| /linux/tools/perf/bench/ |
| H A D | mem-memset-x86-64-asm.S | 13 * the ELF stack should not be restricted at all and set it RWX.
|
| H A D | mem-memcpy-x86-64-asm.S | 18 * the ELF stack should not be restricted at all and set it RWX.
|
| /linux/samples/ |
| H A D | Kconfig | 170 restricted by a user-defined filesystem access control policy. 257 as mount API and statx(). Note that this is restricted to the x86
|
| /linux/arch/x86/include/asm/ |
| H A D | crash_reserve.h | 14 * 64-bit kdump kernels need to be restricted to be under 64 TB, which is
|
| /linux/block/partitions/ |
| H A D | atari.h | 10 * modified for ICD/Supra partitioning scheme restricted to at most 12
|
| /linux/tools/perf/ |
| H A D | design.txt | 225 way to request that counting of events be restricted to times when the 229 to request counting of events restricted to guest and host contexts when 253 cpu >= 0: the counter is restricted to a specific CPU
|