Home
last modified time | relevance | path

Searched full:restricted (Results 1 – 25 of 314) sorted by relevance

12345678910>>...13

/linux/rust/syn/
H A Drestriction.rs8 /// `pub(restricted)`.
20 /// A visibility level restricted to some path: `pub(self)` or
22 Restricted(VisRestricted),
30 /// A visibility level restricted to some path: `pub(self)` or
50 // FieldMutability::Restricted(MutRestricted)
111 // field as a restricted visibility, causing a parse error. in parse_pub()
115 return Ok(Visibility::Restricted(VisRestricted { in parse_pub()
127 return Ok(Visibility::Restricted(VisRestricted { in parse_pub()
162 Visibility::Restricted(vis_restricted) => vis_restricted.to_tokens(tokens), in to_tokens()
/linux/arch/arm64/kvm/hyp/nvhe/
H A Dsys_regs.c75 * Definitions for features to be allowed or restricted for protected guests.
368 * NOTE: Anything not explicitly listed here is *restricted by default*, i.e.,
372 /* Cache maintenance by set/way operations are restricted. */
374 /* Debug and Trace Registers are restricted. */
445 /* Scalable Vector Registers are restricted. */
458 /* Performance Monitoring Registers are restricted. */
460 /* Limited Ordering Regions Registers are restricted. */
476 /* Performance Monitoring Registers are restricted. */
478 /* Activity Monitoring Registers are restricted. */
484 /* Performance Monitoring Registers are restricted. */
[all …]
/linux/Documentation/admin-guide/hw-vuln/
H A Drsb.rst191 Restricted RSB Alternate (RRSBA)
194 Some newer Intel CPUs have Restricted RSB Alternate (RRSBA) behavior,
197 restricted to the current domain when eIBRS is enabled:
199 * "Restricted RSB Alternate (RRSBA) behavior allows alternate branch
202 alternate predictors are restricted to those belonging to the
242Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw…
246Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw…
H A Dspectre.rst219 x86 CPUs with Enhanced Indirect Branch Restricted Speculation
226 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature
389 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
404 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks
415 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks
521 On x86, indirect branch restricted speculation is turned on by default
645 restricted.
/linux/security/landlock/
H A Ddomain.h43 * @pid: PID of the task that initially restricted itself. It still
49 * @uid: UID of the task that initially restricted itself, at creation time.
53 * @comm: Command line of the task that initially restricted itself, at
58 * @exe_path: Executable path of the task that initially restricted
/linux/drivers/video/fbdev/kyro/
H A DSTG4000InitDevice.c71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */
72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */
73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */
75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */
172 * Check it's within restricted VCO range in ProgramClock()
174 * above the restricted range, then test in ProgramClock()
/linux/arch/powerpc/include/asm/
H A Dperf_event_fsl_emb.h28 * can hold restricted events, or zero if there are no
29 * restricted events.
/linux/drivers/firmware/efi/
H A Dcper_cxl.c14 "Restricted CXL Device",
15 "Restricted CXL Host Downstream Port",
37 * is used to refer to Restricted CXL Device, CXL Device, CXL in cxl_cper_print_prot_err()
/linux/Documentation/userspace-api/
H A Dlandlock.rst219 now restricted and this policy will be enforced on all its subsequently created
341 be restricted. This works for both datagram and stream sockets.
485 Access to regular files and directories can be restricted by Landlock,
489 restricted. Likewise, some special kernel filesystems such as nsfs, which can
491 restricted. However, thanks to the `ptrace restrictions`_, access to such
492 sensitive ``/proc`` files are automatically restricted according to domain
510 Kernel memory allocated to create rulesets is accounted and can be restricted
545 from a parent to its hierarchy. Because files are identified and restricted by
/linux/include/asm-generic/bitops/
H A Dinstrumented-atomic.h24 * restricted to acting on a single-word quantity.
53 * restricted to acting on a single-word quantity.
/linux/include/uapi/xen/
H A Devtchn.h93 * Once a file descriptor has been restricted it cannot be
94 * de-restricted, and must be closed and re-opened. Event channels
/linux/arch/x86/include/uapi/asm/
H A Ddebugreg.h23 * Note, with the introduction of Bus Lock Detection (BLD) and Restricted
30 * restricted transactional memory. #DB occurred inside an RTM region
/linux/tools/testing/selftests/tty/
H A Dtty_tiocsti_test.c79 const int legacy_tiocsti; /* 0=restricted, 1=permissive */ in FIXTURE_VARIANT()
93 * | 0 (restricted) | true | SUCCESS | - |
94 * | 0 (restricted) | false | FAILURE | -EIO |
179 * | 0 (restricted) | true | SUCCESS | - |
180 * | 0 (restricted) | false | FAILURE | -EIO |
/linux/security/apparmor/
H A Dpolicy_compat.c160 /* DFAs are restricted from having a state_count of less than 2 */ in compute_fperms()
184 /* DFAs are restricted from having a state_count of less than 2 */ in compute_xmatch_perms()
259 /* DFAs are restricted from having a state_count of less than 2 */ in compute_perms()
/linux/drivers/of/
H A Ddevice.c55 * restricted-dma-pool region is allowed. in of_dma_set_restricted_buffer()
57 if (of_device_is_compatible(it.node, "restricted-dma-pool") && in of_dma_set_restricted_buffer()
60 dev_warn(dev, "failed to initialise \"restricted-dma-pool\" memory node\n"); in of_dma_set_restricted_buffer()
/linux/kernel/dma/
H A DKconfig115 bool "DMA Restricted Pool"
118 This enables support for restricted DMA pools which provide a level of
/linux/include/linux/
H A Drational.h9 * pll configuration taking into account restricted register size
/linux/drivers/gpu/drm/i915/
H A Di915_scatterlist.c99 /* restricted by sg_alloc_table */ in i915_rsgt_from_mm_node()
187 /* restricted by sg_alloc_table */ in i915_rsgt_from_buddy_resource()
/linux/drivers/media/i2c/
H A Daptina-pll.c116 * We can thus iterate over the restricted p1 range defined by the in aptina_pll_calculate()
117 * combination of (1) and (7), and then compute the restricted mf range in aptina_pll_calculate()
/linux/include/cxl/
H A Devent.h215 RCD, /* Restricted CXL Device */
216 RCH_DP, /* Restricted CXL Host Downstream Port */
/linux/tools/perf/bench/
H A Dmem-memset-x86-64-asm.S13 * the ELF stack should not be restricted at all and set it RWX.
H A Dmem-memcpy-x86-64-asm.S18 * the ELF stack should not be restricted at all and set it RWX.
/linux/drivers/net/fddi/
H A Ddefza.h458 u32 rtoken_timeout; /* default restricted token timeout
503 u32 rtoken_timeout; /* restricted token timeout
532 u32 rtoken_timeout; /* restricted token timeout */
586 #define FZA_PRH0_TKN_TYPE_RST 0x10 /* use a restricted token */
629 #define FZA_PRH1_TKN_SEND_RST 0x10 /* send a restricted token */
784 uint rtoken_timeout; /* restricted token timeout */
/linux/arch/x86/include/asm/
H A Dcrash_reserve.h14 * 64-bit kdump kernels need to be restricted to be under 64 TB, which is
/linux/samples/
H A DKconfig170 restricted by a user-defined filesystem access control policy.
255 as mount API and statx(). Note that this is restricted to the x86

12345678910>>...13