| /linux/rust/syn/ |
| H A D | restriction.rs | 8 /// `pub(restricted)`. 20 /// A visibility level restricted to some path: `pub(self)` or 22 Restricted(VisRestricted), 30 /// A visibility level restricted to some path: `pub(self)` or 50 // FieldMutability::Restricted(MutRestricted) 111 // field as a restricted visibility, causing a parse error. in parse_pub() 115 return Ok(Visibility::Restricted(VisRestricted { in parse_pub() 127 return Ok(Visibility::Restricted(VisRestricted { in parse_pub() 162 Visibility::Restricted(vis_restricted) => vis_restricted.to_tokens(tokens), in to_tokens()
|
| /linux/arch/arm64/kvm/hyp/nvhe/ |
| H A D | sys_regs.c | 75 * Definitions for features to be allowed or restricted for protected guests. 368 * NOTE: Anything not explicitly listed here is *restricted by default*, i.e., 372 /* Cache maintenance by set/way operations are restricted. */ 374 /* Debug and Trace Registers are restricted. */ 445 /* Scalable Vector Registers are restricted. */ 458 /* Performance Monitoring Registers are restricted. */ 460 /* Limited Ordering Regions Registers are restricted. */ 476 /* Performance Monitoring Registers are restricted. */ 478 /* Activity Monitoring Registers are restricted. */ 484 /* Performance Monitoring Registers are restricted. */ [all …]
|
| /linux/Documentation/admin-guide/hw-vuln/ |
| H A D | rsb.rst | 191 Restricted RSB Alternate (RRSBA) 194 Some newer Intel CPUs have Restricted RSB Alternate (RRSBA) behavior, 197 restricted to the current domain when eIBRS is enabled: 199 * "Restricted RSB Alternate (RRSBA) behavior allows alternate branch 202 alternate predictors are restricted to those belonging to the 242 …Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw… 246 …Restricted Speculation <https://www.intel.com/content/www/us/en/developer/articles/technical/softw…
|
| H A D | spectre.rst | 219 x86 CPUs with Enhanced Indirect Branch Restricted Speculation 226 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature 389 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is 404 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks 415 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks 521 On x86, indirect branch restricted speculation is turned on by default 645 restricted.
|
| /linux/security/landlock/ |
| H A D | domain.h | 43 * @pid: PID of the task that initially restricted itself. It still 49 * @uid: UID of the task that initially restricted itself, at creation time. 53 * @comm: Command line of the task that initially restricted itself, at 58 * @exe_path: Executable path of the task that initially restricted
|
| /linux/drivers/video/fbdev/kyro/ |
| H A D | STG4000InitDevice.c | 71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */ 72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */ 73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */ 75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */ 172 * Check it's within restricted VCO range in ProgramClock() 174 * above the restricted range, then test in ProgramClock()
|
| /linux/arch/powerpc/include/asm/ |
| H A D | perf_event_fsl_emb.h | 28 * can hold restricted events, or zero if there are no 29 * restricted events.
|
| /linux/drivers/firmware/efi/ |
| H A D | cper_cxl.c | 14 "Restricted CXL Device", 15 "Restricted CXL Host Downstream Port", 37 * is used to refer to Restricted CXL Device, CXL Device, CXL in cxl_cper_print_prot_err()
|
| /linux/Documentation/userspace-api/ |
| H A D | landlock.rst | 219 now restricted and this policy will be enforced on all its subsequently created 341 be restricted. This works for both datagram and stream sockets. 485 Access to regular files and directories can be restricted by Landlock, 489 restricted. Likewise, some special kernel filesystems such as nsfs, which can 491 restricted. However, thanks to the `ptrace restrictions`_, access to such 492 sensitive ``/proc`` files are automatically restricted according to domain 510 Kernel memory allocated to create rulesets is accounted and can be restricted 545 from a parent to its hierarchy. Because files are identified and restricted by
|
| /linux/include/asm-generic/bitops/ |
| H A D | instrumented-atomic.h | 24 * restricted to acting on a single-word quantity. 53 * restricted to acting on a single-word quantity.
|
| /linux/include/uapi/xen/ |
| H A D | evtchn.h | 93 * Once a file descriptor has been restricted it cannot be 94 * de-restricted, and must be closed and re-opened. Event channels
|
| /linux/arch/x86/include/uapi/asm/ |
| H A D | debugreg.h | 23 * Note, with the introduction of Bus Lock Detection (BLD) and Restricted 30 * restricted transactional memory. #DB occurred inside an RTM region
|
| /linux/tools/testing/selftests/tty/ |
| H A D | tty_tiocsti_test.c | 79 const int legacy_tiocsti; /* 0=restricted, 1=permissive */ in FIXTURE_VARIANT() 93 * | 0 (restricted) | true | SUCCESS | - | 94 * | 0 (restricted) | false | FAILURE | -EIO | 179 * | 0 (restricted) | true | SUCCESS | - | 180 * | 0 (restricted) | false | FAILURE | -EIO |
|
| /linux/security/apparmor/ |
| H A D | policy_compat.c | 160 /* DFAs are restricted from having a state_count of less than 2 */ in compute_fperms() 184 /* DFAs are restricted from having a state_count of less than 2 */ in compute_xmatch_perms() 259 /* DFAs are restricted from having a state_count of less than 2 */ in compute_perms()
|
| /linux/drivers/of/ |
| H A D | device.c | 55 * restricted-dma-pool region is allowed. in of_dma_set_restricted_buffer() 57 if (of_device_is_compatible(it.node, "restricted-dma-pool") && in of_dma_set_restricted_buffer() 60 dev_warn(dev, "failed to initialise \"restricted-dma-pool\" memory node\n"); in of_dma_set_restricted_buffer()
|
| /linux/kernel/dma/ |
| H A D | Kconfig | 115 bool "DMA Restricted Pool" 118 This enables support for restricted DMA pools which provide a level of
|
| /linux/include/linux/ |
| H A D | rational.h | 9 * pll configuration taking into account restricted register size
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_scatterlist.c | 99 /* restricted by sg_alloc_table */ in i915_rsgt_from_mm_node() 187 /* restricted by sg_alloc_table */ in i915_rsgt_from_buddy_resource()
|
| /linux/drivers/media/i2c/ |
| H A D | aptina-pll.c | 116 * We can thus iterate over the restricted p1 range defined by the in aptina_pll_calculate() 117 * combination of (1) and (7), and then compute the restricted mf range in aptina_pll_calculate()
|
| /linux/include/cxl/ |
| H A D | event.h | 215 RCD, /* Restricted CXL Device */ 216 RCH_DP, /* Restricted CXL Host Downstream Port */
|
| /linux/tools/perf/bench/ |
| H A D | mem-memset-x86-64-asm.S | 13 * the ELF stack should not be restricted at all and set it RWX.
|
| H A D | mem-memcpy-x86-64-asm.S | 18 * the ELF stack should not be restricted at all and set it RWX.
|
| /linux/drivers/net/fddi/ |
| H A D | defza.h | 458 u32 rtoken_timeout; /* default restricted token timeout 503 u32 rtoken_timeout; /* restricted token timeout 532 u32 rtoken_timeout; /* restricted token timeout */ 586 #define FZA_PRH0_TKN_TYPE_RST 0x10 /* use a restricted token */ 629 #define FZA_PRH1_TKN_SEND_RST 0x10 /* send a restricted token */ 784 uint rtoken_timeout; /* restricted token timeout */
|
| /linux/arch/x86/include/asm/ |
| H A D | crash_reserve.h | 14 * 64-bit kdump kernels need to be restricted to be under 64 TB, which is
|
| /linux/samples/ |
| H A D | Kconfig | 170 restricted by a user-defined filesystem access control policy. 255 as mount API and statx(). Note that this is restricted to the x86
|