| /linux/security/integrity/ima/ |
| H A D | ima_mok.c | 26 struct key_restriction *restriction; in ima_mok_init() local 30 restriction = kzalloc_obj(struct key_restriction); in ima_mok_init() 31 if (!restriction) in ima_mok_init() 32 panic("Can't allocate IMA blacklist restriction."); in ima_mok_init() 34 restriction->check = restrict_link_by_builtin_trusted; in ima_mok_init() 43 restriction, NULL); in ima_mok_init()
|
| /linux/security/integrity/ |
| H A D | digsig.c | 100 struct key_restriction *restriction) in __integrity_init_keyring() argument 107 KEY_ALLOC_NOT_IN_QUOTA, restriction, NULL); in __integrity_init_keyring() 127 struct key_restriction *restriction; in integrity_init_keyring() local 137 restriction = NULL; in integrity_init_keyring() 144 restriction = kzalloc_obj(struct key_restriction); in integrity_init_keyring() 145 if (!restriction) in integrity_init_keyring() 149 restriction->check = restrict_link_by_ca; in integrity_init_keyring() 151 restriction->check = restrict_link_to_ima; in integrity_init_keyring() 162 ret = __integrity_init_keyring(id, perm, restriction); in integrity_init_keyring() 164 kfree(restriction); in integrity_init_keyring()
|
| /linux/drivers/net/wireless/intel/iwlwifi/dvm/ |
| H A D | tt.c | 56 /* Advance Thermal Throttling default restriction table */ 83 struct iwl_tt_restriction *restriction; in iwl_ht_enabled() local 87 restriction = tt->restriction + tt->state; in iwl_ht_enabled() 88 return restriction->is_ht; in iwl_ht_enabled() 119 struct iwl_tt_restriction *restriction; in iwl_tx_ant_restriction() local 123 restriction = tt->restriction + tt->state; in iwl_tx_ant_restriction() 124 return restriction->tx_stream; in iwl_tx_ant_restriction() 574 * Initialize thermal throttling restriction table 598 tt->restriction = kzalloc_objs(struct iwl_tt_restriction, in iwl_tt_initialize() 602 if (!tt->restriction || !tt->transaction) { in iwl_tt_initialize() [all …]
|
| H A D | tt.h | 35 * struct iwl_tt_restriction - Thermal Throttling restriction table 76 * @restriction: ptr to restriction tbl, used by advance 93 struct iwl_tt_restriction *restriction; member
|
| /linux/certs/ |
| H A D | blacklist.c | 326 struct key_restriction *restriction; in blacklist_init() local 331 restriction = kzalloc_obj(*restriction); in blacklist_init() 332 if (!restriction) in blacklist_init() 333 panic("Can't allocate blacklist keyring restriction\n"); in blacklist_init() 334 restriction->check = restrict_link_for_blacklist; in blacklist_init() 347 restriction, NULL); in blacklist_init()
|
| H A D | system_keyring.c | 141 struct key_restriction *restriction; in get_builtin_and_secondary_restriction() local 143 restriction = kzalloc_obj(struct key_restriction); in get_builtin_and_secondary_restriction() 145 if (!restriction) in get_builtin_and_secondary_restriction() 146 panic("Can't allocate secondary trusted keyring restriction\n"); in get_builtin_and_secondary_restriction() 149 restriction->check = restrict_link_by_builtin_secondary_and_machine; in get_builtin_and_secondary_restriction() 151 restriction->check = restrict_link_by_builtin_and_secondary_trusted; in get_builtin_and_secondary_restriction() 153 return restriction; in get_builtin_and_secondary_restriction()
|
| /linux/drivers/gpu/drm/msm/registers/ |
| H A D | rules-fd.xsd | 325 <restriction base="string"> 329 </restriction> 340 <restriction base="string"> 347 </restriction> 354 <restriction base="string"> 356 </restriction>
|
| /linux/security/keys/ |
| H A D | keyring.c | 545 * @restriction_key: Keys providing additional data for evaluating restriction. 991 * Semaphore to serialise restriction setup to prevent reference count 992 * cycles through restriction key pointers. 997 * Check for restriction cycles that would prevent keyring garbage collection. 1015 * keyring_restrict - Look up and apply a restriction to a keyring 1017 * @type: The key type that will provide the restriction checker. 1018 * @restriction: The restriction options to apply to the keyring 1020 * Look up a keyring and apply a restriction to it. The restriction is managed 1022 * the restriction string. 1025 const char *restriction) in keyring_restrict() argument [all …]
|
| /linux/rust/syn/ |
| H A D | thread.rs | 19 // This impl needs to be revisited if that restriction is relaxed in the future. 55 // revisited if that restriction is relaxed in the future.
|
| H A D | restriction.rs | 69 use crate::restriction::{VisRestricted, Visibility}; 153 use crate::restriction::{VisRestricted, Visibility};
|
| /linux/Documentation/RCU/ |
| H A D | UP.rst | 85 What locking restriction must RCU callbacks respect? 123 What locking restriction must RCU callbacks respect? 139 This restriction might seem gratuitous, since very few RCU
|
| /linux/include/linux/ |
| H A D | key-type.h | 147 /* Look up a keyring access restriction (optional) 149 * - NULL is a valid return value (meaning the requested restriction 151 * - should return -EINVAL if the restriction is unknown
|
| /linux/tools/testing/selftests/tc-testing/tc-tests/qdiscs/ |
| H A D | netem.json | 342 "name": "NETEM test qdisc duplication restriction in qdisc tree in netem_change root", 362 "name": "NETEM test qdisc duplication restriction in qdisc tree in netem_change non-root", 382 "name": "NETEM test qdisc duplication restriction in qdisc tree", 401 "name": "NETEM test qdisc duplication restriction in qdisc tree across branches",
|
| /linux/tools/perf/pmu-events/arch/x86/silvermont/ |
| H A D | frontend.json | 30 …"BriefDescription": "Counts the number of times a decode restriction reduced the decode throughput… 34 …"PublicDescription": "Counts the number of times a decode restriction reduced the decode throughpu…
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_gem_gtt.c | 165 * @start: start of any range restriction inside GTT (0 for all), 167 * @end: end of any range restriction inside GTT (U64_MAX for all), 270 * range restrictions (e.g. restriction to low 4GiB) and so, for in i915_gem_gtt_insert()
|
| /linux/arch/arm/kernel/ |
| H A D | vmlinux-xip.lds.S | 183 * Due to PMSAv7 restriction on base address and size we have to 185 * alignment restriction on _xiprom will likely force XIP address
|
| /linux/security/yama/ |
| H A D | Kconfig | 9 access controls. Currently available is ptrace scope restriction.
|
| /linux/crypto/asymmetric_keys/ |
| H A D | asymmetric_type.c | 505 const char *restriction) in asymmetric_lookup_restriction() argument 512 if (strcmp("builtin_trusted", restriction) == 0) in asymmetric_lookup_restriction() 516 if (strcmp("builtin_and_secondary_trusted", restriction) == 0) in asymmetric_lookup_restriction() 520 parse_buf = kstrndup(restriction, PAGE_SIZE, GFP_KERNEL); in asymmetric_lookup_restriction()
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | scoped_test.c | 3 * Landlock tests - Common scope restriction
|
| /linux/drivers/xen/ |
| H A D | privcmd.c | 280 /* If restriction is in place, check the domid matches */ in privcmd_ioctl_mmap() 487 /* If restriction is in place, check the domid matches */ in privcmd_ioctl_mmap_batch() 646 /* If restriction is in place, check the domid matches */ in privcmd_ioctl_dm_op() 725 /* Set restriction to the specified domain, or check it matches */ in privcmd_ioctl_restrict() 748 /* If restriction is in place, check the domid matches */ in privcmd_ioctl_mmap_resource() 1082 /* If restriction is in place, check the domid matches */ in privcmd_ioctl_irqfd() 1457 /* If restriction is in place, check the domid matches */ in privcmd_ioctl_ioeventfd() 1571 /* DOMID_INVALID implies no restriction */ in privcmd_open()
|
| /linux/Documentation/security/keys/ |
| H A D | core.rst | 891 const char *type, const char *restriction); 894 the contents of the key according to a restriction scheme. 896 "keyring" is the key ID for an existing keyring to apply a restriction 898 will remain in the keyring even if the new restriction would reject them. 902 "restriction" is a string describing how key linkage is to be restricted. 905 a method and relevant data for the restriction such as signature 910 To apply a keyring restriction the process must have Set Attribute 1078 restriction). 1284 When called, the restriction function will be passed the keyring being 1286 used in the restriction check. Note that when a new key is being created, [all …]
|
| /linux/LICENSES/exceptions/ |
| H A D | GCC-exception-2.0 | 15 distribute those programs without any restriction coming from the use of
|
| /linux/tools/testing/selftests/exec/ |
| H A D | check-exec-tests.sh | 145 # With only file restriction: protect non-malicious users from inadvertent errors (e.g. python ~/Do… 185 # With both file restriction and denied interactive commands: only allow executable scripts.
|
| /linux/drivers/gpu/drm/amd/amdgpu/ |
| H A D | uvd_v4_2.h | 6 * to deal in the Software without restriction, including without limitation
|
| H A D | navi10_ih.h | 6 * to deal in the Software without restriction, including without limitation
|