| /linux/security/loadpin/ |
| H A D | loadpin.c | 46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 59 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 261 enforce ? "" : "not "); in loadpin_init() 443 module_param(enforce, int, 0); 444 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
| /linux/fs/btrfs/ |
| H A D | qgroup.h | 396 enum btrfs_qgroup_rsv_type type, bool enforce); 398 enum btrfs_qgroup_rsv_type type, bool enforce, 402 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 406 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 409 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 414 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
| /linux/security/ipe/ |
| H A D | eval.c | 23 bool enforce = true; variable 378 if (!READ_ONCE(enforce)) in ipe_evaluate_event() 392 module_param(enforce, bool, 0400); 393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
|
| H A D | fs.c | 86 old_value = READ_ONCE(enforce); in setenforce() 93 WRITE_ONCE(enforce, new_value); in setenforce() 113 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce()
|
| H A D | eval.h | 19 extern bool enforce;
|
| H A D | audit.c | 146 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match()
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
| H A D | ipe.rst | 39 checks, allowing IPE to enforce policies that trust files protected by 45 For the IPE policy, specifically, it grants the ability to enforce 235 are signed through the PKCS#7 message format to enforce some level of 299 only enforce the policy marked active. Note that only one policy can be active 334 The default mode is enforce, and can be changed via the kernel command 335 line parameter ``ipe.enforce=(0|1)``, or the securityfs node 336 ``/sys/kernel/security/ipe/enforce``.
|
| /linux/include/linux/ |
| H A D | page-flags.h | 391 #define PF_ANY(page, enforce) PF_POISONED_CHECK(page) argument 392 #define PF_HEAD(page, enforce) PF_POISONED_CHECK(compound_head(page)) argument 393 #define PF_NO_TAIL(page, enforce) ({ \ argument 394 VM_BUG_ON_PGFLAGS(enforce && PageTail(page), page); \ 396 #define PF_NO_COMPOUND(page, enforce) ({ \ argument 397 VM_BUG_ON_PGFLAGS(enforce && PageCompound(page), page); \ 399 #define PF_SECOND(page, enforce) ({ \ argument
|
| /linux/Documentation/userspace-api/ |
| H A D | check_exec.rst | 10 are intended for script interpreters and dynamic linkers to enforce a 31 set to 1 (i.e. always enforce restrictions). 75 Programs should only enforce consistent restrictions according to the
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | dm-ebs.rst | 48 offset 128 sectors, enforce 2KiB underlying device block size.
|
| /linux/Documentation/devicetree/bindings/mtd/partitions/ |
| H A D | brcm,trx.txt | 18 TRX doesn't enforce any strict partition boundaries or size limits. All
|
| /linux/Documentation/hwmon/ |
| H A D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
| /linux/Documentation/arch/x86/x86_64/ |
| H A D | fsgs.rst | 19 limits. The limits can be used to enforce address space protections. 98 the GS register and enforce them when GS base is set via
|
| /linux/Documentation/scsi/ |
| H A D | scsi.rst | 24 will enforce the correct ordering of loading and unloading modules in
|
| /linux/arch/x86/kvm/ |
| H A D | cpuid.h | 222 if (!vcpu->arch.pv_cpuid.enforce) in guest_pv_has()
|
| H A D | hyperv.h | 192 int kvm_hv_set_enforce_cpuid(struct kvm_vcpu *vcpu, bool enforce);
|
| /linux/security/selinux/ |
| H A D | Kconfig | 38 /sys/fs/selinux/enforce.
|
| /linux/Documentation/mm/ |
| H A D | ksm.rst | 35 Every "chain" and all "dups" linked into a "chain" enforce the
|
| /linux/arch/powerpc/boot/dts/ |
| H A D | wii.dts | 212 sda-enforce-dir;
|
| /linux/Documentation/arch/arm64/ |
| H A D | cpu-hotplug.rst | 59 brought online. Firmware can enforce its policy via PSCI's return codes. e.g.
|
| /linux/Documentation/driver-api/serial/ |
| H A D | serial-rs485.rst | 127 receiver side to enforce the filtering. Receive address will be cleared
|
| /linux/security/integrity/ |
| H A D | Kconfig | 83 The .machine keyring can be configured to enforce CA restriction
|
| /linux/Documentation/bpf/ |
| H A D | graph_ds_impl.rst | 77 the same map_value and will enforce that the correct lock is held when 116 obvious. The verifier could enforce the same semantics as for ``bpf_obj_drop``,
|
| /linux/Documentation/admin-guide/cgroup-v1/ |
| H A D | devices.rst | 8 Implement a cgroup to track and enforce open and mknod restrictions
|