Searched full:restrict (Results 1 – 25 of 340) sorted by relevance
12345678910>>...14
| /Linux-v6.1/drivers/net/wireless/intel/iwlwifi/cfg/ |
| D | 22000.c | 448 * so we need to restrict the size of transmitted aggregation to the 460 * so we need to restrict the size of transmitted aggregation to the 539 * so we need to restrict the size of transmitted aggregation to the 552 * so we need to restrict the size of transmitted aggregation to the 565 * so we need to restrict the size of transmitted aggregation to the 577 * so we need to restrict the size of transmitted aggregation to the 590 * so we need to restrict the size of transmitted aggregation to the 603 * so we need to restrict the size of transmitted aggregation to the 615 * so we need to restrict the size of transmitted aggregation to the 629 * so we need to restrict the size of transmitted aggregation to the [all …]
|
| /Linux-v6.1/tools/testing/selftests/bpf/progs/ |
| D | btf_dump_test_case_syntax.c | 34 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v… 193 void * restrict g;
|
| /Linux-v6.1/Documentation/userspace-api/ |
| D | landlock.rst | 13 The goal of Landlock is to enable to restrict ambient rights (e.g. global 19 any process, including unprivileged ones, to securely restrict themselves. 33 rights`_. A set of rules is aggregated in a ruleset, which can then restrict 135 restrict the current thread from gaining more privileges (e.g. thanks to a SUID 141 perror("Failed to restrict privileges"); 206 Landlock enables to restrict access to file hierarchies, which means that these 213 be tied, either via the source or the destination path. These rules restrict 214 access when they are encountered on a path, which means that they can restrict 225 restrict the resulted merged hierarchy, and vice versa. Landlock users should 362 restrict such paths with dedicated ruleset flags. [all …]
|
| /Linux-v6.1/certs/ |
| D | system_keyring.c | 36 * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA 38 * Restrict the addition of keys into a keyring based on the key-to-be-added 52 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring 55 * Restrict the addition of keys into a keyring based on the key-to-be-added 109 * restrict_link_by_builtin_secondary_and_machine - Restrict keyring addition. 115 * Restrict the addition of keys into a keyring based on the key-to-be-added
|
| /Linux-v6.1/scripts/genksyms/ |
| D | keywords.c | 28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO 32 { "restrict", RESTRICT_KEYW },
|
| /Linux-v6.1/include/uapi/linux/ |
| D | landlock.h | 91 * These flags enable to restrict a sandboxed process to a set of actions on 140 * It is currently not possible to restrict some file-related actions 146 * Future Landlock evolutions will enable to restrict them.
|
| D | btf.h | 45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT, 71 BTF_KIND_RESTRICT = 11, /* Restrict */
|
| D | tiocl.h | 33 #define TIOCL_SETKMSGREDIRECT 11 /* restrict kernel messages to a vt */
|
| /Linux-v6.1/Documentation/devicetree/bindings/leds/ |
| D | richtek,rt8515.yaml | 64 the device tree, you can further restrict the maximum 76 the device tree, you can further restrict the maximum
|
| /Linux-v6.1/Documentation/crypto/ |
| D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 348 2) Restrict using the kernel builtin and secondary trusted keyrings 359 3) Restrict using a separate key or keyring 383 # Create and restrict a keyring for the certificate chain 404 # Restrict the keyring that already has root1.cert linked. The cert
|
| /Linux-v6.1/include/uapi/sound/ |
| D | asequencer.h | 367 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */ 368 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */ 369 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */ 370 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */ 372 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */ 374 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
|
| /Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
| D | btf_write.c | 54 /* PTR/CONST/VOLATILE/RESTRICT */ in gen_btf() 63 id = btf__add_const(btf, 5); /* points forward to restrict */ in gen_btf() 85 "[5] RESTRICT '(anon)' type_id=4", "raw_dump"); in gen_btf() 371 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add() 430 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add_btf() 465 "[27] RESTRICT '(anon)' type_id=26", in test_btf_add_btf()
|
| /Linux-v6.1/crypto/asymmetric_keys/ |
| D | restrict.c | 54 * restrict_link_by_signature - Restrict additions to a ring of public keys 223 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public 250 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
|
| D | Makefile | 10 restrict.o \
|
| /Linux-v6.1/arch/arm64/kvm/hyp/include/nvhe/ |
| D | fixed_config.h | 44 * Restrict to the following *unsigned* features for protected VMs: 84 * Restrict to the following *unsigned* features for protected VMs:
|
| /Linux-v6.1/security/safesetid/ |
| D | Kconfig | 9 restrict UID/GID transitions from a given UID/GID to only those
|
| /Linux-v6.1/tools/include/uapi/linux/ |
| D | btf.h | 45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT, 71 BTF_KIND_RESTRICT = 11, /* Restrict */
|
| /Linux-v6.1/security/landlock/ |
| D | Kconfig | 8 Landlock is a sandboxing mechanism that enables processes to restrict
|
| /Linux-v6.1/drivers/media/i2c/ |
| D | aptina-pll.c | 98 * restrict the number of mf values to be checked. in aptina_pll_calculate() 100 * Furthermore, conditions (4) and (5) only restrict the range of in aptina_pll_calculate()
|
| /Linux-v6.1/Documentation/devicetree/bindings/iommu/ |
| D | xen,grant-dma.yaml | 16 The binding is required to restrict memory access using Xen grant mappings.
|
| /Linux-v6.1/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 4 SafeSetID is an LSM module that gates the setid family of syscalls to restrict 29 generally feasible way in Linux to restrict the potential UIDs that a user can
|
| /Linux-v6.1/Documentation/mm/ |
| D | numa.rst | 108 System administrators and application designers can restrict a task's migration 115 System administrators can restrict the CPUs and nodes' memories that a non-
|
| /Linux-v6.1/drivers/sh/intc/ |
| D | irqdomain.c | 58 * restrict the linear case to these conditions here, taking the in intc_irq_domain_init()
|
| /Linux-v6.1/drivers/staging/media/imx/ |
| D | TODO | 31 - imx7-media-csi: Restrict the supported formats list to the SoC version.
|
| /Linux-v6.1/net/netfilter/ |
| D | xt_CHECKSUM.c | 62 …pr_warn_once("CHECKSUM should be avoided. If really needed, restrict with \"-p udp\" and only use… in checksum_tg_check()
|
12345678910>>...14