/linux-6.14.4/security/loadpin/ |
D | loadpin.c | 46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 58 .procname = "enforce", 59 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 261 enforce ? "" : "not "); in loadpin_init() 442 module_param(enforce, int, 0); 443 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
D | Kconfig | 15 bool "Enforce LoadPin at boot" 21 If selected, LoadPin will enforce pinning at boot. If not 23 "loadpin.enforce=1".
|
/linux-6.14.4/security/ipe/ |
D | fs.c | 70 * setenforce() - Write handler for the securityfs node, "ipe/enforce" 89 old_value = READ_ONCE(enforce); in setenforce() 96 WRITE_ONCE(enforce, new_value); in setenforce() 103 * getenforce() - Read handler for the securityfs node, "ipe/enforce" 116 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce() 211 enforce_node = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
|
D | eval.c | 23 bool enforce = true; variable 378 if (!READ_ONCE(enforce)) in ipe_evaluate_event() 392 module_param(enforce, bool, 0400); 393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
|
D | audit.c | 143 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match() 273 * @new_enforce: The new value enforce to be set. 274 * @old_enforce: The old value currently in enforce.
|
/linux-6.14.4/Documentation/admin-guide/LSM/ |
D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
/linux-6.14.4/Documentation/gpu/amdgpu/ |
D | process-isolation.rst | 19 …e partition will be present. Writing 1 to the partition position enables enforce isolation, writin… 21 Example of enabling enforce isolation on a GPU with multiple partitions: 29 The output indicates that enforce isolation is enabled on zeroth and second parition and disabled o…
|
/linux-6.14.4/fs/btrfs/ |
D | qgroup.h | 393 enum btrfs_qgroup_rsv_type type, bool enforce); 395 enum btrfs_qgroup_rsv_type type, bool enforce, 399 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 403 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 406 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 411 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
/linux-6.14.4/tools/arch/riscv/include/asm/ |
D | barrier.h | 16 /* These barriers need to enforce ordering on both devices and memory. */ 21 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux-6.14.4/drivers/gpu/drm/i915/display/ |
D | intel_fb_bo.c | 34 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init() 65 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
|
/linux-6.14.4/Documentation/userspace-api/ |
D | check_exec.rst | 10 are intended for script interpreters and dynamic linkers to enforce a 31 set to 1 (i.e. always enforce restrictions). 75 Programs should only enforce consistent restrictions according to the
|
/linux-6.14.4/arch/riscv/include/asm/ |
D | barrier.h | 22 /* These barriers need to enforce ordering on both devices or memory. */ 27 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux-6.14.4/security/integrity/ |
D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 82 The .machine keyring can be configured to enforce CA restriction
|
/linux-6.14.4/kernel/livepatch/ |
D | transition.c | 196 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state() 200 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state() 390 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch() 615 * Enforce the order of the task->patch_state initializations and the in klp_init_transition() 619 * Also enforce the order of the klp_target_state write and future in klp_init_transition() 686 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
|
D | patch.c | 74 * In the enable path, enforce the order of the ops->func_stack and in klp_ftrace_handler() 89 * Enforce the order of the func->transition and in klp_ftrace_handler()
|
/linux-6.14.4/arch/x86/kvm/vmx/ |
D | sgx.c | 164 /* Enforce restriction of access to the PROVISIONKEY. */ in __handle_encls_ecreate() 174 * Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. Note in __handle_encls_ecreate() 190 /* Enforce CPUID restriction on max enclave size. */ in __handle_encls_ecreate() 274 * enforce restriction of access to the PROVISIONKEY. in handle_encls_ecreate() 436 * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
|
/linux-6.14.4/Documentation/hwmon/ |
D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
/linux-6.14.4/arch/powerpc/include/asm/ |
D | plpks.h | 18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce 19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
|
/linux-6.14.4/arch/arc/include/asm/ |
D | shmparam.h | 12 /* Enforce SHMLBA in shmat */
|
/linux-6.14.4/arch/x86/configs/ |
D | hardening.config | 13 # Enforce CET Indirect Branch Tracking in the kernel.
|
/linux-6.14.4/arch/arm/include/asm/ |
D | shmparam.h | 13 * Enforce SHMLBA in shmat
|
/linux-6.14.4/scripts/gdb/linux/ |
D | symbols.py | 34 # enforce update if object file is not found 180 # enforce update
|
/linux-6.14.4/arch/xtensa/include/asm/ |
D | fixmap.h | 31 /* Enforce that FIXADDR_START is PMD aligned to handle cache aliasing */
|
/linux-6.14.4/arch/powerpc/mm/book3s64/ |
D | pkeys.c | 440 * We only want to enforce protection keys on the current thread because we 444 * So do not enforce things if the VMA is not from the current mm, or if we are 453 * Do not enforce our key-permissions on a foreign vma. in arch_vma_access_permitted()
|
/linux-6.14.4/arch/x86/include/asm/ |
D | mmu_context.h | 243 * We only want to enforce protection keys on the current process 248 * So do not enforce things if the VMA is not from the current
|