Home
last modified time | relevance | path

Searched full:restrict (Results 1 – 25 of 381) sorted by relevance

12345678910>>...16

/linux-6.14.4/drivers/net/wireless/intel/iwlwifi/cfg/
D22000.c188 * so we need to restrict the size of transmitted aggregation to the
224 * so we need to restrict the size of transmitted aggregation to the
237 * so we need to restrict the size of transmitted aggregation to the
250 * so we need to restrict the size of transmitted aggregation to the
262 * so we need to restrict the size of transmitted aggregation to the
275 * so we need to restrict the size of transmitted aggregation to the
288 * so we need to restrict the size of transmitted aggregation to the
300 * so we need to restrict the size of transmitted aggregation to the
314 * so we need to restrict the size of transmitted aggregation to the
327 * so we need to restrict the size of transmitted aggregation to the
[all …]
/linux-6.14.4/certs/
Dsystem_keyring.c36 * restrict_link_by_builtin_trusted - Restrict keyring addition by built-in CA
42 * Restrict the addition of keys into a keyring based on the key-to-be-added
55 * restrict_link_by_digsig_builtin - Restrict digitalSignature key additions by the built-in keyring
61 * Restrict the addition of keys into a keyring based on the key-to-be-added
76 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring
83 * Restrict the addition of keys into a keyring based on the key-to-be-added
107 * restrict_link_by_digsig_builtin_and_secondary - Restrict by digitalSignature.
113 * Restrict the addition of keys into a keyring based on the key-to-be-added
196 * restrict_link_by_builtin_secondary_and_machine - Restrict keyring addition.
202 * Restrict the addition of keys into a keyring based on the key-to-be-added
/linux-6.14.4/tools/testing/selftests/bpf/progs/
Dbtf_dump_test_case_syntax.c67 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v…
226 void * restrict g;
/linux-6.14.4/Documentation/userspace-api/
Dlandlock.rst19 any process, including unprivileged ones, to securely restrict themselves.
33 perform. A set of rules is aggregated in a ruleset, which can then restrict
194 The next step is to restrict the current thread from gaining more privileges
202 perror("Failed to restrict privileges");
274 be tied, either via the source or the destination path. These rules restrict
275 access when they are encountered on a path, which means that they can restrict
286 OverlayFS layer will not restrict the resulted merged hierarchy, and vice versa.
319 Similar to the implicit `Ptrace restrictions`_, we may want to further restrict
495 restrict such paths with dedicated ruleset flags.
545 restrict access to files, also implies inheritance of the ruleset restrictions
[all …]
/linux-6.14.4/include/uapi/linux/
Dlandlock.h143 * These flags enable to restrict a sandboxed process to a set of actions on
240 * It is currently not possible to restrict some file-related actions
245 * Future Landlock evolutions will enable to restrict them.
272 * These flags enable to restrict a sandboxed process to a set of network
302 * - %LANDLOCK_SCOPE_ABSTRACT_UNIX_SOCKET: Restrict a sandboxed process from
305 * - %LANDLOCK_SCOPE_SIGNAL: Restrict a sandboxed process from sending a signal
Dbtf.h45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT,
71 BTF_KIND_RESTRICT = 11, /* Restrict */
Dtiocl.h33 #define TIOCL_SETKMSGREDIRECT 11 /* restrict kernel messages to a vt */
/linux-6.14.4/crypto/asymmetric_keys/
Drestrict.c54 * restrict_link_by_signature - Restrict additions to a ring of public keys
116 * restrict_link_by_ca - Restrict additions to a ring of CA keys
156 * restrict_link_by_digsig - Restrict additions to a ring of digsig keys
311 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public
338 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
/linux-6.14.4/scripts/genksyms/
Dkeywords.c28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO
32 { "restrict", RESTRICT_KEYW },
/linux-6.14.4/Documentation/devicetree/bindings/leds/
Drichtek,rt8515.yaml64 the device tree, you can further restrict the maximum
76 the device tree, you can further restrict the maximum
/linux-6.14.4/Documentation/crypto/
Dasymmetric-keys.rst338 1) Restrict using the kernel builtin trusted keyring
348 2) Restrict using the kernel builtin and secondary trusted keyrings
359 3) Restrict using a separate key or keyring
383 # Create and restrict a keyring for the certificate chain
404 # Restrict the keyring that already has root1.cert linked. The cert
/linux-6.14.4/samples/landlock/
Dsandboxer.c322 " - \"a\" to restrict opening abstract unix sockets\n"
323 " - \"s\" to restrict sending signals\n"
401 * should then fall back to not restrict themselves at all if in main()
483 perror("Failed to restrict privileges"); in main()
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/
Dbtf_write.c54 /* PTR/CONST/VOLATILE/RESTRICT */ in gen_btf()
63 id = btf__add_const(btf, 5); /* points forward to restrict */ in gen_btf()
85 "[5] RESTRICT '(anon)' type_id=4", "raw_dump"); in gen_btf()
371 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add()
430 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add_btf()
465 "[27] RESTRICT '(anon)' type_id=26", in test_btf_add_btf()
Dbtf_field_iter.c71 btf__add_restrict(btf, 3); /* [12] restrict int *; */ in test_btf_field_iter()
110 "[12] RESTRICT '(anon)' type_id=3", in test_btf_field_iter()
/linux-6.14.4/include/uapi/sound/
Dasequencer.h403 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */
404 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */
405 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */
406 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */
408 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */
410 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
/linux-6.14.4/tools/build/feature/
Dtest-scandirat.c9 // expects non-NULL, arg3 is 'restrict' so "pointers" have to be different in main()
/linux-6.14.4/tools/include/uapi/linux/
Dbtf.h45 * "type" is used by PTR, TYPEDEF, VOLATILE, CONST, RESTRICT,
71 BTF_KIND_RESTRICT = 11, /* Restrict */
/linux-6.14.4/security/safesetid/
DKconfig9 restrict UID/GID transitions from a given UID/GID to only those
/linux-6.14.4/drivers/media/i2c/
Daptina-pll.c97 * restrict the number of mf values to be checked. in aptina_pll_calculate()
99 * Furthermore, conditions (4) and (5) only restrict the range of in aptina_pll_calculate()
/linux-6.14.4/Documentation/devicetree/bindings/iommu/
Dxen,grant-dma.yaml16 The binding is required to restrict memory access using Xen grant mappings.
/linux-6.14.4/security/landlock/
DKconfig9 Landlock is a sandboxing mechanism that enables processes to restrict
/linux-6.14.4/Documentation/admin-guide/LSM/
DSafeSetID.rst4 SafeSetID is an LSM module that gates the setid family of syscalls to restrict
29 generally feasible way in Linux to restrict the potential UIDs that a user can
/linux-6.14.4/Documentation/mm/
Dnuma.rst106 System administrators and application designers can restrict a task's migration
113 System administrators can restrict the CPUs and nodes' memories that a non-
/linux-6.14.4/drivers/sh/intc/
Dirqdomain.c58 * restrict the linear case to these conditions here, taking the in intc_irq_domain_init()
/linux-6.14.4/tools/testing/selftests/landlock/
Dsandbox-and-launch.c52 perror("Failed to restrict self"); in main()

12345678910>>...16