| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | ima_mok.c | 26 struct key_restriction *restriction; in ima_mok_init() local 30 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in ima_mok_init() 31 if (!restriction) in ima_mok_init() 32 panic("Can't allocate IMA blacklist restriction."); in ima_mok_init() 34 restriction->check = restrict_link_by_builtin_trusted; in ima_mok_init() 43 restriction, NULL); in ima_mok_init()
|
| /kernel/linux/linux-4.19/security/integrity/ima/ |
| D | ima_mok.c | 31 struct key_restriction *restriction; in ima_mok_init() local 35 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in ima_mok_init() 36 if (!restriction) in ima_mok_init() 37 panic("Can't allocate IMA blacklist restriction."); in ima_mok_init() 39 restriction->check = restrict_link_by_builtin_trusted; in ima_mok_init() 47 restriction, NULL); in ima_mok_init()
|
| /kernel/linux/linux-5.10/security/integrity/ |
| D | digsig.c | 98 struct key_restriction *restriction) in __integrity_init_keyring() argument 105 KEY_ALLOC_NOT_IN_QUOTA, restriction, NULL); in __integrity_init_keyring() 121 struct key_restriction *restriction; in integrity_init_keyring() local 128 restriction = NULL; in integrity_init_keyring() 135 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in integrity_init_keyring() 136 if (!restriction) in integrity_init_keyring() 139 restriction->check = restrict_link_to_ima; in integrity_init_keyring() 143 return __integrity_init_keyring(id, perm, restriction); in integrity_init_keyring()
|
| /kernel/linux/linux-5.10/drivers/net/wireless/intel/iwlwifi/dvm/ |
| D | tt.c | 60 /* Advance Thermal Throttling default restriction table */ 87 struct iwl_tt_restriction *restriction; in iwl_ht_enabled() local 91 restriction = tt->restriction + tt->state; in iwl_ht_enabled() 92 return restriction->is_ht; in iwl_ht_enabled() 123 struct iwl_tt_restriction *restriction; in iwl_tx_ant_restriction() local 127 restriction = tt->restriction + tt->state; in iwl_tx_ant_restriction() 128 return restriction->tx_stream; in iwl_tx_ant_restriction() 134 struct iwl_tt_restriction *restriction; in iwl_rx_ant_restriction() local 138 restriction = tt->restriction + tt->state; in iwl_rx_ant_restriction() 139 return restriction->rx_stream; in iwl_rx_ant_restriction() [all …]
|
| D | tt.h | 39 * struct iwl_tt_restriction - Thermal Throttling restriction table 80 * @iwl_tt_restriction: ptr to restriction tbl, used by advance 96 struct iwl_tt_restriction *restriction; member
|
| /kernel/linux/linux-4.19/drivers/net/wireless/intel/iwlwifi/dvm/ |
| D | tt.c | 74 /* Advance Thermal Throttling default restriction table */ 101 struct iwl_tt_restriction *restriction; in iwl_ht_enabled() local 105 restriction = tt->restriction + tt->state; in iwl_ht_enabled() 106 return restriction->is_ht; in iwl_ht_enabled() 137 struct iwl_tt_restriction *restriction; in iwl_tx_ant_restriction() local 141 restriction = tt->restriction + tt->state; in iwl_tx_ant_restriction() 142 return restriction->tx_stream; in iwl_tx_ant_restriction() 148 struct iwl_tt_restriction *restriction; in iwl_rx_ant_restriction() local 152 restriction = tt->restriction + tt->state; in iwl_rx_ant_restriction() 153 return restriction->rx_stream; in iwl_rx_ant_restriction() [all …]
|
| D | tt.h | 54 * struct iwl_tt_restriction - Thermal Throttling restriction table 95 * @iwl_tt_restriction: ptr to restriction tbl, used by advance 111 struct iwl_tt_restriction *restriction; member
|
| /kernel/linux/linux-4.19/security/integrity/ |
| D | digsig.c | 85 struct key_restriction *restriction; in integrity_init_keyring() local 91 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in integrity_init_keyring() 92 if (!restriction) in integrity_init_keyring() 95 restriction->check = restrict_link_to_ima; in integrity_init_keyring() 103 restriction, NULL); in integrity_init_keyring()
|
| /kernel/linux/linux-4.19/certs/ |
| D | system_keyring.c | 80 struct key_restriction *restriction; in get_builtin_and_secondary_restriction() local 82 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in get_builtin_and_secondary_restriction() 84 if (!restriction) in get_builtin_and_secondary_restriction() 85 panic("Can't allocate secondary trusted keyring restriction\n"); in get_builtin_and_secondary_restriction() 87 restriction->check = restrict_link_by_builtin_and_secondary_trusted; in get_builtin_and_secondary_restriction() 89 return restriction; in get_builtin_and_secondary_restriction()
|
| /kernel/linux/linux-5.10/certs/ |
| D | system_keyring.c | 80 struct key_restriction *restriction; in get_builtin_and_secondary_restriction() local 82 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in get_builtin_and_secondary_restriction() 84 if (!restriction) in get_builtin_and_secondary_restriction() 85 panic("Can't allocate secondary trusted keyring restriction\n"); in get_builtin_and_secondary_restriction() 87 restriction->check = restrict_link_by_builtin_and_secondary_trusted; in get_builtin_and_secondary_restriction() 89 return restriction; in get_builtin_and_secondary_restriction()
|
| /kernel/linux/linux-4.19/Documentation/RCU/ |
| D | UP.txt | 79 Quick Quiz #2: What locking restriction must RCU callbacks respect? 107 What locking restriction must RCU callbacks respect? 122 This restriction might seem gratuitous, since very few RCU
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | keyring.c | 545 * @restriction_key: Keys providing additional data for evaluating restriction. 988 * Semaphore to serialise restriction setup to prevent reference count 989 * cycles through restriction key pointers. 994 * Check for restriction cycles that would prevent keyring garbage collection. 1012 * keyring_restrict - Look up and apply a restriction to a keyring 1014 * @type: The key type that will provide the restriction checker. 1015 * @restriction: The restriction options to apply to the keyring 1017 * Look up a keyring and apply a restriction to it. The restriction is managed 1019 * the restriction string. 1022 const char *restriction) in keyring_restrict() argument [all …]
|
| /kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/silvermont/ |
| D | frontend.json | 39 …"PublicDescription": "Counts the number of times a decode restriction reduced the decode throughpu… 45 …"BriefDescription": "Counts the number of times a decode restriction reduced the decode throughput…
|
| /kernel/linux/linux-4.19/tools/perf/pmu-events/arch/x86/silvermont/ |
| D | frontend.json | 39 …"PublicDescription": "Counts the number of times a decode restriction reduced the decode throughpu… 45 …"BriefDescription": "Counts the number of times a decode restriction reduced the decode throughput…
|
| /kernel/linux/linux-5.10/Documentation/RCU/ |
| D | UP.rst | 84 What locking restriction must RCU callbacks respect? 114 What locking restriction must RCU callbacks respect? 130 This restriction might seem gratuitous, since very few RCU
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | key-type.h | 142 /* Look up a keyring access restriction (optional) 144 * - NULL is a valid return value (meaning the requested restriction 146 * - should return -EINVAL if the restriction is unknown
|
| /kernel/linux/linux-4.19/include/linux/ |
| D | key-type.h | 140 /* Look up a keyring access restriction (optional) 142 * - NULL is a valid return value (meaning the requested restriction 144 * - should return -EINVAL if the restriction is unknown
|
| /kernel/linux/linux-4.19/security/keys/ |
| D | keyring.c | 518 * @data: Additional data for evaluating restriction. 949 * Semaphore to serialise restriction setup to prevent reference count 950 * cycles through restriction key pointers. 955 * Check for restriction cycles that would prevent keyring garbage collection. 973 * keyring_restrict - Look up and apply a restriction to a keyring 976 * @restriction: The restriction options to apply to the keyring 979 const char *restriction) in keyring_restrict() argument 1005 restrict_link = restrict_type->lookup_restriction(restriction); in keyring_restrict() 1533 * Garbage collect restriction pointers from a keyring. 1536 * up if the key type is unregistered. The restriction is altered to always [all …]
|
| /kernel/linux/linux-5.10/drivers/gpu/drm/amd/display/modules/inc/ |
| D | mod_freesync.h | 6 * to deal in the Software without restriction, including without limitation 34 * to deal in the Software without restriction, including without limitation
|
| /kernel/linux/linux-4.19/drivers/net/wireless/intel/iwlwifi/fw/api/ |
| D | power.h | 306 * @pwr_restriction: TX power restriction in dBms. 328 * @pwr_restriction: TX power restriction in 1/8 dBms. 329 * @dev_24: device TX power restriction in 1/8 dBms 330 * @dev_52_low: device TX power restriction upper band - low 331 * @dev_52_high: device TX power restriction upper band - high
|
| /kernel/linux/linux-4.19/drivers/gpu/drm/amd/display/modules/inc/ |
| D | mod_freesync.h | 6 * to deal in the Software without restriction, including without limitation 34 * to deal in the Software without restriction, including without limitation
|
| /kernel/linux/linux-4.19/security/yama/ |
| D | Kconfig | 8 access controls. Currently available is ptrace scope restriction.
|
| /kernel/linux/linux-5.10/security/yama/ |
| D | Kconfig | 9 access controls. Currently available is ptrace scope restriction.
|
| /kernel/linux/linux-5.10/arch/arm/kernel/ |
| D | vmlinux-xip.lds.S | 181 * Due to PMSAv7 restriction on base address and size we have to 183 * alignment restriction on _xiprom will likely force XIP address
|
| /kernel/linux/linux-4.19/arch/arm/kernel/ |
| D | vmlinux-xip.lds.S | 186 * Due to PMSAv7 restriction on base address and size we have to 188 * alignment restriction on _xiprom will likely force XIP address
|