| /kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/cfg/ |
| D | 22000.c | 190 * so we need to restrict the size of transmitted aggregation to the 226 * so we need to restrict the size of transmitted aggregation to the 239 * so we need to restrict the size of transmitted aggregation to the 252 * so we need to restrict the size of transmitted aggregation to the 264 * so we need to restrict the size of transmitted aggregation to the 277 * so we need to restrict the size of transmitted aggregation to the 290 * so we need to restrict the size of transmitted aggregation to the 302 * so we need to restrict the size of transmitted aggregation to the 316 * so we need to restrict the size of transmitted aggregation to the 329 * so we need to restrict the size of transmitted aggregation to the [all …]
|
| /kernel/linux/linux-5.10/drivers/net/wireless/intel/iwlwifi/cfg/ |
| D | 22000.c | 321 * so we need to restrict the size of transmitted aggregation to the 333 * so we need to restrict the size of transmitted aggregation to the 383 * so we need to restrict the size of transmitted aggregation to the 396 * so we need to restrict the size of transmitted aggregation to the 409 * so we need to restrict the size of transmitted aggregation to the 421 * so we need to restrict the size of transmitted aggregation to the 434 * so we need to restrict the size of transmitted aggregation to the 447 * so we need to restrict the size of transmitted aggregation to the 459 * so we need to restrict the size of transmitted aggregation to the 473 * so we need to restrict the size of transmitted aggregation to the [all …]
|
| /kernel/uniproton/src/net/lwip-2.1/src/ |
| D | netdb.c | 38 int getaddrinfo(const char *restrict nodename, const char *restrict servname, in getaddrinfo() 39 const struct addrinfo *restrict hints, struct addrinfo **restrict res) in getaddrinfo()
|
| /kernel/liteos_m/components/net/lwip-2.1/porting/src/ |
| D | netdb_porting.c | 55 int getaddrinfo(const char *restrict nodename, const char *restrict servname, const struct addrinfo… in getaddrinfo() 56 struct addrinfo **restrict res) in getaddrinfo()
|
| /kernel/linux/linux-6.6/certs/ |
| D | system_keyring.c | 36 * restrict_link_by_builtin_trusted - Restrict keyring addition by built-in CA 42 * Restrict the addition of keys into a keyring based on the key-to-be-added 55 * restrict_link_by_digsig_builtin - Restrict digitalSignature key additions by the built-in keyring 61 * Restrict the addition of keys into a keyring based on the key-to-be-added 76 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring 83 * Restrict the addition of keys into a keyring based on the key-to-be-added 107 * restrict_link_by_digsig_builtin_and_secondary - Restrict by digitalSignature. 113 * Restrict the addition of keys into a keyring based on the key-to-be-added 196 * restrict_link_by_builtin_secondary_and_machine - Restrict keyring addition. 202 * Restrict the addition of keys into a keyring based on the key-to-be-added
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
| D | btf_dump_test_case_syntax.c | 34 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v… 187 void * restrict g;
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
| D | btf_dump_test_case_syntax.c | 67 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v… 226 void * restrict g;
|
| /kernel/linux/linux-6.6/Documentation/userspace-api/ |
| D | landlock.rst | 13 The goal of Landlock is to enable to restrict ambient rights (e.g. global 19 any process, including unprivileged ones, to securely restrict themselves. 33 rights`_. A set of rules is aggregated in a ruleset, which can then restrict 148 restrict the current thread from gaining more privileges (e.g. thanks to a SUID 154 perror("Failed to restrict privileges"); 219 Landlock enables to restrict access to file hierarchies, which means that these 226 be tied, either via the source or the destination path. These rules restrict 227 access when they are encountered on a path, which means that they can restrict 238 restrict the resulted merged hierarchy, and vice versa. Landlock users should 406 restrict such paths with dedicated ruleset flags. [all …]
|
| /kernel/liteos_a/syscall/ |
| D | los_syscall.h | 135 extern int SysSigAction(int sig, const sigaction_t *restrict sa, sigaction_t *restrict old, size_t … 136 extern int SysSigprocMask(int how, const sigset_t_l *restrict setl, sigset_t_l *restrict oldl, size… 278 extern int SysStatx(int fd, const char *restrict path, int flag, unsigned mask, struct statx *restr… 285 extern int SysFstatat64(int fd, const char *restrict path, struct kstat *restrict buf, int flag);
|
| D | ipc_syscall.c | 234 int SysSigAction(int sig, const sigaction_t *restrict sa, sigaction_t *restrict old, size_t sigsets… in SysSigAction() 239 int SysSigprocMask(int how, const sigset_t_l *restrict setl, sigset_t_l *restrict oldl, size_t sigs… in SysSigprocMask()
|
| /kernel/linux/config/linux-5.10/ |
| D | base_defconfig | 91 #Security DMESG restrict 94 # end of Security DMESG restrict
|
| /kernel/linux/config/linux-6.6/ |
| D | base_defconfig | 91 #Security DMESG restrict 94 # end of Security DMESG restrict
|
| /kernel/linux/linux-5.10/certs/ |
| D | system_keyring.c | 32 * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA 34 * Restrict the addition of keys into a keyring based on the key-to-be-added 48 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring 51 * Restrict the addition of keys into a keyring based on the key-to-be-added
|
| /kernel/linux/linux-6.6/crypto/asymmetric_keys/ |
| D | restrict.c | 54 * restrict_link_by_signature - Restrict additions to a ring of public keys 112 * restrict_link_by_ca - Restrict additions to a ring of CA keys 152 * restrict_link_by_digsig - Restrict additions to a ring of digsig keys 307 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public 334 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
|
| /kernel/linux/linux-5.10/scripts/genksyms/ |
| D | keywords.c | 28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO 32 { "restrict", RESTRICT_KEYW },
|
| /kernel/linux/linux-6.6/scripts/genksyms/ |
| D | keywords.c | 28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO 32 { "restrict", RESTRICT_KEYW },
|
| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/leds/ |
| D | richtek,rt8515.yaml | 64 the device tree, you can further restrict the maximum 76 the device tree, you can further restrict the maximum
|
| /kernel/linux/linux-5.10/Documentation/crypto/ |
| D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 348 2) Restrict using the kernel builtin and secondary trusted keyrings 359 3) Restrict using a separate key or keyring 383 # Create and restrict a keyring for the certificate chain 404 # Restrict the keyring that already has root1.cert linked. The cert
|
| /kernel/linux/linux-6.6/Documentation/crypto/ |
| D | asymmetric-keys.rst | 338 1) Restrict using the kernel builtin trusted keyring 348 2) Restrict using the kernel builtin and secondary trusted keyrings 359 3) Restrict using a separate key or keyring 383 # Create and restrict a keyring for the certificate chain 404 # Restrict the keyring that already has root1.cert linked. The cert
|
| /kernel/linux/linux-6.6/include/uapi/linux/ |
| D | landlock.h | 93 * These flags enable to restrict a sandboxed process to a set of actions on 169 * It is currently not possible to restrict some file-related actions 174 * Future Landlock evolutions will enable to restrict them.
|
| /kernel/linux/linux-5.10/include/uapi/sound/ |
| D | asequencer.h | 383 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */ 384 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */ 385 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */ 386 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */ 388 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */ 390 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
|
| /kernel/linux/linux-5.10/crypto/asymmetric_keys/ |
| D | restrict.c | 54 * restrict_link_by_signature - Restrict additions to a ring of public keys 213 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public 240 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
|
| /kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
| D | btf_write.c | 54 /* PTR/CONST/VOLATILE/RESTRICT */ in gen_btf() 63 id = btf__add_const(btf, 5); /* points forward to restrict */ in gen_btf() 85 "[5] RESTRICT '(anon)' type_id=4", "raw_dump"); in gen_btf() 371 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add() 430 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add_btf() 465 "[27] RESTRICT '(anon)' type_id=26", in test_btf_add_btf()
|
| /kernel/linux/linux-6.6/include/uapi/sound/ |
| D | asequencer.h | 393 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */ 394 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */ 395 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */ 396 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */ 398 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */ 400 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
|
| /kernel/linux/linux-6.6/arch/arm64/kvm/hyp/include/nvhe/ |
| D | fixed_config.h | 47 * Restrict to the following *unsigned* features for protected VMs: 87 * Restrict to the following *unsigned* features for protected VMs:
|