Home
last modified time | relevance | path

Searched full:restrict (Results 1 – 25 of 682) sorted by relevance

12345678910>>...28

/kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/cfg/
D22000.c190 * so we need to restrict the size of transmitted aggregation to the
226 * so we need to restrict the size of transmitted aggregation to the
239 * so we need to restrict the size of transmitted aggregation to the
252 * so we need to restrict the size of transmitted aggregation to the
264 * so we need to restrict the size of transmitted aggregation to the
277 * so we need to restrict the size of transmitted aggregation to the
290 * so we need to restrict the size of transmitted aggregation to the
302 * so we need to restrict the size of transmitted aggregation to the
316 * so we need to restrict the size of transmitted aggregation to the
329 * so we need to restrict the size of transmitted aggregation to the
[all …]
/kernel/linux/linux-5.10/drivers/net/wireless/intel/iwlwifi/cfg/
D22000.c321 * so we need to restrict the size of transmitted aggregation to the
333 * so we need to restrict the size of transmitted aggregation to the
383 * so we need to restrict the size of transmitted aggregation to the
396 * so we need to restrict the size of transmitted aggregation to the
409 * so we need to restrict the size of transmitted aggregation to the
421 * so we need to restrict the size of transmitted aggregation to the
434 * so we need to restrict the size of transmitted aggregation to the
447 * so we need to restrict the size of transmitted aggregation to the
459 * so we need to restrict the size of transmitted aggregation to the
473 * so we need to restrict the size of transmitted aggregation to the
[all …]
/kernel/uniproton/src/net/lwip-2.1/src/
Dnetdb.c38 int getaddrinfo(const char *restrict nodename, const char *restrict servname, in getaddrinfo()
39 const struct addrinfo *restrict hints, struct addrinfo **restrict res) in getaddrinfo()
/kernel/liteos_m/components/net/lwip-2.1/porting/src/
Dnetdb_porting.c55 int getaddrinfo(const char *restrict nodename, const char *restrict servname, const struct addrinfo… in getaddrinfo()
56 struct addrinfo **restrict res) in getaddrinfo()
/kernel/linux/linux-6.6/certs/
Dsystem_keyring.c36 * restrict_link_by_builtin_trusted - Restrict keyring addition by built-in CA
42 * Restrict the addition of keys into a keyring based on the key-to-be-added
55 * restrict_link_by_digsig_builtin - Restrict digitalSignature key additions by the built-in keyring
61 * Restrict the addition of keys into a keyring based on the key-to-be-added
76 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring
83 * Restrict the addition of keys into a keyring based on the key-to-be-added
107 * restrict_link_by_digsig_builtin_and_secondary - Restrict by digitalSignature.
113 * Restrict the addition of keys into a keyring based on the key-to-be-added
196 * restrict_link_by_builtin_secondary_and_machine - Restrict keyring addition.
202 * Restrict the addition of keys into a keyring based on the key-to-be-added
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/
Dbtf_dump_test_case_syntax.c34 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v…
187 void * restrict g;
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/
Dbtf_dump_test_case_syntax.c67 … we_need_to_go_deeper_ptr_t * restrict * volatile * const * restrict volatile * restrict const * v…
226 void * restrict g;
/kernel/linux/linux-6.6/Documentation/userspace-api/
Dlandlock.rst13 The goal of Landlock is to enable to restrict ambient rights (e.g. global
19 any process, including unprivileged ones, to securely restrict themselves.
33 rights`_. A set of rules is aggregated in a ruleset, which can then restrict
148 restrict the current thread from gaining more privileges (e.g. thanks to a SUID
154 perror("Failed to restrict privileges");
219 Landlock enables to restrict access to file hierarchies, which means that these
226 be tied, either via the source or the destination path. These rules restrict
227 access when they are encountered on a path, which means that they can restrict
238 restrict the resulted merged hierarchy, and vice versa. Landlock users should
406 restrict such paths with dedicated ruleset flags.
[all …]
/kernel/liteos_a/syscall/
Dlos_syscall.h135 extern int SysSigAction(int sig, const sigaction_t *restrict sa, sigaction_t *restrict old, size_t …
136 extern int SysSigprocMask(int how, const sigset_t_l *restrict setl, sigset_t_l *restrict oldl, size…
278 extern int SysStatx(int fd, const char *restrict path, int flag, unsigned mask, struct statx *restr…
285 extern int SysFstatat64(int fd, const char *restrict path, struct kstat *restrict buf, int flag);
Dipc_syscall.c234 int SysSigAction(int sig, const sigaction_t *restrict sa, sigaction_t *restrict old, size_t sigsets… in SysSigAction()
239 int SysSigprocMask(int how, const sigset_t_l *restrict setl, sigset_t_l *restrict oldl, size_t sigs… in SysSigprocMask()
/kernel/linux/config/linux-5.10/
Dbase_defconfig91 #Security DMESG restrict
94 # end of Security DMESG restrict
/kernel/linux/config/linux-6.6/
Dbase_defconfig91 #Security DMESG restrict
94 # end of Security DMESG restrict
/kernel/linux/linux-5.10/certs/
Dsystem_keyring.c32 * restrict_link_to_builtin_trusted - Restrict keyring addition by built in CA
34 * Restrict the addition of keys into a keyring based on the key-to-be-added
48 * restrict_link_by_builtin_and_secondary_trusted - Restrict keyring
51 * Restrict the addition of keys into a keyring based on the key-to-be-added
/kernel/linux/linux-6.6/crypto/asymmetric_keys/
Drestrict.c54 * restrict_link_by_signature - Restrict additions to a ring of public keys
112 * restrict_link_by_ca - Restrict additions to a ring of CA keys
152 * restrict_link_by_digsig - Restrict additions to a ring of digsig keys
307 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public
334 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
/kernel/linux/linux-5.10/scripts/genksyms/
Dkeywords.c28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO
32 { "restrict", RESTRICT_KEYW },
/kernel/linux/linux-6.6/scripts/genksyms/
Dkeywords.c28 // According to rth, c99 defines "_Bool", "__restrict", "__restrict__", "restrict". KAO
32 { "restrict", RESTRICT_KEYW },
/kernel/linux/linux-6.6/Documentation/devicetree/bindings/leds/
Drichtek,rt8515.yaml64 the device tree, you can further restrict the maximum
76 the device tree, you can further restrict the maximum
/kernel/linux/linux-5.10/Documentation/crypto/
Dasymmetric-keys.rst338 1) Restrict using the kernel builtin trusted keyring
348 2) Restrict using the kernel builtin and secondary trusted keyrings
359 3) Restrict using a separate key or keyring
383 # Create and restrict a keyring for the certificate chain
404 # Restrict the keyring that already has root1.cert linked. The cert
/kernel/linux/linux-6.6/Documentation/crypto/
Dasymmetric-keys.rst338 1) Restrict using the kernel builtin trusted keyring
348 2) Restrict using the kernel builtin and secondary trusted keyrings
359 3) Restrict using a separate key or keyring
383 # Create and restrict a keyring for the certificate chain
404 # Restrict the keyring that already has root1.cert linked. The cert
/kernel/linux/linux-6.6/include/uapi/linux/
Dlandlock.h93 * These flags enable to restrict a sandboxed process to a set of actions on
169 * It is currently not possible to restrict some file-related actions
174 * Future Landlock evolutions will enable to restrict them.
/kernel/linux/linux-5.10/include/uapi/sound/
Dasequencer.h383 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */
384 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */
385 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */
386 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */
388 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */
390 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
/kernel/linux/linux-5.10/crypto/asymmetric_keys/
Drestrict.c54 * restrict_link_by_signature - Restrict additions to a ring of public keys
213 * restrict_link_by_key_or_keyring - Restrict additions to a ring of public
240 * restrict_link_by_key_or_keyring_chain - Restrict additions to a ring of
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/
Dbtf_write.c54 /* PTR/CONST/VOLATILE/RESTRICT */ in gen_btf()
63 id = btf__add_const(btf, 5); /* points forward to restrict */ in gen_btf()
85 "[5] RESTRICT '(anon)' type_id=4", "raw_dump"); in gen_btf()
371 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add()
430 "[5] RESTRICT '(anon)' type_id=4", in test_btf_add_btf()
465 "[27] RESTRICT '(anon)' type_id=26", in test_btf_add_btf()
/kernel/linux/linux-6.6/include/uapi/sound/
Dasequencer.h393 #define SNDRV_SEQ_REMOVE_DEST (1<<2) /* Restrict by destination q:client:port */
394 #define SNDRV_SEQ_REMOVE_DEST_CHANNEL (1<<3) /* Restrict by channel */
395 #define SNDRV_SEQ_REMOVE_TIME_BEFORE (1<<4) /* Restrict to before time */
396 #define SNDRV_SEQ_REMOVE_TIME_AFTER (1<<5) /* Restrict to time or after */
398 #define SNDRV_SEQ_REMOVE_EVENT_TYPE (1<<7) /* Restrict to event type */
400 #define SNDRV_SEQ_REMOVE_TAG_MATCH (1<<9) /* Restrict to events with given tag */
/kernel/linux/linux-6.6/arch/arm64/kvm/hyp/include/nvhe/
Dfixed_config.h47 * Restrict to the following *unsigned* features for protected VMs:
87 * Restrict to the following *unsigned* features for protected VMs:

12345678910>>...28