| /kernel/linux/linux-6.6/Documentation/devicetree/bindings/reserved-memory/ |
| D | shared-dma-pool.yaml | 25 - const: restricted-dma-pool 28 of restricted DMA buffers for a set of devices. The memory 33 restricted DMA is to mitigate the lack of DMA access control 63 const: restricted-dma-pool 91 restricted_dma_reserved: restricted-dma-pool@50000000 { 92 compatible = "restricted-dma-pool";
|
| /kernel/linux/linux-6.6/arch/arm64/kvm/hyp/nvhe/ |
| D | sys_regs.c | 53 * Returns the restricted features values of the feature register based on the 67 * Iterate over the restricted feature fields and calculate the minimum in get_restricted_features_unsigned() 69 * value is being restricted to. in get_restricted_features_unsigned() 341 * NOTE: Anything not explicitly listed here is *restricted by default*, i.e., 345 /* Cache maintenance by set/way operations are restricted. */ 347 /* Debug and Trace Registers are restricted. */ 415 /* Scalable Vector Registers are restricted. */ 426 /* Performance Monitoring Registers are restricted. */ 428 /* Limited Ordering Regions Registers are restricted. */ 440 /* Performance Monitoring Registers are restricted. */ [all …]
|
| /kernel/linux/linux-6.6/drivers/firmware/efi/ |
| D | cper_cxl.c | 33 "Restricted CXL Device", 34 "Restricted CXL Host Downstream Port", 48 RCD, /* Restricted CXL Device */ 49 RCH_DP, /* Restricted CXL Host Downstream Port */ 70 * is used to refer to Restricted CXL Device, CXL Device, CXL in cper_print_prot_err()
|
| /kernel/linux/linux-5.10/drivers/video/fbdev/kyro/ |
| D | STG4000InitDevice.c | 71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */ 72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */ 73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */ 75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */ 172 * Check it's within restricted VCO range in ProgramClock() 174 * above the restricted range, then test in ProgramClock()
|
| /kernel/linux/linux-6.6/drivers/video/fbdev/kyro/ |
| D | STG4000InitDevice.c | 71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */ 72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */ 73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */ 75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */ 172 * Check it's within restricted VCO range in ProgramClock() 174 * above the restricted range, then test in ProgramClock()
|
| /kernel/linux/linux-5.10/arch/powerpc/include/asm/ |
| D | perf_event_fsl_emb.h | 28 * can hold restricted events, or zero if there are no 29 * restricted events.
|
| /kernel/linux/linux-6.6/arch/powerpc/include/asm/ |
| D | perf_event_fsl_emb.h | 28 * can hold restricted events, or zero if there are no 29 * restricted events.
|
| /kernel/linux/common_modules/qos_auth/auth_ctl/ |
| D | Kconfig | 27 ioctl cmd will be restricted. 36 be restricted.
|
| /kernel/linux/linux-6.6/drivers/of/ |
| D | device.c | 60 * restricted-dma-pool region is allowed. in of_dma_set_restricted_buffer() 62 if (of_device_is_compatible(node, "restricted-dma-pool") && in of_dma_set_restricted_buffer() 71 * Attempt to initialize a restricted-dma-pool region if one was found. in of_dma_set_restricted_buffer() 75 dev_warn(dev, "failed to initialise \"restricted-dma-pool\" memory node\n"); in of_dma_set_restricted_buffer()
|
| /kernel/linux/linux-6.6/Documentation/userspace-api/ |
| D | landlock.rst | 171 now restricted and this policy will be enforced on all its subsequently created 397 Access to regular files and directories can be restricted by Landlock, 401 restricted. Likewise, some special kernel filesystems such as nsfs, which can 403 restricted. However, thanks to the `ptrace restrictions`_, access to such 404 sensitive ``/proc`` files are automatically restricted according to domain 422 Kernel memory allocated to create rulesets is accounted and can be restricted 435 from a parent to its hierarchy. Because files are identified and restricted by
|
| /kernel/linux/linux-5.10/include/asm-generic/bitops/ |
| D | instrumented-atomic.h | 24 * restricted to acting on a single-word quantity. 53 * restricted to acting on a single-word quantity.
|
| /kernel/linux/linux-6.6/include/asm-generic/bitops/ |
| D | instrumented-atomic.h | 24 * restricted to acting on a single-word quantity. 53 * restricted to acting on a single-word quantity.
|
| /kernel/linux/linux-5.10/drivers/spi/ |
| D | spi-fsi.c | 80 bool restricted; member 295 if (ctx->restricted) { in fsi_spi_sequence_transfer() 596 if (of_device_is_compatible(np, "ibm,fsi2spi-restricted")) { in fsi_spi_probe() 597 ctx->restricted = true; in fsi_spi_probe() 600 ctx->restricted = false; in fsi_spi_probe()
|
| /kernel/linux/linux-6.6/arch/x86/include/asm/ |
| D | sync_bitops.h | 30 * restricted to acting on a single-word quantity. 65 * restricted to acting on a single-word quantity.
|
| /kernel/linux/linux-5.10/include/uapi/xen/ |
| D | evtchn.h | 93 * Once a file descriptor has been restricted it cannot be 94 * de-restricted, and must be closed and re-opened. Event channels
|
| /kernel/linux/linux-5.10/arch/x86/include/asm/ |
| D | sync_bitops.h | 30 * restricted to acting on a single-word quantity. 65 * restricted to acting on a single-word quantity.
|
| /kernel/linux/linux-6.6/include/uapi/xen/ |
| D | evtchn.h | 93 * Once a file descriptor has been restricted it cannot be 94 * de-restricted, and must be closed and re-opened. Event channels
|
| /kernel/linux/linux-5.10/Documentation/x86/x86_64/ |
| D | fake-numa-for-cpusets.rst | 64 /proc/meminfo between the restricted cpuset case above and the unrestricted 69 Name Unrestricted Restricted
|
| /kernel/linux/linux-6.6/Documentation/arch/x86/x86_64/ |
| D | fake-numa-for-cpusets.rst | 64 /proc/meminfo between the restricted cpuset case above and the unrestricted 69 Name Unrestricted Restricted
|
| /kernel/linux/linux-6.6/arch/x86/include/uapi/asm/ |
| D | debugreg.h | 23 * Note, with the introduction of Bus Lock Detection (BLD) and Restricted 30 * restricted transactional memory. #DB occurred inside an RTM region
|
| /kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/ |
| D | spectre.rst | 220 x86 CPUs with Enhanced Indirect Branch Restricted Speculation 227 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature 390 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is 405 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks 416 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks 498 On x86, indirect branch restricted speculation is turned on by default 528 speculation restricted by default. Administrators can change 713 branch speculation restricted by default. This behavior can be 724 restricted.
|
| /kernel/linux/linux-6.6/arch/powerpc/perf/ |
| D | core-fsl-emb.c | 291 * Allocate counters from top-down, so that restricted-capable in fsl_emb_pmu_add() 360 * TODO: if at least one restricted event exists, and we in fsl_emb_pmu_del() 361 * just freed up a non-restricted-capable counter, and in fsl_emb_pmu_del() 362 * there is a restricted-capable counter occupied by in fsl_emb_pmu_del() 363 * a non-restricted event, migrate that event to the in fsl_emb_pmu_del()
|
| /kernel/linux/linux-5.10/arch/powerpc/perf/ |
| D | core-fsl-emb.c | 291 * Allocate counters from top-down, so that restricted-capable in fsl_emb_pmu_add() 360 * TODO: if at least one restricted event exists, and we in fsl_emb_pmu_del() 361 * just freed up a non-restricted-capable counter, and in fsl_emb_pmu_del() 362 * there is a restricted-capable counter occupied by in fsl_emb_pmu_del() 363 * a non-restricted event, migrate that event to the in fsl_emb_pmu_del()
|
| /kernel/linux/linux-6.6/arch/arm64/kvm/hyp/include/nvhe/ |
| D | fixed_config.h | 13 * This file contains definitions for features to be allowed or restricted for 21 * features that are restricted to support at most the specified feature.
|
| /kernel/linux/linux-5.10/Documentation/cdrom/ |
| D | packet-writing.rst | 34 the so called "restricted overwrite" mode. To put a disc in restricted
|