| /kernel/linux/linux-6.6/security/integrity/ima/ |
| D | ima_mok.c | 26 struct key_restriction *restriction; in ima_mok_init() local 30 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in ima_mok_init() 31 if (!restriction) in ima_mok_init() 32 panic("Can't allocate IMA blacklist restriction."); in ima_mok_init() 34 restriction->check = restrict_link_by_builtin_trusted; in ima_mok_init() 43 restriction, NULL); in ima_mok_init()
|
| /kernel/linux/linux-5.10/security/integrity/ima/ |
| D | ima_mok.c | 26 struct key_restriction *restriction; in ima_mok_init() local 30 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in ima_mok_init() 31 if (!restriction) in ima_mok_init() 32 panic("Can't allocate IMA blacklist restriction."); in ima_mok_init() 34 restriction->check = restrict_link_by_builtin_trusted; in ima_mok_init() 43 restriction, NULL); in ima_mok_init()
|
| /kernel/linux/linux-6.6/security/integrity/ |
| D | digsig.c | 100 struct key_restriction *restriction) in __integrity_init_keyring() argument 107 KEY_ALLOC_NOT_IN_QUOTA, restriction, NULL); in __integrity_init_keyring() 127 struct key_restriction *restriction; in integrity_init_keyring() local 137 restriction = NULL; in integrity_init_keyring() 144 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in integrity_init_keyring() 145 if (!restriction) in integrity_init_keyring() 149 restriction->check = restrict_link_by_ca; in integrity_init_keyring() 151 restriction->check = restrict_link_to_ima; in integrity_init_keyring() 162 ret = __integrity_init_keyring(id, perm, restriction); in integrity_init_keyring() 164 kfree(restriction); in integrity_init_keyring()
|
| /kernel/linux/linux-5.10/security/integrity/ |
| D | digsig.c | 98 struct key_restriction *restriction) in __integrity_init_keyring() argument 105 KEY_ALLOC_NOT_IN_QUOTA, restriction, NULL); in __integrity_init_keyring() 121 struct key_restriction *restriction; in integrity_init_keyring() local 129 restriction = NULL; in integrity_init_keyring() 136 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in integrity_init_keyring() 137 if (!restriction) in integrity_init_keyring() 140 restriction->check = restrict_link_to_ima; in integrity_init_keyring() 144 ret = __integrity_init_keyring(id, perm, restriction); in integrity_init_keyring() 146 kfree(restriction); in integrity_init_keyring()
|
| /kernel/linux/linux-5.10/drivers/net/wireless/intel/iwlwifi/dvm/ |
| D | tt.c | 60 /* Advance Thermal Throttling default restriction table */ 87 struct iwl_tt_restriction *restriction; in iwl_ht_enabled() local 91 restriction = tt->restriction + tt->state; in iwl_ht_enabled() 92 return restriction->is_ht; in iwl_ht_enabled() 123 struct iwl_tt_restriction *restriction; in iwl_tx_ant_restriction() local 127 restriction = tt->restriction + tt->state; in iwl_tx_ant_restriction() 128 return restriction->tx_stream; in iwl_tx_ant_restriction() 134 struct iwl_tt_restriction *restriction; in iwl_rx_ant_restriction() local 138 restriction = tt->restriction + tt->state; in iwl_rx_ant_restriction() 139 return restriction->rx_stream; in iwl_rx_ant_restriction() [all …]
|
| D | tt.h | 39 * struct iwl_tt_restriction - Thermal Throttling restriction table 80 * @iwl_tt_restriction: ptr to restriction tbl, used by advance 96 struct iwl_tt_restriction *restriction; member
|
| /kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/dvm/ |
| D | tt.c | 56 /* Advance Thermal Throttling default restriction table */ 83 struct iwl_tt_restriction *restriction; in iwl_ht_enabled() local 87 restriction = tt->restriction + tt->state; in iwl_ht_enabled() 88 return restriction->is_ht; in iwl_ht_enabled() 119 struct iwl_tt_restriction *restriction; in iwl_tx_ant_restriction() local 123 restriction = tt->restriction + tt->state; in iwl_tx_ant_restriction() 124 return restriction->tx_stream; in iwl_tx_ant_restriction() 130 struct iwl_tt_restriction *restriction; in iwl_rx_ant_restriction() local 134 restriction = tt->restriction + tt->state; in iwl_rx_ant_restriction() 135 return restriction->rx_stream; in iwl_rx_ant_restriction() [all …]
|
| D | tt.h | 35 * struct iwl_tt_restriction - Thermal Throttling restriction table 76 * @iwl_tt_restriction: ptr to restriction tbl, used by advance 92 struct iwl_tt_restriction *restriction; member
|
| /kernel/linux/linux-6.6/certs/ |
| D | blacklist.c | 325 struct key_restriction *restriction; in blacklist_init() local 330 restriction = kzalloc(sizeof(*restriction), GFP_KERNEL); in blacklist_init() 331 if (!restriction) in blacklist_init() 332 panic("Can't allocate blacklist keyring restriction\n"); in blacklist_init() 333 restriction->check = restrict_link_for_blacklist; in blacklist_init() 346 restriction, NULL); in blacklist_init()
|
| D | system_keyring.c | 141 struct key_restriction *restriction; in get_builtin_and_secondary_restriction() local 143 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in get_builtin_and_secondary_restriction() 145 if (!restriction) in get_builtin_and_secondary_restriction() 146 panic("Can't allocate secondary trusted keyring restriction\n"); in get_builtin_and_secondary_restriction() 149 restriction->check = restrict_link_by_builtin_secondary_and_machine; in get_builtin_and_secondary_restriction() 151 restriction->check = restrict_link_by_builtin_and_secondary_trusted; in get_builtin_and_secondary_restriction() 153 return restriction; in get_builtin_and_secondary_restriction()
|
| /kernel/linux/linux-5.10/certs/ |
| D | system_keyring.c | 80 struct key_restriction *restriction; in get_builtin_and_secondary_restriction() local 82 restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL); in get_builtin_and_secondary_restriction() 84 if (!restriction) in get_builtin_and_secondary_restriction() 85 panic("Can't allocate secondary trusted keyring restriction\n"); in get_builtin_and_secondary_restriction() 87 restriction->check = restrict_link_by_builtin_and_secondary_trusted; in get_builtin_and_secondary_restriction() 89 return restriction; in get_builtin_and_secondary_restriction()
|
| /kernel/linux/linux-6.6/security/keys/ |
| D | keyring.c | 545 * @restriction_key: Keys providing additional data for evaluating restriction. 991 * Semaphore to serialise restriction setup to prevent reference count 992 * cycles through restriction key pointers. 997 * Check for restriction cycles that would prevent keyring garbage collection. 1015 * keyring_restrict - Look up and apply a restriction to a keyring 1017 * @type: The key type that will provide the restriction checker. 1018 * @restriction: The restriction options to apply to the keyring 1020 * Look up a keyring and apply a restriction to it. The restriction is managed 1022 * the restriction string. 1025 const char *restriction) in keyring_restrict() argument [all …]
|
| /kernel/linux/linux-5.10/security/keys/ |
| D | keyring.c | 545 * @restriction_key: Keys providing additional data for evaluating restriction. 991 * Semaphore to serialise restriction setup to prevent reference count 992 * cycles through restriction key pointers. 997 * Check for restriction cycles that would prevent keyring garbage collection. 1015 * keyring_restrict - Look up and apply a restriction to a keyring 1017 * @type: The key type that will provide the restriction checker. 1018 * @restriction: The restriction options to apply to the keyring 1020 * Look up a keyring and apply a restriction to it. The restriction is managed 1022 * the restriction string. 1025 const char *restriction) in keyring_restrict() argument [all …]
|
| /kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/silvermont/ |
| D | frontend.json | 39 …"PublicDescription": "Counts the number of times a decode restriction reduced the decode throughpu… 45 …"BriefDescription": "Counts the number of times a decode restriction reduced the decode throughput…
|
| /kernel/linux/linux-5.10/Documentation/RCU/ |
| D | UP.rst | 84 What locking restriction must RCU callbacks respect? 114 What locking restriction must RCU callbacks respect? 130 This restriction might seem gratuitous, since very few RCU
|
| /kernel/linux/linux-6.6/Documentation/RCU/ |
| D | UP.rst | 85 What locking restriction must RCU callbacks respect? 123 What locking restriction must RCU callbacks respect? 139 This restriction might seem gratuitous, since very few RCU
|
| /kernel/linux/linux-6.6/include/linux/ |
| D | key-type.h | 144 /* Look up a keyring access restriction (optional) 146 * - NULL is a valid return value (meaning the requested restriction 148 * - should return -EINVAL if the restriction is unknown
|
| /kernel/linux/linux-5.10/include/linux/ |
| D | key-type.h | 143 /* Look up a keyring access restriction (optional) 145 * - NULL is a valid return value (meaning the requested restriction 147 * - should return -EINVAL if the restriction is unknown
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/x86/silvermont/ |
| D | frontend.json | 27 …"BriefDescription": "Counts the number of times a decode restriction reduced the decode throughput… 30 …"PublicDescription": "Counts the number of times a decode restriction reduced the decode throughpu…
|
| /kernel/linux/linux-5.10/drivers/gpu/drm/amd/display/modules/inc/ |
| D | mod_freesync.h | 6 * to deal in the Software without restriction, including without limitation 34 * to deal in the Software without restriction, including without limitation
|
| /kernel/linux/linux-6.6/drivers/gpu/drm/amd/display/modules/inc/ |
| D | mod_freesync.h | 6 * to deal in the Software without restriction, including without limitation 34 * to deal in the Software without restriction, including without limitation
|
| /kernel/linux/linux-5.10/arch/arm/kernel/ |
| D | vmlinux-xip.lds.S | 181 * Due to PMSAv7 restriction on base address and size we have to 183 * alignment restriction on _xiprom will likely force XIP address
|
| /kernel/linux/linux-6.6/arch/arm/kernel/ |
| D | vmlinux-xip.lds.S | 182 * Due to PMSAv7 restriction on base address and size we have to 184 * alignment restriction on _xiprom will likely force XIP address
|
| /kernel/linux/linux-6.6/security/yama/ |
| D | Kconfig | 9 access controls. Currently available is ptrace scope restriction.
|
| /kernel/linux/linux-5.10/security/yama/ |
| D | Kconfig | 9 access controls. Currently available is ptrace scope restriction.
|