Home
last modified time | relevance | path

Searched full:enforce (Results 1 – 25 of 702) sorted by relevance

12345678910>>...29

/linux-6.15/security/loadpin/
Dloadpin.c46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable
58 .procname = "enforce",
59 .data = &enforce,
120 if (enforce) { in loadpin_sb_free_security()
145 if (!enforce) { in loadpin_check()
178 if (unlikely(!enforce)) { in loadpin_check()
261 enforce ? "" : "not "); in loadpin_init()
442 module_param(enforce, int, 0);
443 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
DKconfig15 bool "Enforce LoadPin at boot"
21 If selected, LoadPin will enforce pinning at boot. If not
23 "loadpin.enforce=1".
/linux-6.15/security/ipe/
Dfs.c70 * setenforce() - Write handler for the securityfs node, "ipe/enforce"
89 old_value = READ_ONCE(enforce); in setenforce()
96 WRITE_ONCE(enforce, new_value); in setenforce()
103 * getenforce() - Read handler for the securityfs node, "ipe/enforce"
116 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce()
211 enforce_node = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
Deval.c23 bool enforce = true; variable
378 if (!READ_ONCE(enforce)) in ipe_evaluate_event()
392 module_param(enforce, bool, 0400);
393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
Daudit.c143 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match()
273 * @new_enforce: The new value enforce to be set.
274 * @old_enforce: The old value currently in enforce.
/linux-6.15/Documentation/admin-guide/LSM/
DLoadPin.rst9 and/or unchangeable filesystem to enforce module and firmware loading
14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at
15 boot ("``loadpin.enforce=0``").
/linux-6.15/Documentation/gpu/amdgpu/
Dprocess-isolation.rst19 …e partition will be present. Writing 1 to the partition position enables enforce isolation, writin…
21 Example of enabling enforce isolation on a GPU with multiple partitions:
29 The output indicates that enforce isolation is enabled on zeroth and second parition and disabled o…
/linux-6.15/fs/btrfs/
Dqgroup.h396 enum btrfs_qgroup_rsv_type type, bool enforce);
398 enum btrfs_qgroup_rsv_type type, bool enforce,
402 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument
406 enforce, false); in btrfs_qgroup_reserve_meta_pertrans()
409 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument
414 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
/linux-6.15/tools/arch/riscv/include/asm/
Dbarrier.h16 /* These barriers need to enforce ordering on both devices and memory. */
21 /* These barriers do not need to enforce ordering on devices, just memory. */
/linux-6.15/drivers/gpu/drm/i915/display/
Dintel_fb_bo.c35 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
66 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
/linux-6.15/Documentation/userspace-api/
Dcheck_exec.rst10 are intended for script interpreters and dynamic linkers to enforce a
31 set to 1 (i.e. always enforce restrictions).
75 Programs should only enforce consistent restrictions according to the
/linux-6.15/arch/riscv/include/asm/
Dbarrier.h22 /* These barriers need to enforce ordering on both devices or memory. */
27 /* These barriers do not need to enforce ordering on devices, just memory. */
/linux-6.15/security/integrity/
DKconfig78 bool "Enforce Machine Keyring CA Restrictions"
82 The .machine keyring can be configured to enforce CA restriction
/linux-6.15/kernel/livepatch/
Dtransition.c196 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state()
200 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state()
390 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch()
615 * Enforce the order of the task->patch_state initializations and the in klp_init_transition()
619 * Also enforce the order of the klp_target_state write and future in klp_init_transition()
686 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
/linux-6.15/arch/x86/kvm/vmx/
Dsgx.c164 /* Enforce restriction of access to the PROVISIONKEY. */ in __handle_encls_ecreate()
174 * Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. Note in __handle_encls_ecreate()
190 /* Enforce CPUID restriction on max enclave size. */ in __handle_encls_ecreate()
274 * enforce restriction of access to the PROVISIONKEY. in handle_encls_ecreate()
436 * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
/linux-6.15/Documentation/hwmon/
Docc.rst121 Maximum power cap that the OCC can enforce in
123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
/linux-6.15/arch/powerpc/include/asm/
Dplpks.h18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce
19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
/linux-6.15/arch/arc/include/asm/
Dshmparam.h12 /* Enforce SHMLBA in shmat */
/linux-6.15/arch/x86/configs/
Dhardening.config13 # Enforce CET Indirect Branch Tracking in the kernel.
/linux-6.15/arch/arm/include/asm/
Dshmparam.h13 * Enforce SHMLBA in shmat
/linux-6.15/Documentation/process/
Dcode-of-conduct-interpretation.rst150 measures, the Code of Conduct Committee will enforce the TAB approved
159 Because how we interpret and enforce the Code of Conduct will evolve over
234 Conduct Committee will enforce the TAB approved measure(s) in collaboration
/linux-6.15/drivers/media/platform/qcom/camss/
Dcamss-vfe-17x.c271 /* Enforce ordering between previous reg writes and reg update */ in vfe_reg_update()
276 /* Enforce ordering between reg update and subsequent reg writes */ in vfe_reg_update()
309 /* Enforce ordering between IRQ Clear and Global IRQ Clear */ in vfe_isr_read()
345 /* Enforce ordering between IRQ reading and interpretation */ in vfe_isr()
/linux-6.15/arch/xtensa/include/asm/
Dfixmap.h31 /* Enforce that FIXADDR_START is PMD aligned to handle cache aliasing */
/linux-6.15/arch/powerpc/mm/book3s64/
Dpkeys.c440 * We only want to enforce protection keys on the current thread because we
444 * So do not enforce things if the VMA is not from the current mm, or if we are
453 * Do not enforce our key-permissions on a foreign vma. in arch_vma_access_permitted()
/linux-6.15/arch/x86/include/asm/
Dmmu_context.h251 * We only want to enforce protection keys on the current process
256 * So do not enforce things if the VMA is not from the current

12345678910>>...29