/linux-6.15/security/loadpin/ |
D | loadpin.c | 46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 58 .procname = "enforce", 59 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 261 enforce ? "" : "not "); in loadpin_init() 442 module_param(enforce, int, 0); 443 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
D | Kconfig | 15 bool "Enforce LoadPin at boot" 21 If selected, LoadPin will enforce pinning at boot. If not 23 "loadpin.enforce=1".
|
/linux-6.15/security/ipe/ |
D | fs.c | 70 * setenforce() - Write handler for the securityfs node, "ipe/enforce" 89 old_value = READ_ONCE(enforce); in setenforce() 96 WRITE_ONCE(enforce, new_value); in setenforce() 103 * getenforce() - Read handler for the securityfs node, "ipe/enforce" 116 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce() 211 enforce_node = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
|
D | eval.c | 23 bool enforce = true; variable 378 if (!READ_ONCE(enforce)) in ipe_evaluate_event() 392 module_param(enforce, bool, 0400); 393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
|
D | audit.c | 143 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match() 273 * @new_enforce: The new value enforce to be set. 274 * @old_enforce: The old value currently in enforce.
|
/linux-6.15/Documentation/admin-guide/LSM/ |
D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
/linux-6.15/Documentation/gpu/amdgpu/ |
D | process-isolation.rst | 19 …e partition will be present. Writing 1 to the partition position enables enforce isolation, writin… 21 Example of enabling enforce isolation on a GPU with multiple partitions: 29 The output indicates that enforce isolation is enabled on zeroth and second parition and disabled o…
|
/linux-6.15/fs/btrfs/ |
D | qgroup.h | 396 enum btrfs_qgroup_rsv_type type, bool enforce); 398 enum btrfs_qgroup_rsv_type type, bool enforce, 402 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 406 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 409 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 414 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
/linux-6.15/tools/arch/riscv/include/asm/ |
D | barrier.h | 16 /* These barriers need to enforce ordering on both devices and memory. */ 21 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux-6.15/drivers/gpu/drm/i915/display/ |
D | intel_fb_bo.c | 35 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init() 66 * If there's a fence, enforce that in intel_fb_bo_framebuffer_init()
|
/linux-6.15/Documentation/userspace-api/ |
D | check_exec.rst | 10 are intended for script interpreters and dynamic linkers to enforce a 31 set to 1 (i.e. always enforce restrictions). 75 Programs should only enforce consistent restrictions according to the
|
/linux-6.15/arch/riscv/include/asm/ |
D | barrier.h | 22 /* These barriers need to enforce ordering on both devices or memory. */ 27 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/linux-6.15/security/integrity/ |
D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 82 The .machine keyring can be configured to enforce CA restriction
|
/linux-6.15/kernel/livepatch/ |
D | transition.c | 196 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state() 200 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state() 390 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch() 615 * Enforce the order of the task->patch_state initializations and the in klp_init_transition() 619 * Also enforce the order of the klp_target_state write and future in klp_init_transition() 686 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
|
/linux-6.15/arch/x86/kvm/vmx/ |
D | sgx.c | 164 /* Enforce restriction of access to the PROVISIONKEY. */ in __handle_encls_ecreate() 174 * Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. Note in __handle_encls_ecreate() 190 /* Enforce CPUID restriction on max enclave size. */ in __handle_encls_ecreate() 274 * enforce restriction of access to the PROVISIONKEY. in handle_encls_ecreate() 436 * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
|
/linux-6.15/Documentation/hwmon/ |
D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
/linux-6.15/arch/powerpc/include/asm/ |
D | plpks.h | 18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce 19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
|
/linux-6.15/arch/arc/include/asm/ |
D | shmparam.h | 12 /* Enforce SHMLBA in shmat */
|
/linux-6.15/arch/x86/configs/ |
D | hardening.config | 13 # Enforce CET Indirect Branch Tracking in the kernel.
|
/linux-6.15/arch/arm/include/asm/ |
D | shmparam.h | 13 * Enforce SHMLBA in shmat
|
/linux-6.15/Documentation/process/ |
D | code-of-conduct-interpretation.rst | 150 measures, the Code of Conduct Committee will enforce the TAB approved 159 Because how we interpret and enforce the Code of Conduct will evolve over 234 Conduct Committee will enforce the TAB approved measure(s) in collaboration
|
/linux-6.15/drivers/media/platform/qcom/camss/ |
D | camss-vfe-17x.c | 271 /* Enforce ordering between previous reg writes and reg update */ in vfe_reg_update() 276 /* Enforce ordering between reg update and subsequent reg writes */ in vfe_reg_update() 309 /* Enforce ordering between IRQ Clear and Global IRQ Clear */ in vfe_isr_read() 345 /* Enforce ordering between IRQ reading and interpretation */ in vfe_isr()
|
/linux-6.15/arch/xtensa/include/asm/ |
D | fixmap.h | 31 /* Enforce that FIXADDR_START is PMD aligned to handle cache aliasing */
|
/linux-6.15/arch/powerpc/mm/book3s64/ |
D | pkeys.c | 440 * We only want to enforce protection keys on the current thread because we 444 * So do not enforce things if the VMA is not from the current mm, or if we are 453 * Do not enforce our key-permissions on a foreign vma. in arch_vma_access_permitted()
|
/linux-6.15/arch/x86/include/asm/ |
D | mmu_context.h | 251 * We only want to enforce protection keys on the current process 256 * So do not enforce things if the VMA is not from the current
|