/linux-6.8/arch/arm64/kvm/hyp/nvhe/ |
D | sys_regs.c | 53 * Returns the restricted features values of the feature register based on the 67 * Iterate over the restricted feature fields and calculate the minimum in get_restricted_features_unsigned() 69 * value is being restricted to. in get_restricted_features_unsigned() 341 * NOTE: Anything not explicitly listed here is *restricted by default*, i.e., 345 /* Cache maintenance by set/way operations are restricted. */ 347 /* Debug and Trace Registers are restricted. */ 415 /* Scalable Vector Registers are restricted. */ 426 /* Performance Monitoring Registers are restricted. */ 428 /* Limited Ordering Regions Registers are restricted. */ 440 /* Performance Monitoring Registers are restricted. */ [all …]
|
/linux-6.8/drivers/firmware/efi/ |
D | cper_cxl.c | 33 "Restricted CXL Device", 34 "Restricted CXL Host Downstream Port", 48 RCD, /* Restricted CXL Device */ 49 RCH_DP, /* Restricted CXL Host Downstream Port */ 70 * is used to refer to Restricted CXL Device, CXL Device, CXL in cper_print_prot_err()
|
/linux-6.8/drivers/video/fbdev/kyro/ |
D | STG4000InitDevice.c | 71 #define STG4K3_PLL_MINR_VCO_SC (100000000 >> STG4K3_PLL_SCALER) /* Min VCO rate (restricted) */ 72 #define STG4K3_PLL_MAXR_VCO_SC (500000000 >> STG4K3_PLL_SCALER) /* Max VCO rate (restricted) */ 73 #define STG4K3_PLL_MINR_VCO 100000000 /* Min VCO rate (restricted) */ 75 #define STG4K3_PLL_MAXR_VCO 500000000 /* Max VCO rate (restricted) */ 172 * Check it's within restricted VCO range in ProgramClock() 174 * above the restricted range, then test in ProgramClock()
|
/linux-6.8/arch/powerpc/include/asm/ |
D | perf_event_fsl_emb.h | 28 * can hold restricted events, or zero if there are no 29 * restricted events.
|
/linux-6.8/Documentation/userspace-api/ |
D | landlock.rst | 205 now restricted and this policy will be enforced on all its subsequently created 432 Access to regular files and directories can be restricted by Landlock, 436 restricted. Likewise, some special kernel filesystems such as nsfs, which can 438 restricted. However, thanks to the `ptrace restrictions`_, access to such 439 sensitive ``/proc`` files are automatically restricted according to domain 457 Kernel memory allocated to create rulesets is accounted and can be restricted 470 from a parent to its hierarchy. Because files are identified and restricted by
|
/linux-6.8/include/asm-generic/bitops/ |
D | instrumented-atomic.h | 24 * restricted to acting on a single-word quantity. 53 * restricted to acting on a single-word quantity.
|
/linux-6.8/drivers/of/ |
D | device.c | 60 * restricted-dma-pool region is allowed. in of_dma_set_restricted_buffer() 62 if (of_device_is_compatible(node, "restricted-dma-pool") && in of_dma_set_restricted_buffer() 71 * Attempt to initialize a restricted-dma-pool region if one was found. in of_dma_set_restricted_buffer() 75 dev_warn(dev, "failed to initialise \"restricted-dma-pool\" memory node\n"); in of_dma_set_restricted_buffer()
|
/linux-6.8/arch/x86/include/asm/ |
D | sync_bitops.h | 30 * restricted to acting on a single-word quantity. 65 * restricted to acting on a single-word quantity.
|
D | crash_core.h | 14 * 64-bit kdump kernels need to be restricted to be under 64 TB, which is
|
/linux-6.8/Documentation/arch/x86/x86_64/ |
D | fake-numa-for-cpusets.rst | 64 /proc/meminfo between the restricted cpuset case above and the unrestricted 69 Name Unrestricted Restricted
|
/linux-6.8/include/uapi/xen/ |
D | evtchn.h | 93 * Once a file descriptor has been restricted it cannot be 94 * de-restricted, and must be closed and re-opened. Event channels
|
/linux-6.8/arch/powerpc/perf/ |
D | core-fsl-emb.c | 291 * Allocate counters from top-down, so that restricted-capable in fsl_emb_pmu_add() 360 * TODO: if at least one restricted event exists, and we in fsl_emb_pmu_del() 361 * just freed up a non-restricted-capable counter, and in fsl_emb_pmu_del() 362 * there is a restricted-capable counter occupied by in fsl_emb_pmu_del() 363 * a non-restricted event, migrate that event to the in fsl_emb_pmu_del()
|
/linux-6.8/Documentation/cdrom/ |
D | packet-writing.rst | 34 the so called "restricted overwrite" mode. To put a disc in restricted
|
/linux-6.8/security/apparmor/ |
D | policy_compat.c | 160 /* DFAs are restricted from having a state_count of less than 2 */ in compute_fperms() 184 /* DFAs are restricted from having a state_count of less than 2 */ in compute_xmatch_perms() 259 /* DFAs are restricted from having a state_count of less than 2 */ in compute_perms()
|
/linux-6.8/include/linux/ |
D | rational.h | 9 * pll configuration taking into account restricted register size
|
/linux-6.8/arch/arm64/kvm/hyp/include/nvhe/ |
D | fixed_config.h | 13 * This file contains definitions for features to be allowed or restricted for 21 * features that are restricted to support at most the specified feature.
|
/linux-6.8/kernel/dma/ |
D | Kconfig | 111 bool "DMA Restricted Pool" 114 This enables support for restricted DMA pools which provide a level of
|
/linux-6.8/tools/perf/bench/ |
D | mem-memset-x86-64-asm.S | 13 * the ELF stack should not be restricted at all and set it RWX.
|
D | mem-memcpy-x86-64-asm.S | 18 * the ELF stack should not be restricted at all and set it RWX.
|
/linux-6.8/drivers/media/i2c/ |
D | aptina-pll.c | 116 * We can thus iterate over the restricted p1 range defined by the in aptina_pll_calculate() 117 * combination of (1) and (7), and then compute the restricted mf range in aptina_pll_calculate()
|
/linux-6.8/samples/ |
D | Kconfig | 170 restricted by a user-defined filesystem access control policy. 244 as mount API and statx(). Note that this is restricted to the x86
|
/linux-6.8/drivers/gpu/drm/i915/ |
D | i915_scatterlist.c | 99 /* restricted by sg_alloc_table */ in i915_rsgt_from_mm_node() 187 /* restricted by sg_alloc_table */ in i915_rsgt_from_buddy_resource()
|
/linux-6.8/drivers/phy/freescale/ |
D | Kconfig | 49 Only useful for a restricted set of Ethernet protocols.
|
/linux-6.8/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 220 x86 CPUs with Enhanced Indirect Branch Restricted Speculation 227 attacks on x86, Indirect Branch Restricted Speculation (IBRS) feature 390 - Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is 405 'IBPB: conditional' Use IBPB on SECCOMP or indirect branch restricted tasks 416 'STIBP: conditional' Use STIBP on SECCOMP or indirect branch restricted tasks 501 On x86, indirect branch restricted speculation is turned on by default 679 restricted.
|
/linux-6.8/drivers/net/fddi/ |
D | defza.h | 458 u32 rtoken_timeout; /* default restricted token timeout 503 u32 rtoken_timeout; /* restricted token timeout 532 u32 rtoken_timeout; /* restricted token timeout */ 586 #define FZA_PRH0_TKN_TYPE_RST 0x10 /* use a restricted token */ 629 #define FZA_PRH1_TKN_SEND_RST 0x10 /* send a restricted token */ 784 uint rtoken_timeout; /* restricted token timeout */
|