/linux-6.8/io_uring/ |
D | register.c | 166 /* Restrictions allowed only if rings started disabled */ in io_register_restrictions() 170 /* We allow only a single restrictions registration */ in io_register_restrictions() 171 if (ctx->restrictions.registered) in io_register_restrictions() 196 ctx->restrictions.register_op); in io_register_restrictions() 204 __set_bit(res[i].sqe_op, ctx->restrictions.sqe_op); in io_register_restrictions() 207 ctx->restrictions.sqe_flags_allowed = res[i].sqe_flags; in io_register_restrictions() 210 ctx->restrictions.sqe_flags_required = res[i].sqe_flags; in io_register_restrictions() 219 /* Reset all restrictions if an error happened */ in io_register_restrictions() 221 memset(&ctx->restrictions, 0, sizeof(ctx->restrictions)); in io_register_restrictions() 223 ctx->restrictions.registered = true; in io_register_restrictions() [all …]
|
/linux-6.8/Documentation/gpu/amdgpu/display/ |
D | mpo-overview.rst | 62 every DCN has different restrictions; here, we are just trying to provide the 65 Plane Restrictions 68 AMDGPU imposes restrictions on the use of DRM planes in the driver. 71 restrictions: 83 Cursor Restrictions 86 Before we start to describe some restrictions around cursor and MPO, see the 184 many more restrictions for a multi-display scenario. The below example shows a
|
/linux-6.8/Documentation/firmware-guide/acpi/ |
D | acpi-lid.rst | 22 exceptional buggy platforms, special restrictions and exceptions should be 23 taken into account. This document describes the restrictions and the 27 Restrictions of the returning value of the _LID control method 39 Restrictions of the lid state change notifications
|
/linux-6.8/Documentation/userspace-api/ |
D | landlock.rst | 57 space may not know each other's supported restrictions), hence the need 207 security policy; only adding more restrictions is allowed. These threads are 280 restrictions from its parent. This is similar to the seccomp inheritance (cf. 293 Ptrace restrictions 297 then be subject to additional restrictions when manipulating another process. 425 Threads sandboxed with filesystem restrictions cannot modify filesystem 438 restricted. However, thanks to the `ptrace restrictions`_, access to such 469 restrict access to files, also implies inheritance of the ruleset restrictions 527 Using user space process to enforce restrictions on kernel resources can lead 537 fine-grained restrictions). Moreover, their complexity can lead to security
|
/linux-6.8/include/uapi/linux/ |
D | capability.h | 122 /* Overrides all DAC restrictions regarding read and search on files 123 and directories, including ACL restrictions if [_POSIX_ACL] is 128 /* Overrides all restrictions about allowed operations on files, where 130 is applicable. It doesn't override MAC and DAC restrictions. */ 134 /* Overrides the following restrictions that the effective user ID 303 /* Override size restrictions on IPC message queues */
|
/linux-6.8/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 6 system-wide allowlist. These restrictions also prohibit the given UIDs/GIDs 37 additional restrictions imposed by this LSM would mean it is a "safer" version 114 setgroups() calls for processes with CAP_SETGID restrictions. Until we add 116 policies add no meaningful security. setgroups() restrictions will be enforced
|
D | Yama.rst | 45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)`` 75 The original children-only logic was based on the restrictions in grsecurity.
|
/linux-6.8/Documentation/devicetree/bindings/interrupt-controller/ |
D | msi.txt | 22 MSI controllers may have restrictions on permitted payloads. 70 If a device has restrictions on the allocation of MSIs, these restrictions
|
/linux-6.8/include/video/ |
D | imx-ipu-image-convert.h | 57 * ipu_image_convert_adjust() - adjust input/output images to IPU restrictions. 70 * and rotation mode meet IPU restrictions. 76 * Returns 0 if the formats and rotation mode meet IPU restrictions,
|
/linux-6.8/Documentation/mm/ |
D | highmem.rst | 88 come with restrictions about the pointers validity. Contrary to kmap() 108 restrictions imposed on kmap_local_page(). Furthermore, the code between 134 restrictions imposed on kmap_local_page(). In particular, it is necessary to 141 restrictions on preemption or migration. It comes with an overhead as mapping
|
/linux-6.8/Documentation/gpu/rfc/ |
D | i915_small_bar.rst | 37 Error Capture restrictions 39 With error capture we have two new restrictions:
|
/linux-6.8/security/landlock/ |
D | fs.c | 262 * Check that a destination file hierarchy has more restrictions than a source 285 * Checks if the destination restrictions are a in no_more_access() 288 * restrictions(parent2) >= restrictions(child1) in no_more_access() 301 * Checks inverted restrictions for RENAME_EXCHANGE: in no_more_access() 302 * restrictions(parent1) >= restrictions(child2) in no_more_access() 386 * This helper first checks that the destination has a superset of restrictions 478 * least as much as restrictions on the destination than on the in is_access_to_paths_allowed() 713 * if the destination one has more (or the same) restrictions as the source 819 * hierarchy is not a superset of restrictions of the source directory in current_check_refer_path()
|
/linux-6.8/security/integrity/ |
D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 83 on any key added to it. By default no restrictions are in place
|
/linux-6.8/Documentation/core-api/ |
D | memory-allocation.rst | 83 driver for a device with such restrictions, avoid using these flags. 84 And even with hardware with restrictions it is preferable to use 161 will be retried with `vmalloc`. There are restrictions on which GFP
|
/linux-6.8/drivers/cxl/ |
D | acpi.c | 128 static unsigned long cfmws_to_decoder_flags(int restrictions) in cfmws_to_decoder_flags() argument 132 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_TYPE2) in cfmws_to_decoder_flags() 134 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_TYPE3) in cfmws_to_decoder_flags() 136 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_VOLATILE) in cfmws_to_decoder_flags() 138 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_PMEM) in cfmws_to_decoder_flags() 140 if (restrictions & ACPI_CEDT_CFMWS_RESTRICT_FIXED) in cfmws_to_decoder_flags() 378 cxld->flags = cfmws_to_decoder_flags(cfmws->restrictions); in __cxl_parse_cfmws()
|
/linux-6.8/Documentation/arch/powerpc/ |
D | vas-api.rst | 105 error codes and restrictions. 162 restrictions. 174 Only restrictions on mmap for a NX-GZIP device fd are: 179 Refer to mmap(2) man page for additional details/restrictions.
|
/linux-6.8/Documentation/misc-devices/ |
D | xilinx_sdfec.rst | 138 Setting the order can only be done if the following restrictions are met: 155 Adding LDPC codes can only be done if the following restrictions are met: 166 Adding Turbo decode can only be done if the following restrictions are met: 186 Bypassing the SD-FEC can only be done if the following restrictions are met:
|
/linux-6.8/arch/m68k/math-emu/ |
D | fp_emu.h | 21 * required INSTEAD OF the above restrictions. (This clause is 23 * the restrictions contained in a BSD-style copyright.)
|
/linux-6.8/LICENSES/dual/ |
D | copyleft-next-0.3.1 | 55 4. Condition Against Further Restrictions; Inbound License Compatibility 58 restrictions on the exercise of rights in the Covered Work granted under 60 restrictions result from Your compliance with conditions or obligations
|
/linux-6.8/security/safesetid/ |
D | lsm.c | 196 /* Do nothing if there are no setuid restrictions for our old RUID. */ in safesetid_task_fix_setuid() 220 /* Do nothing if there are no setgid restrictions for our old RGID. */ in safesetid_task_fix_setgid() 243 /* Do nothing if there are no setgid restrictions for our old RGID. */ in safesetid_task_fix_setgroups()
|
/linux-6.8/tools/testing/selftests/powerpc/mm/ |
D | pkey_siginfo.c | 109 /* No read, write and execute restrictions */ in protect() 214 * Restore the restrictions originally imposed by the in protect_access() 279 * AMR and IAMR, i.e. impose no restrictions, for all available in test()
|
/linux-6.8/drivers/gpu/drm/ |
D | drm_encoder.c | 43 * userspace to infer cloning and connector/CRTC restrictions. Unfortunately 45 * top of that the exposed restrictions are too simple for today's hardware, and 46 * the recommended way to infer restrictions is by using the
|
/linux-6.8/drivers/net/wireless/intel/iwlwifi/fw/api/ |
D | power.h | 303 * @per_chain: per chain restrictions 313 * @per_chain: per chain restrictions 326 * @per_chain: per chain restrictions 347 * @per_chain: per chain restrictions 368 * @per_chain: per chain restrictions
|
/linux-6.8/tools/testing/cxl/test/ |
D | cxl.c | 212 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 227 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 242 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 257 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 272 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 287 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 304 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 320 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 | 336 .restrictions = ACPI_CEDT_CFMWS_RESTRICT_TYPE3 |
|
/linux-6.8/Documentation/admin-guide/ |
D | abi-stable.rst | 7 restrictions, and backward compatibility for them will be guaranteed
|