/linux/security/loadpin/ |
H A D | loadpin.c | 46 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 58 .procname = "enforce", 59 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 261 enforce ? "" : "not "); in loadpin_init() 442 module_param(enforce, int, 0); 443 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
/linux/fs/btrfs/ |
H A D | qgroup.h | 396 enum btrfs_qgroup_rsv_type type, bool enforce); 398 enum btrfs_qgroup_rsv_type type, bool enforce, 402 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 406 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 409 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 414 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
/linux/security/ipe/ |
H A D | eval.c | 23 bool enforce = true; variable 378 if (!READ_ONCE(enforce)) in ipe_evaluate_event() 392 module_param(enforce, bool, 0400); 393 MODULE_PARM_DESC(enforce, "Start IPE in enforce or permissive mode");
|
H A D | fs.c | 67 * setenforce() - Write handler for the securityfs node, "ipe/enforce" 86 old_value = READ_ONCE(enforce); in setenforce() 93 WRITE_ONCE(enforce, new_value); in setenforce() 100 * getenforce() - Read handler for the securityfs node, "ipe/enforce" 113 result = ((READ_ONCE(enforce)) ? "1" : "0"); in getenforce() 216 dentry = securityfs_create_file("enforce", 0600, root, NULL, in ipe_init_securityfs()
|
H A D | eval.h | 19 extern bool enforce;
|
H A D | audit.c | 145 op, audit_hook_names[ctx->hook], READ_ONCE(enforce), in ipe_audit_match() 259 * @new_enforce: The new value enforce to be set. 260 * @old_enforce: The old value currently in enforce.
|
H A D | Kconfig | 18 allowing users to define a policy to enforce a trust-based access
|
/linux/Documentation/admin-guide/LSM/ |
H A D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
H A D | apparmor.rst | 36 For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
|
H A D | ipe.rst | 39 checks, allowing IPE to enforce policies that trust files protected by 45 For the IPE policy, specifically, it grants the ability to enforce 222 are signed through the PKCS#7 message format to enforce some level of 286 only enforce the policy marked active. Note that only one policy can be active 321 The default mode is enforce, and can be changed via the kernel command 322 line parameter ``ipe.enforce=(0|1)``, or the securityfs node 323 ``/sys/kernel/security/ipe/enforce``.
|
/linux/Documentation/gpu/amdgpu/ |
H A D | process-isolation.rst | 19 The `enforce_isolation` file in sysfs can be used to enable process isolation and automatic shader cleanup between processes. On GPUs that support graphics engine partitioning, this can be enabled per partition. The partition and its current setting (0 disabled, 1 enabled) can be read from sysfs. On GPUs that do not support graphics engine partitioning, only a single partition will be present. Writing 1 to the partition position enables enforce isolation, writing 0 disables it. 21 Example of enabling enforce isolation on a GPU with multiple partitions: 29 The output indicates that enforce isolation is enabled on zeroth and second parition and disabled on first and fourth parition.
|
/linux/include/linux/ |
H A D | page-flags.h | 391 #define PF_ANY(page, enforce) PF_POISONED_CHECK(page) argument 392 #define PF_HEAD(page, enforce) PF_POISONED_CHECK(compound_head(page)) argument 393 #define PF_NO_TAIL(page, enforce) ({ \ argument 394 VM_BUG_ON_PGFLAGS(enforce && PageTail(page), page); \ 396 #define PF_NO_COMPOUND(page, enforce) ({ \ argument 397 VM_BUG_ON_PGFLAGS(enforce && PageCompound(page), page); \ 399 #define PF_SECOND(page, enforce) ({ \ argument
|
/linux/Documentation/userspace-api/ |
H A D | check_exec.rst | 10 are intended for script interpreters and dynamic linkers to enforce a 31 set to 1 (i.e. always enforce restrictions). 75 Programs should only enforce consistent restrictions according to the
|
/linux/Documentation/devicetree/bindings/mtd/partitions/ |
H A D | brcm,trx.txt | 18 TRX doesn't enforce any strict partition boundaries or size limits. All
|
/linux/Documentation/admin-guide/device-mapper/ |
H A D | dm-ebs.rst | 48 offset 128 sectors, enforce 2KiB underlying device block size.
|
/linux/Documentation/hwmon/ |
H A D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
H A D | acpi_power_meter.rst | 39 Some computers have the ability to enforce a power cap in hardware. If this is
|
/linux/Documentation/scsi/ |
H A D | scsi.rst | 24 will enforce the correct ordering of loading and unloading modules in
|
/linux/Documentation/arch/x86/x86_64/ |
H A D | fsgs.rst | 19 limits. The limits can be used to enforce address space protections. 98 the GS register and enforce them when GS base is set via
|
/linux/arch/x86/kvm/ |
H A D | hyperv.h | 192 int kvm_hv_set_enforce_cpuid(struct kvm_vcpu *vcpu, bool enforce);
|
H A D | cpuid.h | 222 if (!vcpu->arch.pv_cpuid.enforce) in guest_pv_has()
|
/linux/drivers/gpu/drm/ |
H A D | Kconfig.debug | 21 enables the '-Werror' flag to enforce that rule in the drm subsystem.
|
/linux/Documentation/process/ |
H A D | code-of-conduct-interpretation.rst | 150 measures, the Code of Conduct Committee will enforce the TAB approved 159 Because how we interpret and enforce the Code of Conduct will evolve over 234 Conduct Committee will enforce the TAB approved measure(s) in collaboration
|
/linux/Documentation/mm/ |
H A D | ksm.rst | 35 Every "chain" and all "dups" linked into a "chain" enforce the
|
/linux/arch/powerpc/boot/dts/ |
H A D | wii.dts | 212 sda-enforce-dir;
|