/openbmc/linux/security/loadpin/ |
H A D | loadpin.c | 45 static int enforce = IS_ENABLED(CONFIG_SECURITY_LOADPIN_ENFORCE); variable 57 .procname = "enforce", 58 .data = &enforce, 120 if (enforce) { in loadpin_sb_free_security() 145 if (!enforce) { in loadpin_check() 178 if (unlikely(!enforce)) { in loadpin_check() 256 enforce ? "" : "not "); in loadpin_init() 440 module_param(enforce, int, 0); 441 MODULE_PARM_DESC(enforce, "Enforce module/firmware pinning");
|
H A D | Kconfig | 15 bool "Enforce LoadPin at boot" 18 If selected, LoadPin will enforce pinning at boot. If not 20 "loadpin.enforce=1".
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | LoadPin.rst | 9 and/or unchangeable filesystem to enforce module and firmware loading 14 "``loadpin.enforce``". By default, it is enabled, but can be disabled at 15 boot ("``loadpin.enforce=0``").
|
/openbmc/qemu/tests/functional/ |
H A D | test_x86_cpu_model_versions.py | 256 'enforce=off') 266 'enforce=off') 277 'enforce=off,+arch-capabilities') 287 'enforce=off,-arch-capabilities') 298 'enforce=off') 308 'enforce=off') 319 'enforce=off,+arch-capabilities') 329 'enforce=off,-arch-capabilities')
|
/openbmc/qemu/docs/interop/ |
H A D | dbus.rst | 36 D-Bus, the protocol and standard, doesn't have mechanisms to enforce 38 have additional mechanisms to enforce security rules, based for 51 dbus-daemon can enforce various policies based on the UID/GID of the
|
/openbmc/linux/fs/btrfs/ |
H A D | qgroup.h | 380 enum btrfs_qgroup_rsv_type type, bool enforce); 382 enum btrfs_qgroup_rsv_type type, bool enforce, 386 int num_bytes, bool enforce) in btrfs_qgroup_reserve_meta_pertrans() argument 390 enforce, false); in btrfs_qgroup_reserve_meta_pertrans() 393 int num_bytes, bool enforce, in btrfs_qgroup_reserve_meta_prealloc() argument 398 enforce, noflush); in btrfs_qgroup_reserve_meta_prealloc()
|
/openbmc/openbmc/meta-security/lib/oeqa/runtime/cases/ |
H A D | apparmor.py | 40 status, output = self.target.run('aa-enforce /etc/apparmor.d/*') 43 msg = ('aa-enforce failed. '
|
/openbmc/openbmc/meta-raspberrypi/recipes-multimedia/omxplayer/omxplayer/ |
H A D | 0001-Fix-build-with-vc4-driver.patch | 32 ENFORCE(!FT_Set_Pixel_Sizes(ft_face_, 0, font_size)); 33 ENFORCE(!FT_Set_Pixel_Sizes(ft_face_italic_, 0, font_size));
|
/openbmc/u-boot/arch/riscv/include/asm/ |
H A D | barrier.h | 21 /* These barriers need to enforce ordering on both devices or memory. */ 26 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/openbmc/linux/arch/riscv/include/asm/ |
H A D | barrier.h | 22 /* These barriers need to enforce ordering on both devices or memory. */ 27 /* These barriers do not need to enforce ordering on devices, just memory. */
|
/openbmc/linux/security/integrity/ |
H A D | Kconfig | 78 bool "Enforce Machine Keyring CA Restrictions" 82 The .machine keyring can be configured to enforce CA restriction
|
/openbmc/linux/kernel/livepatch/ |
H A D | transition.c | 196 * 1) Enforce the order of the TIF_PATCH_PENDING read and the in klp_update_patch_state() 200 * 2) Enforce the order of the TIF_PATCH_PENDING read and a future read in klp_update_patch_state() 390 * Enforce the order of the TIF_PATCH_PENDING read above and the in __klp_sched_try_switch() 615 * Enforce the order of the task->patch_state initializations and the in klp_init_transition() 619 * Also enforce the order of the klp_target_state write and future in klp_init_transition() 686 * Enforce the order of the klp_target_state write and the in klp_reverse_transition()
|
/openbmc/linux/arch/x86/kvm/vmx/ |
H A D | sgx.c | 164 /* Enforce restriction of access to the PROVISIONKEY. */ in __handle_encls_ecreate() 174 * Enforce CPUID restrictions on MISCSELECT, ATTRIBUTES and XFRM. Note in __handle_encls_ecreate() 190 /* Enforce CPUID restriction on max enclave size. */ in __handle_encls_ecreate() 274 * enforce restriction of access to the PROVISIONKEY. in handle_encls_ecreate() 436 * ECREATE must be intercepted to enforce MISCSELECT, ATTRIBUTES and XFRM
|
/openbmc/openbmc/meta-bytedance/meta-g220a/recipes-network/network/static-mac-addr/ |
H A D | static-mac-addr.service | 2 Description=Enforce Static MAC addr mapping
|
/openbmc/linux/Documentation/hwmon/ |
H A D | occ.rst | 121 Maximum power cap that the OCC can enforce in 123 power[1-n]_cap_min Minimum power cap that the OCC can enforce in
|
/openbmc/linux/drivers/hwmon/pmbus/ |
H A D | mp5990.c | 32 * We should enforce the VOUT in linear mode and in mp5990_read_byte_data() 42 * Therefore, we should enforce the VOUT in the direct format in mp5990_read_byte_data()
|
/openbmc/linux/arch/arc/include/asm/ |
H A D | shmparam.h | 12 /* Enforce SHMLBA in shmat */
|
/openbmc/openbmc/poky/meta/files/common-licenses/ |
H A D | CAL-1.0-Combined-Work-Exception | 67 enforce the terms and conditions of this License against You via 322 In any action to enforce the terms of this License, or seeking damages 334 Any failure by Licensor to enforce any provision of this License will 336 Licensor's ability to enforce such provision at a later time.
|
H A D | CAL-1.0 | 67 enforce the terms and conditions of this License against You via 322 In any action to enforce the terms of this License, or seeking damages 334 Any failure by Licensor to enforce any provision of this License will 336 Licensor's ability to enforce such provision at a later time.
|
/openbmc/qemu/tests/qapi-schema/ |
H A D | union-bad-base.json | 1 # we allow anonymous base, but enforce no duplicate keys
|
H A D | returns-bad-type.json | 1 # we enforce that 'returns' be a dict or array of dict unless whitelisted
|
/openbmc/linux/arch/arm/include/asm/ |
H A D | shmparam.h | 13 * Enforce SHMLBA in shmat
|
/openbmc/openbmc/meta-yadro/meta-vegman/recipes-yadro/fru/vegman-fru-handler/ |
H A D | baseboard-fru-handler.service | 2 Description=Enforce Static MAC addr mapping and hostname setting
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-multimedia/libmad/libmad/ |
H A D | automake-foreign.patch | 1 Pass foreign to AM_INIT_AUTOMAKE so it doesn't enforce GNU strictness.
|
/openbmc/linux/arch/powerpc/include/asm/ |
H A D | plpks.h | 18 #define PLPKS_OSSECBOOTAUDIT PPC_BIT32(1) // OS secure boot must be audit/enforce 19 #define PLPKS_OSSECBOOTENFORCE PPC_BIT32(2) // OS secure boot must be enforce
|