/linux-5.19.10/certs/ |
D | Kconfig | 103 string "Hashes to be preloaded into the system blacklist keyring" 120 blacklist keyring and implements a hook whereby a PKCS#7 message can 124 string "X.509 certificates to be preloaded into the system blacklist keyring" 128 containing X.509 certificates to be included in the default blacklist 132 bool "Allow root to add signed blacklist keys" 136 If set, provide the ability to load new blacklist keys at run time if
|
D | Makefile | 7 obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist.o 16 $(AWK) -f $(srctree)/scripts/check-blacklist-hashes.awk $(CONFIG_SYSTEM_BLACKLIST_HASH_LIST) >&2; \
|
/linux-5.19.10/tools/testing/selftests/bpf/ |
D | test_progs.c | 163 for (i = 0; i < sel->blacklist.cnt; i++) { in should_run() 164 if (glob_match(name, sel->blacklist.tests[i].name) && in should_run() 165 !sel->blacklist.tests[i].subtest_cnt) in should_run() 188 for (i = 0; i < sel->blacklist.cnt; i++) { in should_run_subtest() 189 if (glob_match(test_name, sel->blacklist.tests[i].name)) { in should_run_subtest() 190 if (!sel->blacklist.tests[i].subtest_cnt) in should_run_subtest() 193 for (j = 0; j < sel->blacklist.tests[i].subtest_cnt; j++) { in should_run_subtest() 195 sel->blacklist.tests[i].subtests[j])) in should_run_subtest() 767 free_test_filter_set(&test_selector->blacklist); in free_test_selector() 810 &env->test_selector.blacklist, in parse_arg()
|
D | test_sockmap.c | 146 char *blacklist; member 1841 if (!opt->blacklist) in check_blacklist() 1843 ptr = strdup(opt->blacklist); in check_blacklist() 1999 options.blacklist = strdup(optarg); in main() 2000 if (!options.blacklist) in main() 2045 if (options.blacklist) in main() 2046 free(options.blacklist); in main()
|
D | test_progs.h | 62 struct test_filter_set blacklist; member
|
/linux-5.19.10/Documentation/translations/zh_CN/maintainer/ |
D | modifying-patches.rst | 38 libata: Un-break ATA blacklist
|
/linux-5.19.10/drivers/staging/fwserial/ |
D | TODO | 9 GUID-to-port matching/whitelist/blacklist.
|
/linux-5.19.10/drivers/pci/pcie/ |
D | aspm.c | 169 static void pcie_clkpm_cap_init(struct pcie_link_state *link, int blacklist) in pcie_clkpm_cap_init() argument 192 link->clkpm_disable = blacklist ? 1 : 0; in pcie_clkpm_cap_init() 551 static void pcie_aspm_cap_init(struct pcie_link_state *link, int blacklist) in pcie_aspm_cap_init() argument 560 if (blacklist) { in pcie_aspm_cap_init() 892 int blacklist = !!pcie_aspm_sanity_check(pdev); in pcie_aspm_init_link_state() local 926 pcie_aspm_cap_init(link, blacklist); in pcie_aspm_init_link_state() 929 pcie_clkpm_cap_init(link, blacklist); in pcie_aspm_init_link_state()
|
/linux-5.19.10/drivers/s390/cio/ |
D | Makefile | 10 obj-y += airq.o blacklist.o chsc.o cio.o css.o chp.o idset.o isc.o \
|
/linux-5.19.10/drivers/i2c/busses/ |
D | i2c-sis5595.c | 54 static int blacklist[] = { variable 141 for (i = blacklist; *i != 0; i++) { in sis5595_setup()
|
/linux-5.19.10/Documentation/i2c/busses/ |
D | i2c-sis5595.rst | 24 "blacklist" PCI ID and refuse to load.
|
/linux-5.19.10/drivers/misc/mei/ |
D | bus-fixup.c | 67 static void blacklist(struct mei_cl_device *cldev) in blacklist() function 514 MEI_FIXUP(MEI_UUID_NFC_INFO, blacklist),
|
/linux-5.19.10/arch/x86/kernel/cpu/ |
D | common.c | 1217 #define VULNBL(vendor, family, model, blacklist) \ argument 1218 X86_MATCH_VENDOR_FAM_MODEL(vendor, family, model, blacklist) 1225 #define VULNBL_AMD(family, blacklist) \ argument 1226 VULNBL(AMD, family, X86_MODEL_ANY, blacklist) 1228 #define VULNBL_HYGON(family, blacklist) \ argument 1229 VULNBL(HYGON, family, X86_MODEL_ANY, blacklist)
|
/linux-5.19.10/drivers/media/usb/uvc/ |
D | uvc_ctrl.c | 2338 const struct uvc_ctrl_blacklist *blacklist; in uvc_ctrl_prune_entity() local 2346 blacklist = processing_blacklist; in uvc_ctrl_prune_entity() 2353 blacklist = camera_blacklist; in uvc_ctrl_prune_entity() 2364 if (!usb_match_one_id(dev->intf, &blacklist[i].id)) in uvc_ctrl_prune_entity() 2367 if (blacklist[i].index >= 8 * size || in uvc_ctrl_prune_entity() 2368 !uvc_test_bit(controls, blacklist[i].index)) in uvc_ctrl_prune_entity() 2373 entity->id, blacklist[i].index); in uvc_ctrl_prune_entity() 2375 uvc_clear_bit(controls, blacklist[i].index); in uvc_ctrl_prune_entity()
|
/linux-5.19.10/security/integrity/ima/ |
D | Kconfig | 271 Keys may be added to the IMA or IMA blacklist keyrings, if the 281 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)" 286 This option creates an IMA blacklist keyring, which contains all
|
/linux-5.19.10/drivers/acpi/ |
D | Makefile | 17 obj-$(CONFIG_X86) += blacklist.o
|
/linux-5.19.10/Documentation/maintainer/ |
D | modifying-patches.rst | 36 libata: Un-break ATA blacklist
|
/linux-5.19.10/security/integrity/ |
D | Kconfig | 95 hashes to the .blacklist keyring for powerpc based platforms.
|
/linux-5.19.10/tools/perf/util/ |
D | probe-event.c | 2460 static void kprobe_blacklist__delete(struct list_head *blacklist) in kprobe_blacklist__delete() argument 2464 while (!list_empty(blacklist)) { in kprobe_blacklist__delete() 2465 node = list_first_entry(blacklist, in kprobe_blacklist__delete() 2473 static int kprobe_blacklist__load(struct list_head *blacklist) in kprobe_blacklist__load() argument 2500 list_add_tail(&node->list, blacklist); in kprobe_blacklist__load() 2522 kprobe_blacklist__delete(blacklist); in kprobe_blacklist__load() 2529 kprobe_blacklist__find_by_address(struct list_head *blacklist, u64 address) in kprobe_blacklist__find_by_address() argument 2533 list_for_each_entry(node, blacklist, list) { in kprobe_blacklist__find_by_address()
|
/linux-5.19.10/Documentation/dev-tools/ |
D | kcsan.rst | 102 `DebugFS interface`_ blacklist/whitelist feature. 157 * Writing either ``blacklist`` or ``whitelist`` to ``/sys/kernel/debug/kcsan`` 158 changes the report filtering behaviour. For example, the blacklist feature
|
/linux-5.19.10/Documentation/hwmon/ |
D | sis5595.rst | 36 "blacklist" PCI ID and refuse to load.
|
/linux-5.19.10/drivers/hwmon/ |
D | sis5595.c | 746 static int blacklist[] = { variable 810 for (i = blacklist; *i != 0; i++) { in sis5595_pci_probe()
|
/linux-5.19.10/Documentation/ABI/testing/ |
D | ima_policy | 61 Currently, blacklist check is only for files signed with appended
|
/linux-5.19.10/Documentation/networking/device_drivers/ethernet/chelsio/ |
D | cxgb.rst | 298 to the "blacklist" file located in /etc/hotplug. It has been noted that 300 does not use the blacklist file. Simply remove, or rename, the net.agent
|
/linux-5.19.10/Documentation/trace/ |
D | kprobes.rst | 301 Kprobes manages such functions as a blacklist. 302 If you want to add a function into the blacklist, you just need 305 Kprobes checks the given probe address against the blacklist and 306 rejects registering it, if the given address is in the blacklist.
|