/linux-4.1.27/arch/x86/boot/ |
D | video-mode.c | 31 void probe_cards(int unsafe) in probe_cards() argument 36 if (probed[unsafe]) in probe_cards() 39 probed[unsafe] = 1; in probe_cards() 42 if (card->unsafe == unsafe) { in probe_cards()
|
D | video.h | 78 int unsafe; /* Probing is unsafe, only do after "scan" */ member
|
D | video-bios.c | 125 .unsafe = 1,
|
D | boot.h | 352 void probe_cards(int unsafe);
|
/linux-4.1.27/Documentation/locking/ |
D | lockdep-design.txt | 68 A softirq-unsafe lock-class is automatically hardirq-unsafe as well. The 72 <hardirq-safe> and <hardirq-unsafe> 73 <softirq-safe> and <softirq-unsafe> 97 <hardirq-safe> -> <hardirq-unsafe> 98 <softirq-safe> -> <softirq-unsafe> 101 taken by a hardirq context, interrupting a hardirq-unsafe lock - and 103 lock could be taken by an softirq context, interrupting a softirq-unsafe 114 took any hardirq-unsafe lock in the past. 117 any softirq-unsafe lock in the past. 119 - if a new hardirq-unsafe lock is discovered, we check whether any [all …]
|
/linux-4.1.27/drivers/uwb/ |
D | drp-ie.c | 195 int unsafe; in uwb_drp_ie_update() local 203 unsafe = rsv->mas.unsafe ? 1 : 0; in uwb_drp_ie_update() 212 uwb_ie_drp_set_unsafe(drp_ie, unsafe); in uwb_drp_ie_update()
|
D | rsv.c | 362 rsv->mas.unsafe += mv->companion_mas.unsafe; in uwb_rsv_set_state() 369 rsv->mas.unsafe = mv->final_mas.unsafe; in uwb_rsv_set_state()
|
D | allocator.c | 377 result->unsafe = ai->unsafe_allocated_mases; in uwb_rsv_find_best_allocation()
|
/linux-4.1.27/arch/x86/boot/compressed/ |
D | aslr.c | 142 unsigned long unsafe, unsafe_len; in mem_avoid_init() local 150 unsafe = (unsigned long)input + input_size - unsafe_len; in mem_avoid_init() 151 mem_avoid[0].start = unsafe; in mem_avoid_init()
|
/linux-4.1.27/security/apparmor/ |
D | domain.c | 463 if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) { in apparmor_bprm_set_creds() 472 if (bprm->unsafe & LSM_UNSAFE_SHARE) { in apparmor_bprm_set_creds() 477 if (bprm->unsafe & (LSM_UNSAFE_PTRACE | LSM_UNSAFE_PTRACE_CAP)) { in apparmor_bprm_set_creds() 500 bprm->unsafe |= AA_SECURE_X_NEEDED; in apparmor_bprm_set_creds() 539 if (!ret && (bprm->unsafe & AA_SECURE_X_NEEDED)) in apparmor_bprm_secureexec()
|
/linux-4.1.27/include/linux/ |
D | binfmts.h | 37 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */ member
|
D | uwb.h | 116 int unsafe; member
|
/linux-4.1.27/drivers/memstick/core/ |
D | Kconfig | 8 bool "Allow unsafe resume (DANGEROUS)"
|
/linux-4.1.27/include/linux/uwb/ |
D | spec.h | 388 static inline void uwb_ie_drp_set_unsafe(struct uwb_ie_drp *ie, int unsafe) in uwb_ie_drp_set_unsafe() argument 391 drp_control = (drp_control & ~(0x1 << 12)) | (unsafe << 12); in uwb_ie_drp_set_unsafe()
|
/linux-4.1.27/security/ |
D | commoncap.c | 538 bprm->unsafe & ~LSM_UNSAFE_PTRACE_CAP) { in cap_bprm_set_creds() 541 (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)) { in cap_bprm_set_creds()
|
/linux-4.1.27/fs/ |
D | exec.c | 1252 bprm->unsafe |= LSM_UNSAFE_PTRACE_CAP; in check_unsafe_exec() 1254 bprm->unsafe |= LSM_UNSAFE_PTRACE; in check_unsafe_exec() 1262 bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS; in check_unsafe_exec() 1275 bprm->unsafe |= LSM_UNSAFE_SHARE; in check_unsafe_exec()
|
/linux-4.1.27/fs/ceph/ |
D | file.c | 531 static void ceph_sync_write_unsafe(struct ceph_osd_request *req, bool unsafe) in ceph_sync_write_unsafe() argument 536 unsafe ? "un" : ""); in ceph_sync_write_unsafe() 537 if (unsafe) { in ceph_sync_write_unsafe()
|
/linux-4.1.27/tools/perf/Documentation/ |
D | Makefile | 50 ASCIIDOC_EXTRA = --unsafe
|
/linux-4.1.27/Documentation/ |
D | preempt-locking.txt | 85 But keep in mind that 'irqs disabled' is a fundamentally unsafe way of
|
D | unaligned-memory-access.txt | 169 not use this function at all. This alignment-unsafe function is still useful
|
/linux-4.1.27/drivers/tty/serial/8250/ |
D | Kconfig | 250 bool "Autodetect IRQ on standard ports (unsafe)" 256 This is considered unsafe; it is far better to configure the IRQ in
|
/linux-4.1.27/arch/arm/kernel/ |
D | entry-armv.S | 349 mov lr, r1 @ Restore lr_abt, abort is unsafe
|
/linux-4.1.27/Documentation/development-process/ |
D | 3.Early-stage | 112 data structures in ways which were considered to be unsafe and
|
/linux-4.1.27/drivers/mtd/ |
D | Kconfig | 183 this is very unsafe, but could be useful for file systems which are
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | sysfs-devices-power | 73 It generally is unsafe to permit the asynchronous suspend/resume
|
/linux-4.1.27/Documentation/device-mapper/ |
D | thin-provisioning.txt | 304 In serious cases where even a read-only mode is deemed unsafe
|
/linux-4.1.27/security/smack/ |
D | smack_lsm.c | 733 if (bprm->unsafe & (LSM_UNSAFE_PTRACE | LSM_UNSAFE_PTRACE_CAP)) { in smack_bprm_set_creds() 748 } else if (bprm->unsafe) in smack_bprm_set_creds()
|
/linux-4.1.27/security/selinux/ |
D | hooks.c | 2157 int nnp = (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS); in check_nnp_nosuid() 2266 if (bprm->unsafe & LSM_UNSAFE_SHARE) { in selinux_bprm_set_creds() 2276 if (bprm->unsafe & in selinux_bprm_set_creds()
|
/linux-4.1.27/drivers/platform/x86/ |
D | Kconfig | 402 bool "Allow control of important LEDs (unsafe)"
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | README | 180 such symlinks safely by converting unsafe symlinks (ie symlinks to server
|
D | CHANGES | 671 Fix unsafe global variable usage and password hash failure on gcc 3.3.1
|
/linux-4.1.27/lib/ |
D | Kconfig.debug | 902 if kernel code uses it in a preemption-unsafe way. Also, the kernel
|
/linux-4.1.27/init/ |
D | Kconfig | 1840 kernel believes it is unsafe: the kernel will remove the module
|