/linux-4.4.14/arch/x86/boot/ |
D | video-mode.c | 33 void probe_cards(int unsafe) in probe_cards() argument 38 if (probed[unsafe]) in probe_cards() 41 probed[unsafe] = 1; in probe_cards() 44 if (card->unsafe == unsafe) { in probe_cards()
|
D | video.h | 78 int unsafe; /* Probing is unsafe, only do after "scan" */ member
|
D | video-bios.c | 125 .unsafe = 1,
|
D | boot.h | 348 void probe_cards(int unsafe);
|
/linux-4.4.14/drivers/ntb/test/ |
D | ntb_pingpong.c | 80 static unsigned int unsafe; variable 81 module_param(unsafe, uint, 0644); 82 MODULE_PARM_DESC(unsafe, "Run even though ntb operations may be unsafe"); 191 if (!unsafe) { in pp_probe() 199 if (!unsafe) { in pp_probe()
|
/linux-4.4.14/Documentation/locking/ |
D | lockdep-design.txt | 68 A softirq-unsafe lock-class is automatically hardirq-unsafe as well. The 72 <hardirq-safe> and <hardirq-unsafe> 73 <softirq-safe> and <softirq-unsafe> 97 <hardirq-safe> -> <hardirq-unsafe> 98 <softirq-safe> -> <softirq-unsafe> 101 taken by a hardirq context, interrupting a hardirq-unsafe lock - and 103 lock could be taken by an softirq context, interrupting a softirq-unsafe 114 took any hardirq-unsafe lock in the past. 117 any softirq-unsafe lock in the past. 119 - if a new hardirq-unsafe lock is discovered, we check whether any [all …]
|
/linux-4.4.14/drivers/uwb/ |
D | drp-ie.c | 195 int unsafe; in uwb_drp_ie_update() local 203 unsafe = rsv->mas.unsafe ? 1 : 0; in uwb_drp_ie_update() 212 uwb_ie_drp_set_unsafe(drp_ie, unsafe); in uwb_drp_ie_update()
|
D | rsv.c | 362 rsv->mas.unsafe += mv->companion_mas.unsafe; in uwb_rsv_set_state() 369 rsv->mas.unsafe = mv->final_mas.unsafe; in uwb_rsv_set_state()
|
D | allocator.c | 377 result->unsafe = ai->unsafe_allocated_mases; in uwb_rsv_find_best_allocation()
|
/linux-4.4.14/arch/x86/boot/compressed/ |
D | aslr.c | 142 unsigned long unsafe, unsafe_len; in mem_avoid_init() local 150 unsafe = (unsigned long)input + input_size - unsafe_len; in mem_avoid_init() 151 mem_avoid[0].start = unsafe; in mem_avoid_init()
|
/linux-4.4.14/security/apparmor/ |
D | domain.c | 461 if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) { in apparmor_bprm_set_creds() 470 if (bprm->unsafe & LSM_UNSAFE_SHARE) { in apparmor_bprm_set_creds() 475 if (bprm->unsafe & (LSM_UNSAFE_PTRACE | LSM_UNSAFE_PTRACE_CAP)) { in apparmor_bprm_set_creds() 498 bprm->unsafe |= AA_SECURE_X_NEEDED; in apparmor_bprm_set_creds() 535 if (bprm->unsafe & AA_SECURE_X_NEEDED) in apparmor_bprm_secureexec()
|
/linux-4.4.14/include/linux/ |
D | binfmts.h | 37 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */ member
|
D | uwb.h | 116 int unsafe; member
|
/linux-4.4.14/drivers/memstick/core/ |
D | Kconfig | 8 bool "Allow unsafe resume (DANGEROUS)"
|
/linux-4.4.14/include/linux/uwb/ |
D | spec.h | 388 static inline void uwb_ie_drp_set_unsafe(struct uwb_ie_drp *ie, int unsafe) in uwb_ie_drp_set_unsafe() argument 391 drp_control = (drp_control & ~(0x1 << 12)) | (unsafe << 12); in uwb_ie_drp_set_unsafe()
|
/linux-4.4.14/Documentation/ |
D | ntb.txt | 54 * unsafe - Some hardware has known issues with scratchpad and doorbell 57 unsafe=1.
|
D | preempt-locking.txt | 85 But keep in mind that 'irqs disabled' is a fundamentally unsafe way of
|
D | unaligned-memory-access.txt | 169 not use this function at all. This alignment-unsafe function is still useful
|
/linux-4.4.14/security/ |
D | commoncap.c | 548 bprm->unsafe & ~LSM_UNSAFE_PTRACE_CAP) { in cap_bprm_set_creds() 551 (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)) { in cap_bprm_set_creds()
|
/linux-4.4.14/fs/ |
D | exec.c | 1258 bprm->unsafe |= LSM_UNSAFE_PTRACE_CAP; in check_unsafe_exec() 1260 bprm->unsafe |= LSM_UNSAFE_PTRACE; in check_unsafe_exec() 1268 bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS; in check_unsafe_exec() 1281 bprm->unsafe |= LSM_UNSAFE_SHARE; in check_unsafe_exec()
|
/linux-4.4.14/fs/ceph/ |
D | file.c | 594 static void ceph_sync_write_unsafe(struct ceph_osd_request *req, bool unsafe) in ceph_sync_write_unsafe() argument 599 unsafe ? "un" : ""); in ceph_sync_write_unsafe() 600 if (unsafe) { in ceph_sync_write_unsafe()
|
/linux-4.4.14/tools/perf/Documentation/ |
D | Makefile | 50 ASCIIDOC_EXTRA = --unsafe
|
/linux-4.4.14/drivers/tty/serial/8250/ |
D | Kconfig | 250 bool "Autodetect IRQ on standard ports (unsafe)" 256 This is considered unsafe; it is far better to configure the IRQ in
|
/linux-4.4.14/arch/arm/kernel/ |
D | entry-armv.S | 356 mov lr, r1 @ Restore lr_abt, abort is unsafe
|
/linux-4.4.14/Documentation/development-process/ |
D | 3.Early-stage | 112 data structures in ways which were considered to be unsafe and
|
/linux-4.4.14/Documentation/nvdimm/ |
D | btt.txt | 208 (This case can only be caused by power-fails/unsafe shutdowns)
|
/linux-4.4.14/drivers/mtd/ |
D | Kconfig | 183 this is very unsafe, but could be useful for file systems which are
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | sysfs-devices-power | 73 It generally is unsafe to permit the asynchronous suspend/resume
|
/linux-4.4.14/Documentation/device-mapper/ |
D | cache.txt | 257 In serious cases where even a read-only mode is deemed unsafe
|
D | thin-provisioning.txt | 304 In serious cases where even a read-only mode is deemed unsafe
|
/linux-4.4.14/security/smack/ |
D | smack_lsm.c | 920 if (bprm->unsafe & (LSM_UNSAFE_PTRACE | LSM_UNSAFE_PTRACE_CAP)) { in smack_bprm_set_creds() 935 } else if (bprm->unsafe) in smack_bprm_set_creds()
|
/linux-4.4.14/security/selinux/ |
D | hooks.c | 2173 int nnp = (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS); in check_nnp_nosuid() 2278 if (bprm->unsafe & LSM_UNSAFE_SHARE) { in selinux_bprm_set_creds() 2288 if (bprm->unsafe & in selinux_bprm_set_creds()
|
/linux-4.4.14/drivers/platform/x86/ |
D | Kconfig | 427 bool "Allow control of important LEDs (unsafe)"
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | README | 180 such symlinks safely by converting unsafe symlinks (ie symlinks to server
|
D | CHANGES | 671 Fix unsafe global variable usage and password hash failure on gcc 3.3.1
|
/linux-4.4.14/lib/ |
D | Kconfig.debug | 917 if kernel code uses it in a preemption-unsafe way. Also, the kernel
|
/linux-4.4.14/init/ |
D | Kconfig | 1877 kernel believes it is unsafe: the kernel will remove the module
|