/linux-master/arch/x86/boot/ |
H A D | video-mode.c | 31 void probe_cards(int unsafe) argument 36 if (probed[unsafe]) 39 probed[unsafe] = 1; 42 if (card->unsafe == unsafe) {
|
H A D | video.h | 76 int unsafe; /* Probing is unsafe, only do after "scan" */ member in struct:card_info
|
H A D | video-bios.c | 123 .unsafe = 1,
|
H A D | boot.h | 326 void probe_cards(int unsafe);
|
/linux-master/kernel/printk/ |
H A D | nbcon.c | 35 * - The 'unsafe' field allows to take over the console in a safe way in the 42 * console in an unsafe state. The console will stay in the unsafe state 52 * unsafe state. 65 * a) Observes the 'req_prio' field set on exit from the unsafe 71 * console is an unsafe state. It is used only in panic() by the final 76 * using the hostile takeover in unsafe state. 90 * - What is marked as an unsafe section. 92 * in an unsafe state. 93 * - Whether to attempt an unsafe hostil 759 __nbcon_context_update_unsafe(struct nbcon_context *ctxt, bool unsafe) argument [all...] |
/linux-master/mm/kasan/ |
H A D | kasan_test.c | 701 static void kasan_atomics_helper(struct kunit *test, void *unsafe, void *safe) argument 703 int *i_unsafe = unsafe; 710 KUNIT_EXPECT_KASAN_FAIL(test, atomic_read(unsafe)); 711 KUNIT_EXPECT_KASAN_FAIL(test, atomic_set(unsafe, 42)); 712 KUNIT_EXPECT_KASAN_FAIL(test, atomic_add(42, unsafe)); 713 KUNIT_EXPECT_KASAN_FAIL(test, atomic_sub(42, unsafe)); 714 KUNIT_EXPECT_KASAN_FAIL(test, atomic_inc(unsafe)); 715 KUNIT_EXPECT_KASAN_FAIL(test, atomic_dec(unsafe)); 716 KUNIT_EXPECT_KASAN_FAIL(test, atomic_and(42, unsafe)); 717 KUNIT_EXPECT_KASAN_FAIL(test, atomic_andnot(42, unsafe)); [all...] |
/linux-master/drivers/ntb/test/ |
H A D | ntb_pingpong.c | 91 static unsigned int unsafe; variable 92 module_param(unsafe, uint, 0644); 93 MODULE_PARM_DESC(unsafe, "Run even though ntb operations may be unsafe"); 247 dev_dbg(&ntb->dev, "Doorbell is unsafe\n"); 248 if (!unsafe) 253 dev_dbg(&ntb->dev, "Scratchpad is unsafe\n"); 254 if (!unsafe)
|
/linux-master/include/linux/ |
H A D | binfmts.h | 50 int unsafe; /* how unsafe this exec is (mask of LSM_UNSAFE_*) */ member in struct:linux_binprm
|
H A D | console.h | 205 * @unsafe: Console is busy in a non takeover region 206 * @unsafe_takeover: A hostile takeover in an unsafe state happened in the 223 unsigned int unsafe : 1; member in struct:nbcon_state::__anon394::__anon395 248 * can be allowed to do so even in an unsafe state (Hope and pray). 266 * @allow_unsafe_takeover: Allow performing takeover even if unsafe. Can 294 * @unsafe_takeover: If a hostile takeover in an unsafe state has occurred
|
/linux-master/security/apparmor/ |
H A D | domain.c | 814 bool *unsafe) 828 bprm, buffer, cond, unsafe)); 835 cond, unsafe)); 841 buffer, cond, unsafe)); 849 cond, unsafe)); 882 bool unsafe = false; local 904 if ((bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) && !unconfined(label) && 918 bprm, buffer, &cond, &unsafe); 923 &cond, &unsafe)); 942 if ((bprm->unsafe 809 handle_onexec(const struct cred *subj_cred, struct aa_label *label, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *unsafe) argument [all...] |
/linux-master/tools/testing/selftests/ |
H A D | lib.mk | 93 rsync -aq --copy-unsafe-links $(TEST_PROGS) $(TEST_PROGS_EXTENDED) $(TEST_FILES) $(TEST_GEN_MODS_DIR) $(OUTPUT); \ 114 $(if $(INSTALL_LIST),rsync -a --copy-unsafe-links $(INSTALL_LIST) $(INSTALL_PATH)/) 119 $(if $(INSTALL_LIST),rsync -a --copy-unsafe-links $(INSTALL_LIST)/*.ko $(INSTALL_PATH)/$(INSTALL_LIST))
|
/linux-master/tools/lib/perf/Documentation/ |
H A D | Makefile | 38 ASCIIDOC_EXTRA = --unsafe -f asciidoc.conf
|
/linux-master/tools/perf/Documentation/ |
H A D | Makefile | 48 ASCIIDOC_EXTRA += --unsafe -f asciidoc.conf
|
/linux-master/security/ |
H A D | commoncap.c | 918 ((bprm->unsafe & ~LSM_UNSAFE_PTRACE) || 922 (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)) {
|
/linux-master/fs/ |
H A D | exec.c | 1612 bprm->unsafe |= LSM_UNSAFE_PTRACE; 1619 bprm->unsafe |= LSM_UNSAFE_NO_NEW_PRIVS; 1638 bprm->unsafe |= LSM_UNSAFE_SHARE; 1857 * Check for unsafe execution states before exec_binprm(), which
|
/linux-master/arch/arm/kernel/ |
H A D | entry-armv.S | 333 mov lr, r1 @ Restore lr_abt, abort is unsafe
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 935 if (bprm->unsafe & LSM_UNSAFE_PTRACE) { 951 if (bprm->unsafe & ~LSM_UNSAFE_PTRACE)
|
/linux-master/security/selinux/ |
H A D | hooks.c | 2244 int nnp = (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS); 2378 if (bprm->unsafe & LSM_UNSAFE_SHARE) { 2388 if (bprm->unsafe & LSM_UNSAFE_PTRACE) { 2399 /* Clear any possibly unsafe personality bits on exec: */
|