/Linux-v6.1/tools/include/uapi/linux/ |
D | fcntl.h | 41 #define F_SEAL_SEAL 0x0001 /* prevent further seals from being set */ 42 #define F_SEAL_SHRINK 0x0002 /* prevent file from shrinking */ 43 #define F_SEAL_GROW 0x0004 /* prevent file from growing */ 44 #define F_SEAL_WRITE 0x0008 /* prevent writes */ 45 #define F_SEAL_FUTURE_WRITE 0x0010 /* prevent future writes while mapped */
|
/Linux-v6.1/include/uapi/linux/ |
D | fcntl.h | 41 #define F_SEAL_SEAL 0x0001 /* prevent further seals from being set */ 42 #define F_SEAL_SHRINK 0x0002 /* prevent file from shrinking */ 43 #define F_SEAL_GROW 0x0004 /* prevent file from growing */ 44 #define F_SEAL_WRITE 0x0008 /* prevent writes */ 45 #define F_SEAL_FUTURE_WRITE 0x0010 /* prevent future writes while mapped */
|
/Linux-v6.1/drivers/md/ |
D | dm-builtin.c | 12 * The release method suffers from module unload race. We may prevent the 15 * method), however there is no way to prevent the module from being 37 * higher-priority processes that prevent the low-priority process from
|
/Linux-v6.1/mm/ |
D | memfd.c | 172 * may prevent some kinds of access to the file. Currently, the in memfd_add_seals() 174 * SEAL_SEAL: Prevent further seals from being set on this file in memfd_add_seals() 175 * SEAL_SHRINK: Prevent the file from shrinking in memfd_add_seals() 176 * SEAL_GROW: Prevent the file from growing in memfd_add_seals() 177 * SEAL_WRITE: Prevent write access to the file in memfd_add_seals() 180 * must prevent seals from being removed. Therefore, sealing a file in memfd_add_seals()
|
/Linux-v6.1/drivers/cpuidle/ |
D | coupled.c | 95 * @prevent: flag to prevent coupled idle while a cpu is hotplugging 104 int prevent; member 405 * the waiting count first to prevent another cpu looping back in and seeing 480 while (coupled->prevent) { in cpuidle_enter_state_coupled() 491 /* Read barrier ensures online_count is read after prevent is cleared */ in cpuidle_enter_state_coupled() 529 if (coupled->prevent) { in cpuidle_enter_state_coupled() 670 coupled->prevent++; in cpuidle_coupled_register_device() 703 * cpuidle_coupled_prevent_idle - prevent cpus from entering a coupled state 714 coupled->prevent++; in cpuidle_coupled_prevent_idle() 734 * see prevent == 0. in cpuidle_coupled_allow_idle() [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/progs/ |
D | test_rdonly_maps.c | 27 /* prevent compiler to optimize everything out */ in skip_loop() 46 /* prevent compiler to optimize everything out */ in part_loop() 65 /* prevent compiler to optimize everything out */ in full_loop()
|
/Linux-v6.1/drivers/net/ethernet/microchip/ |
D | lan743x_ptp.h | 29 /* gpio_lock: used to prevent concurrent access to gpio settings */ 74 /* command_lock: used to prevent concurrent ptp commands */ 89 /* tx_ts_lock: used to prevent concurrent access to timestamp arrays */
|
/Linux-v6.1/drivers/clk/sifive/ |
D | sifive-prci.c | 124 * Context: Any context. Caller must prevent the records pointed to by 144 * Context: Any context. Caller must prevent the records pointed to by 310 * Context: Any context. Caller must prevent concurrent changes to the 331 * Context: Any context. Caller must prevent concurrent changes to the 353 * Context: Any context. Caller must prevent concurrent changes to the 374 * Context: Any context. Caller must prevent concurrent changes to the 395 * Context: Any context. Caller must prevent concurrent changes to the 416 * Context: Any context. Caller must prevent concurrent changes to the 437 * Context: Any context. Caller must prevent concurrent changes to the
|
/Linux-v6.1/Documentation/userspace-api/ |
D | no_new_privs.rst | 7 programs and file capabilities. To prevent the parent program from 9 careful to prevent the parent from doing anything that could subvert the 41 Note that ``no_new_privs`` does not prevent privilege changes that do not
|
/Linux-v6.1/Documentation/core-api/ |
D | debug-objects.rst | 79 can deactivate an active object in order to prevent damage to the 102 can deactivate an active object in order to prevent damage to the 126 deactivate an active object in order to prevent damage to the subsystem. 156 prevent the usage of invalid objects, which are still available in 166 deactivate an active object in order to prevent damage to the subsystem. 182 prevent damage to the subsystem.
|
/Linux-v6.1/arch/x86/kernel/ |
D | sev_verify_cbit.S | 47 * prevent forward progress than to work with a non-random value here. 77 * The check failed, prevent any forward progress to prevent ROP
|
/Linux-v6.1/tools/testing/selftests/bpf/verifier/ |
D | prevent_map_lookup.c | 2 "prevent map lookup in stack trace", 17 "prevent map lookup in prog array",
|
/Linux-v6.1/Documentation/power/ |
D | freezing-of-tasks.rst | 106 1. The principal reason is to prevent filesystems from being damaged after 125 to allocate additional memory and we prevent them from doing that by 130 3. The third reason is to prevent user space processes and some kernel threads 160 4. Another reason for freezing tasks is to prevent user space processes from 213 VI. Are there any precautions to be taken to prevent freezing failures? 238 mutex_[un]lock(&system_transition_mutex). That would prevent freezing failures.
|
/Linux-v6.1/drivers/misc/lkdtm/ |
D | fortify.c | 30 /* Store result to global to prevent the code from being eliminated */ in lkdtm_FORTIFY_STR_OBJECT() 59 /* Store result to global to prevent the code from being eliminated */ in lkdtm_FORTIFY_STR_MEMBER() 95 /* Store result to global to prevent the code from being eliminated */ in lkdtm_FORTIFY_MEM_OBJECT() 124 /* Store result to global to prevent the code from being eliminated */ in lkdtm_FORTIFY_MEM_MEMBER()
|
/Linux-v6.1/arch/x86/ |
D | Makefile.um | 22 # prevent gcc from keeping the stack 16 byte aligned. Taken from i386. 25 # Prevent sprintf in nfsd from being converted to strcpy and resulting in
|
/Linux-v6.1/drivers/net/netdevsim/ |
D | bus.c | 68 /* Prevent to use nsim_bus_dev before initialization. */ in new_port_store() 89 /* Prevent to use nsim_bus_dev before initialization. */ in del_port_store() 161 /* Prevent to use resource before initialization. */ in new_device_store() 210 /* Prevent to use resource before initialization. */ in del_device_store()
|
/Linux-v6.1/tools/testing/selftests/rcutorture/formal/srcu-cbmc/src/ |
D | locks.h | 72 /* Minimal barrier to prevent accesses leaking out of lock. */ in lock_impl_trylock() 98 /* Minimal barrier to prevent accesses leaking out of lock. */ in lock_impl_unlock() 120 * Implement spinlocks using the lock mechanism. Wrap the lock to prevent mixing
|
/Linux-v6.1/drivers/dma/ |
D | dmaengine.h | 27 * Note: caller is expected to hold a lock to prevent concurrency. 47 * cookie marker. Zero the descriptors cookie to prevent accidental 50 * Note: caller is expected to hold a lock to prevent concurrency.
|
/Linux-v6.1/Documentation/process/ |
D | volatile-considered-harmful.rst | 22 safe (spinlocks, mutexes, memory barriers, etc.) are designed to prevent 58 architectures. Those accessors are written to prevent unwanted 83 keyword to asm statements will prevent this removal.
|
/Linux-v6.1/arch/powerpc/platforms/powernv/ |
D | subcore-asm.S | 39 b . /* prevent speculative execution */ 88 b . /* prevent speculative execution */
|
/Linux-v6.1/sound/soc/sof/intel/ |
D | hda-ipc.h | 43 /* Prevent clock gating (0 - cg allowed, 1 - DSP clock always on) */ 45 /* Prevent power gating (0 - deep power state transitions allowed) */
|
/Linux-v6.1/drivers/gpu/drm/i915/gt/ |
D | intel_reset_types.h | 24 * flag to prevent two concurrent reset attempts in the same engine. 39 * use it to mark that the GPU is no longer available (and prevent
|
/Linux-v6.1/arch/powerpc/kernel/ |
D | entry_32.S | 159 b . /* Prevent prefetch past rfi */ 280 b . /* Prevent prefetch past rfi */ 339 b . /* Prevent prefetch past rfi */ 389 b . /* Prevent prefetch past rfi */ 418 b . /* Prevent prefetch past rfi */ 477 b .; /* prevent prefetch past exc_lvl_rfi */
|
/Linux-v6.1/Documentation/filesystems/ |
D | efivarfs.rst | 24 as immutable files. This doesn't prevent removal - "chattr -i" will work - 25 but it does prevent this kind of failure from being accomplished
|
/Linux-v6.1/security/selinux/ss/ |
D | constraint.h | 8 * used to prevent a process from transitioning to a new user 10 * Constraints are likewise typically used to prevent a
|