/openbmc/linux/drivers/scsi/arm/ |
H A D | Kconfig | 21 don't implement it properly, so the safe answer is N.
|
/openbmc/linux/Documentation/admin-guide/hw-vuln/ |
H A D | l1d_flush.rst | 9 the mechanism keeps them safe from vulnerabilities, related to leaks
|
/openbmc/linux/Documentation/admin-guide/cifs/ |
H A D | introduction.rst | 28 high performance safe distributed caching (leases/oplocks), optional packet
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/ckermit/ckermit/ |
H A D | 0001-Fix-function-prototype-errors.patch | 84 #define CK_CHILD /* Assume this is safe in all UNIX */
|
/openbmc/openbmc/poky/meta/recipes-devtools/rsync/files/ |
H A D | makefile-no-rebuild.patch | 6 Remove the Makefile rules to reinvoke autoconf, they're not out-of-tree safe and
|
/openbmc/linux/Documentation/bpf/ |
H A D | verifier.rst | 186 now known to have a safe range of at least 4 bytes. See 'Direct packet access', 198 that pointer are safe. 222 this 2byte load from the packet is safe to do, since the program author 229 r=14 is the range of safe access which means that bytes [R3, R3 + 14) are ok. 258 ``if (r3 + 8 > r1) goto err`` at insn #18, the safe range is [R3, R3 + 8). 312 alignment, then r1 is safe. Similarly, if r2 was NOT_INIT before then it can't 314 another NOT_INIT) is safe. The implementation is in the function regsafe(). 316 registers it may hold). They must all be safe for the branch to be pruned.
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-dbs/mysql/ |
H A D | mariadb.inc | 40 MULTILIB_SCRIPTS = "${PN}-server:${bindir}/mariadbd-safe \ 331 ${bindir}/mariadbd-safe \ 334 ${bindir}/mariadbd-safe-helper \
|
/openbmc/linux/drivers/net/ethernet/mscc/ |
H A D | ocelot_fdma.c | 103 u32 safe; in ocelot_fdma_wait_chan_safe() local 105 return readx_poll_timeout_atomic(ocelot_fdma_read_ch_safe, ocelot, safe, in ocelot_fdma_wait_chan_safe() 106 safe & BIT(chan), 0, in ocelot_fdma_wait_chan_safe()
|
/openbmc/linux/drivers/net/can/spi/mcp251xfd/ |
H A D | mcp251xfd.h | 512 } safe; member 801 mcp251xfd_spi_cmd_write_safe_set_addr(&write_reg_buf->safe.cmd, in mcp251xfd_spi_cmd_write() 803 data = write_reg_buf->safe.data; in mcp251xfd_spi_cmd_write()
|
/openbmc/linux/Documentation/core-api/ |
H A D | local_ops.rst | 42 making sure that we modify it from within a preemption safe context. It is 110 If you are already in a preemption-safe context, you can use
|
/openbmc/linux/Documentation/arch/x86/x86_64/ |
H A D | 5level-paging.rst | 57 paging support is safe. The hint will be ignored and kernel will fall back
|
/openbmc/linux/Documentation/rust/ |
H A D | general-information.rst | 65 should provide as-safe-as-possible abstractions as needed.
|
/openbmc/linux/arch/arm/vfp/ |
H A D | vfphw.S | 38 @ FPEXC is in a safe state
|
/openbmc/openbmc/poky/meta/recipes-core/kbd/kbd/ |
H A D | 0001-Remove-non-free-Agafari-fonts.patch | 28 release. To be on a safe side, SUSE even decided to repack any source
|
/openbmc/linux/Documentation/driver-api/md/ |
H A D | raid5-cache.rst | 35 is safe on the cache disk, the data will be flushed onto RAID disks. The 40 filesystems) after the data is safe on RAID disks, so cache disk failure
|
/openbmc/linux/drivers/s390/block/ |
H A D | scm_blk.c | 53 struct list_head *iter, *safe; in scm_free_rqs() local 57 list_for_each_safe(iter, safe, &inactive_requests) { in scm_free_rqs()
|
/openbmc/linux/arch/x86/boot/ |
H A D | header.S | 437 # data, plus a small amount extra to keep the algorithm safe. The 457 # to be safe. To avoid problems at the block level allocating 5 extra bytes
|
/openbmc/linux/arch/um/ |
H A D | Kconfig | 167 It is safe to say 'Y' here. 226 It is safe to say Y, but you probably don't need this.
|
/openbmc/linux/fs/dlm/ |
H A D | lock.c | 2533 struct dlm_lkb *lkb, *safe; in process_lookup_list() local 4890 struct dlm_lkb *lkb, *safe; in dlm_recover_waiters_pre() local 5133 struct dlm_lkb *lkb, *safe; in purge_mstcpy_list() local 5135 list_for_each_entry_safe(lkb, safe, list, lkb_statequeue) { in purge_mstcpy_list() 5166 struct dlm_lkb *lkb, *safe; in purge_dead_list() local 5168 list_for_each_entry_safe(lkb, safe, list, lkb_statequeue) { in purge_dead_list() 5964 struct dlm_lkb *lkb, *safe; in dlm_clear_proc_locks() local 5993 list_for_each_entry_safe(lkb, safe, &proc->asts, lkb_cb_list) { in dlm_clear_proc_locks() 6005 struct dlm_lkb *lkb, *safe; in purge_proc_locks() local 6034 list_for_each_entry_safe(lkb, safe, &proc->asts, lkb_cb_list) { in purge_proc_locks() [all …]
|
/openbmc/linux/tools/testing/selftests/powerpc/math/ |
H A D | vmx_asm.S | 9 # Should be safe from C, only touches r4, r5 and v0,v1,v2
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | highuid.rst | 79 (it should be safe because it's always used a 32-bit integer to
|
/openbmc/linux/drivers/net/wireless/broadcom/b43legacy/ |
H A D | Kconfig | 14 It is safe to include both b43 and b43legacy as the underlying glue
|
/openbmc/linux/Documentation/driver-api/firmware/ |
H A D | firmware_cache.rst | 14 The firmware cache makes using certain firmware API calls safe during a device
|
/openbmc/openbmc/poky/meta/recipes-bsp/grub/ |
H A D | grub2.inc | 72 # builds, it's safe to clear them unconditionally for both target and native.
|
/openbmc/linux/Documentation/devicetree/bindings/memory-controllers/ |
H A D | samsung,exynos5422-dmc.yaml | 80 framework but they must be used in a safe way. The register offsets are
|