/linux/arch/arm/mm/ |
H A D | proc-sa110.S | 98 mov r0, r0 @ safety 99 mov r0, r0 @ safety 100 mov r0, r0 @ safety 102 mov r0, r0 @ safety 103 mov r0, r0 @ safety 104 mov r0, r0 @ safety
|
H A D | proc-sa1100.S | 114 mov r0, r0 @ safety
|
/linux/Documentation/translations/zh_CN/rust/ |
H A D | coding-guidelines.rst | 85 // SAFETY: `p` is valid by the safety requirements. 127 // SAFETY: The safety contract must be upheld by the caller.
|
/linux/arch/x86/include/asm/ |
H A D | suspend_32.h | 23 unsigned long safety; member
|
H A D | suspend_64.h | 52 unsigned long safety; member
|
/linux/arch/powerpc/boot/dts/ |
H A D | ac14xx.dts | 45 0x5 0x0 0xe0400000 0x00010000 /* CS5: safety */ 125 safety@5,0 { 126 compatible = "ifm,safety";
|
/linux/Documentation/rust/ |
H A D | general-information.rst | 110 #. Any ``unsafe`` blocks respect the safety contract necessary to call the 112 safety contract necessary to implement the trait. 136 Besides the safety aspect, the abstractions are supposed to be "ergonomic", in
|
H A D | coding-guidelines.rst | 94 // SAFETY: `p` is valid by the safety requirements. 140 // SAFETY: The safety contract must be upheld by the caller. 151 - Unsafe functions must document their safety preconditions under
|
/linux/drivers/thermal/intel/int340x_thermal/ |
H A D | Kconfig | 19 CPU/SOC, for thermal safety reasons.
|
/linux/net/hsr/ |
H A D | Kconfig | 38 relying on this code in a safety critical system!
|
/linux/drivers/media/pci/saa7164/ |
H A D | saa7164-cmd.c | 336 int safety = 0; in saa7164_cmd_send() local 444 if (safety++ > 16) { in saa7164_cmd_send()
|
/linux/lib/ |
H A D | Kconfig.kasan | 35 bool "KASAN: dynamic memory safety error detector" 43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety
|
H A D | Kconfig.kfence | 7 bool "KFENCE: low-overhead sampling-based memory safety error detector"
|
/linux/Documentation/admin-guide/ |
H A D | index.rst | 63 Linux kernel for safety critical applications. Documents supporting
|
H A D | workload-tracing.rst | 25 to avoid regressions and use it to evaluate safety considerations. 34 to evaluate safety considerations. We use strace tool to trace workloads.
|
/linux/Documentation/driver-api/driver-model/ |
H A D | bus.rst | 53 type-safety.
|
/linux/drivers/net/wan/ |
H A D | farsync.c | 911 int safety; in fst_issue_cmd() local 917 safety = 0; in fst_issue_cmd() 924 if (++safety > 2000) { in fst_issue_cmd() 931 if (safety > 0) in fst_issue_cmd() 932 dbg(DBG_CMD, "Mailbox clear after %d jiffies\n", safety); in fst_issue_cmd()
|
/linux/Documentation/driver-api/ |
H A D | interconnect.rst | 118 any arbitrary path. Note that for safety reasons, this feature is disabled by
|
/linux/Documentation/filesystems/ |
H A D | ocfs2.rst | 83 will hurt performance, but it's good for data-safety.
|
/linux/Documentation/i2c/busses/ |
H A D | i2c-parport.rst | 94 the i2c-parport module might be a good safety since data line state
|
/linux/Documentation/filesystems/ext4/ |
H A D | blockgroup.rst | 83 Without the option META_BG, for safety concerns, all block group
|
/linux/Documentation/trace/rv/ |
H A D | runtime-verification.rst | 20 events, avoiding, for example, the propagation of a failure on safety-critical
|
/linux/Documentation/admin-guide/hw-vuln/ |
H A D | srso.rst | 151 To ensure the safety of this mitigation, the kernel must ensure that the
|
/linux/Documentation/admin-guide/laptops/ |
H A D | thinkpad-acpi.rst | 588 wake up caused by the firmware will have negated most safety nets... 678 CAP_SYS_ADMIN capability for safety reasons, as it can interact badly 1216 safety reasons. To enable them, the module parameter "fan_control=1" 1275 120 seconds. This functionality is called fan safety watchdog. 1317 To program the safety watchdog, use the "watchdog" command:: 1327 part, and the exception is the fan safety watchdog. 1367 Fan safety watchdog timer interval, in seconds. Minimum is
|
/linux/Documentation/wmi/devices/ |
H A D | msi-wmi-platform.rst | 188 debugfs interface for directly executing WMI methods. Additionally, any safety checks regarding
|