Home
last modified time | relevance | path

Searched refs:prevent (Results 1 – 25 of 345) sorted by relevance

12345678910>>...14

/linux/drivers/cpuidle/
A Dcoupled.c104 int prevent; member
480 while (coupled->prevent) { in cpuidle_enter_state_coupled()
529 if (coupled->prevent) { in cpuidle_enter_state_coupled()
670 coupled->prevent++; in cpuidle_coupled_register_device()
714 coupled->prevent++; in cpuidle_coupled_prevent_idle()
737 coupled->prevent--; in cpuidle_coupled_allow_idle()
/linux/Documentation/userspace-api/
A Dno_new_privs.rst7 programs and file capabilities. To prevent the parent program from
9 careful to prevent the parent from doing anything that could subvert the
41 Note that ``no_new_privs`` does not prevent privilege changes that do not
/linux/Documentation/filesystems/
A Defivarfs.rst24 as immutable files. This doesn't prevent removal - "chattr -i" will work -
25 but it does prevent this kind of failure from being accomplished
/linux/Documentation/core-api/
A Ddebug-objects.rst79 can deactivate an active object in order to prevent damage to the
102 can deactivate an active object in order to prevent damage to the
126 deactivate an active object in order to prevent damage to the subsystem.
156 prevent the usage of invalid objects, which are still available in
166 deactivate an active object in order to prevent damage to the subsystem.
182 prevent damage to the subsystem.
/linux/Documentation/networking/
A Dnetfilter-sysctl.rst15 with LOG target; this aims to prevent containers from flooding host
/linux/Documentation/power/
A Dfreezing-of-tasks.rst106 1. The principal reason is to prevent filesystems from being damaged after
125 to allocate additional memory and we prevent them from doing that by
130 3. The third reason is to prevent user space processes and some kernel threads
160 4. Another reason for freezing tasks is to prevent user space processes from
213 VI. Are there any precautions to be taken to prevent freezing failures?
238 mutex_[un]lock(&system_transition_mutex). That would prevent freezing failures.
/linux/Documentation/process/
A Dvolatile-considered-harmful.rst22 safe (spinlocks, mutexes, memory barriers, etc.) are designed to prevent
58 architectures. Those accessors are written to prevent unwanted
83 keyword to asm statements will prevent this removal.
/linux/Documentation/locking/
A Drt-mutex.rst66 with ->wait_lock is held. To prevent any fast path cmpxchg to the lock,
72 To prevent a cmpxchg of the owner releasing the lock, we need to
A Dpreempt-locking.rst88 Note that you do not need to explicitly prevent preemption if you are holding
129 It is possible to prevent a preemption event using local_irq_disable and
/linux/Documentation/devicetree/bindings/soc/mediatek/
A Ddevapc.yaml12 protection to prevent slaves from being accessed by unexpected masters.
/linux/Documentation/x86/
A Dbuslock.rst82 solutions as they have no way to prevent the "untrusted" user code from
86 It's also useful for general computing to prevent guests or user
/linux/Documentation/admin-guide/
A Dkernel-per-CPU-kthreads.rst46 that does not require per-CPU kthreads. This will prevent these
113 3. Once your application has started, prevent CPU-hotplug operations
125 3. Once your application has started, prevent CPU-hotplug operations
137 3. Once your application has started, prevent CPU-hotplug operations
331 2. Build with CONFIG_RCU_NOCB_CPU=n, which will prevent these
/linux/tools/testing/kunit/configs/
A Dbroken_on_uml.config1 # These are currently broken on UML and prevent allyesconfig from building
/linux/Documentation/admin-guide/hw-vuln/
A Dspectre.rst156 macros are used to prevent speculative loading of data.
206 to prevent jumping to gadget code during speculative execution.
245 Predictors (STIBP) :ref:`[4] <spec_ref4>` are turned on to prevent the
429 Copy-from-user code has an LFENCE barrier to prevent the access_ok()
445 in an infinite loop to prevent any speculative execution jumping to
468 before invoking any firmware code to prevent Spectre variant 2 exploits
492 also prevent the program from launching a variant 2 attack
514 Linux kernel uses retpoline or Enhanced IBRS to prevent consumption of
516 flushes the return stack buffer on every VM exit to prevent a return
/linux/tools/testing/selftests/tc-testing/
A DTODO.txt4 present, prevent the related categories from running.
/linux/Documentation/powerpc/
A Delfnote.rst33 In an ultravisor-enabled system, a bootloader could warn the user or prevent
/linux/Documentation/security/keys/
A Drequest-key.rst46 does not need to link the key to a keyring to prevent it from being immediately
64 to prevent the key from going away, and returns the serial number of the key to
141 This is provided to prevent excessive repeated spawning of /sbin/request-key
/linux/kernel/gcov/
A DKconfig54 which are not linked to the kernel image to prevent linker errors.
/linux/arch/arm/boot/dts/
A Drk3288-veyron-sdmmc.dtsi34 * Builtin CD line is hooked to ground to prevent JTAG at boot
/linux/Documentation/virt/kvm/
A Dreview-checklist.rst40 host/guest memory must be unshared to prevent the host from writing to
/linux/tools/testing/selftests/tc-testing/creating-testcases/
A DAddingTestCases.txt9 will help prevent conflicts when updating the repository. Refer to
80 the tests are run will be destroyed. This is to prevent inaccurate results
/linux/drivers/pnp/pnpbios/
A DKconfig19 BIOS) say Y here. Also the PNPBIOS can help prevent resource
/linux/arch/arm/kernel/
A Dentry-common.S379 mov why, #0 @ prevent syscall restart handling
385 mov why, #0 @ prevent syscall restart handling
/linux/net/ax25/
A DKconfig56 DAMA is a mechanism to prevent collisions when doing AX.25
71 DAMA is a mechanism to prevent collisions when doing AX.25
/linux/arch/mips/loongson2ef/
A DPlatform17 # We disable this in order to prevent the assembler meddling with the

Completed in 30 milliseconds

12345678910>>...14