/linux-master/drivers/s390/scsi/ |
H A D | zfcp_dbf.c | 690 rec->scsi_allowed = sc->allowed;
|
/linux-master/drivers/gpu/drm/amd/pm/powerplay/hwmgr/ |
H A D | vega20_hwmgr.c | 401 data->smu_features[i].allowed = 628 * state tables to the allowed range based 923 if (data->smu_features[i].allowed) 935 "[SetAllowedFeaturesMask] Attempt to set allowed features mask(high) failed!", 941 "[SetAllowedFeaturesMask] Attempt to set allowed features mask (low) failed!", 984 if (data->smu_features[i].allowed && !enabled) 986 else if (!data->smu_features[i].allowed && enabled) 1691 "[EnableDPMTasks] Failed to set allowed featuresmask!\n", 2568 pr_err("Clock level specified %d is over max allowed %d\n", 2595 pr_err("Clock level specified %d is over max allowed [all...] |
H A D | vega12_hwmgr.c | 361 data->smu_features[i].allowed = 629 * state tables to the allowed range based 872 if (data->smu_features[i].allowed) 880 "[SetAllowedFeaturesMask] Attempt to set allowed features mask (high) failed!", 886 "[SetAllowedFeaturesMask] Attempt to set allowed features mask (low) failed!", 1056 "[EnableDPMTasks] Failed to set allowed featuresmask!\n", 2069 pr_err("Clock level specified %d is over max allowed %d\n", 2096 pr_err("Clock level specified %d is over max allowed %d\n",
|
/linux-master/drivers/target/ |
H A D | target_core_pscsi.c | 971 scmd->allowed = PS_RETRY;
|
/linux-master/drivers/scsi/device_handler/ |
H A D | scsi_dh_rdac.c | 546 .allowed = SCMD_FAILURE_NO_LIMIT,
|
/linux-master/drivers/scsi/ |
H A D | ch.c | 197 .allowed = 3,
|
H A D | scsi_transport_spi.c | 118 .allowed = DV_RETRIES,
|
H A D | scsi_scan.c | 669 .allowed = 1, 1564 " allowed by the host adapter\n", lun);
|
H A D | sg.c | 227 pr_err_once("%s: process %d (%s) changed security contexts after opening file descriptor, this is not allowed.\n", 1776 scmd->allowed = SG_DEFAULT_RETRIES;
|
/linux-master/drivers/gpu/drm/amd/pm/swsmu/inc/ |
H A D | amdgpu_smu.h | 396 DECLARE_BITMAP(allowed, SMU_FEATURE_MAX); 604 * @get_allowed_feature_mask: Get allowed feature mask. 654 * @force_clk_levels: Set a range of allowed DPM levels for a clock 657 * &mask: Range of allowed DPM levels. 867 * &pcie_gen_cap: Maximum allowed PCIe generation. 868 * &pcie_width_cap: Maximum allowed PCIe width. 1030 * @set_allowed_mask: Notify the SMU of the features currently allowed
|
/linux-master/drivers/gpu/drm/amd/pm/swsmu/smu13/ |
H A D | smu_v13_0.c | 785 if (bitmap_empty(feature->allowed, SMU_FEATURE_MAX) || 789 bitmap_to_arr32(feature_mask, feature->allowed, 64); 2350 /* Only allowed in manual mode */ 2364 "Fine grain setting minimum sclk (%ld) MHz is less than the minimum allowed (%d) MHz\n", 2372 "Fine grain setting maximum sclk (%ld) MHz is greater than the maximum allowed (%d) MHz\n",
|
/linux-master/drivers/infiniband/hw/hfi1/ |
H A D | mad.c | 1060 * columns "new" states, and physical_state_transitions.allowed[old][new] 1065 u8 allowed[__N_PHYSTATES][__N_PHYSTATES]; member in struct:__anon881 1091 * columns "new" states, and logical_state_transitions.allowed[old][new] 1096 u8 allowed[__N_LOGICAL_STATES][__N_LOGICAL_STATES]; member in struct:__anon882 1118 return HFI_TRANSITION_ALLOWED; /* always allowed */ 1126 return logical_state_transitions.allowed[old][new]; 1139 return HFI_TRANSITION_ALLOWED; /* always allowed */ 1147 return physical_state_transitions.allowed[old][new];
|
/linux-master/fs/proc/ |
H A D | base.c | 677 bool allowed = false; local 684 allowed = ptrace_may_access(task, PTRACE_MODE_READ_FSCREDS); 687 return allowed; 1748 /* Are we allowed to snoop on the tasks file descriptors? */ 1791 /* Are we allowed to snoop on the tasks file descriptors? */
|
/linux-master/kernel/cgroup/ |
H A D | cpuset.c | 606 * One cpuset is a subset of another if all its allowed CPUs and 1199 * 'cpus' changes, or if the 'cpus' allowed changes in any cpuset 1685 * Additions of remote CPUs is only allowed if those CPUs are 1869 * Enabling partition root is not allowed if its 1903 * Empty cpumask is not allowed 2222 * A partition with no effective_cpus is allowed as long as 3102 * Switching back to member is always allowed even if it 3286 /* Check to see if task is allowed in the cpuset */ 4183 * additional checks are done to see if the move is allowed. 4201 /* Check to see if task is allowed i 4912 bool allowed; /* is allocation in zone z allowed? */ local [all...] |
/linux-master/drivers/scsi/bnx2fc/ |
H A D | bnx2fc_io.c | 203 BNX2FC_IO_DBG(io_req, "sc=%p, result=0x%x, retries=%d, allowed=%d\n", 205 sc_cmd->allowed);
|
/linux-master/drivers/net/ethernet/intel/iavf/ |
H A D | iavf_main.c | 862 * iavf_get_max_vlans_allowed - get maximum VLANs allowed for this VF 867 * VIRTCHNL_VF_OFFLOAD_VLAN_V2, use the maximum allowed sent from the PF. 883 * iavf_max_vlans_added - check if maximum VLANs allowed already exist 914 netdev_err(netdev, "Max allowed VLAN filters %u. Remove existing VLANs or disable filtering via Ethtool if supported.\n", 3815 dev_info(&adapter->pdev->dev, "Tenant id not allowed for ip filter\n"); 4239 * Returns 0, this is not allowed to fail 4641 #define IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested, allowed, feature_bit) \ 4643 !((allowed) & (feature_bit))))
|
/linux-master/arch/x86/kvm/vmx/ |
H A D | vmx.c | 193 * ple_window: upper bound on the amount of time a guest is allowed to execute 1700 * INT1ICEBRK and INT3, as they are allowed in debug enclaves 1923 * Userspace is allowed to set any supported IA32_FEATURE_CONTROL regardless of 1926 * because userspace set "VMX in SMX", the guest must also be allowed to set it, 2559 u64 allowed; local 2561 rdmsrl(msr, allowed); 2563 return ctl_opt & allowed; 3414 * enabled under SMM. Note, whether or not VMXE is allowed at all, 4337 * 64-bit kernels. It is always zero If neither is allowed, otherwise 4414 * nested virtualization and thus allowed t [all...] |
/linux-master/drivers/scsi/qedf/ |
H A D | qedf_io.c | 1397 "allowed=%d retries=%d refcount=%d.\n", 1401 sc_cmd->cmnd[5], sc_cmd->allowed, sc_cmd->retries,
|
/linux-master/include/net/ |
H A D | tcp.h | 1208 int tcp_set_allowed_congestion_control(char *allowed);
|
/linux-master/drivers/net/wireless/ath/ath10k/ |
H A D | mac.c | 1269 bool allowed; local 1275 allowed = ath10k_mac_monitor_vdev_is_allowed(ar); 1278 "mac monitor recalc started? %d needed? %d allowed? %d\n", 1279 ar->monitor_started, needed, allowed); 1281 if (WARN_ON(needed && !allowed)) { 1435 * radiation is not allowed, make this channel DFS_UNAVAILABLE 5566 ath10k_warn(ar, "Free vdev map is empty, no more interfaces allowed.\n");
|
/linux-master/security/selinux/ |
H A D | selinuxfs.c | 893 avd.allowed, 0xffffffff,
|
/linux-master/include/linux/ |
H A D | bpf.h | 830 bool (*allowed)(const struct bpf_prog *prog); member in struct:bpf_func_proto 951 * with 'type' (read or write) is allowed
|
/linux-master/arch/x86/kvm/ |
H A D | x86.c | 1798 bool allowed; local 1810 allowed = true; 1814 allowed = msr_filter->default_allow; 1824 allowed = test_bit(index - start, bitmap); 1832 return allowed; 3077 /* guest entries allowed */ 4167 * Userspace is allowed to write '0' to MSRs that KVM reports 4526 * Userspace is allowed to read MSRs that KVM reports as 8827 * Write permission should be allowed since only 13539 * is allowed b [all...] |
/linux-master/kernel/trace/ |
H A D | bpf_trace.c | 976 .allowed = bpf_d_path_allowed, 1449 * For security reasons, only *name__str* with prefix "user." is allowed.
|
/linux-master/drivers/scsi/qla4xxx/ |
H A D | ql4_os.c | 4331 " exceeds maximum allowed. Hardware has been shut" 9294 "dpc_flags=%lx, status=%x allowed=%d\n", ha->host_no, 9296 ha->dpc_flags, cmd->result, cmd->allowed)); 9361 "to=%x,dpc_flags=%lx, status=%x allowed=%d\n", 9363 ha->dpc_flags, cmd->result, cmd->allowed));
|