/linux-master/arch/x86/kvm/ |
H A D | x86.c | 1798 bool allowed; local 1810 allowed = true; 1814 allowed = msr_filter->default_allow; 1824 allowed = test_bit(index - start, bitmap); 1832 return allowed; 3077 /* guest entries allowed */ 4167 * Userspace is allowed to write '0' to MSRs that KVM reports 4526 * Userspace is allowed to read MSRs that KVM reports as 8827 * Write permission should be allowed since only 13539 * is allowed b [all...] |
/linux-master/arch/x86/kvm/vmx/ |
H A D | vmx.c | 193 * ple_window: upper bound on the amount of time a guest is allowed to execute 1700 * INT1ICEBRK and INT3, as they are allowed in debug enclaves 1923 * Userspace is allowed to set any supported IA32_FEATURE_CONTROL regardless of 1926 * because userspace set "VMX in SMX", the guest must also be allowed to set it, 2559 u64 allowed; local 2561 rdmsrl(msr, allowed); 2563 return ctl_opt & allowed; 3414 * enabled under SMM. Note, whether or not VMXE is allowed at all, 4337 * 64-bit kernels. It is always zero If neither is allowed, otherwise 4414 * nested virtualization and thus allowed t [all...] |
/linux-master/drivers/scsi/ |
H A D | scsi_lib.c | 260 if (failure->allowed) { 261 if (failure->allowed == SCMD_FAILURE_NO_LIMIT || 262 ++failure->retries <= failure->allowed) 317 scmd->allowed = ml_retries; 758 if (cmd->allowed == SCSI_CMD_RETRIES_NO_LIMIT) 761 wait_for = (cmd->allowed + 1) * req->timeout; 1696 cmd->allowed = 0; 2273 .allowed = retries, 2734 * It is allowed to call scsi_device_quiesce() multiple times from 2736 * not allowed [all...] |
H A D | sg.c | 227 pr_err_once("%s: process %d (%s) changed security contexts after opening file descriptor, this is not allowed.\n", 1776 scmd->allowed = SG_DEFAULT_RETRIES;
|
H A D | sd.c | 913 cmd->allowed = sdkp->max_retries; 940 cmd->allowed = sdkp->max_retries; 967 cmd->allowed = sdkp->max_retries; 1078 cmd->allowed = sdkp->max_retries; 1304 cmd->allowed = sdkp->max_retries; 1685 .allowed = 3, 1835 .allowed = 5, 1937 .allowed = 5, 2314 .allowed = 3, 2636 .allowed [all...] |
H A D | st.c | 587 scmd->allowed = retries; 2911 return (-EIO); /* Not allowed if data in buffer */ 3570 "MTSETDRVBUFFER only allowed for root.\n");
|
H A D | scsi_scan.c | 669 .allowed = 1, 1564 " allowed by the host adapter\n", lun);
|
H A D | ch.c | 197 .allowed = 3,
|
H A D | sr.c | 465 SCpnt->allowed = MAX_RETRIES; 728 .allowed = 3,
|
H A D | ses.c | 95 .allowed = SES_RETRIES, 102 .allowed = SES_RETRIES, 152 .allowed = SES_RETRIES, 159 .allowed = SES_RETRIES,
|
H A D | scsi_transport_spi.c | 118 .allowed = DV_RETRIES,
|
/linux-master/arch/x86/kernel/cpu/ |
H A D | topology.c | 417 unsigned int cnta, cntb, cpu, allowed = 1; local 437 allowed = min_t(unsigned int, total, nr_cpu_ids); 440 if (total > allowed) 441 pr_warn("%u possible CPUs exceed the limit of %u\n", total, allowed); 443 assigned = min_t(unsigned int, allowed, assigned); 444 disabled = allowed - assigned; 449 total_cpus = allowed; 450 set_nr_cpu_ids(allowed); 492 for (cpu = 0; cpu < allowed; cpu++) {
|
/linux-master/drivers/gpu/drm/amd/pm/swsmu/smu14/ |
H A D | smu_v14_0.c | 718 if (bitmap_empty(feature->allowed, SMU_FEATURE_MAX) || 722 bitmap_to_arr32(feature_mask, feature->allowed, 64); 1703 /* Only allowed in manual mode */ 1717 "Fine grain setting minimum sclk (%ld) MHz is less than the minimum allowed (%d) MHz\n", 1725 "Fine grain setting maximum sclk (%ld) MHz is greater than the maximum allowed (%d) MHz\n",
|
/linux-master/drivers/gpu/drm/amd/pm/swsmu/inc/ |
H A D | amdgpu_smu.h | 396 DECLARE_BITMAP(allowed, SMU_FEATURE_MAX); 604 * @get_allowed_feature_mask: Get allowed feature mask. 654 * @force_clk_levels: Set a range of allowed DPM levels for a clock 657 * &mask: Range of allowed DPM levels. 867 * &pcie_gen_cap: Maximum allowed PCIe generation. 868 * &pcie_width_cap: Maximum allowed PCIe width. 1030 * @set_allowed_mask: Notify the SMU of the features currently allowed
|
/linux-master/drivers/gpu/drm/amd/pm/swsmu/ |
H A D | amdgpu_smu.c | 625 * With SCPM enabled, the allowed featuremasks setting(via 628 * Thus, we just assume all the features are allowed under 632 bitmap_fill(feature->allowed, SMU_FEATURE_MAX); 636 bitmap_zero(feature->allowed, SMU_FEATURE_MAX); 643 bitmap_or(feature->allowed, feature->allowed, 1215 bitmap_zero(smu->smu_feature.allowed, SMU_FEATURE_MAX); 1618 dev_err(adev->dev, "Failed to set driver allowed features mask!\n");
|
/linux-master/kernel/trace/ |
H A D | bpf_trace.c | 976 .allowed = bpf_d_path_allowed, 1449 * For security reasons, only *name__str* with prefix "user." is allowed.
|
/linux-master/kernel/bpf/ |
H A D | verifier.c | 2709 /* In the future, this can be allowed to increase limit 2912 verbose(env, "loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n"); 5136 verbose(env, "R%d min value is outside of the allowed memory range\n", 5153 verbose(env, "R%d max value is outside of the allowed memory range\n", 5166 * is only allowed in its original, unmodified form. 5741 /* Byte size accesses are always allowed. */ 5776 /* Byte size accesses are always allowed. */ 5898 "tail_calls are not allowed when call stack of previous frames is %d bytes. Too large\n", 6447 "'struct %s' access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN\n", 6563 * and will be allowed t [all...] |
/linux-master/include/linux/ |
H A D | bpf.h | 830 bool (*allowed)(const struct bpf_prog *prog); member in struct:bpf_func_proto 951 * with 'type' (read or write) is allowed
|
/linux-master/drivers/ufs/core/ |
H A D | ufshcd.c | 1902 * still be in hibner8 state if hibern8 is allowed 5791 * as the device is allowed to manage its own way of handling background 5844 * urgent bkops exception is allowed. 9527 .allowed = 2,
|
/linux-master/drivers/gpu/drm/xe/ |
H A D | xe_device_types.h | 426 /** @d3cold.allowed: Indicates if d3cold is a valid device state */ 427 bool allowed; member in struct:xe_device::__anon78
|
/linux-master/security/selinux/ |
H A D | selinuxfs.c | 893 avd.allowed, 0xffffffff,
|
/linux-master/drivers/ata/ |
H A D | libata-eh.c | 652 scmd->retries = scmd->allowed; 1072 * is not allowed to perform any operation until the port is 1190 scmd->retries = scmd->allowed; 1201 * SCSI midlayer limits the number of retries to scmd->allowed. 1202 * scmd->allowed is incremented for commands which get retried 1209 scmd->allowed++; 3333 * Making sure retry is allowed at least once and 3338 qc->scsicmd->allowed = max(qc->scsicmd->allowed, 1); 3939 * will not increment scmd->allowed, s [all...] |
/linux-master/fs/btrfs/ |
H A D | volumes.c | 868 * 2b must not be allowed at all time. 1366 * and we are not allowed to call set_blocksize during the scan. The superblock 4217 * Validate target profile against allowed profiles and return true if it's OK. 4222 u64 allowed, const char *type) 4227 /* Profile is valid and does not have bits outside of the allowed set */ 4229 (bargs->target & ~allowed) == 0) 4399 u64 allowed; local 4415 allowed = btrfs_super_incompat_flags(fs_info->super_copy); 4416 if (allowed & BTRFS_FEATURE_INCOMPAT_MIXED_GROUPS) 4423 allowed 4220 validate_convert_profile(struct btrfs_fs_info *fs_info, const struct btrfs_balance_args *bargs, u64 allowed, const char *type) argument [all...] |
H A D | block-group.c | 77 u64 allowed = 0; local 94 allowed |= btrfs_raid_array[raid_type].bg_flag; 96 allowed &= flags; 99 if (allowed & BTRFS_BLOCK_GROUP_RAID1C4) 100 allowed = BTRFS_BLOCK_GROUP_RAID1C4; 101 else if (allowed & BTRFS_BLOCK_GROUP_RAID6) 102 allowed = BTRFS_BLOCK_GROUP_RAID6; 103 else if (allowed & BTRFS_BLOCK_GROUP_RAID1C3) 104 allowed = BTRFS_BLOCK_GROUP_RAID1C3; 105 else if (allowed [all...] |
/linux-master/include/scsi/ |
H A D | scsi_device.h | 40 * Only internal commands allowed (for inq) */ 42 * All commands allowed */ 44 * Only error handler commands allowed */ 46 * no commands allowed */ 521 s8 allowed; member in struct:scsi_failure
|