Searched refs:allowed (Results 1 - 25 of 104) sorted by last modified time

12345

/linux-master/arch/x86/kvm/
H A Dx86.c1798 bool allowed; local
1810 allowed = true;
1814 allowed = msr_filter->default_allow;
1824 allowed = test_bit(index - start, bitmap);
1832 return allowed;
3077 /* guest entries allowed */
4167 * Userspace is allowed to write '0' to MSRs that KVM reports
4526 * Userspace is allowed to read MSRs that KVM reports as
8827 * Write permission should be allowed since only
13539 * is allowed b
[all...]
/linux-master/arch/x86/kvm/vmx/
H A Dvmx.c193 * ple_window: upper bound on the amount of time a guest is allowed to execute
1700 * INT1ICEBRK and INT3, as they are allowed in debug enclaves
1923 * Userspace is allowed to set any supported IA32_FEATURE_CONTROL regardless of
1926 * because userspace set "VMX in SMX", the guest must also be allowed to set it,
2559 u64 allowed; local
2561 rdmsrl(msr, allowed);
2563 return ctl_opt & allowed;
3414 * enabled under SMM. Note, whether or not VMXE is allowed at all,
4337 * 64-bit kernels. It is always zero If neither is allowed, otherwise
4414 * nested virtualization and thus allowed t
[all...]
/linux-master/drivers/scsi/
H A Dscsi_lib.c260 if (failure->allowed) {
261 if (failure->allowed == SCMD_FAILURE_NO_LIMIT ||
262 ++failure->retries <= failure->allowed)
317 scmd->allowed = ml_retries;
758 if (cmd->allowed == SCSI_CMD_RETRIES_NO_LIMIT)
761 wait_for = (cmd->allowed + 1) * req->timeout;
1696 cmd->allowed = 0;
2273 .allowed = retries,
2734 * It is allowed to call scsi_device_quiesce() multiple times from
2736 * not allowed
[all...]
H A Dsg.c227 pr_err_once("%s: process %d (%s) changed security contexts after opening file descriptor, this is not allowed.\n",
1776 scmd->allowed = SG_DEFAULT_RETRIES;
H A Dsd.c913 cmd->allowed = sdkp->max_retries;
940 cmd->allowed = sdkp->max_retries;
967 cmd->allowed = sdkp->max_retries;
1078 cmd->allowed = sdkp->max_retries;
1304 cmd->allowed = sdkp->max_retries;
1685 .allowed = 3,
1835 .allowed = 5,
1937 .allowed = 5,
2314 .allowed = 3,
2636 .allowed
[all...]
H A Dst.c587 scmd->allowed = retries;
2911 return (-EIO); /* Not allowed if data in buffer */
3570 "MTSETDRVBUFFER only allowed for root.\n");
H A Dscsi_scan.c669 .allowed = 1,
1564 " allowed by the host adapter\n", lun);
H A Dch.c197 .allowed = 3,
H A Dsr.c465 SCpnt->allowed = MAX_RETRIES;
728 .allowed = 3,
H A Dses.c95 .allowed = SES_RETRIES,
102 .allowed = SES_RETRIES,
152 .allowed = SES_RETRIES,
159 .allowed = SES_RETRIES,
H A Dscsi_transport_spi.c118 .allowed = DV_RETRIES,
/linux-master/arch/x86/kernel/cpu/
H A Dtopology.c417 unsigned int cnta, cntb, cpu, allowed = 1; local
437 allowed = min_t(unsigned int, total, nr_cpu_ids);
440 if (total > allowed)
441 pr_warn("%u possible CPUs exceed the limit of %u\n", total, allowed);
443 assigned = min_t(unsigned int, allowed, assigned);
444 disabled = allowed - assigned;
449 total_cpus = allowed;
450 set_nr_cpu_ids(allowed);
492 for (cpu = 0; cpu < allowed; cpu++) {
/linux-master/drivers/gpu/drm/amd/pm/swsmu/smu14/
H A Dsmu_v14_0.c718 if (bitmap_empty(feature->allowed, SMU_FEATURE_MAX) ||
722 bitmap_to_arr32(feature_mask, feature->allowed, 64);
1703 /* Only allowed in manual mode */
1717 "Fine grain setting minimum sclk (%ld) MHz is less than the minimum allowed (%d) MHz\n",
1725 "Fine grain setting maximum sclk (%ld) MHz is greater than the maximum allowed (%d) MHz\n",
/linux-master/drivers/gpu/drm/amd/pm/swsmu/inc/
H A Damdgpu_smu.h396 DECLARE_BITMAP(allowed, SMU_FEATURE_MAX);
604 * @get_allowed_feature_mask: Get allowed feature mask.
654 * @force_clk_levels: Set a range of allowed DPM levels for a clock
657 * &mask: Range of allowed DPM levels.
867 * &pcie_gen_cap: Maximum allowed PCIe generation.
868 * &pcie_width_cap: Maximum allowed PCIe width.
1030 * @set_allowed_mask: Notify the SMU of the features currently allowed
/linux-master/drivers/gpu/drm/amd/pm/swsmu/
H A Damdgpu_smu.c625 * With SCPM enabled, the allowed featuremasks setting(via
628 * Thus, we just assume all the features are allowed under
632 bitmap_fill(feature->allowed, SMU_FEATURE_MAX);
636 bitmap_zero(feature->allowed, SMU_FEATURE_MAX);
643 bitmap_or(feature->allowed, feature->allowed,
1215 bitmap_zero(smu->smu_feature.allowed, SMU_FEATURE_MAX);
1618 dev_err(adev->dev, "Failed to set driver allowed features mask!\n");
/linux-master/kernel/trace/
H A Dbpf_trace.c976 .allowed = bpf_d_path_allowed,
1449 * For security reasons, only *name__str* with prefix "user." is allowed.
/linux-master/kernel/bpf/
H A Dverifier.c2709 /* In the future, this can be allowed to increase limit
2912 verbose(env, "loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n");
5136 verbose(env, "R%d min value is outside of the allowed memory range\n",
5153 verbose(env, "R%d max value is outside of the allowed memory range\n",
5166 * is only allowed in its original, unmodified form.
5741 /* Byte size accesses are always allowed. */
5776 /* Byte size accesses are always allowed. */
5898 "tail_calls are not allowed when call stack of previous frames is %d bytes. Too large\n",
6447 "'struct %s' access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN\n",
6563 * and will be allowed t
[all...]
/linux-master/include/linux/
H A Dbpf.h830 bool (*allowed)(const struct bpf_prog *prog); member in struct:bpf_func_proto
951 * with 'type' (read or write) is allowed
/linux-master/drivers/ufs/core/
H A Dufshcd.c1902 * still be in hibner8 state if hibern8 is allowed
5791 * as the device is allowed to manage its own way of handling background
5844 * urgent bkops exception is allowed.
9527 .allowed = 2,
/linux-master/drivers/gpu/drm/xe/
H A Dxe_device_types.h426 /** @d3cold.allowed: Indicates if d3cold is a valid device state */
427 bool allowed; member in struct:xe_device::__anon78
/linux-master/security/selinux/
H A Dselinuxfs.c893 avd.allowed, 0xffffffff,
/linux-master/drivers/ata/
H A Dlibata-eh.c652 scmd->retries = scmd->allowed;
1072 * is not allowed to perform any operation until the port is
1190 scmd->retries = scmd->allowed;
1201 * SCSI midlayer limits the number of retries to scmd->allowed.
1202 * scmd->allowed is incremented for commands which get retried
1209 scmd->allowed++;
3333 * Making sure retry is allowed at least once and
3338 qc->scsicmd->allowed = max(qc->scsicmd->allowed, 1);
3939 * will not increment scmd->allowed, s
[all...]
/linux-master/fs/btrfs/
H A Dvolumes.c868 * 2b must not be allowed at all time.
1366 * and we are not allowed to call set_blocksize during the scan. The superblock
4217 * Validate target profile against allowed profiles and return true if it's OK.
4222 u64 allowed, const char *type)
4227 /* Profile is valid and does not have bits outside of the allowed set */
4229 (bargs->target & ~allowed) == 0)
4399 u64 allowed; local
4415 allowed = btrfs_super_incompat_flags(fs_info->super_copy);
4416 if (allowed & BTRFS_FEATURE_INCOMPAT_MIXED_GROUPS)
4423 allowed
4220 validate_convert_profile(struct btrfs_fs_info *fs_info, const struct btrfs_balance_args *bargs, u64 allowed, const char *type) argument
[all...]
H A Dblock-group.c77 u64 allowed = 0; local
94 allowed |= btrfs_raid_array[raid_type].bg_flag;
96 allowed &= flags;
99 if (allowed & BTRFS_BLOCK_GROUP_RAID1C4)
100 allowed = BTRFS_BLOCK_GROUP_RAID1C4;
101 else if (allowed & BTRFS_BLOCK_GROUP_RAID6)
102 allowed = BTRFS_BLOCK_GROUP_RAID6;
103 else if (allowed & BTRFS_BLOCK_GROUP_RAID1C3)
104 allowed = BTRFS_BLOCK_GROUP_RAID1C3;
105 else if (allowed
[all...]
/linux-master/include/scsi/
H A Dscsi_device.h40 * Only internal commands allowed (for inq) */
42 * All commands allowed */
44 * Only error handler commands allowed */
46 * no commands allowed */
521 s8 allowed; member in struct:scsi_failure

Completed in 579 milliseconds

12345