Searched refs:allowed (Results 1 – 25 of 28) sorted by relevance
12
/arch/mips/kvm/ |
D | interrupt.c | 118 int allowed = 0; in kvm_mips_irq_deliver_cb() local 129 allowed = 1; in kvm_mips_irq_deliver_cb() 138 allowed = 1; in kvm_mips_irq_deliver_cb() 147 allowed = 1; in kvm_mips_irq_deliver_cb() 156 allowed = 1; in kvm_mips_irq_deliver_cb() 166 if (allowed) { in kvm_mips_irq_deliver_cb() 195 return allowed; in kvm_mips_irq_deliver_cb()
|
/arch/mips/kernel/ |
D | mips-mt-fpaff.c | 161 cpumask_t allowed, mask; in mipsmt_sys_sched_getaffinity() local 180 cpumask_or(&allowed, &p->thread.user_cpus_allowed, p->cpus_ptr); in mipsmt_sys_sched_getaffinity() 181 cpumask_and(&mask, &allowed, cpu_active_mask); in mipsmt_sys_sched_getaffinity()
|
/arch/arm/boot/dts/ |
D | at91-sama5d2_xplained.dts | 148 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 166 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 180 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 194 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>, 208 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>, 222 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>, 236 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
|
/arch/x86/configs/ |
D | xen.config | 2 # On 32-bit HIGHMEM4G is not allowed
|
/arch/arc/include/asm/ |
D | entry-compact.h | 225 mov lp_count, r9 ;LD to lp_count is not allowed 309 mov lp_count, r9 ;LD to lp_count is not allowed
|
/arch/powerpc/kvm/ |
D | booke.c | 390 int allowed = 0; in kvmppc_booke_irqprio_deliver() local 442 allowed = 1; in kvmppc_booke_irqprio_deliver() 449 allowed = vcpu->arch.shared->msr & MSR_CE; in kvmppc_booke_irqprio_deliver() 450 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver() 455 allowed = vcpu->arch.shared->msr & MSR_ME; in kvmppc_booke_irqprio_deliver() 456 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver() 465 allowed = vcpu->arch.shared->msr & MSR_EE; in kvmppc_booke_irqprio_deliver() 466 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver() 471 allowed = vcpu->arch.shared->msr & MSR_DE; in kvmppc_booke_irqprio_deliver() 472 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver() [all …]
|
/arch/x86/events/intel/ |
D | pt.c | 307 u64 allowed, requested; in pt_event_valid() local 316 allowed = intel_pt_validate_hw_cap(PT_CAP_psb_periods); in pt_event_valid() 319 if (requested && (!(allowed & BIT(requested)))) in pt_event_valid() 322 allowed = intel_pt_validate_hw_cap(PT_CAP_cycle_thresholds); in pt_event_valid() 325 if (requested && (!(allowed & BIT(requested)))) in pt_event_valid() 340 allowed = intel_pt_validate_hw_cap(PT_CAP_mtc_periods); in pt_event_valid() 341 if (!allowed) in pt_event_valid() 347 if (!(allowed & BIT(requested))) in pt_event_valid()
|
/arch/powerpc/platforms/ps3/ |
D | spu.c | 536 static const u64 allowed = ~(MFC_STATE1_LOCAL_STORAGE_DECODE_MASK in mfc_sr1_set() local 539 BUG_ON((sr1 & allowed) != (spu_pdata(spu)->cache.sr1 & allowed)); in mfc_sr1_set()
|
/arch/mips/dec/ |
D | int-handler.S | 138 and t0,t1 # isolate allowed ones
|
/arch/mips/boot/dts/cavium-octeon/ |
D | octeon_3xxx.dts | 362 /* 12MHz, 24MHz and 48MHz allowed */ 382 /* 12MHz, 24MHz and 48MHz allowed */
|
D | octeon_68xx.dts | 591 /* 12MHz, 24MHz and 48MHz allowed */
|
/arch/arc/kernel/ |
D | entry-arcv2.S | 243 ; (since IRQ NOT allowed in DS in ARCv2, this can only happen if orig
|
/arch/um/ |
D | Kconfig | 198 and the task is only allowed to execute a few safe syscalls
|
/arch/riscv/ |
D | Kconfig | 243 Adds "C" to the ISA subsets that the toolchain is allowed to emit
|
/arch/m68k/ifpsp060/ |
D | os.S | 65 | The result is that Unix processes are allowed to sleep as a consequence
|
/arch/microblaze/ |
D | Kconfig | 135 and the task is only allowed to execute a few safe syscalls
|
/arch/m68k/fpsp040/ |
D | skeleton.S | 399 | process is allowed to sleep as a consequence of a page fault during
|
/arch/parisc/ |
D | Kconfig | 389 and the task is only allowed to execute a few safe syscalls
|
/arch/arm64/boot/dts/xilinx/ |
D | zynqmp.dtsi | 276 * Channels are allowed for non secure access.
|
/arch/sparc/ |
D | Kconfig | 247 and the task is only allowed to execute a few safe syscalls
|
/arch/x86/math-emu/ |
D | README | 157 allowed to write outside the bounds set by the protection.
|
/arch/sh/ |
D | Kconfig | 660 allowed to execute a few safe syscalls defined by each seccomp
|
/arch/s390/ |
D | Kconfig | 851 and the task is only allowed to execute a few safe syscalls
|
/arch/powerpc/ |
D | Kconfig | 919 and the task is only allowed to execute a few safe syscalls
|
/arch/arm64/ |
D | Kconfig | 1000 and the task is only allowed to execute a few safe syscalls
|
12