Home
last modified time | relevance | path

Searched refs:allowed (Results 1 – 25 of 28) sorted by relevance

12

/arch/mips/kvm/
Dinterrupt.c118 int allowed = 0; in kvm_mips_irq_deliver_cb() local
129 allowed = 1; in kvm_mips_irq_deliver_cb()
138 allowed = 1; in kvm_mips_irq_deliver_cb()
147 allowed = 1; in kvm_mips_irq_deliver_cb()
156 allowed = 1; in kvm_mips_irq_deliver_cb()
166 if (allowed) { in kvm_mips_irq_deliver_cb()
195 return allowed; in kvm_mips_irq_deliver_cb()
/arch/mips/kernel/
Dmips-mt-fpaff.c161 cpumask_t allowed, mask; in mipsmt_sys_sched_getaffinity() local
180 cpumask_or(&allowed, &p->thread.user_cpus_allowed, p->cpus_ptr); in mipsmt_sys_sched_getaffinity()
181 cpumask_and(&mask, &allowed, cpu_active_mask); in mipsmt_sys_sched_getaffinity()
/arch/arm/boot/dts/
Dat91-sama5d2_xplained.dts148 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>,
166 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>,
180 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>,
194 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
208 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
222 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
236 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
/arch/x86/configs/
Dxen.config2 # On 32-bit HIGHMEM4G is not allowed
/arch/arc/include/asm/
Dentry-compact.h225 mov lp_count, r9 ;LD to lp_count is not allowed
309 mov lp_count, r9 ;LD to lp_count is not allowed
/arch/powerpc/kvm/
Dbooke.c390 int allowed = 0; in kvmppc_booke_irqprio_deliver() local
442 allowed = 1; in kvmppc_booke_irqprio_deliver()
449 allowed = vcpu->arch.shared->msr & MSR_CE; in kvmppc_booke_irqprio_deliver()
450 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver()
455 allowed = vcpu->arch.shared->msr & MSR_ME; in kvmppc_booke_irqprio_deliver()
456 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver()
465 allowed = vcpu->arch.shared->msr & MSR_EE; in kvmppc_booke_irqprio_deliver()
466 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver()
471 allowed = vcpu->arch.shared->msr & MSR_DE; in kvmppc_booke_irqprio_deliver()
472 allowed = allowed && !crit; in kvmppc_booke_irqprio_deliver()
[all …]
/arch/x86/events/intel/
Dpt.c307 u64 allowed, requested; in pt_event_valid() local
316 allowed = intel_pt_validate_hw_cap(PT_CAP_psb_periods); in pt_event_valid()
319 if (requested && (!(allowed & BIT(requested)))) in pt_event_valid()
322 allowed = intel_pt_validate_hw_cap(PT_CAP_cycle_thresholds); in pt_event_valid()
325 if (requested && (!(allowed & BIT(requested)))) in pt_event_valid()
340 allowed = intel_pt_validate_hw_cap(PT_CAP_mtc_periods); in pt_event_valid()
341 if (!allowed) in pt_event_valid()
347 if (!(allowed & BIT(requested))) in pt_event_valid()
/arch/powerpc/platforms/ps3/
Dspu.c536 static const u64 allowed = ~(MFC_STATE1_LOCAL_STORAGE_DECODE_MASK in mfc_sr1_set() local
539 BUG_ON((sr1 & allowed) != (spu_pdata(spu)->cache.sr1 & allowed)); in mfc_sr1_set()
/arch/mips/dec/
Dint-handler.S138 and t0,t1 # isolate allowed ones
/arch/mips/boot/dts/cavium-octeon/
Docteon_3xxx.dts362 /* 12MHz, 24MHz and 48MHz allowed */
382 /* 12MHz, 24MHz and 48MHz allowed */
Docteon_68xx.dts591 /* 12MHz, 24MHz and 48MHz allowed */
/arch/arc/kernel/
Dentry-arcv2.S243 ; (since IRQ NOT allowed in DS in ARCv2, this can only happen if orig
/arch/um/
DKconfig198 and the task is only allowed to execute a few safe syscalls
/arch/riscv/
DKconfig243 Adds "C" to the ISA subsets that the toolchain is allowed to emit
/arch/m68k/ifpsp060/
Dos.S65 | The result is that Unix processes are allowed to sleep as a consequence
/arch/microblaze/
DKconfig135 and the task is only allowed to execute a few safe syscalls
/arch/m68k/fpsp040/
Dskeleton.S399 | process is allowed to sleep as a consequence of a page fault during
/arch/parisc/
DKconfig389 and the task is only allowed to execute a few safe syscalls
/arch/arm64/boot/dts/xilinx/
Dzynqmp.dtsi276 * Channels are allowed for non secure access.
/arch/sparc/
DKconfig247 and the task is only allowed to execute a few safe syscalls
/arch/x86/math-emu/
DREADME157 allowed to write outside the bounds set by the protection.
/arch/sh/
DKconfig660 allowed to execute a few safe syscalls defined by each seccomp
/arch/s390/
DKconfig851 and the task is only allowed to execute a few safe syscalls
/arch/powerpc/
DKconfig919 and the task is only allowed to execute a few safe syscalls
/arch/arm64/
DKconfig1000 and the task is only allowed to execute a few safe syscalls

12