| /Linux-v5.15/drivers/power/supply/ | 
| D | 88pm860x_charger.c | 109 	unsigned allowed:1;  member 315 		"Allowed:%d\n",  in set_charging_fsm() 318 		(info->present) ? "present" : "N/A", info->allowed);  in set_charging_fsm() 323 		if (info->online && info->present && info->allowed) {  in set_charging_fsm() 344 		if (info->online && info->present && info->allowed) {  in set_charging_fsm() 355 		if (info->online && info->present && info->allowed) {  in set_charging_fsm() 366 		if (info->online && info->present && info->allowed) {  in set_charging_fsm() 387 		"Out FSM:%s, Charger:%s, Battery:%s, Allowed:%d\n",  in set_charging_fsm() 390 		(info->present) ? "present" : "N/A", info->allowed);  in set_charging_fsm() 409 		info->allowed = 1;  in pm860x_charger_handler() [all …] 
 | 
| /Linux-v5.15/Documentation/devicetree/bindings/regulator/ | 
| D | mt6360-regulator.yaml | 51         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 60         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 69         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 77         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 85         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 93         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 101         regulator-allowed-modes = <MT6360_OPMODE_NORMAL 109         regulator-allowed-modes = <MT6360_OPMODE_NORMAL
  | 
| D | act8945a-regulator.txt | 18 regulator-initial-mode, regulator-allowed-modes and regulator-mode could be 42 				regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 61 				regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 83 				regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
  | 
| D | mcp16502-regulator.txt | 42 			regulator-allowed-modes = <2>, <4>; 61 			regulator-allowed-modes = <2>, <4>; 80 			regulator-allowed-modes = <2>, <4>; 99 			regulator-allowed-modes = <2>, <4>;
  | 
| /Linux-v5.15/Documentation/admin-guide/mm/ | 
| D | numa_memory_policy.rst | 253 	MPOL_PREFERRED allowed for a mask rather than a single node. 259 	the user should not be remapped if the task or VMA's set of allowed 263         change in the set of allowed nodes, the preferred nodemask (Preferred 265         remapped to the new set of allowed nodes.  This may result in nodes 269 	nodes allowed by the task's cpuset, then the memory policy is 277 	3 is allowed from the user's nodemask, the "interleave" only 279 	now allowed, the Default behavior is used. 289 	set of allowed nodes.  The kernel stores the user-passed nodemask, 290 	and if the allowed nodes changes, then that original nodemask will 291 	be remapped relative to the new set of allowed nodes. [all …] 
 | 
| /Linux-v5.15/Documentation/admin-guide/cgroup-v1/ | 
| D | cpusets.rst | 61 schedule a task on a CPU that is not allowed in its cpus_allowed 63 node that is not allowed in the requesting task's mems_allowed vector. 122  - Cpusets are sets of allowed CPUs and Memory Nodes, known to the 127    allowed in that task's cpuset. 129    those Memory Nodes allowed in that task's cpuset. 147    allowed in that task's cpuset. 149    the CPUs allowed by their cpuset, if possible. 151    Memory Nodes by what's allowed in that task's cpuset. 152  - in page_alloc.c, to restrict memory to allowed nodes. 181  - cpuset.memory_spread_page flag: if set, spread page cache evenly on allowed nodes [all …] 
 | 
| /Linux-v5.15/drivers/staging/pi433/Documentation/ | 
| D | pi433.txt | 42 Since there is only one application allowed to receive data at a time, for 78 		Allowed values: 433050000...434790000 81 		Allowed values: ##### 84 		Allowed values: 600...500000 150 		length of the preamble. Allowed values: 0...65536 152 		length of the sync word. Allowed values: 0...8 169 		Allowed values: 433050000...434790000 172 		Allowed values: ##### 175 		Allowed values: 600...500000 182 		Allowed values: 0...255
  | 
| /Linux-v5.15/Documentation/hwmon/ | 
| D | ltc2992.rst | 37 inX_min			Minimum voltage allowed. 38 inX_max			Maximum voltage allowed. 45 currX_min		Minimum current allowed. 46 currX_max		Maximum current allowed.
  | 
| /Linux-v5.15/Documentation/admin-guide/device-mapper/ | 
| D | dm-init.rst | 46 `crypt`			allowed 47 `delay`			allowed 50 `linear`		allowed 55 `snapshot-origin`	allowed 57 `striped`		allowed 61 `verity`		allowed
  | 
| /Linux-v5.15/Documentation/admin-guide/LSM/ | 
| D | Yama.rst | 26 exist and remain possible if ptrace is allowed to operate as before. 28 builders should be allowed the option to disable this debugging system. 40 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 46 so that any otherwise allowed process (even those in external pid namespaces) 64     an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior.
  | 
| /Linux-v5.15/tools/testing/selftests/wireguard/ | 
| D | netns.sh | 103 			allowed-ips 192.168.241.2/32,fd00::2/128 109 			allowed-ips 192.168.241.1/32,fd00::1/128 225 n1 wg set wg0 peer "$pub2" allowed-ips 192.168.241.0/24 233 n1 wg set wg0 peer "$more_specific_key" allowed-ips 192.168.241.2/32 245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192… 246 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips 192.168.241.1… 249 n2 wg set wg0 peer "$pub3" preshared-key <(echo "$psk") allowed-ips 192.168.241.1/32 peer "$pub1" r… 258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0… 259 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips fd00::5:1/128… 268 n1 wg set wg1 listen-port 5 private-key <(echo "$key3") peer "$pub4" allowed-ips 192.168.241.2/32,f… [all …] 
 | 
| /Linux-v5.15/arch/sh/kernel/cpu/shmobile/ | 
| D | cpuidle.c | 33 	/* convert allowed mode to allowed state */  in cpuidle_sleep_enter() 41 	 * - allowed_state: best mode allowed by hardware (clock deps)  in cpuidle_sleep_enter() 42 	 * - requested_state: best mode allowed by software (latencies)  in cpuidle_sleep_enter()
  | 
| /Linux-v5.15/drivers/net/ethernet/intel/ice/ | 
| D | ice_virtchnl_allowlist.c | 8  * - default -> should be always allowed after creating VF, 11  *   should be allowed after successful VF resources allocation, 15  * Caps that don't use new opcodes (no opcodes should be allowed): 95  * ice_vc_is_opcode_allowed - check if this opcode is allowed on this VF 99  * Return true if message is allowed on this VF
  | 
| /Linux-v5.15/arch/powerpc/include/asm/ | 
| D | tce.h | 25 #define TCE_PCI_WRITE		0x2		/* write from PCI allowed */ 26 #define TCE_PCI_READ		0x1		/* read from PCI allowed */ 27 #define TCE_VB_WRITE		0x1		/* write from VB allowed */
  | 
| /Linux-v5.15/security/selinux/ | 
| D | avc.c | 207 		rc = security_xperm_test(xpd->allowed->p, perm);  in avc_xperms_has_perm() 223 	if (xpd && xpd->allowed)  in avc_xperms_allow_perm() 224 		security_xperm_set(xpd->allowed->p, perm);  in avc_xperms_allow_perm() 232 	if (xpd->allowed)  in avc_xperms_decision_free() 233 		kmem_cache_free(avc_xperms_data_cachep, xpd->allowed);  in avc_xperms_decision_free() 261 		memcpy(dest->allowed->p, src->allowed->p,  in avc_copy_xperms_decision() 262 				sizeof(src->allowed->p));  in avc_copy_xperms_decision() 287 		dest->allowed->p[i] = src->allowed->p[i];  in avc_quick_copy_xperms_decision() 307 		xpd->allowed = kmem_cache_zalloc(avc_xperms_data_cachep,  in avc_xperms_decision_alloc() 309 		if (!xpd->allowed)  in avc_xperms_decision_alloc() [all …] 
 | 
| /Linux-v5.15/fs/affs/ | 
| D | amigaffs.h | 140 #define FIBF_NOREAD		0x0008		/* 0 means allowed */ 141 #define FIBF_NOWRITE		0x0004		/* 0 means allowed */ 142 #define FIBF_NOEXECUTE		0x0002		/* 0 means allowed, ignored under linux */ 143 #define FIBF_NODELETE		0x0001		/* 0 means allowed */
  | 
| /Linux-v5.15/tools/testing/selftests/bpf/verifier/ | 
| D | map_ptr.c | 12 	.errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 29 	.errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 44 	.errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 60 	.errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN",
  | 
| D | dead_code.c | 90 	.errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 108 	.errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 126 	.errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 142 	.errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 157 	.errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
  | 
| D | helper_access_var_len.c | 321 	.errstr = "R1 min value is outside of the allowed memory range", 326 	"helper access to variable memory: size = 0 allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)", 340 	"helper access to variable memory: size > 0 not allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)", 358 …"helper access to variable memory: size = 0 allowed on != NULL stack pointer (ARG_PTR_TO_MEM_OR_NU… 375 …"helper access to variable memory: size = 0 allowed on != NULL map pointer (ARG_PTR_TO_MEM_OR_NULL… 396 …"helper access to variable memory: size possible = 0 allowed on != NULL stack pointer (ARG_PTR_TO_… 420 …"helper access to variable memory: size possible = 0 allowed on != NULL map pointer (ARG_PTR_TO_ME… 442 …"helper access to variable memory: size possible = 0 allowed on != NULL packet pointer (ARG_PTR_TO… 466 	"helper access to variable memory: size = 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)", 479 	"helper access to variable memory: size > 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)", [all …] 
 | 
| /Linux-v5.15/drivers/net/wireless/intel/iwlwifi/fw/api/ | 
| D | time-event.h | 48  * @TE_V1_FRAG_NONE: fragmentation of the time event is NOT allowed. 49  * @TE_V1_FRAG_SINGLE: fragmentation of the time event is allowed, but only 51  * @TE_V1_FRAG_DUAL: fragmentation of the time event is allowed, but only 53  * @TE_V1_FRAG_ENDLESS: fragmentation of the time event is allowed, and any 114  * @TE_V2_FRAG_NONE: fragmentation of the time event is NOT allowed. 115  * @TE_V2_FRAG_SINGLE: fragmentation of the time event is allowed, but only 117  * @TE_V2_FRAG_DUAL: fragmentation of the time event is allowed, but only 119  * @TE_V2_FRAG_ENDLESS: fragmentation of the time event is allowed, and any 271  *	time by which start of the event is allowed to be postponed.
  | 
| /Linux-v5.15/include/dt-bindings/regulator/ | 
| D | qcom,rpmh-regulator.h | 13  *				load current is allowed.  This mode is supported 16  *				allowed.  This mode corresponds to PFM for SMPS 26  *				of the regulator is allowed.  This mode
  | 
| /Linux-v5.15/include/uapi/linux/ | 
| D | ncsi.h | 29  * @NCSI_CMD_SET_PACKAGE_MASK: set a whitelist of allowed packages. 31  * @NCSI_CMD_SET_CHANNEL_MASK: set a whitelist of allowed channels. 61  * @NCSI_ATTR_PACKAGE_MASK: 32-bit mask of allowed packages. 62  * @NCSI_ATTR_CHANNEL_MASK: 32-bit mask of allowed channels.
  | 
| /Linux-v5.15/Documentation/userspace-api/media/dvb/ | 
| D | frontend_f_open.rst | 33     Multiple opens are allowed with ``O_RDONLY``. In this mode, only 34     query and read ioctls are allowed. 36     Only one open is allowed in ``O_RDWR``. In this mode, all ioctls are 37     allowed.
  | 
| /Linux-v5.15/tools/testing/selftests/net/ | 
| D | unicast_extensions.sh | 178 segmenttest 240.1.2.1   240.1.2.4    24 "assign and ping within 240/4 (1 of 2) (is allowed)" 179 segmenttest 250.100.2.1 250.100.30.4 16 "assign and ping within 240/4 (2 of 2) (is allowed)" 182 segmenttest 0.1.2.17    0.1.2.23  24 "assign and ping within 0/8 (1 of 2) (is allowed)" 183 segmenttest 0.77.240.17 0.77.2.23 16 "assign and ping within 0/8 (2 of 2) (is allowed)" 186 segmenttest 255.255.3.1 255.255.50.77 16 "assign and ping inside 255.255/16 (is allowed)" 189 segmenttest 255.255.255.1 255.255.255.254 24 "assign and ping inside 255.255.255/24 (is allowed)" 192 ….7 240.5.6.1  255.1.2.1    255.1.2.3      24 "route between 240.5.6/24 and 255.1.2/24 (is allowed)" 193 …0.6.7 0.200.38.1 245.99.101.1 245.99.200.111 16 "route between 0.200/16 and 245.99/16 (is allowed)"
  | 
| /Linux-v5.15/tools/testing/selftests/kvm/lib/aarch64/ | 
| D | ucall.c | 39 	 * Find an address within the allowed physical and virtual address  in ucall_init() 46 	 * of the allowed space are unmapped and then work both down and  in ucall_init() 47 	 * up from there in 1/16th allowed space sized steps.  in ucall_init() 49 	 * Note, we need to use VA-bits - 1 when calculating the allowed  in ucall_init()
  |