/Linux-v5.15/drivers/power/supply/ |
D | 88pm860x_charger.c | 109 unsigned allowed:1; member 315 "Allowed:%d\n", in set_charging_fsm() 318 (info->present) ? "present" : "N/A", info->allowed); in set_charging_fsm() 323 if (info->online && info->present && info->allowed) { in set_charging_fsm() 344 if (info->online && info->present && info->allowed) { in set_charging_fsm() 355 if (info->online && info->present && info->allowed) { in set_charging_fsm() 366 if (info->online && info->present && info->allowed) { in set_charging_fsm() 387 "Out FSM:%s, Charger:%s, Battery:%s, Allowed:%d\n", in set_charging_fsm() 390 (info->present) ? "present" : "N/A", info->allowed); in set_charging_fsm() 409 info->allowed = 1; in pm860x_charger_handler() [all …]
|
/Linux-v5.15/Documentation/devicetree/bindings/regulator/ |
D | mt6360-regulator.yaml | 51 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 60 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 69 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 77 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 85 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 93 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 101 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 109 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
D | act8945a-regulator.txt | 18 regulator-initial-mode, regulator-allowed-modes and regulator-mode could be 42 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 61 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 83 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
|
D | mcp16502-regulator.txt | 42 regulator-allowed-modes = <2>, <4>; 61 regulator-allowed-modes = <2>, <4>; 80 regulator-allowed-modes = <2>, <4>; 99 regulator-allowed-modes = <2>, <4>;
|
/Linux-v5.15/Documentation/admin-guide/mm/ |
D | numa_memory_policy.rst | 253 MPOL_PREFERRED allowed for a mask rather than a single node. 259 the user should not be remapped if the task or VMA's set of allowed 263 change in the set of allowed nodes, the preferred nodemask (Preferred 265 remapped to the new set of allowed nodes. This may result in nodes 269 nodes allowed by the task's cpuset, then the memory policy is 277 3 is allowed from the user's nodemask, the "interleave" only 279 now allowed, the Default behavior is used. 289 set of allowed nodes. The kernel stores the user-passed nodemask, 290 and if the allowed nodes changes, then that original nodemask will 291 be remapped relative to the new set of allowed nodes. [all …]
|
/Linux-v5.15/Documentation/admin-guide/cgroup-v1/ |
D | cpusets.rst | 61 schedule a task on a CPU that is not allowed in its cpus_allowed 63 node that is not allowed in the requesting task's mems_allowed vector. 122 - Cpusets are sets of allowed CPUs and Memory Nodes, known to the 127 allowed in that task's cpuset. 129 those Memory Nodes allowed in that task's cpuset. 147 allowed in that task's cpuset. 149 the CPUs allowed by their cpuset, if possible. 151 Memory Nodes by what's allowed in that task's cpuset. 152 - in page_alloc.c, to restrict memory to allowed nodes. 181 - cpuset.memory_spread_page flag: if set, spread page cache evenly on allowed nodes [all …]
|
/Linux-v5.15/drivers/staging/pi433/Documentation/ |
D | pi433.txt | 42 Since there is only one application allowed to receive data at a time, for 78 Allowed values: 433050000...434790000 81 Allowed values: ##### 84 Allowed values: 600...500000 150 length of the preamble. Allowed values: 0...65536 152 length of the sync word. Allowed values: 0...8 169 Allowed values: 433050000...434790000 172 Allowed values: ##### 175 Allowed values: 600...500000 182 Allowed values: 0...255
|
/Linux-v5.15/Documentation/hwmon/ |
D | ltc2992.rst | 37 inX_min Minimum voltage allowed. 38 inX_max Maximum voltage allowed. 45 currX_min Minimum current allowed. 46 currX_max Maximum current allowed.
|
/Linux-v5.15/Documentation/admin-guide/device-mapper/ |
D | dm-init.rst | 46 `crypt` allowed 47 `delay` allowed 50 `linear` allowed 55 `snapshot-origin` allowed 57 `striped` allowed 61 `verity` allowed
|
/Linux-v5.15/Documentation/admin-guide/LSM/ |
D | Yama.rst | 26 exist and remain possible if ptrace is allowed to operate as before. 28 builders should be allowed the option to disable this debugging system. 40 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 46 so that any otherwise allowed process (even those in external pid namespaces) 64 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior.
|
/Linux-v5.15/tools/testing/selftests/wireguard/ |
D | netns.sh | 103 allowed-ips 192.168.241.2/32,fd00::2/128 109 allowed-ips 192.168.241.1/32,fd00::1/128 225 n1 wg set wg0 peer "$pub2" allowed-ips 192.168.241.0/24 233 n1 wg set wg0 peer "$more_specific_key" allowed-ips 192.168.241.2/32 245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192… 246 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips 192.168.241.1… 249 n2 wg set wg0 peer "$pub3" preshared-key <(echo "$psk") allowed-ips 192.168.241.1/32 peer "$pub1" r… 258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0… 259 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips fd00::5:1/128… 268 n1 wg set wg1 listen-port 5 private-key <(echo "$key3") peer "$pub4" allowed-ips 192.168.241.2/32,f… [all …]
|
/Linux-v5.15/arch/sh/kernel/cpu/shmobile/ |
D | cpuidle.c | 33 /* convert allowed mode to allowed state */ in cpuidle_sleep_enter() 41 * - allowed_state: best mode allowed by hardware (clock deps) in cpuidle_sleep_enter() 42 * - requested_state: best mode allowed by software (latencies) in cpuidle_sleep_enter()
|
/Linux-v5.15/drivers/net/ethernet/intel/ice/ |
D | ice_virtchnl_allowlist.c | 8 * - default -> should be always allowed after creating VF, 11 * should be allowed after successful VF resources allocation, 15 * Caps that don't use new opcodes (no opcodes should be allowed): 95 * ice_vc_is_opcode_allowed - check if this opcode is allowed on this VF 99 * Return true if message is allowed on this VF
|
/Linux-v5.15/arch/powerpc/include/asm/ |
D | tce.h | 25 #define TCE_PCI_WRITE 0x2 /* write from PCI allowed */ 26 #define TCE_PCI_READ 0x1 /* read from PCI allowed */ 27 #define TCE_VB_WRITE 0x1 /* write from VB allowed */
|
/Linux-v5.15/security/selinux/ |
D | avc.c | 207 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm() 223 if (xpd && xpd->allowed) in avc_xperms_allow_perm() 224 security_xperm_set(xpd->allowed->p, perm); in avc_xperms_allow_perm() 232 if (xpd->allowed) in avc_xperms_decision_free() 233 kmem_cache_free(avc_xperms_data_cachep, xpd->allowed); in avc_xperms_decision_free() 261 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision() 262 sizeof(src->allowed->p)); in avc_copy_xperms_decision() 287 dest->allowed->p[i] = src->allowed->p[i]; in avc_quick_copy_xperms_decision() 307 xpd->allowed = kmem_cache_zalloc(avc_xperms_data_cachep, in avc_xperms_decision_alloc() 309 if (!xpd->allowed) in avc_xperms_decision_alloc() [all …]
|
/Linux-v5.15/fs/affs/ |
D | amigaffs.h | 140 #define FIBF_NOREAD 0x0008 /* 0 means allowed */ 141 #define FIBF_NOWRITE 0x0004 /* 0 means allowed */ 142 #define FIBF_NOEXECUTE 0x0002 /* 0 means allowed, ignored under linux */ 143 #define FIBF_NODELETE 0x0001 /* 0 means allowed */
|
/Linux-v5.15/tools/testing/selftests/bpf/verifier/ |
D | map_ptr.c | 12 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 29 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 44 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 60 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN",
|
D | dead_code.c | 90 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 108 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 126 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 142 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 157 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
|
D | helper_access_var_len.c | 321 .errstr = "R1 min value is outside of the allowed memory range", 326 "helper access to variable memory: size = 0 allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)", 340 "helper access to variable memory: size > 0 not allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)", 358 …"helper access to variable memory: size = 0 allowed on != NULL stack pointer (ARG_PTR_TO_MEM_OR_NU… 375 …"helper access to variable memory: size = 0 allowed on != NULL map pointer (ARG_PTR_TO_MEM_OR_NULL… 396 …"helper access to variable memory: size possible = 0 allowed on != NULL stack pointer (ARG_PTR_TO_… 420 …"helper access to variable memory: size possible = 0 allowed on != NULL map pointer (ARG_PTR_TO_ME… 442 …"helper access to variable memory: size possible = 0 allowed on != NULL packet pointer (ARG_PTR_TO… 466 "helper access to variable memory: size = 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)", 479 "helper access to variable memory: size > 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)", [all …]
|
/Linux-v5.15/drivers/net/wireless/intel/iwlwifi/fw/api/ |
D | time-event.h | 48 * @TE_V1_FRAG_NONE: fragmentation of the time event is NOT allowed. 49 * @TE_V1_FRAG_SINGLE: fragmentation of the time event is allowed, but only 51 * @TE_V1_FRAG_DUAL: fragmentation of the time event is allowed, but only 53 * @TE_V1_FRAG_ENDLESS: fragmentation of the time event is allowed, and any 114 * @TE_V2_FRAG_NONE: fragmentation of the time event is NOT allowed. 115 * @TE_V2_FRAG_SINGLE: fragmentation of the time event is allowed, but only 117 * @TE_V2_FRAG_DUAL: fragmentation of the time event is allowed, but only 119 * @TE_V2_FRAG_ENDLESS: fragmentation of the time event is allowed, and any 271 * time by which start of the event is allowed to be postponed.
|
/Linux-v5.15/include/dt-bindings/regulator/ |
D | qcom,rpmh-regulator.h | 13 * load current is allowed. This mode is supported 16 * allowed. This mode corresponds to PFM for SMPS 26 * of the regulator is allowed. This mode
|
/Linux-v5.15/include/uapi/linux/ |
D | ncsi.h | 29 * @NCSI_CMD_SET_PACKAGE_MASK: set a whitelist of allowed packages. 31 * @NCSI_CMD_SET_CHANNEL_MASK: set a whitelist of allowed channels. 61 * @NCSI_ATTR_PACKAGE_MASK: 32-bit mask of allowed packages. 62 * @NCSI_ATTR_CHANNEL_MASK: 32-bit mask of allowed channels.
|
/Linux-v5.15/Documentation/userspace-api/media/dvb/ |
D | frontend_f_open.rst | 33 Multiple opens are allowed with ``O_RDONLY``. In this mode, only 34 query and read ioctls are allowed. 36 Only one open is allowed in ``O_RDWR``. In this mode, all ioctls are 37 allowed.
|
/Linux-v5.15/tools/testing/selftests/net/ |
D | unicast_extensions.sh | 178 segmenttest 240.1.2.1 240.1.2.4 24 "assign and ping within 240/4 (1 of 2) (is allowed)" 179 segmenttest 250.100.2.1 250.100.30.4 16 "assign and ping within 240/4 (2 of 2) (is allowed)" 182 segmenttest 0.1.2.17 0.1.2.23 24 "assign and ping within 0/8 (1 of 2) (is allowed)" 183 segmenttest 0.77.240.17 0.77.2.23 16 "assign and ping within 0/8 (2 of 2) (is allowed)" 186 segmenttest 255.255.3.1 255.255.50.77 16 "assign and ping inside 255.255/16 (is allowed)" 189 segmenttest 255.255.255.1 255.255.255.254 24 "assign and ping inside 255.255.255/24 (is allowed)" 192 ….7 240.5.6.1 255.1.2.1 255.1.2.3 24 "route between 240.5.6/24 and 255.1.2/24 (is allowed)" 193 …0.6.7 0.200.38.1 245.99.101.1 245.99.200.111 16 "route between 0.200/16 and 245.99/16 (is allowed)"
|
/Linux-v5.15/tools/testing/selftests/kvm/lib/aarch64/ |
D | ucall.c | 39 * Find an address within the allowed physical and virtual address in ucall_init() 46 * of the allowed space are unmapped and then work both down and in ucall_init() 47 * up from there in 1/16th allowed space sized steps. in ucall_init() 49 * Note, we need to use VA-bits - 1 when calculating the allowed in ucall_init()
|