/Linux-v6.6/drivers/power/supply/ |
D | 88pm860x_charger.c | 109 unsigned allowed:1; member 315 "Allowed:%d\n", in set_charging_fsm() 318 (info->present) ? "present" : "N/A", info->allowed); in set_charging_fsm() 323 if (info->online && info->present && info->allowed) { in set_charging_fsm() 344 if (info->online && info->present && info->allowed) { in set_charging_fsm() 355 if (info->online && info->present && info->allowed) { in set_charging_fsm() 366 if (info->online && info->present && info->allowed) { in set_charging_fsm() 387 "Out FSM:%s, Charger:%s, Battery:%s, Allowed:%d\n", in set_charging_fsm() 390 (info->present) ? "present" : "N/A", info->allowed); in set_charging_fsm() 409 info->allowed = 1; in pm860x_charger_handler() [all …]
|
/Linux-v6.6/Documentation/devicetree/bindings/regulator/ |
D | mt6360-regulator.yaml | 52 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 60 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 68 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 75 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 82 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 89 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 96 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 103 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
D | richtek,rtq2208.yaml | 16 Bucks support "regulator-allowed-modes" and "regulator-mode". The former defines the permitted 63 regulator-allowed-modes: 102 regulator-allowed-modes = <0 1>; 112 regulator-allowed-modes = <0 1>; 122 regulator-allowed-modes = <0 1>; 132 regulator-allowed-modes = <0 1>; 142 regulator-allowed-modes = <0 1>; 152 regulator-allowed-modes = <0 1>; 162 regulator-allowed-modes = <0 1>; 172 regulator-allowed-modes = <0 1>;
|
D | active-semi,act8945a.yaml | 145 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 163 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 177 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_FIXED>, 191 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>, 205 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>, 219 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>, 233 regulator-allowed-modes = <ACT8945A_REGULATOR_MODE_NORMAL>,
|
/Linux-v6.6/Documentation/admin-guide/mm/ |
D | numa_memory_policy.rst | 251 MPOL_PREFERRED allowed for a mask rather than a single node. 257 the user should not be remapped if the task or VMA's set of allowed 261 change in the set of allowed nodes, the preferred nodemask (Preferred 263 remapped to the new set of allowed nodes. This may result in nodes 267 nodes allowed by the task's cpuset, then the memory policy is 275 3 is allowed from the user's nodemask, the "interleave" only 277 now allowed, the Default behavior is used. 287 set of allowed nodes. The kernel stores the user-passed nodemask, 288 and if the allowed nodes changes, then that original nodemask will 289 be remapped relative to the new set of allowed nodes. [all …]
|
/Linux-v6.6/security/ |
D | security.c | 167 /* Is an LSM allowed to be initialized? */ 174 /* Not allowed if another exclusive LSM already initialized. */ in lsm_allowed() 794 * Check whether @mgr is allowed to be the binder context manager. 804 * security_binder_transaction() - Check if a binder transaction is allowed 808 * Check whether @from is allowed to invoke a binder transaction call to @to. 819 * security_binder_transfer_binder() - Check if a binder transfer is allowed 823 * Check whether @from is allowed to transfer a binder reference to @to. 834 * security_binder_transfer_file() - Check if a binder file xfer is allowed 839 * Check whether @from is allowed to transfer @file to @to. 850 * security_ptrace_access_check() - Check if tracing is allowed [all …]
|
/Linux-v6.6/Documentation/devicetree/bindings/mfd/ |
D | mediatek,mt6360.yaml | 150 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 158 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 166 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 173 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 180 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 187 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 194 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 201 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
D | richtek,rt5120.yaml | 74 regulator-allowed-modes: 76 Used to specify the allowed buck converter operating mode 137 regulator-allowed-modes = <0 1>; 144 regulator-allowed-modes = <0 1>; 151 regulator-allowed-modes = <0 1>; 158 regulator-allowed-modes = <0 1>;
|
/Linux-v6.6/include/uapi/linux/ |
D | iommufd.h | 102 * Query an IOAS for ranges of allowed IOVAs. Mapping IOVA outside these ranges 103 * is not allowed. num_iovas will be set to the total number of iovas and 106 * The allowed ranges are dependent on the HW path the DMA operation takes, and 124 * out_iova_alignment can be 1 indicating any IOVA is allowed. It cannot 152 * When an allowed range is specified any narrowing will be refused, ie device 153 * attachment can fail if the device requires limiting within the allowed range. 156 * allocate within the allowed IOVAs if they are present. 158 * This call replaces the entire allowed list with the given list. 173 * @IOMMU_IOAS_MAP_WRITEABLE: DMA is allowed to write to this mapping 174 * @IOMMU_IOAS_MAP_READABLE: DMA is allowed to read from this mapping [all …]
|
/Linux-v6.6/Documentation/admin-guide/cgroup-v1/ |
D | cpusets.rst | 61 schedule a task on a CPU that is not allowed in its cpus_allowed 63 node that is not allowed in the requesting task's mems_allowed vector. 122 - Cpusets are sets of allowed CPUs and Memory Nodes, known to the 127 allowed in that task's cpuset. 129 those Memory Nodes allowed in that task's cpuset. 147 allowed in that task's cpuset. 149 the CPUs allowed by their cpuset, if possible. 151 Memory Nodes by what's allowed in that task's cpuset. 152 - in page_alloc.c, to restrict memory to allowed nodes. 181 - cpuset.memory_spread_page flag: if set, spread page cache evenly on allowed nodes [all …]
|
/Linux-v6.6/arch/arm64/boot/dts/qcom/ |
D | sa8775p-ride.dts | 67 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 77 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 87 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 97 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 107 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 117 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 132 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 142 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 152 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM 174 regulator-allowed-modes = <RPMH_REGULATOR_MODE_LPM [all …]
|
/Linux-v6.6/drivers/staging/pi433/Documentation/ |
D | pi433.txt | 42 Since there is only one application allowed to receive data at a time, for 78 Allowed values: 433050000...434790000 81 Allowed values: ##### 84 Allowed values: 600...500000 150 length of the preamble. Allowed values: 0...65536 152 length of the sync word. Allowed values: 0...8 169 Allowed values: 433050000...434790000 172 Allowed values: ##### 175 Allowed values: 600...500000 182 Allowed values: 0...255
|
/Linux-v6.6/Documentation/hwmon/ |
D | ltc2992.rst | 37 inX_min Minimum voltage allowed. 38 inX_max Maximum voltage allowed. 45 currX_min Minimum current allowed. 46 currX_max Maximum current allowed.
|
/Linux-v6.6/security/selinux/ |
D | avc.c | 205 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm() 221 if (xpd && xpd->allowed) in avc_xperms_allow_perm() 222 security_xperm_set(xpd->allowed->p, perm); in avc_xperms_allow_perm() 230 if (xpd->allowed) in avc_xperms_decision_free() 231 kmem_cache_free(avc_xperms_data_cachep, xpd->allowed); in avc_xperms_decision_free() 259 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision() 260 sizeof(src->allowed->p)); in avc_copy_xperms_decision() 285 dest->allowed->p[i] = src->allowed->p[i]; in avc_quick_copy_xperms_decision() 305 xpd->allowed = kmem_cache_zalloc(avc_xperms_data_cachep, in avc_xperms_decision_alloc() 307 if (!xpd->allowed) in avc_xperms_decision_alloc() [all …]
|
/Linux-v6.6/Documentation/admin-guide/LSM/ |
D | Yama.rst | 26 exist and remain possible if ptrace is allowed to operate as before. 28 builders should be allowed the option to disable this debugging system. 40 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 46 so that any otherwise allowed process (even those in external pid namespaces) 64 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior.
|
/Linux-v6.6/Documentation/devicetree/bindings/net/ |
D | mediatek-dwmac.yaml | 79 For MT2712 RGMII interface, Allowed value need to be a multiple of 170, 81 For MT2712 RMII/MII interface, Allowed value need to be a multiple of 550, 83 For MT8188/MT8195 RGMII/RMII/MII interface, Allowed value need to be a multiple of 290, 89 For MT2712 RGMII interface, Allowed value need to be a multiple of 170, 91 For MT2712 RMII/MII interface, Allowed value need to be a multiple of 550, 93 For MT8188/MT8195 RGMII/RMII/MII interface, Allowed value need to be a multiple
|
/Linux-v6.6/Documentation/admin-guide/device-mapper/ |
D | dm-init.rst | 46 `crypt` allowed 47 `delay` allowed 50 `linear` allowed 55 `snapshot-origin` allowed 57 `striped` allowed 61 `verity` allowed
|
/Linux-v6.6/tools/testing/selftests/bpf/progs/ |
D | verifier_helper_access_var_len.c | 88 * ARG_CONST_SIZE_OR_ZERO parameter allowed in unpriv mode.\ in stack_bitwise_and_zero_included() 281 * ARG_CONST_SIZE_OR_ZERO parameter allowed in unpriv mode.\ in stack_jmp_no_min_check() 417 __failure __msg("R1 min value is outside of the allowed memory range") 450 __description("helper access to variable memory: size = 0 allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)") 468 __description("helper access to variable memory: size > 0 not allowed on NULL (ARG_PTR_TO_MEM_OR_NU… 489 __description("helper access to variable memory: size = 0 allowed on != NULL stack pointer (ARG_PTR… 510 __description("helper access to variable memory: size = 0 allowed on != NULL map pointer (ARG_PTR_T… 537 __description("helper access to variable memory: size possible = 0 allowed on != NULL stack pointer… 567 __description("helper access to variable memory: size possible = 0 allowed on != NULL map pointer (… 595 __description("helper access to variable memory: size possible = 0 allowed on != NULL packet pointe… [all …]
|
/Linux-v6.6/arch/sh/kernel/cpu/shmobile/ |
D | cpuidle.c | 33 /* convert allowed mode to allowed state */ in cpuidle_sleep_enter() 41 * - allowed_state: best mode allowed by hardware (clock deps) in cpuidle_sleep_enter() 42 * - requested_state: best mode allowed by software (latencies) in cpuidle_sleep_enter()
|
/Linux-v6.6/Documentation/ABI/testing/ |
D | debugfs-scmi | 42 Description: Timeout in milliseconds allowed for SCMI synchronous replies 50 Description: Max message size of allowed SCMI messages for the currently 58 Description: Max number of concurrently allowed in-flight SCMI messages for 67 Description: Max number of concurrently allowed in-flight SCMI messages for
|
/Linux-v6.6/tools/testing/selftests/wireguard/ |
D | netns.sh | 105 allowed-ips 192.168.241.2/32,fd00::2/128 111 allowed-ips 192.168.241.1/32,fd00::1/128 225 n1 wg set wg0 peer "$pub2" allowed-ips 192.168.241.0/24 233 n1 wg set wg0 peer "$more_specific_key" allowed-ips 192.168.241.2/32 245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192… 246 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips 192.168.241.1… 249 n2 wg set wg0 peer "$pub3" preshared-key <(echo "$psk") allowed-ips 192.168.241.1/32 peer "$pub1" r… 258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0… 259 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips fd00::5:1/128… 268 n1 wg set wg1 listen-port 5 private-key <(echo "$key3") peer "$pub4" allowed-ips 192.168.241.2/32,f… [all …]
|
/Linux-v6.6/drivers/net/ethernet/intel/ice/ |
D | ice_virtchnl_allowlist.c | 8 * - default -> should be always allowed after creating VF, 11 * should be allowed after successful VF resources allocation, 15 * Caps that don't use new opcodes (no opcodes should be allowed): 111 * ice_vc_is_opcode_allowed - check if this opcode is allowed on this VF 115 * Return true if message is allowed on this VF
|
/Linux-v6.6/drivers/iommu/iommufd/ |
D | ioas.c | 120 struct iopt_allowed *allowed; in iommufd_ioas_load_iovas() local 131 allowed = kzalloc(sizeof(*allowed), GFP_KERNEL_ACCOUNT); in iommufd_ioas_load_iovas() 132 if (!allowed) in iommufd_ioas_load_iovas() 134 allowed->node.start = range.start; in iommufd_ioas_load_iovas() 135 allowed->node.last = range.last; in iommufd_ioas_load_iovas() 137 interval_tree_insert(&allowed->node, itree); in iommufd_ioas_load_iovas() 166 * We want the allowed tree update to be atomic, so we have to keep the in iommufd_ioas_allow_iovas()
|
/Linux-v6.6/drivers/gpu/drm/ |
D | drm_vma_manager.c | 63 * management. For every open-file context that is allowed to access a given 294 * drm_vma_node_allow - Add open-file to list of allowed users 298 * Add @tag to the list of allowed open-files for this node. If @tag is 301 * The list of allowed-users is preserved across drm_vma_offset_add() and 320 * drm_vma_node_allow_once - Add open-file to list of allowed users 324 * Add @tag to the list of allowed open-files for this node. 326 * The list of allowed-users is preserved across drm_vma_offset_add() and 345 * drm_vma_node_revoke - Remove open-file from list of allowed users 349 * Decrement the ref-count of @tag in the list of allowed open-files on @node. 390 * Search the list in @node whether @tag is currently on the list of allowed
|
/Linux-v6.6/arch/powerpc/include/asm/ |
D | tce.h | 25 #define TCE_PCI_WRITE 0x2 /* write from PCI allowed */ 26 #define TCE_PCI_READ 0x1 /* read from PCI allowed */ 27 #define TCE_VB_WRITE 0x1 /* write from VB allowed */
|