| /OK3568_Linux_fs/kernel/drivers/power/supply/ |
| H A D | 88pm860x_charger.c | 109 unsigned allowed:1; member 315 "Allowed:%d\n", in set_charging_fsm() 318 (info->present) ? "present" : "N/A", info->allowed); in set_charging_fsm() 323 if (info->online && info->present && info->allowed) { in set_charging_fsm() 344 if (info->online && info->present && info->allowed) { in set_charging_fsm() 355 if (info->online && info->present && info->allowed) { in set_charging_fsm() 366 if (info->online && info->present && info->allowed) { in set_charging_fsm() 387 "Out FSM:%s, Charger:%s, Battery:%s, Allowed:%d\n", in set_charging_fsm() 390 (info->present) ? "present" : "N/A", info->allowed); in set_charging_fsm() 409 info->allowed = 1; in pm860x_charger_handler() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/regulator/ |
| H A D | mt6360-regulator.yaml | 51 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 60 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 69 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 77 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 85 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 93 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 101 regulator-allowed-modes = <MT6360_OPMODE_NORMAL 109 regulator-allowed-modes = <MT6360_OPMODE_NORMAL
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/mm/ |
| H A D | numa_memory_policy.rst | 252 the user should not be remapped if the task or VMA's set of allowed 256 change in the set of allowed nodes, the node (Preferred) or 258 allowed nodes. This may result in nodes being used that were 262 nodes allowed by the task's cpuset, then the memory policy is 270 3 is allowed from the user's nodemask, the "interleave" only 272 now allowed, the Default behavior is used. 282 set of allowed nodes. The kernel stores the user-passed nodemask, 283 and if the allowed nodes changes, then that original nodemask will 284 be remapped relative to the new set of allowed nodes. 287 mempolicy is rebound because of a change in the set of allowed [all …]
|
| /OK3568_Linux_fs/kernel/include/uapi/gpu/arm/bifrost/csf/ |
| H A D | mali_kbase_csf_ioctl.h | 220 * @in.tiler_mask: Mask of tiler endpoints the group is allowed to use. 221 * @in.fragment_mask: Mask of fragment endpoints the group is allowed to use. 222 * @in.compute_mask: Mask of compute endpoints the group is allowed to use. 225 * @in.tiler_max: Maximum number of tiler endpoints the group is allowed 228 * allowed to use. 229 * @in.compute_max: Maximum number of compute endpoints the group is allowed 263 * @in.tiler_mask: Mask of tiler endpoints the group is allowed to use. 264 * @in.fragment_mask: Mask of fragment endpoints the group is allowed to use. 265 * @in.compute_mask: Mask of compute endpoints the group is allowed to use. 268 * @in.tiler_max: Maximum number of tiler endpoints the group is allowed [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cgroup-v1/ |
| H A D | cpusets.rst | 61 schedule a task on a CPU that is not allowed in its cpus_allowed 63 node that is not allowed in the requesting task's mems_allowed vector. 122 - Cpusets are sets of allowed CPUs and Memory Nodes, known to the 127 allowed in that task's cpuset. 129 those Memory Nodes allowed in that task's cpuset. 147 allowed in that task's cpuset. 149 the CPUs allowed by their cpuset, if possible. 151 Memory Nodes by what's allowed in that task's cpuset. 152 - in page_alloc.c, to restrict memory to allowed nodes. 181 - cpuset.memory_spread_page flag: if set, spread page cache evenly on allowed nodes [all …]
|
| /OK3568_Linux_fs/external/xserver/hw/xfree86/ |
| H A D | xorg-wrapper.c | 83 static void parse_config(int *allowed, int *needs_root_rights) in parse_config() argument 126 *allowed = ROOT_ONLY; in parse_config() 128 *allowed = CONSOLE_ONLY; in parse_config() 130 *allowed = ANYBODY; in parse_config() 201 int allowed = CONSOLE_ONLY; in main() local 207 parse_config(&allowed, &needs_root_rights); in main() 209 /* For non root users check if they are allowed to run the X server */ in main() 211 switch (allowed) { in main() 214 fprintf(stderr, "%s: Only root is allowed to run the X server\n", argv[0]); in main() 224 … fprintf(stderr, "%s: Only console users are allowed to run the X server\n", argv[0]); in main()
|
| /OK3568_Linux_fs/kernel/drivers/staging/pi433/Documentation/ |
| H A D | pi433.txt | 42 Since there is only one application allowed to receive data at a time, for 78 Allowed values: 433050000...434790000 81 Allowed values: ##### 84 Allowed values: 600...500000 150 length of the preamble. Allowed values: 0...65536 152 length of the sync word. Allowed values: 0...8 169 Allowed values: 433050000...434790000 172 Allowed values: ##### 175 Allowed values: 600...500000 182 Allowed values: 0...255
|
| /OK3568_Linux_fs/external/xserver/Xext/ |
| H A D | security.c | 74 * Access modes that untrusted clients are allowed on trusted objects. 118 Mask requested, Mask allowed) in SecurityDoCheck() argument 126 if ((requested | allowed) == allowed) in SecurityDoCheck() 688 * TRUE if the device access should be allowed, else FALSE. 700 Mask allowed = SecurityDeviceMask; in SecurityDevice() local 707 allowed = requested; in SecurityDevice() 709 if (SecurityDoCheck(subj, obj, requested, allowed) != Success) { in SecurityDevice() 745 Mask allowed = SecurityResourceMask; in SecurityResource() local 756 allowed |= SecurityWindowExtraMask; in SecurityResource() 761 /* additional operations allowed on root windows */ in SecurityResource() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/wireguard/ |
| H A D | netns.sh | 103 allowed-ips 192.168.241.2/32,fd00::2/128 109 allowed-ips 192.168.241.1/32,fd00::1/128 225 n1 wg set wg0 peer "$pub2" allowed-ips 192.168.241.0/24 233 n1 wg set wg0 peer "$more_specific_key" allowed-ips 192.168.241.2/32 245 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips 192… 246 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips 192.168.241.1… 249 n2 wg set wg0 peer "$pub3" preshared-key <(echo "$psk") allowed-ips 192.168.241.1/32 peer "$pub1" r… 258 n1 wg set wg0 private-key <(echo "$key1") peer "$pub2" preshared-key <(echo "$psk") allowed-ips fd0… 259 … <(echo "$key2") listen-port 2 peer "$pub1" preshared-key <(echo "$psk") allowed-ips fd00::5:1/128… 268 n1 wg set wg1 listen-port 5 private-key <(echo "$key3") peer "$pub4" allowed-ips 192.168.241.2/32,f… [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/device-mapper/ |
| H A D | dm-init.rst | 46 `crypt` allowed 47 `delay` allowed 50 `linear` allowed 55 `snapshot-origin` allowed 57 `striped` allowed 61 `verity` allowed
|
| /OK3568_Linux_fs/kernel/security/selinux/ |
| H A D | avc.c | 210 rc = security_xperm_test(xpd->allowed->p, perm); in avc_xperms_has_perm() 226 if (xpd && xpd->allowed) in avc_xperms_allow_perm() 227 security_xperm_set(xpd->allowed->p, perm); in avc_xperms_allow_perm() 235 if (xpd->allowed) in avc_xperms_decision_free() 236 kmem_cache_free(avc_xperms_data_cachep, xpd->allowed); in avc_xperms_decision_free() 264 memcpy(dest->allowed->p, src->allowed->p, in avc_copy_xperms_decision() 265 sizeof(src->allowed->p)); in avc_copy_xperms_decision() 290 dest->allowed->p[i] = src->allowed->p[i]; in avc_quick_copy_xperms_decision() 310 xpd->allowed = kmem_cache_zalloc(avc_xperms_data_cachep, in avc_xperms_decision_alloc() 312 if (!xpd->allowed) in avc_xperms_decision_alloc() [all …]
|
| /OK3568_Linux_fs/u-boot/doc/device-tree-bindings/regulator/ |
| H A D | sandbox.txt | 22 - regulator-min-microvolt: minimum allowed Voltage to set 23 - regulator-max-microvolt: minimum allowed Voltage to set 24 - regulator-min-microamps: minimum allowed Current limit to set (LDO1/BUCK1) 25 - regulator-max-microamps: minimum allowed Current limit to set (LDO1/BUCK1)
|
| H A D | regulator.txt | 32 - regulator-min-microvolt: a minimum allowed Voltage value 33 - regulator-max-microvolt: a maximum allowed Voltage value 34 - regulator-min-microamp: a minimum allowed Current value 35 - regulator-max-microamp: a maximum allowed Current value
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/ |
| H A D | Yama.rst | 26 exist and remain possible if ptrace is allowed to operate as before. 28 builders should be allowed the option to disable this debugging system. 40 other process (and its descendants) are allowed to call ``PTRACE_ATTACH`` 46 so that any otherwise allowed process (even those in external pid namespaces) 64 an allowed debugger PID to call ``PTRACE_ATTACH`` on the inferior.
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/verifier/ |
| H A D | helper_access_var_len.c | 321 .errstr = "R1 min value is outside of the allowed memory range", 326 "helper access to variable memory: size = 0 allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)", 340 "helper access to variable memory: size > 0 not allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)", 358 …"helper access to variable memory: size = 0 allowed on != NULL stack pointer (ARG_PTR_TO_MEM_OR_NU… 375 …"helper access to variable memory: size = 0 allowed on != NULL map pointer (ARG_PTR_TO_MEM_OR_NULL… 396 …"helper access to variable memory: size possible = 0 allowed on != NULL stack pointer (ARG_PTR_TO_… 420 …"helper access to variable memory: size possible = 0 allowed on != NULL map pointer (ARG_PTR_TO_ME… 442 …"helper access to variable memory: size possible = 0 allowed on != NULL packet pointer (ARG_PTR_TO… 466 "helper access to variable memory: size = 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)", 479 "helper access to variable memory: size > 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)", [all …]
|
| H A D | dead_code.c | 90 .errstr_unpriv = "function calls to other bpf functions are allowed for", 108 .errstr_unpriv = "function calls to other bpf functions are allowed for", 126 .errstr_unpriv = "function calls to other bpf functions are allowed for", 142 .errstr_unpriv = "function calls to other bpf functions are allowed for", 157 .errstr_unpriv = "function calls to other bpf functions are allowed for",
|
| H A D | map_ptr.c | 12 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 29 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 44 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN", 59 .errstr_unpriv = "bpf_array access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN",
|
| /OK3568_Linux_fs/kernel/arch/sh/kernel/cpu/shmobile/ |
| H A D | cpuidle.c | 33 /* convert allowed mode to allowed state */ in cpuidle_sleep_enter() 41 * - allowed_state: best mode allowed by hardware (clock deps) in cpuidle_sleep_enter() 42 * - requested_state: best mode allowed by software (latencies) in cpuidle_sleep_enter()
|
| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | LPPL-1.0 | 9 of this license document, but modification is not allowed. 95 Redistribution of unchanged files is allowed provided that all files 107 The Program, and the reuse of code from The Program, are allowed 110 * It is allowed only if the legal notice in the file does not 152 files are allowed to be modified without changing the name, but 155 allowed to be distributed in place of original files. 206 extent of *modification* that is allowed.
|
| /OK3568_Linux_fs/kernel/arch/mips/kvm/ |
| H A D | interrupt.c | 81 int allowed = 0; in kvm_mips_irq_deliver_cb() local 94 allowed = 1; in kvm_mips_irq_deliver_cb() 98 /* Are we allowed to deliver the interrupt ??? */ in kvm_mips_irq_deliver_cb() 99 if (allowed) { in kvm_mips_irq_deliver_cb() 128 return allowed; in kvm_mips_irq_deliver_cb()
|
| /OK3568_Linux_fs/kernel/fs/affs/ |
| H A D | amigaffs.h | 140 #define FIBF_NOREAD 0x0008 /* 0 means allowed */ 141 #define FIBF_NOWRITE 0x0004 /* 0 means allowed */ 142 #define FIBF_NOEXECUTE 0x0002 /* 0 means allowed, ignored under linux */ 143 #define FIBF_NODELETE 0x0001 /* 0 means allowed */
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/tinyproxy/tinyproxy/ |
| H A D | tinyproxy.conf | 47 # allowed to have before it is closed by tinyproxy. 107 # Set the logging level. Allowed settings are: 264 # to deny everything which is _not_ specifically allowed by the filter 271 # is enabled. The headers listed are allowed through, while all others 273 # allowed through. You must include quotes around the headers. 283 # ConnectPort: This is a list of ports allowed by tinyproxy when the 286 # allowed (which is not very secure.)
|
| /OK3568_Linux_fs/kernel/arch/arm64/boot/dts/mediatek/ |
| H A D | mt6358.dtsi | 28 regulator-allowed-modes = <0 1>; 38 regulator-allowed-modes = <0 1>; 47 regulator-allowed-modes = <0 1>; 57 regulator-allowed-modes = <0 1>; 67 regulator-allowed-modes = <0 1>; 76 regulator-allowed-modes = <0 1>; 95 regulator-allowed-modes = <0 1>;
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | ncsi.h | 29 * @NCSI_CMD_SET_PACKAGE_MASK: set a whitelist of allowed packages. 31 * @NCSI_CMD_SET_CHANNEL_MASK: set a whitelist of allowed channels. 61 * @NCSI_ATTR_PACKAGE_MASK: 32-bit mask of allowed packages. 62 * @NCSI_ATTR_CHANNEL_MASK: 32-bit mask of allowed channels.
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/media/dvb/ |
| H A D | frontend_f_open.rst | 33 Multiple opens are allowed with ``O_RDONLY``. In this mode, only 34 query and read ioctls are allowed. 36 Only one open is allowed in ``O_RDWR``. In this mode, all ioctls are 37 allowed.
|