Home
last modified time | relevance | path

Searched refs:allowed (Results 1 - 4 of 4) sorted by relevance

/device/soc/rockchip/rk3588/kernel/include/trace/hooks/
H A Dsched.h61 TP_PROTO(struct task_struct *p, long *nice, bool *allowed),
62 TP_ARGS(p, nice, allowed), 1);
/device/soc/rockchip/common/sdk_linux/kernel/cgroup/
H A Dcpuset.c457 * One cpuset is a subset of another if all its allowed CPUs and
1012 * 'cpus' changes, or if the 'cpus' allowed changes in any cpuset
1202 * Enabling/disabling partition root is not allowed if there are in update_parent_subparts_cpumask()
1210 * Enabling partition root is not allowed if not all the CPUs in update_parent_subparts_cpumask()
3408 * Description: In the case that the scheduler cannot find an allowed cpu in
3483 * Are any of the nodes in the nodemask allowed in current->mems_allowed?
3506 * @node: is this an allowed node?
3530 * so no allocation on a node outside the cpuset is allowed (unless
3542 * GFP_USER - only nodes in current tasks mems allowed ok.
3547 int allowed; /* i in _cpuset_node_allowed() local
[all...]
/device/soc/rockchip/common/sdk_linux/include/linux/
H A Dbpf.h376 bool (*allowed)(const struct bpf_prog *prog); member
473 * with 'type' (read or write) is allowed
1107 * Hence, new allowed return values of CGROUP EGRESS BPF programs are:
/device/soc/rockchip/common/sdk_linux/kernel/bpf/
H A Dverifier.c1471 verbose(env, "function calls to other bpf functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n"); in check_subprogs()
2840 verbose(env, "R%d min value is outside of the allowed memory range\n", regno); in check_mem_region_access()
2854 verbose(env, "R%d max value is outside of the allowed memory range\n", regno); in check_mem_region_access()
3101 /* Byte size accesses are always allowed. */ in check_pkt_ptr_alignment()
3133 /* Byte size accesses are always allowed. */ in check_generic_ptr_alignment()
3251 verbose(env, "tail_calls are not allowed when call stack of previous frames is %d bytes. Too large\n", in check_max_stack_depth()
3353 * is only allowed in its original, unmodified form. in __check_ptr_off_reg()
3572 verbose(env, "%s access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN\n", tname); in check_ptr_to_map_access()
3923 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", insn->dst_reg, in check_xadd()
3997 /* Only initialized buffer on stack is allowed t in check_stack_range_initialized()
[all...]

Completed in 18 milliseconds