Searched refs:allowed (Results 1 - 4 of 4) sorted by relevance
/device/soc/rockchip/rk3588/kernel/include/trace/hooks/ |
H A D | sched.h | 61 TP_PROTO(struct task_struct *p, long *nice, bool *allowed), 62 TP_ARGS(p, nice, allowed), 1);
|
/device/soc/rockchip/common/sdk_linux/kernel/cgroup/ |
H A D | cpuset.c | 457 * One cpuset is a subset of another if all its allowed CPUs and 1012 * 'cpus' changes, or if the 'cpus' allowed changes in any cpuset 1202 * Enabling/disabling partition root is not allowed if there are in update_parent_subparts_cpumask() 1210 * Enabling partition root is not allowed if not all the CPUs in update_parent_subparts_cpumask() 3408 * Description: In the case that the scheduler cannot find an allowed cpu in 3483 * Are any of the nodes in the nodemask allowed in current->mems_allowed? 3506 * @node: is this an allowed node? 3530 * so no allocation on a node outside the cpuset is allowed (unless 3542 * GFP_USER - only nodes in current tasks mems allowed ok. 3547 int allowed; /* i in _cpuset_node_allowed() local [all...] |
/device/soc/rockchip/common/sdk_linux/include/linux/ |
H A D | bpf.h | 376 bool (*allowed)(const struct bpf_prog *prog); member 473 * with 'type' (read or write) is allowed 1107 * Hence, new allowed return values of CGROUP EGRESS BPF programs are:
|
/device/soc/rockchip/common/sdk_linux/kernel/bpf/ |
H A D | verifier.c | 1471 verbose(env, "function calls to other bpf functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n");
in check_subprogs() 2840 verbose(env, "R%d min value is outside of the allowed memory range\n", regno);
in check_mem_region_access() 2854 verbose(env, "R%d max value is outside of the allowed memory range\n", regno);
in check_mem_region_access() 3101 /* Byte size accesses are always allowed. */
in check_pkt_ptr_alignment() 3133 /* Byte size accesses are always allowed. */
in check_generic_ptr_alignment() 3251 verbose(env, "tail_calls are not allowed when call stack of previous frames is %d bytes. Too large\n",
in check_max_stack_depth() 3353 * is only allowed in its original, unmodified form.
in __check_ptr_off_reg() 3572 verbose(env, "%s access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN\n", tname);
in check_ptr_to_map_access() 3923 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", insn->dst_reg,
in check_xadd() 3997 /* Only initialized buffer on stack is allowed t in check_stack_range_initialized() [all...] |
Completed in 18 milliseconds