| /linux/drivers/net/wireless/ath/ath10k/ |
| H A D | bmi.c | 61 ath10k_warn(ar, "BMI Get Target Info Command disallowed\n"); in ath10k_bmi_get_target_info() 100 ath10k_warn(ar, "BMI Get Target Info Command disallowed\n"); in ath10k_bmi_get_target_info_sdio() 169 ath10k_warn(ar, "command disallowed\n"); in ath10k_bmi_read_memory() 273 ath10k_warn(ar, "command disallowed\n"); in ath10k_bmi_write_memory() 319 ath10k_warn(ar, "command disallowed\n"); in ath10k_bmi_execute() 358 ath10k_warn(ar, "command disallowed\n"); in ath10k_bmi_lz_data_large() 404 ath10k_warn(ar, "command disallowed\n"); in ath10k_bmi_lz_data() 441 ath10k_warn(ar, "command disallowed\n"); in ath10k_bmi_lz_stream_start() 507 ath10k_warn(ar, "bmi set start command disallowed\n"); in ath10k_bmi_set_start()
|
| /linux/drivers/net/wireless/ath/ath6kl/ |
| H A D | bmi.c | 51 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_get_target_info() 125 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_read() 183 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_write() 247 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_execute() 294 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_set_app_start() 330 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_reg_read() 373 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_reg_write() 415 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_lz_data() 464 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid); in ath6kl_bmi_lz_stream_start()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | verifier_ctx.c | 55 __failure __msg("negative offset ctx ptr R1 off=-612 disallowed") 71 __failure __msg("negative offset ctx ptr R1 off=-612 disallowed") 72 __failure_unpriv __msg_unpriv("negative offset ctx ptr R1 off=-612 disallowed") 149 __failure __msg("negative offset ctx ptr R1 off=-612 disallowed")
|
| H A D | percpu_alloc_fail.c | 39 __failure __msg("store to referenced kptr disallowed")
|
| H A D | verifier_bounds_deduction.c | 123 __failure __msg("negative offset ctx ptr R1 off=-1 disallowed")
|
| H A D | user_ringbuf_fail.c | 239 __failure __msg("dereference of modified dynptr_ptr ptr R1 off=16384 disallowed")
|
| /linux/arch/arm64/boot/dts/qcom/ |
| H A D | msm8998-sony-xperia-yoshino.dtsi | 320 "WLAN_SW_CTRL (DISALLOWED)", 332 "NC (DISALLOWED)", 337 "NC (DISALLOWED)", /* GPIO_20 */ 339 "NC (DISALLOWED)", 341 "OPTION_1 (DISALLOWED)", 342 "OPTION_2 (DISALLOWED)", 343 "PM_SLB (DISALLOWED)";
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | linked_list.c | 76 { "direct_read_lock", "direct access to bpf_spin_lock is disallowed" }, 77 { "direct_write_lock", "direct access to bpf_spin_lock is disallowed" }, 78 { "direct_read_head", "direct access to bpf_list_head is disallowed" }, 79 { "direct_write_head", "direct access to bpf_list_head is disallowed" }, 80 { "direct_read_node", "direct access to bpf_list_node is disallowed" }, 81 { "direct_write_node", "direct access to bpf_list_node is disallowed" }, 90 { "incorrect_node_var_off", "variable ptr_ access var_off=(0x0; 0xffffffff) disallowed" }, 95 { "incorrect_head_var_off2", "variable ptr_ access var_off=(0x0; 0xffffffff) disallowed" },
|
| /linux/ |
| H A D | .clippy.toml | 7 disallowed-macros = [
|
| /linux/tools/testing/selftests/sched_ext/ |
| H A D | select_cpu_dispatch_dbl_dsp.bpf.c | 20 /* Dispatching twice in a row is disallowed. */ in BPF_STRUCT_OPS()
|
| /linux/tools/testing/selftests/bpf/verifier/ |
| H A D | map_kptr.c | 154 .errstr = "variable untrusted_ptr_ access var_off=(0x0; 0x7) disallowed", 400 .errstr = "store to referenced kptr disallowed", 420 .errstr = "store to referenced kptr disallowed",
|
| /linux/Documentation/userspace-api/ |
| H A D | no_new_privs.rst | 15 - chroot is disallowed to unprivileged processes, since it would allow
|
| /linux/samples/seccomp/ |
| H A D | bpf-helper.c | 28 * Since backward jumps are disallowed by BPF, this is easy. in bpf_resolve_jumps()
|
| /linux/drivers/gpu/drm/i915/ |
| H A D | i915_file_private.h | 51 * We have since disallowed setting these more complex parameters
|
| /linux/tools/perf/pmu-events/arch/x86/broadwellde/ |
| H A D | memory.json | 35 "PublicDescription": "Number of times a disallowed operation caused an HLE abort.", 247 "PublicDescription": "Number of times a disallowed operation caused an RTM abort.",
|
| /linux/Documentation/arch/x86/x86_64/ |
| H A D | fred.rst | 80 longer needed when FRED is enabled, thus is disallowed (#UD).
|
| /linux/drivers/net/ethernet/microchip/lan966x/ |
| H A D | lan966x_switchdev.c | 382 "Bridging between multiple lan966x switches disallowed"); in lan966x_foreign_bridging_check() 406 "Bridging lan966x ports with foreign interfaces disallowed"); in lan966x_foreign_bridging_check()
|
| /linux/drivers/infiniband/ulp/ipoib/ |
| H A D | ipoib_netlink.c | 122 ipoib_warn(ppriv, "child creation disallowed for child devices\n"); in ipoib_new_child_link()
|
| /linux/arch/mips/pci/ |
| H A D | pci-bcm1480ht.c | 92 * in config space. Return all 1's for disallowed accesses
|
| H A D | pci-bcm1480.c | 103 * in config space. Return all 1's for disallowed accesses
|
| H A D | pci-sb1250.c | 112 * in config space. Return all 1's for disallowed accesses
|
| /linux/drivers/virtio/ |
| H A D | virtio_rtc_class.c | 23 * @stopped: Whether RTC ops are disallowed. Access protected by rtc_lock().
|
| /linux/tools/perf/pmu-events/arch/x86/broadwellx/ |
| H A D | memory.json | 35 "PublicDescription": "Number of times a disallowed operation caused an HLE abort.", 437 "PublicDescription": "Number of times a disallowed operation caused an RTM abort.",
|
| /linux/kernel/rcu/ |
| H A D | update.c | 342 * Note that rcu_read_lock() is disallowed if the CPU is either idle or 367 * Note that rcu_read_lock_bh() is disallowed if the CPU is either idle or
|
| /linux/Documentation/PCI/ |
| H A D | sysfs-pci.rst | 96 disallowed.
|