| /linux/drivers/net/dsa/mv88e6xxx/ |
| H A D | leds.c | 99 unsigned long rules; member 105 /* The following is a lookup table to check what rules we can support on a 106 * certain LED given restrictions such as that some rules only work with fiber 123 .rules = BIT(TRIGGER_NETDEV_LINK), 130 .rules = BIT(TRIGGER_NETDEV_LINK_1000), 137 .rules = BIT(TRIGGER_NETDEV_LINK_100) | BIT(TRIGGER_NETDEV_LINK_1000), 144 .rules = BIT(TRIGGER_NETDEV_LINK_10) | BIT(TRIGGER_NETDEV_LINK_100), 151 .rules = BIT(TRIGGER_NETDEV_LINK_100), 159 .rules = BIT(TRIGGER_NETDEV_LINK_1000), 167 .rules = BIT(TRIGGER_NETDEV_LINK_1000), [all …]
|
| /linux/drivers/net/phy/aquantia/ |
| H A D | aquantia_leds.c | 35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument 41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported() 48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument 59 *rules = 0; in aqr_phy_led_hw_control_get() 61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get() 64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get() 67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get() 70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get() 73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get() 76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get() [all …]
|
| /linux/drivers/gpu/drm/ci/ |
| H A D | gitlab-ci.yml | 89 - '/.gitlab-ci/farm-rules.yml' 141 .rules-anchors: 142 rules: 160 # Rules applied to every job in the pipeline 161 .common-rules: 162 rules: 167 .never-post-merge-rules: 168 rules: 173 .container+build-rules: 174 rules: [all …]
|
| /linux/drivers/net/phy/mediatek/ |
| H A D | mtk-phy-lib.c | 99 unsigned long rules, in mtk_phy_led_hw_is_supported() argument 106 if (rules & ~supported_triggers) in mtk_phy_led_hw_is_supported() 114 unsigned long *rules, u16 on_set, in mtk_phy_led_hw_ctrl_get() argument 156 if (!rules) in mtk_phy_led_hw_ctrl_get() 160 *rules |= BIT(TRIGGER_NETDEV_LINK); in mtk_phy_led_hw_ctrl_get() 163 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mtk_phy_led_hw_ctrl_get() 166 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mtk_phy_led_hw_ctrl_get() 169 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mtk_phy_led_hw_ctrl_get() 172 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in mtk_phy_led_hw_ctrl_get() 175 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mtk_phy_led_hw_ctrl_get() [all …]
|
| /linux/security/apparmor/ |
| H A D | capability.c | 72 struct aa_ruleset *rules = profile->label.rules[0]; in audit_caps() local 81 !cap_raised(rules->caps.audit, cap))) in audit_caps() 85 cap_raised(rules->caps.kill, cap)) { in audit_caps() 87 } else if (cap_raised(rules->caps.quiet, cap) && in audit_caps() 124 struct aa_ruleset *rules = profile->label.rules[0]; in profile_capable() local 128 state = RULE_MEDIATES(rules, ad->class); in profile_capable() 134 state = aa_dfa_next(rules->policy->dfa, state, cap >> 5); in profile_capable() 136 perms = *aa_lookup_perms(rules->policy, state); in profile_capable() 150 if (cap_raised(rules->caps.allow, cap) && in profile_capable() 151 !cap_raised(rules->caps.denied, cap)) in profile_capable() [all …]
|
| H A D | af_unix.c | 205 struct aa_ruleset *rules = profile->label.rules[0]; in profile_create_perm() local 211 state = RULE_MEDIATES_v9NET(rules); in profile_create_perm() 213 state = aa_match_to_prot(rules->policy, state, AA_MAY_CREATE, in profile_create_perm() 217 return aa_do_perms(profile, rules->policy, state, AA_MAY_CREATE, in profile_create_perm() 229 struct aa_ruleset *rules = profile->label.rules[0]; in profile_sk_perm() local 237 state = RULE_MEDIATES_v9NET(rules); in profile_sk_perm() 244 state = match_to_sk(rules->policy, state, request, unix_sk(sk), in profile_sk_perm() 247 return aa_do_perms(profile, rules->policy, state, request, p, in profile_sk_perm() 257 struct aa_ruleset *rules = profile->label.rules[0]; in profile_bind_perm() local 266 state = RULE_MEDIATES_v9NET(rules); in profile_bind_perm() [all …]
|
| H A D | resource.c | 92 struct aa_ruleset *rules = profile->label.rules[0]; in profile_setrlimit() local 95 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 96 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 127 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit() 167 struct aa_ruleset *rules = old->label.rules[0]; in __aa_transition_rlimits() local 168 if (rules->rlimits.mask) { in __aa_transition_rlimits() 173 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 185 struct aa_ruleset *rules = new->label.rules[0]; in __aa_transition_rlimits() local 188 if (!rules->rlimits.mask) in __aa_transition_rlimits() 191 if (!(rules->rlimits.mask & mask)) in __aa_transition_rlimits() [all …]
|
| H A D | policy_unpack.c | 604 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument 614 rules->secmark = kzalloc_objs(struct aa_secmark, size); in unpack_secmark() 615 if (!rules->secmark) in unpack_secmark() 618 rules->secmark_count = size; in unpack_secmark() 621 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 623 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 625 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark() 637 if (rules->secmark) { in unpack_secmark() 639 kfree_sensitive(rules->secmark[i].label); in unpack_secmark() 640 kfree_sensitive(rules->secmark); in unpack_secmark() [all …]
|
| H A D | net.c | 254 struct aa_ruleset *rules = profile->label.rules[0]; in aa_profile_af_perm() local 264 state = RULE_MEDIATES_NET(rules); in aa_profile_af_perm() 267 state = aa_match_to_prot(rules->policy, state, request, family, type, in aa_profile_af_perm() 269 return aa_do_perms(profile, rules->policy, state, request, p, ad); in aa_profile_af_perm() 366 struct aa_ruleset *rules = profile->label.rules[0]; in aa_secmark_perm() local 368 if (rules->secmark_count == 0) in aa_secmark_perm() 371 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 372 if (!rules->secmark[i].secid) { in aa_secmark_perm() 373 ret = apparmor_secmark_init(&rules->secmark[i]); in aa_secmark_perm() 378 if (rules->secmark[i].secid == secid || in aa_secmark_perm() [all …]
|
| H A D | mount.c | 314 struct aa_ruleset *rules = profile->label.rules[0]; in match_mnt_path_str() local 321 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str() 336 pos = do_match_mnt(rules->policy, in match_mnt_path_str() 337 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str() 373 struct aa_ruleset *rules = profile->label.rules[0]; in match_mnt() local 379 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt() 605 struct aa_ruleset *rules = profile->label.rules[0]; in profile_umount() local 614 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in profile_umount() 622 state = aa_dfa_match(rules->policy->dfa, in profile_umount() 623 rules->policy->start[AA_CLASS_MOUNT], in profile_umount() [all …]
|
| H A D | file.c | 179 * @rules: the aa_policydb to lookup perms for (NOT NULL) 187 struct aa_perms *aa_lookup_condperms(kuid_t subj_uid, struct aa_policydb *rules, in aa_lookup_condperms() argument 190 unsigned int index = ACCEPT_TABLE(rules->dfa)[state]; in aa_lookup_condperms() 192 if (!(rules->perms)) in aa_lookup_condperms() 195 if ((ACCEPT_TABLE2(rules->dfa)[state] & ACCEPT_FLAG_OWNER)) { in aa_lookup_condperms() 197 return &(rules->perms[index]); in aa_lookup_condperms() 198 return &(rules->perms[index + 1]); in aa_lookup_condperms() 201 return &(rules->perms[index]); in aa_lookup_condperms() 231 struct aa_ruleset *rules = profile->label.rules[0]; in __aa_path_perm() local 235 ((flags & PATH_SOCK_COND) && !RULE_MEDIATES_v9NET(rules))) in __aa_path_perm() [all …]
|
| /linux/tools/perf/util/ |
| H A D | strfilter.h | 23 * @rules: Filter rule, which is a combination of glob expressions. 24 * @err: Pointer which points an error detected on @rules 26 * Parse @rules and return new strfilter. Return NULL if an error detected. 30 struct strfilter *strfilter__new(const char *rules, const char **err); 35 * @rules: Filter rule to be appended at left of the root of 37 * @err: Pointer which points an error detected on @rules 39 * Parse @rules and join it to the @filter by using logical-or. 43 const char *rules, const char **err); 48 * @rules: Filter rule to be appended at left of the root of 50 * @err: Pointer which points an error detected on @rules [all …]
|
| /linux/drivers/net/phy/qcom/ |
| H A D | qca807x.c | 136 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument 142 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 144 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() 146 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev() 148 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev() 150 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev() 152 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev() 154 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev() 158 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 160 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() [all …]
|
| H A D | qca808x.c | 424 static int qca808x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca808x_led_parse_netdev() argument 428 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca808x_led_parse_netdev() 430 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca808x_led_parse_netdev() 432 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca808x_led_parse_netdev() 434 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca808x_led_parse_netdev() 436 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca808x_led_parse_netdev() 438 if (test_bit(TRIGGER_NETDEV_LINK_2500, &rules)) in qca808x_led_parse_netdev() 440 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca808x_led_parse_netdev() 442 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca808x_led_parse_netdev() 445 if (rules && !*offload_trigger) in qca808x_led_parse_netdev() [all …]
|
| /linux/net/netfilter/ |
| H A D | nft_set_pipapo.c | 56 * represented as one or more rules, depending on the number of composing 61 * Rules are mapped between fields through an array of x, n pairs, with each 62 * item mapping a matched rule to one or more rules. The position of the pair in 65 * next-field rules the current rule maps to. 108 * or multiple rules for ranges. Ranges are expanded to composing netmasks 116 * - insert references to the rules in the lookup table, selecting buckets 144 * rules from the lookup table to rules belonging to the same entry in 147 * Note that as rules map to contiguous ranges of rules, given how netmask 182 * we need to map rules for 10.0.0.5 in lookup table #0 (rule #0) to 1024 183 * in lookup table #1 (rule #0) and rules for 192.168.1.0-192.168.2.1 [all …]
|
| H A D | nft_set_pipapo.h | 52 /* Each n-bit range maps to up to n * 2 rules */ 86 * @n: Number of rules (in next field) this rule maps to 107 * @rules: Number of inserted rules 109 * @rules_alloc: Number of allocated rules, always >= rules 116 unsigned int rules; member 181 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, 238 * of rules (composing netmasks) the entries expand to. We compute the worst 255 unsigned long rules; in pipapo_estimate_size() local 261 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size() 264 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() [all …]
|
| /linux/security/apparmor/include/ |
| H A D | policy.h | 74 APPARMOR_ENFORCE, /* enforce access rules */ 181 /* struct aa_ruleset - data covering mediation rules 184 * @policy: general match rules governing policy 185 * @file: The set of rules governing basic file access and domain transitions 206 /* struct aa_attachment - data and rules for a profiles attachment 233 * @attach: attachment rules for the profile 234 * @rules: rules to be enforced 244 * @rules - label with the rule vec on its end 249 * attachments are determined by profile X transition rules. 328 static inline aa_state_t RULE_MEDIATES(struct aa_ruleset *rules, in RULE_MEDIATES() argument [all …]
|
| /linux/Documentation/admin-guide/aoe/ |
| H A D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 27 rules_d=/etc/udev/rules.d 30 echo "$me Error: cannot find udev rules directory" 1>&2 33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
|
| /linux/kernel/kcsan/ |
| H A D | permissive.h | 3 * Special rules for ignoring entire classes of data-racy memory accesses. None 4 * of the rules here imply that such data races are generally safe! 6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep 20 * Access ignore rules based on address. 35 * Data race ignore rules based on access type and value change patterns. 44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race() 70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
|
| /linux/drivers/net/phy/ |
| H A D | intel-xway.c | 405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument 413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported() 414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported() 421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported() 428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument 444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get() 447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get() 450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get() 455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get() 458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get() [all …]
|
| H A D | mxl-86110.c | 439 unsigned long rules) in mxl86110_led_hw_is_supported() argument 445 if (rules & ~supported_trgs) in mxl86110_led_hw_is_supported() 452 unsigned long *rules) in mxl86110_led_hw_control_get() argument 465 *rules |= BIT(TRIGGER_NETDEV_TX); in mxl86110_led_hw_control_get() 468 *rules |= BIT(TRIGGER_NETDEV_RX); in mxl86110_led_hw_control_get() 471 *rules |= BIT(TRIGGER_NETDEV_HALF_DUPLEX); in mxl86110_led_hw_control_get() 474 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mxl86110_led_hw_control_get() 477 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mxl86110_led_hw_control_get() 480 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mxl86110_led_hw_control_get() 483 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mxl86110_led_hw_control_get() [all …]
|
| /linux/Documentation/doc-guide/ |
| H A D | parse-headers.rst | 49 The optional ``FILE_RULES`` contains a set of rules like:: 97 By default, it create rules for all symbols and defines, but it also 98 allows parsing an exception file. Such file contains a set of rules 101 1. Ignore rules: 107 2. Replace rules: 117 3. Namespace rules 122 be overridden by replace rules. 124 On ignore and replace rules, *type* can be:
|
| /linux/drivers/net/ethernet/microchip/vcap/ |
| H A D | Kconfig | 13 A VCAP is essentially a TCAM with rules consisting of 24 The VCAP implementation provides switchcore independent handling of rules 27 - Creating and deleting rules 28 - Updating and getting rules 32 access rules via the API in a platform independent way, with the
|
| /linux/tools/lib/python/kdoc/ |
| H A D | parse_data_structs.py | 17 The optional rules file contains a set of rules like:: 42 By default, it create rules for all symbols and defines, but it also 43 allows parsing an exception file. Such file contains a set of rules 46 1. Ignore rules:: 52 2. Replace rules:: 61 3. Namespace rules:: 66 be overridden by replace rules. 68 On ignore and replace rules, ``<type>`` can be: 181 # ignore rules [all...] |
| /linux/security/smack/ |
| H A D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 26 rules. The developer can use the information to 27 identify which rules are necessary and what accesses 54 delivering a signal in the Smack rules.
|