/linux/drivers/net/phy/aquantia/ |
H A D | aquantia_leds.c | 35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument 41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported() 48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument 59 *rules = 0; in aqr_phy_led_hw_control_get() 61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get() 64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get() 67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get() 70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get() 73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get() 76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get() [all …]
|
/linux/drivers/net/phy/mediatek/ |
H A D | mtk-phy-lib.c | 99 unsigned long rules, in mtk_phy_led_hw_is_supported() argument 106 if (rules & ~supported_triggers) in mtk_phy_led_hw_is_supported() 114 unsigned long *rules, u16 on_set, in mtk_phy_led_hw_ctrl_get() argument 156 if (!rules) in mtk_phy_led_hw_ctrl_get() 160 *rules |= BIT(TRIGGER_NETDEV_LINK); in mtk_phy_led_hw_ctrl_get() 163 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mtk_phy_led_hw_ctrl_get() 166 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mtk_phy_led_hw_ctrl_get() 169 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mtk_phy_led_hw_ctrl_get() 172 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in mtk_phy_led_hw_ctrl_get() 175 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mtk_phy_led_hw_ctrl_get() [all …]
|
/linux/tools/perf/util/ |
H A D | strfilter.h | 23 * @rules: Filter rule, which is a combination of glob expressions. 24 * @err: Pointer which points an error detected on @rules 26 * Parse @rules and return new strfilter. Return NULL if an error detected. 30 struct strfilter *strfilter__new(const char *rules, const char **err); 35 * @rules: Filter rule to be appended at left of the root of 37 * @err: Pointer which points an error detected on @rules 39 * Parse @rules and join it to the @filter by using logical-or. 43 const char *rules, const char **err); 48 * @rules: Filter rule to be appended at left of the root of 50 * @err: Pointer which points an error detected on @rules [all …]
|
H A D | strfilter.c | 160 struct strfilter *strfilter__new(const char *rules, const char **err) in strfilter__new() argument 166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new() 179 const char *rules, const char **err) in strfilter__append() argument 184 if (!filter || !rules) in strfilter__append() 187 right = strfilter_node__new(rules, &ep); in strfilter__append() 207 int strfilter__or(struct strfilter *filter, const char *rules, const char **err) in strfilter__or() argument 209 return strfilter__append(filter, true, rules, err); in strfilter__or() 212 int strfilter__and(struct strfilter *filter, const char *rules, in strfilter__and() argument 215 return strfilter__append(filter, false, rules, err); in strfilter__and() 238 /* Return true if STR matches the filter rules */
|
/linux/security/apparmor/ |
H A D | net.c | 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local 114 typeof(*rules), list); in aa_profile_af_perm() 124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm() 130 state = aa_dfa_match_len(rules->policy->dfa, state, (char *) &buffer, in aa_profile_af_perm() 132 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_af_perm() 226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local 227 typeof(*rules), list); in aa_secmark_perm() 229 if (rules->secmark_count == 0) in aa_secmark_perm() 232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 233 if (!rules->secmark[i].secid) { in aa_secmark_perm() [all …]
|
H A D | resource.c | 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local 93 typeof(*rules), list); in profile_setrlimit() 96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 128 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit() 168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local 169 typeof(*rules), in __aa_transition_rlimits() 171 if (rules->rlimits.mask) { in __aa_transition_rlimits() 176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local [all …]
|
H A D | mount.c | 314 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt_path_str() local 315 typeof(*rules), list); in match_mnt_path_str() 322 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str() 337 pos = do_match_mnt(rules->policy, in match_mnt_path_str() 338 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str() 374 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt() local 375 typeof(*rules), list); in match_mnt() 381 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt() 607 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_umount() local 608 typeof(*rules), list); in profile_umount() [all …]
|
H A D | ipc.c | 83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() local 84 typeof(*rules), list); in profile_signal_perm() 89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm() 95 state = aa_dfa_next(rules->policy->dfa, in profile_signal_perm() 96 rules->policy->start[AA_CLASS_SIGNAL], in profile_signal_perm() 98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
|
H A D | task.c | 231 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_ptrace_perm() local 232 typeof(*rules), list); in profile_ptrace_perm() 237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm() 249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm() 263 if (ANY_RULE_MEDIATES(&tracer->rules, AA_CLASS_PTRACE)) in profile_tracer_perm() 327 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_ns_perm() local 328 typeof(*rules), in aa_profile_ns_perm() 332 state = RULE_MEDIATES(rules, ad->class); in aa_profile_ns_perm() 336 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_ns_perm()
|
/linux/drivers/net/phy/qcom/ |
H A D | qca807x.c | 135 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument 141 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 143 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() 145 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev() 147 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev() 149 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev() 151 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev() 153 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev() 157 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 159 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() [all …]
|
H A D | qca808x.c | 419 static int qca808x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca808x_led_parse_netdev() argument 423 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca808x_led_parse_netdev() 425 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca808x_led_parse_netdev() 427 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca808x_led_parse_netdev() 429 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca808x_led_parse_netdev() 431 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca808x_led_parse_netdev() 433 if (test_bit(TRIGGER_NETDEV_LINK_2500, &rules)) in qca808x_led_parse_netdev() 435 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca808x_led_parse_netdev() 437 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca808x_led_parse_netdev() 440 if (rules && !*offload_trigger) in qca808x_led_parse_netdev() [all …]
|
/linux/net/netfilter/ |
H A D | nft_set_pipapo.c | 56 * represented as one or more rules, depending on the number of composing 61 * Rules are mapped between fields through an array of x, n pairs, with each 62 * item mapping a matched rule to one or more rules. The position of the pair in 65 * next-field rules the current rule maps to. 108 * or multiple rules for ranges. Ranges are expanded to composing netmasks 116 * - insert references to the rules in the lookup table, selecting buckets 144 * rules from the lookup table to rules belonging to the same entry in 147 * Note that as rules map to contiguous ranges of rules, give 362 pipapo_refill(unsigned long * map,unsigned int len,unsigned int rules,unsigned long * dst,const union nft_pipapo_map_bucket * mt,bool match_only) pipapo_refill() argument 636 pipapo_realloc_mt(struct nft_pipapo_field * f,unsigned int old_rules,unsigned int rules) pipapo_realloc_mt() argument 699 pipapo_resize(struct nft_pipapo_field * f,unsigned int old_rules,unsigned int rules) pipapo_resize() argument 1593 pipapo_unmap(union nft_pipapo_map_bucket * mt,unsigned int rules,unsigned int start,unsigned int n,unsigned int to_offset,bool is_last) global() argument [all...] |
H A D | nft_set_pipapo.h | 52 /* Each n-bit range maps to up to n * 2 rules */ 86 * @n: Number of rules (in next field) this rule maps to 107 * @rules: Number of inserted rules 109 * @rules_alloc: Number of allocated rules, always >= rules 116 unsigned int rules; member 179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, 236 * of rules (composing netmasks) the entries expand to. We compute the worst 253 unsigned long rules; in pipapo_estimate_size() local 259 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size() 262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() [all …]
|
/linux/Documentation/admin-guide/aoe/ |
H A D | udev.txt | 1 # These rules tell udev what device nodes to create for aoe support. 11 # udev_rules="/etc/udev/rules.d/" 12 # bash# ls /etc/udev/rules.d/ 13 # 10-wacom.rules 50-udev.rules 15 # /etc/udev/rules.d/60-aoe.rules
|
H A D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 27 rules_d=/etc/udev/rules.d 30 echo "$me Error: cannot find udev rules directory" 1>&2 33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
|
/linux/kernel/kcsan/ |
H A D | permissive.h | 3 * Special rules for ignoring entire classes of data-racy memory accesses. None 4 * of the rules here imply that such data races are generally safe! 6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep 20 * Access ignore rules based on address. 35 * Data race ignore rules based on access type and value change patterns. 44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race() 70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
|
/linux/drivers/net/phy/ |
H A D | intel-xway.c | 405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument 413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported() 414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported() 421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported() 428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument 444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get() 447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get() 450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get() 455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get() 458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get() [all …]
|
/linux/drivers/net/ethernet/microchip/vcap/ |
H A D | Kconfig | 13 A VCAP is essentially a TCAM with rules consisting of 24 The VCAP implementation provides switchcore independent handling of rules 27 - Creating and deleting rules 28 - Updating and getting rules 32 access rules via the API in a platform independent way, with the
|
/linux/security/smack/ |
H A D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 26 rules. The developer can use the information to 27 identify which rules are necessary and what accesses 54 delivering a signal in the Smack rules.
|
/linux/Documentation/admin-guide/LSM/ |
H A D | Smack.rst | 50 load the Smack access rules 154 This interface allows modification of existing access control rules. 217 This interface allows access control rules in addition to 218 the system defined rules to be specified. The format accepted 232 This interface allows access control rules in addition to 233 the system defined rules to be specified. The format accepted 248 This interface allows process specific access rules to be 249 defined. These rules are only consulted if access would 255 This interface allows process specific access rules to be 256 defined. These rules are only consulted if access would [all …]
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | xt_string.sh | 70 echo "FAIL: rules match data before --from" 79 echo "FAIL: only two rules should match at low offset" 87 echo "FAIL: all rules should match at end of packet" 103 echo "FAIL: two rules should match pattern at start of second fragment" 111 echo "FAIL: two rules should match pattern at end of largest --to" 119 echo "FAIL: no rules should match pattern extending largest --to"
|
H A D | nft_audit.sh | 28 reset rules t c 84 # adding tables, chains and rules 168 # resetting rules 170 do_test 'nft reset rules t1 c2' \ 173 do_test 'nft reset rules table t1' \ 176 do_test 'nft reset rules t2 c3' \ 179 do_test 'nft reset rules t2' \ 182 do_test 'nft reset rules' \ 229 # deleting rules
|
/linux/Documentation/sound/designs/ |
H A D | tracepoints.rst | 116 struct snd_pcm_hardware and rules of constraints in the runtime. The 117 structure describes capabilities of handled hardware. The rules describes 120 to compute the target parameter. ALSA PCM core registers some rules to the 129 2. In the same callback, drivers are also expected to register additional rules 156 device, rules of constraint and name of the changed parameter, in order. The 157 field for rules of constraint consists of two sub-fields; index of applied rule 158 and total number of rules added to the runtime. As an exception, the index 000 159 means that the parameter is changed by ALSA PCM core, regardless of the rules.
|
/linux/security/ipe/ |
H A D | policy_parser.c | 39 for (i = 0; i < ARRAY_SIZE(p->rules); ++i) { in new_parsed_policy() 40 t = &p->rules[i]; in new_parsed_policy() 43 INIT_LIST_HEAD(&t->rules); in new_parsed_policy() 420 if (p->rules[op].default_action != IPE_ACTION_INVALID) in parse_rule() 423 p->rules[op].default_action = action; in parse_rule() 435 list_add_tail(&r->next, &p->rules[op].rules); in parse_rule() 457 for (i = 0; i < ARRAY_SIZE(p->rules); ++i) in ipe_free_parsed_policy() 458 list_for_each_entry_safe(pp, t, &p->rules[i].rules, next) { in ipe_free_parsed_policy() 472 * operations have their default rules or a global default rule is set. 485 for (i = 0; i < ARRAY_SIZE(p->rules); ++i) { in validate_policy() [all …]
|
/linux/Documentation/networking/ |
H A D | representors.rst | 69 fast-path rules in the virtual switch. Packets transmitted on the 77 3. It acts as a handle by which switching rules (such as TC filters) can refer 78 to the representee, allowing these rules to be offloaded. 115 representor TC rules. 133 access that the IP stack "sees" would then be configurable through tc rules; 175 It is expected that userland will use this information (e.g. through udev rules) 183 How do representors interact with TC rules? 197 ``REP_DEV`` is a VF representor, the following rules:: 213 Of course the rules can (if supported by the NIC) include packet-modifying 220 function uplink netdev or port representor). TC rules such as:: [all …]
|