Home
last modified time | relevance | path

Searched full:rules (Results 1 – 25 of 1091) sorted by relevance

12345678910>>...44

/linux/drivers/gpu/drm/ci/
H A Dgitlab-ci.yml89 - '/.gitlab-ci/farm-rules.yml'
133 .rules-anchors:
134 rules:
159 # Rules applied to every job in the pipeline
160 .common-rules:
161 rules:
165 .never-post-merge-rules:
166 rules:
171 .scheduled_pipeline-rules:
172 rules:
[all …]
H A Dcontainer.yml24 rules:
28 rules:
32 rules:
36 rules:
40 rules:
44 rules:
48 rules:
52 rules:
56 rules:
60 rules:
[all …]
/linux/drivers/net/phy/aquantia/
H A Daquantia_leds.c35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument
41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported()
48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument
59 *rules = 0; in aqr_phy_led_hw_control_get()
61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get()
64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get()
67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get()
70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get()
73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get()
76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get()
[all …]
/linux/tools/perf/util/
H A Dstrfilter.h23 * @rules: Filter rule, which is a combination of glob expressions.
24 * @err: Pointer which points an error detected on @rules
26 * Parse @rules and return new strfilter. Return NULL if an error detected.
30 struct strfilter *strfilter__new(const char *rules, const char **err);
35 * @rules: Filter rule to be appended at left of the root of
37 * @err: Pointer which points an error detected on @rules
39 * Parse @rules and join it to the @filter by using logical-or.
43 const char *rules, const char **err);
48 * @rules: Filter rule to be appended at left of the root of
50 * @err: Pointer which points an error detected on @rules
[all …]
H A Dstrfilter.c160 struct strfilter *strfilter__new(const char *rules, const char **err) in strfilter__new() argument
166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new()
179 const char *rules, const char **err) in strfilter__append() argument
184 if (!filter || !rules) in strfilter__append()
187 right = strfilter_node__new(rules, &ep); in strfilter__append()
207 int strfilter__or(struct strfilter *filter, const char *rules, const char **err) in strfilter__or() argument
209 return strfilter__append(filter, true, rules, err); in strfilter__or()
212 int strfilter__and(struct strfilter *filter, const char *rules, in strfilter__and() argument
215 return strfilter__append(filter, false, rules, err); in strfilter__and()
238 /* Return true if STR matches the filter rules */
/linux/drivers/net/phy/mediatek/
H A Dmtk-phy-lib.c99 unsigned long rules, in mtk_phy_led_hw_is_supported() argument
106 if (rules & ~supported_triggers) in mtk_phy_led_hw_is_supported()
114 unsigned long *rules, u16 on_set, in mtk_phy_led_hw_ctrl_get() argument
156 if (!rules) in mtk_phy_led_hw_ctrl_get()
160 *rules |= BIT(TRIGGER_NETDEV_LINK); in mtk_phy_led_hw_ctrl_get()
163 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mtk_phy_led_hw_ctrl_get()
166 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mtk_phy_led_hw_ctrl_get()
169 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mtk_phy_led_hw_ctrl_get()
172 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in mtk_phy_led_hw_ctrl_get()
175 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mtk_phy_led_hw_ctrl_get()
[all …]
/linux/security/apparmor/
H A Dnet.c113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local
114 typeof(*rules), list); in aa_profile_af_perm()
124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm()
130 state = aa_dfa_match_len(rules->policy->dfa, state, (char *) &buffer, in aa_profile_af_perm()
132 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_af_perm()
226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local
227 typeof(*rules), list); in aa_secmark_perm()
229 if (rules->secmark_count == 0) in aa_secmark_perm()
232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm()
233 if (!rules->secmark[i].secid) { in aa_secmark_perm()
[all …]
H A Dresource.c92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local
93 typeof(*rules), list); in profile_setrlimit()
96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit()
97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit()
128 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit()
168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local
169 typeof(*rules), in __aa_transition_rlimits()
171 if (rules->rlimits.mask) { in __aa_transition_rlimits()
176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits()
188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local
[all …]
H A Dmount.c314 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt_path_str() local
315 typeof(*rules), list); in match_mnt_path_str()
322 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str()
337 pos = do_match_mnt(rules->policy, in match_mnt_path_str()
338 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str()
374 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt() local
375 typeof(*rules), list); in match_mnt()
381 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt()
607 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_umount() local
608 typeof(*rules), list); in profile_umount()
[all …]
H A Dipc.c83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() local
84 typeof(*rules), list); in profile_signal_perm()
89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm()
95 state = aa_dfa_next(rules->policy->dfa, in profile_signal_perm()
96 rules->policy->start[AA_CLASS_SIGNAL], in profile_signal_perm()
98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
H A Dtask.c231 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_ptrace_perm() local
232 typeof(*rules), list); in profile_ptrace_perm()
237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm()
249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm()
263 if (ANY_RULE_MEDIATES(&tracer->rules, AA_CLASS_PTRACE)) in profile_tracer_perm()
327 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_ns_perm() local
328 typeof(*rules), in aa_profile_ns_perm()
332 state = RULE_MEDIATES(rules, ad->class); in aa_profile_ns_perm()
336 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_ns_perm()
/linux/drivers/net/phy/qcom/
H A Dqca807x.c135 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument
141 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev()
143 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev()
145 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev()
147 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev()
149 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev()
151 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev()
153 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev()
157 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev()
159 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev()
[all …]
/linux/net/netfilter/
H A Dnft_set_pipapo.c56 * represented as one or more rules, depending on the number of composing
61 * Rules are mapped between fields through an array of x, n pairs, with each
62 * item mapping a matched rule to one or more rules. The position of the pair in
65 * next-field rules the current rule maps to.
108 * or multiple rules for ranges. Ranges are expanded to composing netmasks
116 * - insert references to the rules in the lookup table, selecting buckets
144 * rules from the lookup table to rules belonging to the same entry in
147 * Note that as rules map to contiguous ranges of rules, given how netmask
182 * we need to map rules for 10.0.0.5 in lookup table #0 (rule #0) to 1024
183 * in lookup table #1 (rule #0) and rules for 192.168.1.0-192.168.2.1
[all …]
H A Dnft_set_pipapo.h52 /* Each n-bit range maps to up to n * 2 rules */
86 * @n: Number of rules (in next field) this rule maps to
107 * @rules: Number of inserted rules
109 * @rules_alloc: Number of allocated rules, always >= rules
116 unsigned int rules; member
179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules,
236 * of rules (composing netmasks) the entries expand to. We compute the worst
253 unsigned long rules; in pipapo_estimate_size() local
259 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size()
262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size()
[all …]
/linux/drivers/gpu/drm/xe/
H A Dxe_rtp.c22 * rules and actions. This can be used to define tables with multiple entries
24 * the values to the registers that have matching rules.
35 const struct xe_rtp_rule *rules, in rule_matches() argument
42 for (r = rules, i = 0; i < n_rules; r = &rules[++i]) { in rule_matches()
47 * rules passed or none were evaluated. For both cases, in rule_matches()
48 * shortcut the other rules and return the proper value. in rule_matches()
121 * Advance rules until we find XE_RTP_MATCH_OR to check in rule_matches()
124 while (++i < n_rules && rules[i].match_type != XE_RTP_MATCH_OR) in rule_matches()
167 if (!rule_matches(xe, gt, hwe, entry->rules, entry->n_rules)) in rtp_process_one_sr()
206 * their rules match the condition. Bits are never cleared: entries with
[all …]
H A Dxe_gen_wa_oob.c19 " * This file was generated from rules: %s\n" \
58 char *name, *prev_name = NULL, *rules; in parse() local
81 rules = strtok(NULL, ""); in parse()
89 rules = name; in parse()
93 if (rules[0] == '\0') { in parse()
106 name, rules); in parse()
109 fprintf(csource, ", OR,\n\t%s", rules); in parse()
/linux/Documentation/admin-guide/aoe/
H A Dudev.txt1 # These rules tell udev what device nodes to create for aoe support.
11 # udev_rules="/etc/udev/rules.d/"
12 # bash# ls /etc/udev/rules.d/
13 # 10-wacom.rules 50-udev.rules
15 # /etc/udev/rules.d/60-aoe.rules
H A Dudev-install.sh1 # install the aoe-specific udev rules from udev.txt into
22 # find the directory where udev rules are stored, often
23 # /etc/udev/rules.d
27 rules_d=/etc/udev/rules.d
30 echo "$me Error: cannot find udev rules directory" 1>&2
33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
/linux/kernel/kcsan/
H A Dpermissive.h3 * Special rules for ignoring entire classes of data-racy memory accesses. None
4 * of the rules here imply that such data races are generally safe!
6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep
20 * Access ignore rules based on address.
35 * Data race ignore rules based on access type and value change patterns.
44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race()
70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
/linux/scripts/gendwarfksyms/
H A Dkabi.c74 static HASHTABLE_DEFINE(rules, 1 << RULE_HASH_BITS);
93 error("unexpected end of kABI rules"); in get_rule_field()
169 debug("kABI rules not found"); in kabi_read_rules()
181 error("kABI rules are not null-terminated"); in kabi_read_rules()
213 hash_add(rules, &rule->hash, rule_hash(rule)); in kabi_read_rules()
220 warn("unexpected data at the end of the kABI rules section"); in kabi_read_rules()
234 hash_for_each_possible(rules, rule, hash, in kabi_is_declonly()
282 rules, rule, hash, in kabi_is_enumerator_ignored()
309 hash_for_each_possible(rules, rule, hash, in kabi_get_enumerator_value()
329 hash_for_each_safe(rules, rule, tmp, hash) { in kabi_free()
[all …]
/linux/drivers/net/phy/
H A Dintel-xway.c405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument
413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported()
414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported()
421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported()
428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument
444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get()
447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get()
450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get()
455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get()
458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get()
[all …]
/linux/drivers/net/ethernet/microchip/vcap/
H A DKconfig13 A VCAP is essentially a TCAM with rules consisting of
24 The VCAP implementation provides switchcore independent handling of rules
27 - Creating and deleting rules
28 - Updating and getting rules
32 access rules via the API in a platform independent way, with the
/linux/security/smack/
H A DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
26 rules. The developer can use the information to
27 identify which rules are necessary and what accesses
54 delivering a signal in the Smack rules.
/linux/tools/testing/selftests/net/netfilter/
H A Dxt_string.sh70 echo "FAIL: rules match data before --from"
79 echo "FAIL: only two rules should match at low offset"
87 echo "FAIL: all rules should match at end of packet"
103 echo "FAIL: two rules should match pattern at start of second fragment"
111 echo "FAIL: two rules should match pattern at end of largest --to"
119 echo "FAIL: no rules should match pattern extending largest --to"
/linux/tools/perf/tests/shell/lib/
H A Dperf_metric_validation.py41 self.rules = None
402 # Create metric set for relationship rules
403 for rule in self.rules:
456 def remove_unsupported_rules(self, rules): argument
458 for rule in rules:
470 Create full rules which includes:
471 1) All the rules from the "relationshi_rules" file
474 Reindex all the rules to avoid repeated RuleIndex
477 rules = data['RelationshipRules']
479 self.rules = self.remove_unsupported_rules(rules)
[all …]

12345678910>>...44