Home
last modified time | relevance | path

Searched full:rules (Results 1 – 25 of 1102) sorted by relevance

12345678910>>...45

/linux/drivers/gpu/drm/ci/
H A Dgitlab-ci.yml89 - '/.gitlab-ci/farm-rules.yml'
133 .rules-anchors:
134 rules:
159 # Rules applied to every job in the pipeline
160 .common-rules:
161 rules:
165 .never-post-merge-rules:
166 rules:
171 .scheduled_pipeline-rules:
172 rules:
[all …]
H A Dcontainer.yml24 rules:
28 rules:
32 rules:
36 rules:
40 rules:
44 rules:
48 rules:
52 rules:
56 rules:
60 rules:
[all …]
/linux/drivers/net/phy/aquantia/
H A Daquantia_leds.c35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument
41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported()
48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument
59 *rules = 0; in aqr_phy_led_hw_control_get()
61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get()
64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get()
67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get()
70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get()
73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get()
76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get()
[all …]
/linux/tools/perf/util/
H A Dstrfilter.h23 * @rules: Filter rule, which is a combination of glob expressions.
24 * @err: Pointer which points an error detected on @rules
26 * Parse @rules and return new strfilter. Return NULL if an error detected.
30 struct strfilter *strfilter__new(const char *rules, const char **err);
35 * @rules: Filter rule to be appended at left of the root of
37 * @err: Pointer which points an error detected on @rules
39 * Parse @rules and join it to the @filter by using logical-or.
43 const char *rules, const char **err);
48 * @rules: Filter rule to be appended at left of the root of
50 * @err: Pointer which points an error detected on @rules
[all …]
H A Dstrfilter.c160 struct strfilter *strfilter__new(const char *rules, const char **err) in strfilter__new() argument
166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new()
179 const char *rules, const char **err) in strfilter__append() argument
184 if (!filter || !rules) in strfilter__append()
187 right = strfilter_node__new(rules, &ep); in strfilter__append()
207 int strfilter__or(struct strfilter *filter, const char *rules, const char **err) in strfilter__or() argument
209 return strfilter__append(filter, true, rules, err); in strfilter__or()
212 int strfilter__and(struct strfilter *filter, const char *rules, in strfilter__and() argument
215 return strfilter__append(filter, false, rules, err); in strfilter__and()
238 /* Return true if STR matches the filter rules */
/linux/security/apparmor/
H A Dnet.c113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local
114 typeof(*rules), list); in aa_profile_af_perm()
124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm()
130 state = aa_dfa_match_len(rules->policy->dfa, state, (char *) &buffer, in aa_profile_af_perm()
132 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_af_perm()
226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local
227 typeof(*rules), list); in aa_secmark_perm()
229 if (rules->secmark_count == 0) in aa_secmark_perm()
232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm()
233 if (!rules->secmark[i].secid) { in aa_secmark_perm()
[all …]
H A Dresource.c92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local
93 typeof(*rules), list); in profile_setrlimit()
96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit()
97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit()
128 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit()
168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local
169 typeof(*rules), in __aa_transition_rlimits()
171 if (rules->rlimits.mask) { in __aa_transition_rlimits()
176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits()
188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local
[all …]
H A Dmount.c314 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt_path_str() local
315 typeof(*rules), list); in match_mnt_path_str()
322 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str()
337 pos = do_match_mnt(rules->policy, in match_mnt_path_str()
338 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str()
374 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt() local
375 typeof(*rules), list); in match_mnt()
381 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt()
607 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_umount() local
608 typeof(*rules), list); in profile_umount()
[all …]
H A Dipc.c83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() local
84 typeof(*rules), list); in profile_signal_perm()
89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm()
95 state = aa_dfa_next(rules->policy->dfa, in profile_signal_perm()
96 rules->policy->start[AA_CLASS_SIGNAL], in profile_signal_perm()
98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
H A Dtask.c231 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_ptrace_perm() local
232 typeof(*rules), list); in profile_ptrace_perm()
237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm()
249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm()
263 if (ANY_RULE_MEDIATES(&tracer->rules, AA_CLASS_PTRACE)) in profile_tracer_perm()
327 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_ns_perm() local
328 typeof(*rules), in aa_profile_ns_perm()
332 state = RULE_MEDIATES(rules, ad->class); in aa_profile_ns_perm()
336 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_ns_perm()
/linux/drivers/net/phy/qcom/
H A Dqca807x.c134 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument
140 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev()
142 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev()
144 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev()
146 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev()
148 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev()
150 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev()
152 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev()
156 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev()
158 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev()
[all …]
/linux/net/netfilter/
H A Dnft_set_pipapo.c56 * represented as one or more rules, depending on the number of composing
61 * Rules are mapped between fields through an array of x, n pairs, with each
62 * item mapping a matched rule to one or more rules. The position of the pair in
65 * next-field rules the current rule maps to.
108 * or multiple rules for ranges. Ranges are expanded to composing netmasks
116 * - insert references to the rules in the lookup table, selecting buckets
144 * rules from the lookup table to rules belonging to the same entry in
147 * Note that as rules map to contiguous ranges of rules, given how netmask
182 * we need to map rules for 10.0.0.5 in lookup table #0 (rule #0) to 1024
183 * in lookup table #1 (rule #0) and rules for 192.168.1.0-192.168.2.1
[all …]
H A Dnft_set_pipapo.h52 /* Each n-bit range maps to up to n * 2 rules */
86 * @n: Number of rules (in next field) this rule maps to
107 * @rules: Number of inserted rules
109 * @rules_alloc: Number of allocated rules, always >= rules
116 unsigned int rules; member
179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules,
236 * of rules (composing netmasks) the entries expand to. We compute the worst
253 unsigned long rules; in pipapo_estimate_size() local
259 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size()
262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size()
[all …]
/linux/drivers/gpu/drm/xe/
H A Dxe_rtp.c22 * rules and actions. This can be used to define tables with multiple entries
24 * the values to the registers that have matching rules.
35 const struct xe_rtp_rule *rules, in rule_matches() argument
42 for (r = rules, i = 0; i < n_rules; r = &rules[++i]) { in rule_matches()
47 * rules passed or none were evaluated. For both cases, in rule_matches()
48 * shortcut the other rules and return the proper value. in rule_matches()
121 * Advance rules until we find XE_RTP_MATCH_OR to check in rule_matches()
124 while (++i < n_rules && rules[i].match_type != XE_RTP_MATCH_OR) in rule_matches()
167 if (!rule_matches(xe, gt, hwe, entry->rules, entry->n_rules)) in rtp_process_one_sr()
206 * their rules match the condition. Bits are never cleared: entries with
[all …]
H A Dxe_gen_wa_oob.c19 " * This file was generated from rules: %s\n" \
58 char *name, *prev_name = NULL, *rules; in parse() local
81 rules = strtok(NULL, ""); in parse()
89 rules = name; in parse()
93 if (rules[0] == '\0') { in parse()
106 name, rules); in parse()
109 fprintf(csource, ", OR,\n\t%s", rules); in parse()
/linux/Documentation/admin-guide/aoe/
H A Dudev.txt1 # These rules tell udev what device nodes to create for aoe support.
11 # udev_rules="/etc/udev/rules.d/"
12 # bash# ls /etc/udev/rules.d/
13 # 10-wacom.rules 50-udev.rules
15 # /etc/udev/rules.d/60-aoe.rules
H A Dudev-install.sh1 # install the aoe-specific udev rules from udev.txt into
22 # find the directory where udev rules are stored, often
23 # /etc/udev/rules.d
27 rules_d=/etc/udev/rules.d
30 echo "$me Error: cannot find udev rules directory" 1>&2
33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
/linux/kernel/kcsan/
H A Dpermissive.h3 * Special rules for ignoring entire classes of data-racy memory accesses. None
4 * of the rules here imply that such data races are generally safe!
6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep
20 * Access ignore rules based on address.
35 * Data race ignore rules based on access type and value change patterns.
44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race()
70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
/linux/drivers/net/phy/
H A Dintel-xway.c405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument
413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported()
414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported()
421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported()
428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument
444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get()
447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get()
450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get()
455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get()
458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get()
[all …]
/linux/drivers/net/ethernet/microchip/vcap/
H A DKconfig13 A VCAP is essentially a TCAM with rules consisting of
24 The VCAP implementation provides switchcore independent handling of rules
27 - Creating and deleting rules
28 - Updating and getting rules
32 access rules via the API in a platform independent way, with the
/linux/security/smack/
H A DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
26 rules. The developer can use the information to
27 identify which rules are necessary and what accesses
54 delivering a signal in the Smack rules.
/linux/Documentation/admin-guide/LSM/
H A DSmack.rst50 load the Smack access rules
154 This interface allows modification of existing access control rules.
217 This interface allows access control rules in addition to
218 the system defined rules to be specified. The format accepted
232 This interface allows access control rules in addition to
233 the system defined rules to be specified. The format accepted
248 This interface allows process specific access rules to be
249 defined. These rules are only consulted if access would
255 This interface allows process specific access rules to be
256 defined. These rules are only consulted if access would
[all …]
/linux/tools/perf/tests/shell/lib/
H A Dperf_metric_validation.py41 self.rules = None
402 # Create metric set for relationship rules
403 for rule in self.rules:
456 def remove_unsupported_rules(self, rules): argument
458 for rule in rules:
470 Create full rules which includes:
471 1) All the rules from the "relationshi_rules" file
474 Reindex all the rules to avoid repeated RuleIndex
477 rules = data['RelationshipRules']
479 self.rules = self.remove_unsupported_rules(rules)
[all …]
/linux/tools/testing/selftests/net/netfilter/
H A Dxt_string.sh70 echo "FAIL: rules match data before --from"
79 echo "FAIL: only two rules should match at low offset"
87 echo "FAIL: all rules should match at end of packet"
103 echo "FAIL: two rules should match pattern at start of second fragment"
111 echo "FAIL: two rules should match pattern at end of largest --to"
119 echo "FAIL: no rules should match pattern extending largest --to"
/linux/Documentation/sound/designs/
H A Dtracepoints.rst116 struct snd_pcm_hardware and rules of constraints in the runtime. The
117 structure describes capabilities of handled hardware. The rules describes
120 to compute the target parameter. ALSA PCM core registers some rules to the
129 2. In the same callback, drivers are also expected to register additional rules
156 device, rules of constraint and name of the changed parameter, in order. The
157 field for rules of constraint consists of two sub-fields; index of applied rule
158 and total number of rules added to the runtime. As an exception, the index 000
159 means that the parameter is changed by ALSA PCM core, regardless of the rules.

12345678910>>...45