/linux/drivers/gpu/drm/ci/ |
H A D | gitlab-ci.yml | 89 - '/.gitlab-ci/farm-rules.yml' 133 .rules-anchors: 134 rules: 159 # Rules applied to every job in the pipeline 160 .common-rules: 161 rules: 165 .never-post-merge-rules: 166 rules: 171 .scheduled_pipeline-rules: 172 rules: [all …]
|
H A D | container.yml | 24 rules: 28 rules: 32 rules: 36 rules: 40 rules: 44 rules: 48 rules: 52 rules: 56 rules: 60 rules: [all …]
|
/linux/drivers/net/phy/aquantia/ |
H A D | aquantia_leds.c | 35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument 41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported() 48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument 59 *rules = 0; in aqr_phy_led_hw_control_get() 61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get() 64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get() 67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get() 70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get() 73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get() 76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get() [all …]
|
/linux/tools/perf/util/ |
H A D | strfilter.h | 23 * @rules: Filter rule, which is a combination of glob expressions. 24 * @err: Pointer which points an error detected on @rules 26 * Parse @rules and return new strfilter. Return NULL if an error detected. 30 struct strfilter *strfilter__new(const char *rules, const char **err); 35 * @rules: Filter rule to be appended at left of the root of 37 * @err: Pointer which points an error detected on @rules 39 * Parse @rules and join it to the @filter by using logical-or. 43 const char *rules, const char **err); 48 * @rules: Filter rule to be appended at left of the root of 50 * @err: Pointer which points an error detected on @rules [all …]
|
H A D | strfilter.c | 160 struct strfilter *strfilter__new(const char *rules, const char **err) in strfilter__new() argument 166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new() 179 const char *rules, const char **err) in strfilter__append() argument 184 if (!filter || !rules) in strfilter__append() 187 right = strfilter_node__new(rules, &ep); in strfilter__append() 207 int strfilter__or(struct strfilter *filter, const char *rules, const char **err) in strfilter__or() argument 209 return strfilter__append(filter, true, rules, err); in strfilter__or() 212 int strfilter__and(struct strfilter *filter, const char *rules, in strfilter__and() argument 215 return strfilter__append(filter, false, rules, err); in strfilter__and() 238 /* Return true if STR matches the filter rules */
|
/linux/drivers/net/phy/mediatek/ |
H A D | mtk-phy-lib.c | 99 unsigned long rules, in mtk_phy_led_hw_is_supported() argument 106 if (rules & ~supported_triggers) in mtk_phy_led_hw_is_supported() 114 unsigned long *rules, u16 on_set, in mtk_phy_led_hw_ctrl_get() argument 156 if (!rules) in mtk_phy_led_hw_ctrl_get() 160 *rules |= BIT(TRIGGER_NETDEV_LINK); in mtk_phy_led_hw_ctrl_get() 163 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mtk_phy_led_hw_ctrl_get() 166 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mtk_phy_led_hw_ctrl_get() 169 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mtk_phy_led_hw_ctrl_get() 172 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in mtk_phy_led_hw_ctrl_get() 175 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mtk_phy_led_hw_ctrl_get() [all …]
|
/linux/security/apparmor/ |
H A D | net.c | 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local 114 typeof(*rules), list); in aa_profile_af_perm() 124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm() 130 state = aa_dfa_match_len(rules->policy->dfa, state, (char *) &buffer, in aa_profile_af_perm() 132 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_af_perm() 226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local 227 typeof(*rules), list); in aa_secmark_perm() 229 if (rules->secmark_count == 0) in aa_secmark_perm() 232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 233 if (!rules->secmark[i].secid) { in aa_secmark_perm() [all …]
|
H A D | resource.c | 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local 93 typeof(*rules), list); in profile_setrlimit() 96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 128 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit() 168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local 169 typeof(*rules), in __aa_transition_rlimits() 171 if (rules->rlimits.mask) { in __aa_transition_rlimits() 176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local [all …]
|
H A D | mount.c | 314 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt_path_str() local 315 typeof(*rules), list); in match_mnt_path_str() 322 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str() 337 pos = do_match_mnt(rules->policy, in match_mnt_path_str() 338 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str() 374 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt() local 375 typeof(*rules), list); in match_mnt() 381 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt() 607 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_umount() local 608 typeof(*rules), list); in profile_umount() [all …]
|
H A D | ipc.c | 83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() local 84 typeof(*rules), list); in profile_signal_perm() 89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm() 95 state = aa_dfa_next(rules->policy->dfa, in profile_signal_perm() 96 rules->policy->start[AA_CLASS_SIGNAL], in profile_signal_perm() 98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
|
H A D | task.c | 231 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_ptrace_perm() local 232 typeof(*rules), list); in profile_ptrace_perm() 237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm() 249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm() 263 if (ANY_RULE_MEDIATES(&tracer->rules, AA_CLASS_PTRACE)) in profile_tracer_perm() 327 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_ns_perm() local 328 typeof(*rules), in aa_profile_ns_perm() 332 state = RULE_MEDIATES(rules, ad->class); in aa_profile_ns_perm() 336 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_ns_perm()
|
/linux/drivers/net/phy/qcom/ |
H A D | qca807x.c | 135 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument 141 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 143 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() 145 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev() 147 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev() 149 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev() 151 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev() 153 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev() 157 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 159 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() [all …]
|
/linux/net/netfilter/ |
H A D | nft_set_pipapo.c | 56 * represented as one or more rules, depending on the number of composing 61 * Rules are mapped between fields through an array of x, n pairs, with each 62 * item mapping a matched rule to one or more rules. The position of the pair in 65 * next-field rules the current rule maps to. 108 * or multiple rules for ranges. Ranges are expanded to composing netmasks 116 * - insert references to the rules in the lookup table, selecting buckets 144 * rules from the lookup table to rules belonging to the same entry in 147 * Note that as rules map to contiguous ranges of rules, given how netmask 182 * we need to map rules for 10.0.0.5 in lookup table #0 (rule #0) to 1024 183 * in lookup table #1 (rule #0) and rules for 192.168.1.0-192.168.2.1 [all …]
|
H A D | nft_set_pipapo.h | 52 /* Each n-bit range maps to up to n * 2 rules */ 86 * @n: Number of rules (in next field) this rule maps to 107 * @rules: Number of inserted rules 109 * @rules_alloc: Number of allocated rules, always >= rules 116 unsigned int rules; member 179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, 236 * of rules (composing netmasks) the entries expand to. We compute the worst 253 unsigned long rules; in pipapo_estimate_size() local 259 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size() 262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() [all …]
|
/linux/drivers/gpu/drm/xe/ |
H A D | xe_rtp.c | 22 * rules and actions. This can be used to define tables with multiple entries 24 * the values to the registers that have matching rules. 35 const struct xe_rtp_rule *rules, in rule_matches() argument 42 for (r = rules, i = 0; i < n_rules; r = &rules[++i]) { in rule_matches() 47 * rules passed or none were evaluated. For both cases, in rule_matches() 48 * shortcut the other rules and return the proper value. in rule_matches() 121 * Advance rules until we find XE_RTP_MATCH_OR to check in rule_matches() 124 while (++i < n_rules && rules[i].match_type != XE_RTP_MATCH_OR) in rule_matches() 167 if (!rule_matches(xe, gt, hwe, entry->rules, entry->n_rules)) in rtp_process_one_sr() 206 * their rules match the condition. Bits are never cleared: entries with [all …]
|
H A D | xe_gen_wa_oob.c | 19 " * This file was generated from rules: %s\n" \ 58 char *name, *prev_name = NULL, *rules; in parse() local 81 rules = strtok(NULL, ""); in parse() 89 rules = name; in parse() 93 if (rules[0] == '\0') { in parse() 106 name, rules); in parse() 109 fprintf(csource, ", OR,\n\t%s", rules); in parse()
|
/linux/Documentation/admin-guide/aoe/ |
H A D | udev.txt | 1 # These rules tell udev what device nodes to create for aoe support. 11 # udev_rules="/etc/udev/rules.d/" 12 # bash# ls /etc/udev/rules.d/ 13 # 10-wacom.rules 50-udev.rules 15 # /etc/udev/rules.d/60-aoe.rules
|
H A D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 27 rules_d=/etc/udev/rules.d 30 echo "$me Error: cannot find udev rules directory" 1>&2 33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
|
/linux/kernel/kcsan/ |
H A D | permissive.h | 3 * Special rules for ignoring entire classes of data-racy memory accesses. None 4 * of the rules here imply that such data races are generally safe! 6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep 20 * Access ignore rules based on address. 35 * Data race ignore rules based on access type and value change patterns. 44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race() 70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
|
/linux/scripts/gendwarfksyms/ |
H A D | kabi.c | 74 static HASHTABLE_DEFINE(rules, 1 << RULE_HASH_BITS); 93 error("unexpected end of kABI rules"); in get_rule_field() 169 debug("kABI rules not found"); in kabi_read_rules() 181 error("kABI rules are not null-terminated"); in kabi_read_rules() 213 hash_add(rules, &rule->hash, rule_hash(rule)); in kabi_read_rules() 220 warn("unexpected data at the end of the kABI rules section"); in kabi_read_rules() 234 hash_for_each_possible(rules, rule, hash, in kabi_is_declonly() 282 rules, rule, hash, in kabi_is_enumerator_ignored() 309 hash_for_each_possible(rules, rule, hash, in kabi_get_enumerator_value() 329 hash_for_each_safe(rules, rule, tmp, hash) { in kabi_free() [all …]
|
/linux/drivers/net/phy/ |
H A D | intel-xway.c | 405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument 413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported() 414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported() 421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported() 428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument 444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get() 447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get() 450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get() 455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get() 458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get() [all …]
|
/linux/drivers/net/ethernet/microchip/vcap/ |
H A D | Kconfig | 13 A VCAP is essentially a TCAM with rules consisting of 24 The VCAP implementation provides switchcore independent handling of rules 27 - Creating and deleting rules 28 - Updating and getting rules 32 access rules via the API in a platform independent way, with the
|
/linux/security/smack/ |
H A D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 26 rules. The developer can use the information to 27 identify which rules are necessary and what accesses 54 delivering a signal in the Smack rules.
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | xt_string.sh | 70 echo "FAIL: rules match data before --from" 79 echo "FAIL: only two rules should match at low offset" 87 echo "FAIL: all rules should match at end of packet" 103 echo "FAIL: two rules should match pattern at start of second fragment" 111 echo "FAIL: two rules should match pattern at end of largest --to" 119 echo "FAIL: no rules should match pattern extending largest --to"
|
/linux/tools/perf/tests/shell/lib/ |
H A D | perf_metric_validation.py | 41 self.rules = None 402 # Create metric set for relationship rules 403 for rule in self.rules: 456 def remove_unsupported_rules(self, rules): argument 458 for rule in rules: 470 Create full rules which includes: 471 1) All the rules from the "relationshi_rules" file 474 Reindex all the rules to avoid repeated RuleIndex 477 rules = data['RelationshipRules'] 479 self.rules = self.remove_unsupported_rules(rules) [all …]
|