Home
last modified time | relevance | path

Searched full:rules (Results 1 – 25 of 1137) sorted by relevance

12345678910>>...46

/linux/drivers/net/dsa/mv88e6xxx/
H A Dleds.c99 unsigned long rules; member
105 /* The following is a lookup table to check what rules we can support on a
106 * certain LED given restrictions such as that some rules only work with fiber
123 .rules = BIT(TRIGGER_NETDEV_LINK),
130 .rules = BIT(TRIGGER_NETDEV_LINK_1000),
137 .rules = BIT(TRIGGER_NETDEV_LINK_100) | BIT(TRIGGER_NETDEV_LINK_1000),
144 .rules = BIT(TRIGGER_NETDEV_LINK_10) | BIT(TRIGGER_NETDEV_LINK_100),
151 .rules = BIT(TRIGGER_NETDEV_LINK_100),
159 .rules = BIT(TRIGGER_NETDEV_LINK_1000),
167 .rules = BIT(TRIGGER_NETDEV_LINK_1000),
[all …]
/linux/drivers/net/phy/aquantia/
H A Daquantia_leds.c35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument
41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported()
48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument
59 *rules = 0; in aqr_phy_led_hw_control_get()
61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get()
64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get()
67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get()
70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get()
73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get()
76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get()
[all …]
/linux/drivers/gpu/drm/ci/
H A Dgitlab-ci.yml89 - '/.gitlab-ci/farm-rules.yml'
141 .rules-anchors:
142 rules:
160 # Rules applied to every job in the pipeline
161 .common-rules:
162 rules:
167 .never-post-merge-rules:
168 rules:
173 .container+build-rules:
174 rules:
[all …]
/linux/drivers/net/phy/mediatek/
H A Dmtk-phy-lib.c99 unsigned long rules, in mtk_phy_led_hw_is_supported() argument
106 if (rules & ~supported_triggers) in mtk_phy_led_hw_is_supported()
114 unsigned long *rules, u16 on_set, in mtk_phy_led_hw_ctrl_get() argument
156 if (!rules) in mtk_phy_led_hw_ctrl_get()
160 *rules |= BIT(TRIGGER_NETDEV_LINK); in mtk_phy_led_hw_ctrl_get()
163 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mtk_phy_led_hw_ctrl_get()
166 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mtk_phy_led_hw_ctrl_get()
169 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mtk_phy_led_hw_ctrl_get()
172 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in mtk_phy_led_hw_ctrl_get()
175 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mtk_phy_led_hw_ctrl_get()
[all …]
/linux/security/apparmor/
H A Dcapability.c72 struct aa_ruleset *rules = profile->label.rules[0]; in audit_caps() local
81 !cap_raised(rules->caps.audit, cap))) in audit_caps()
85 cap_raised(rules->caps.kill, cap)) { in audit_caps()
87 } else if (cap_raised(rules->caps.quiet, cap) && in audit_caps()
124 struct aa_ruleset *rules = profile->label.rules[0]; in profile_capable() local
128 state = RULE_MEDIATES(rules, ad->class); in profile_capable()
134 state = aa_dfa_next(rules->policy->dfa, state, cap >> 5); in profile_capable()
136 perms = *aa_lookup_perms(rules->policy, state); in profile_capable()
150 if (cap_raised(rules->caps.allow, cap) && in profile_capable()
151 !cap_raised(rules->caps.denied, cap)) in profile_capable()
[all …]
H A Daf_unix.c205 struct aa_ruleset *rules = profile->label.rules[0]; in profile_create_perm() local
211 state = RULE_MEDIATES_v9NET(rules); in profile_create_perm()
213 state = aa_match_to_prot(rules->policy, state, AA_MAY_CREATE, in profile_create_perm()
217 return aa_do_perms(profile, rules->policy, state, AA_MAY_CREATE, in profile_create_perm()
229 struct aa_ruleset *rules = profile->label.rules[0]; in profile_sk_perm() local
237 state = RULE_MEDIATES_v9NET(rules); in profile_sk_perm()
244 state = match_to_sk(rules->policy, state, request, unix_sk(sk), in profile_sk_perm()
247 return aa_do_perms(profile, rules->policy, state, request, p, in profile_sk_perm()
257 struct aa_ruleset *rules = profile->label.rules[0]; in profile_bind_perm() local
266 state = RULE_MEDIATES_v9NET(rules); in profile_bind_perm()
[all …]
H A Dresource.c92 struct aa_ruleset *rules = profile->label.rules[0]; in profile_setrlimit() local
95 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit()
96 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit()
127 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit()
167 struct aa_ruleset *rules = old->label.rules[0]; in __aa_transition_rlimits() local
168 if (rules->rlimits.mask) { in __aa_transition_rlimits()
173 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits()
185 struct aa_ruleset *rules = new->label.rules[0]; in __aa_transition_rlimits() local
188 if (!rules->rlimits.mask) in __aa_transition_rlimits()
191 if (!(rules->rlimits.mask & mask)) in __aa_transition_rlimits()
[all …]
H A Dpolicy_unpack.c604 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument
614 rules->secmark = kzalloc_objs(struct aa_secmark, size); in unpack_secmark()
615 if (!rules->secmark) in unpack_secmark()
618 rules->secmark_count = size; in unpack_secmark()
621 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark()
623 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark()
625 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark()
637 if (rules->secmark) { in unpack_secmark()
639 kfree_sensitive(rules->secmark[i].label); in unpack_secmark()
640 kfree_sensitive(rules->secmark); in unpack_secmark()
[all …]
H A Dnet.c254 struct aa_ruleset *rules = profile->label.rules[0]; in aa_profile_af_perm() local
264 state = RULE_MEDIATES_NET(rules); in aa_profile_af_perm()
267 state = aa_match_to_prot(rules->policy, state, request, family, type, in aa_profile_af_perm()
269 return aa_do_perms(profile, rules->policy, state, request, p, ad); in aa_profile_af_perm()
366 struct aa_ruleset *rules = profile->label.rules[0]; in aa_secmark_perm() local
368 if (rules->secmark_count == 0) in aa_secmark_perm()
371 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm()
372 if (!rules->secmark[i].secid) { in aa_secmark_perm()
373 ret = apparmor_secmark_init(&rules->secmark[i]); in aa_secmark_perm()
378 if (rules->secmark[i].secid == secid || in aa_secmark_perm()
[all …]
H A Dmount.c314 struct aa_ruleset *rules = profile->label.rules[0]; in match_mnt_path_str() local
321 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str()
336 pos = do_match_mnt(rules->policy, in match_mnt_path_str()
337 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str()
373 struct aa_ruleset *rules = profile->label.rules[0]; in match_mnt() local
379 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt()
605 struct aa_ruleset *rules = profile->label.rules[0]; in profile_umount() local
614 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in profile_umount()
622 state = aa_dfa_match(rules->policy->dfa, in profile_umount()
623 rules->policy->start[AA_CLASS_MOUNT], in profile_umount()
[all …]
H A Dfile.c179 * @rules: the aa_policydb to lookup perms for (NOT NULL)
187 struct aa_perms *aa_lookup_condperms(kuid_t subj_uid, struct aa_policydb *rules, in aa_lookup_condperms() argument
190 unsigned int index = ACCEPT_TABLE(rules->dfa)[state]; in aa_lookup_condperms()
192 if (!(rules->perms)) in aa_lookup_condperms()
195 if ((ACCEPT_TABLE2(rules->dfa)[state] & ACCEPT_FLAG_OWNER)) { in aa_lookup_condperms()
197 return &(rules->perms[index]); in aa_lookup_condperms()
198 return &(rules->perms[index + 1]); in aa_lookup_condperms()
201 return &(rules->perms[index]); in aa_lookup_condperms()
231 struct aa_ruleset *rules = profile->label.rules[0]; in __aa_path_perm() local
235 ((flags & PATH_SOCK_COND) && !RULE_MEDIATES_v9NET(rules))) in __aa_path_perm()
[all …]
/linux/tools/perf/util/
H A Dstrfilter.h23 * @rules: Filter rule, which is a combination of glob expressions.
24 * @err: Pointer which points an error detected on @rules
26 * Parse @rules and return new strfilter. Return NULL if an error detected.
30 struct strfilter *strfilter__new(const char *rules, const char **err);
35 * @rules: Filter rule to be appended at left of the root of
37 * @err: Pointer which points an error detected on @rules
39 * Parse @rules and join it to the @filter by using logical-or.
43 const char *rules, const char **err);
48 * @rules: Filter rule to be appended at left of the root of
50 * @err: Pointer which points an error detected on @rules
[all …]
/linux/drivers/net/phy/qcom/
H A Dqca807x.c136 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument
142 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev()
144 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev()
146 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev()
148 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev()
150 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev()
152 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev()
154 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev()
158 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev()
160 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev()
[all …]
H A Dqca808x.c424 static int qca808x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca808x_led_parse_netdev() argument
428 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca808x_led_parse_netdev()
430 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca808x_led_parse_netdev()
432 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca808x_led_parse_netdev()
434 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca808x_led_parse_netdev()
436 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca808x_led_parse_netdev()
438 if (test_bit(TRIGGER_NETDEV_LINK_2500, &rules)) in qca808x_led_parse_netdev()
440 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca808x_led_parse_netdev()
442 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca808x_led_parse_netdev()
445 if (rules && !*offload_trigger) in qca808x_led_parse_netdev()
[all …]
/linux/net/netfilter/
H A Dnft_set_pipapo.c56 * represented as one or more rules, depending on the number of composing
61 * Rules are mapped between fields through an array of x, n pairs, with each
62 * item mapping a matched rule to one or more rules. The position of the pair in
65 * next-field rules the current rule maps to.
108 * or multiple rules for ranges. Ranges are expanded to composing netmasks
116 * - insert references to the rules in the lookup table, selecting buckets
144 * rules from the lookup table to rules belonging to the same entry in
147 * Note that as rules map to contiguous ranges of rules, given how netmask
182 * we need to map rules for 10.0.0.5 in lookup table #0 (rule #0) to 1024
183 * in lookup table #1 (rule #0) and rules for 192.168.1.0-192.168.2.1
[all …]
H A Dnft_set_pipapo.h52 /* Each n-bit range maps to up to n * 2 rules */
86 * @n: Number of rules (in next field) this rule maps to
107 * @rules: Number of inserted rules
109 * @rules_alloc: Number of allocated rules, always >= rules
116 unsigned int rules; member
181 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules,
238 * of rules (composing netmasks) the entries expand to. We compute the worst
255 unsigned long rules; in pipapo_estimate_size() local
261 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size()
264 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size()
[all …]
/linux/security/apparmor/include/
H A Dpolicy.h74 APPARMOR_ENFORCE, /* enforce access rules */
181 /* struct aa_ruleset - data covering mediation rules
184 * @policy: general match rules governing policy
185 * @file: The set of rules governing basic file access and domain transitions
206 /* struct aa_attachment - data and rules for a profiles attachment
233 * @attach: attachment rules for the profile
234 * @rules: rules to be enforced
244 * @rules - label with the rule vec on its end
249 * attachments are determined by profile X transition rules.
328 static inline aa_state_t RULE_MEDIATES(struct aa_ruleset *rules, in RULE_MEDIATES() argument
[all …]
/linux/Documentation/admin-guide/aoe/
H A Dudev-install.sh1 # install the aoe-specific udev rules from udev.txt into
22 # find the directory where udev rules are stored, often
23 # /etc/udev/rules.d
27 rules_d=/etc/udev/rules.d
30 echo "$me Error: cannot find udev rules directory" 1>&2
33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
/linux/kernel/kcsan/
H A Dpermissive.h3 * Special rules for ignoring entire classes of data-racy memory accesses. None
4 * of the rules here imply that such data races are generally safe!
6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep
20 * Access ignore rules based on address.
35 * Data race ignore rules based on access type and value change patterns.
44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race()
70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
/linux/drivers/net/phy/
H A Dintel-xway.c405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument
413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported()
414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported()
421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported()
428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument
444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get()
447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get()
450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get()
455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get()
458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get()
[all …]
H A Dmxl-86110.c439 unsigned long rules) in mxl86110_led_hw_is_supported() argument
445 if (rules & ~supported_trgs) in mxl86110_led_hw_is_supported()
452 unsigned long *rules) in mxl86110_led_hw_control_get() argument
465 *rules |= BIT(TRIGGER_NETDEV_TX); in mxl86110_led_hw_control_get()
468 *rules |= BIT(TRIGGER_NETDEV_RX); in mxl86110_led_hw_control_get()
471 *rules |= BIT(TRIGGER_NETDEV_HALF_DUPLEX); in mxl86110_led_hw_control_get()
474 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mxl86110_led_hw_control_get()
477 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mxl86110_led_hw_control_get()
480 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mxl86110_led_hw_control_get()
483 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mxl86110_led_hw_control_get()
[all …]
/linux/Documentation/doc-guide/
H A Dparse-headers.rst49 The optional ``FILE_RULES`` contains a set of rules like::
97 By default, it create rules for all symbols and defines, but it also
98 allows parsing an exception file. Such file contains a set of rules
101 1. Ignore rules:
107 2. Replace rules:
117 3. Namespace rules
122 be overridden by replace rules.
124 On ignore and replace rules, *type* can be:
/linux/drivers/net/ethernet/microchip/vcap/
H A DKconfig13 A VCAP is essentially a TCAM with rules consisting of
24 The VCAP implementation provides switchcore independent handling of rules
27 - Creating and deleting rules
28 - Updating and getting rules
32 access rules via the API in a platform independent way, with the
/linux/tools/lib/python/kdoc/
H A Dparse_data_structs.py17 The optional rules file contains a set of rules like::
42 By default, it create rules for all symbols and defines, but it also
43 allows parsing an exception file. Such file contains a set of rules
46 1. Ignore rules::
52 2. Replace rules::
61 3. Namespace rules::
66 be overridden by replace rules.
68 On ignore and replace rules, ``<type>`` can be:
181 # ignore rules
[all...]
/linux/security/smack/
H A DKconfig17 bool "Reporting on access granted by Smack rules"
21 Enable the bring-up ("b") access mode in Smack rules.
26 rules. The developer can use the information to
27 identify which rules are necessary and what accesses
54 delivering a signal in the Smack rules.

12345678910>>...46