/linux/tools/testing/selftests/landlock/ |
H A D | fs_test.c | 716 struct rule { struct 735 const struct rule rules[]) in create_ruleset() argument 770 const struct rule rules[] = { in TEST_F_FORK() 819 const struct rule rules[] = { in TEST_F_FORK() 842 const struct rule rules[] = { in TEST_F_FORK() 900 const struct rule rules[] = { in TEST_F_FORK() 927 const struct rule rules[] = { in TEST_F_FORK() 968 const struct rule layer1[] = { in TEST_F_FORK() 980 const struct rule layer2[] = { in TEST_F_FORK() 989 const struct rule layer3[] = { in TEST_F_FORK() [all …]
|
/linux/security/landlock/ |
H A D | fs.c | 361 const struct landlock_rule *rule; in find_rule() local 374 rule = landlock_find_rule(domain, id); in find_rule() 376 return rule; in find_rule() 846 const struct landlock_rule *rule; in is_access_to_paths_allowed() local 884 rule = find_rule(domain, walker_path.dentry); in is_access_to_paths_allowed() 886 rule, access_masked_parent1, layer_masks_parent1, in is_access_to_paths_allowed() 889 rule, access_masked_parent2, layer_masks_parent2, in is_access_to_paths_allowed()
|
/linux/scripts/ |
H A D | Kbuild.include | 92 # The rule defined shall write to stdout the content of the new file. 160 # if_changed_rule - as if_changed but execute rule instead
|
/linux/drivers/infiniband/hw/mlx5/ |
H A D | mlx5_ib.h | 262 struct mlx5_flow_handle *rule; member 838 struct mlx5_flow_handle *rule[MAX_OPFC_RULES]; member
|
/linux/Documentation/kbuild/ |
H A D | makefiles.rst | 444 This is a custom rule, following the normal syntax 453 echoing information to user in a rule is often a good practice 492 When the rule is evaluated, timestamps are compared between the target 706 This can be done in two ways. Either add the dependency in a rule, 833 (1) List the prerequisite explicitly in a custom rule. 848 When there is no suitable custom rule, and the host program 863 any rule. 1237 The archheaders: rule is used to generate header files that 1246 The archprepare: rule is used to list prerequisites that need to be 1412 A central rule exists to create ``$(obj)/%.dtb`` from ``$(src)/%.dts``; [all …]
|
H A D | kconfig-language.rst | 562 Such a dependency can be relaxed by combining it with the compile-testing rule
|
/linux/Documentation/userspace-api/ |
H A D | landlock.rst | 32 A Landlock rule describes an action on an object which the process intends to 136 We can now add a new rule to this ruleset thanks to the returned file 137 descriptor referring to this ruleset. The rule will only allow reading the 138 file hierarchy ``/usr``. Without another rule, write actions would then be 187 (e.g. through a SUID binary). We now have a ruleset with the first rule 189 the filesystem, and a second rule allowing HTTPS connections. 606 To be able to explicitly allow TCP operations (e.g., adding a network rule with
|
/linux/Documentation/filesystems/ |
H A D | proc.rst | 885 The general rule is that the contents, or even the existence of these
|
/linux/Documentation/admin-guide/ |
H A D | cgroup-v2.rst | 2355 not allowed (the exclusivity rule). A value that violates the 2356 exclusivity rule will be rejected with a write error.
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-kernel-fadump | 46 Kdump udev rule re-registers fadump on memory add/remove events, 48 kdump udev rule that fadump re-registration is not required on
|
/linux/Documentation/userspace-api/media/v4l/ |
H A D | dev-subdev.rst | 424 previous step. The exception to this rule is the sink compose
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | nft_fib.sh | 219 ip -net "$nsrouter" rule add from all table 128 220 ip -net "$nsrouter" rule add from all iif veth0 table 129 225 ip -net "$nsrouter" -4 rule delete table main
|
H A D | nft_flowtable.sh | 423 ip netns exec "$nsr1" nft -a insert rule inet filter forward ip dscp set cs3
|
H A D | nft_nat_zones.sh | 108 echo netns exec "$gw" ip rule add fwmark "$i" lookup $((1000+i))
|
H A D | nft_concat_range.sh | 1450 nft add rule netdev perf test counter name \"test\" drop 1457 nft delete rule netdev perf test handle "${handle}" 1459 nft add rule "netdev perf test ${chain_spec} @norange \ 1467 nft delete rule netdev perf test handle "${handle}" 1469 nft add rule "netdev perf test ${chain_spec%%. *} @noconcat \ 1477 nft delete rule netdev perf test handle "${handle}" 1479 nft add rule "netdev perf test ${chain_spec} @test \
|
/linux/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_connect.sh | 711 if ! ip -net "$listener_ns" $r6flag rule add fwmark 1 lookup 100; then 721 ip -net "$listener_ns" $r6flag rule del fwmark 1 lookup 100 737 ip -net "$listener_ns" $r6flag rule del fwmark 1 lookup 100
|
/linux/tools/testing/selftests/net/ |
H A D | fib_rule_tests.sh | 38 $IP rule show | grep -q l3mdev 159 ip rule help 2>&1 | grep -q $1 176 $IP -6 rule del $1 182 pref=$($IP -6 rule show $1 table $RTABLE | cut -d ":" -f 1) 183 $IP -6 rule del pref $pref 192 $IP -6 rule add $match table $RTABLE 205 $IP -6 rule add $match table $RTABLE 2>/dev/null 210 $IP -6 rule del $match table $RTABLE 294 $IP -6 rule add dsfield 0x04 table $RTABLE_PEER 309 $IP -6 rule del dsfield 0x04 table $RTABLE_PEER [all …]
|
/linux/sound/soc/sh/rcar/ |
H A D | core.c | 926 struct snd_pcm_hw_rule *rule) in rsnd_soc_hw_rule_rate() argument 931 struct rsnd_dai_stream *io = rule->private; in rsnd_soc_hw_rule_rate() 949 struct snd_pcm_hw_rule *rule) in rsnd_soc_hw_rule_channels() argument 954 struct rsnd_dai_stream *io = rule->private; in rsnd_soc_hw_rule_channels()
|
/linux/sound/soc/intel/avs/ |
H A D | pcm.c | 451 static int hw_rule_param_size(struct snd_pcm_hw_params *params, struct snd_pcm_hw_rule *rule) in hw_rule_param_size() argument 453 struct snd_interval *interval = hw_param_interval(params, rule->var); in hw_rule_param_size() 465 if (rule->var == SNDRV_PCM_HW_PARAM_PERIOD_SIZE) in hw_rule_param_size()
|
/linux/sound/firewire/ |
H A D | amdtp-stream.c | 158 struct snd_pcm_hw_rule *rule) in apply_constraint_to_size() argument 160 struct snd_interval *s = hw_param_interval(params, rule->var); in apply_constraint_to_size()
|
/linux/sound/drivers/ |
H A D | aloop.c | 976 struct snd_pcm_hw_rule *rule) in rule_format() argument 978 struct loopback_pcm *dpcm = rule->private; in rule_format() 987 return snd_mask_refine(hw_param_mask(params, rule->var), &m); in rule_format() 991 struct snd_pcm_hw_rule *rule) in rule_rate() argument 993 struct loopback_pcm *dpcm = rule->private; in rule_rate() 1003 return snd_interval_refine(hw_param_interval(params, rule->var), &t); in rule_rate() 1007 struct snd_pcm_hw_rule *rule) in rule_channels() argument 1009 struct loopback_pcm *dpcm = rule->private; in rule_channels() 1019 return snd_interval_refine(hw_param_interval(params, rule->var), &t); in rule_channels() 1023 struct snd_pcm_hw_rule *rule) in rule_period_bytes() argument [all …]
|
/linux/sound/core/ |
H A D | pcm_native.c | 2328 struct snd_pcm_hw_rule *rule) in snd_pcm_hw_rule_mul() argument 2331 snd_interval_mul(hw_param_interval_c(params, rule->deps[0]), in snd_pcm_hw_rule_mul() 2332 hw_param_interval_c(params, rule->deps[1]), &t); in snd_pcm_hw_rule_mul() 2333 return snd_interval_refine(hw_param_interval(params, rule->var), &t); in snd_pcm_hw_rule_mul() 2337 struct snd_pcm_hw_rule *rule) in snd_pcm_hw_rule_div() argument 2340 snd_interval_div(hw_param_interval_c(params, rule->deps[0]), in snd_pcm_hw_rule_div() 2341 hw_param_interval_c(params, rule->deps[1]), &t); in snd_pcm_hw_rule_div() 2342 return snd_interval_refine(hw_param_interval(params, rule->var), &t); in snd_pcm_hw_rule_div() 2346 struct snd_pcm_hw_rule *rule) in snd_pcm_hw_rule_muldivk() argument 2349 snd_interval_muldivk(hw_param_interval_c(params, rule->deps[0]), in snd_pcm_hw_rule_muldivk() [all …]
|
/linux/security/smack/ |
H A D | smack_lsm.c | 4703 char **rule = (char **)vrule; in smack_audit_rule_init() local 4704 *rule = NULL; in smack_audit_rule_init() 4716 *rule = skp->smk_known; in smack_audit_rule_init() 4757 char *rule = vrule; in smack_audit_rule_match() local 4759 if (unlikely(!rule)) { in smack_audit_rule_match() 4775 return (rule == skp->smk_known); in smack_audit_rule_match() 4777 return (rule != skp->smk_known); in smack_audit_rule_match()
|
/linux/security/selinux/ss/ |
H A D | services.c | 3502 struct selinux_audit_rule *rule = vrule; in selinux_audit_rule_free() local 3504 if (rule) { in selinux_audit_rule_free() 3505 context_destroy(&rule->au_ctxt); in selinux_audit_rule_free() 3506 kfree(rule); in selinux_audit_rule_free() 3519 struct selinux_audit_rule **rule = (struct selinux_audit_rule **)vrule; in selinux_audit_rule_init() local 3522 *rule = NULL; in selinux_audit_rule_init() 3600 *rule = tmprule; in selinux_audit_rule_init() 3606 *rule = NULL; in selinux_audit_rule_init() 3611 int selinux_audit_rule_known(struct audit_krule *rule) in selinux_audit_rule_known() argument 3615 for (i = 0; i < rule->field_count; i++) { in selinux_audit_rule_known() [all …]
|
/linux/net/wireless/ |
H A D | reg.h | 63 const struct ieee80211_reg_rule *rule);
|