/linux-6.14.4/drivers/net/dsa/mv88e6xxx/ |
D | leds.c | 99 unsigned long rules; member 105 /* The following is a lookup table to check what rules we can support on a 106 * certain LED given restrictions such as that some rules only work with fiber 123 .rules = BIT(TRIGGER_NETDEV_LINK), 130 .rules = BIT(TRIGGER_NETDEV_LINK_1000), 137 .rules = BIT(TRIGGER_NETDEV_LINK_100) | BIT(TRIGGER_NETDEV_LINK_1000), 144 .rules = BIT(TRIGGER_NETDEV_LINK_10) | BIT(TRIGGER_NETDEV_LINK_100), 151 .rules = BIT(TRIGGER_NETDEV_LINK_100), 159 .rules = BIT(TRIGGER_NETDEV_LINK_1000), 167 .rules = BIT(TRIGGER_NETDEV_LINK_1000), [all …]
|
/linux-6.14.4/drivers/gpu/drm/ci/ |
D | gitlab-ci.yml | 89 - '/.gitlab-ci/farm-rules.yml' 133 .rules-anchors: 134 rules: 159 # Rules applied to every job in the pipeline 160 .common-rules: 161 rules: 165 .never-post-merge-rules: 166 rules: 171 .scheduled_pipeline-rules: 172 rules: [all …]
|
D | container.yml | 24 rules: 28 rules: 32 rules: 36 rules: 40 rules: 44 rules: 48 rules: 52 rules: 56 rules: 60 rules: [all …]
|
/linux-6.14.4/drivers/net/phy/aquantia/ |
D | aquantia_leds.c | 35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument 41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported() 48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument 59 *rules = 0; in aqr_phy_led_hw_control_get() 61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get() 64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get() 67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get() 70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get() 73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get() 76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get() [all …]
|
/linux-6.14.4/drivers/net/phy/mediatek/ |
D | mtk-phy-lib.c | 22 unsigned long rules, in mtk_phy_led_hw_is_supported() argument 29 if (rules & ~supported_triggers) in mtk_phy_led_hw_is_supported() 37 unsigned long *rules, u16 on_set, in mtk_phy_led_hw_ctrl_get() argument 79 if (!rules) in mtk_phy_led_hw_ctrl_get() 83 *rules |= BIT(TRIGGER_NETDEV_LINK); in mtk_phy_led_hw_ctrl_get() 86 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in mtk_phy_led_hw_ctrl_get() 89 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in mtk_phy_led_hw_ctrl_get() 92 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in mtk_phy_led_hw_ctrl_get() 95 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in mtk_phy_led_hw_ctrl_get() 98 *rules |= BIT(TRIGGER_NETDEV_FULL_DUPLEX); in mtk_phy_led_hw_ctrl_get() [all …]
|
/linux-6.14.4/tools/perf/util/ |
D | strfilter.h | 23 * @rules: Filter rule, which is a combination of glob expressions. 24 * @err: Pointer which points an error detected on @rules 26 * Parse @rules and return new strfilter. Return NULL if an error detected. 30 struct strfilter *strfilter__new(const char *rules, const char **err); 35 * @rules: Filter rule to be appended at left of the root of 37 * @err: Pointer which points an error detected on @rules 39 * Parse @rules and join it to the @filter by using logical-or. 43 const char *rules, const char **err); 48 * @rules: Filter rule to be appended at left of the root of 50 * @err: Pointer which points an error detected on @rules [all …]
|
/linux-6.14.4/security/apparmor/ |
D | resource.c | 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local 93 typeof(*rules), list); in profile_setrlimit() 96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 128 * profiles. AppArmor rules currently have the implicit assumption in aa_task_setrlimit() 168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local 169 typeof(*rules), in __aa_transition_rlimits() 171 if (rules->rlimits.mask) { in __aa_transition_rlimits() 176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local [all …]
|
D | net.c | 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local 114 typeof(*rules), list); in aa_profile_af_perm() 124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm() 130 state = aa_dfa_match_len(rules->policy->dfa, state, (char *) &buffer, in aa_profile_af_perm() 132 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_af_perm() 226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local 227 typeof(*rules), list); in aa_secmark_perm() 229 if (rules->secmark_count == 0) in aa_secmark_perm() 232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 233 if (!rules->secmark[i].secid) { in aa_secmark_perm() [all …]
|
D | policy_unpack.c | 565 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument 575 rules->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 577 if (!rules->secmark) in unpack_secmark() 580 rules->secmark_count = size; in unpack_secmark() 583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 587 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark() 599 if (rules->secmark) { in unpack_secmark() 601 kfree(rules->secmark[i].label); in unpack_secmark() 602 kfree(rules->secmark); in unpack_secmark() [all …]
|
D | capability.c | 71 struct aa_ruleset *rules = list_first_entry(&profile->rules, in audit_caps() local 72 typeof(*rules), list); in audit_caps() 81 !cap_raised(rules->caps.audit, cap))) in audit_caps() 85 cap_raised(rules->caps.kill, cap)) { in audit_caps() 87 } else if (cap_raised(rules->caps.quiet, cap) && in audit_caps() 124 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_capable() local 125 typeof(*rules), list); in profile_capable() 128 if (cap_raised(rules->caps.allow, cap) && in profile_capable() 129 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
D | mount.c | 314 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt_path_str() local 315 typeof(*rules), list); in match_mnt_path_str() 322 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str() 337 pos = do_match_mnt(rules->policy, in match_mnt_path_str() 338 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str() 374 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt() local 375 typeof(*rules), list); in match_mnt() 381 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt() 607 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_umount() local 608 typeof(*rules), list); in profile_umount() [all …]
|
D | ipc.c | 83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() local 84 typeof(*rules), list); in profile_signal_perm() 89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm() 95 state = aa_dfa_next(rules->policy->dfa, in profile_signal_perm() 96 rules->policy->start[AA_CLASS_SIGNAL], in profile_signal_perm() 98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
|
/linux-6.14.4/drivers/net/dsa/qca/ |
D | qca8k-leds.c | 53 * 3 control rules for phy0-3 that applies to all their leds in qca8k_get_control_led_reg() 54 * 3 control rules for phy4 in qca8k_get_control_led_reg() 65 qca8k_parse_netdev(unsigned long rules, u32 *offload_trigger) in qca8k_parse_netdev() argument 68 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca8k_parse_netdev() 70 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca8k_parse_netdev() 72 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca8k_parse_netdev() 74 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca8k_parse_netdev() 76 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca8k_parse_netdev() 78 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca8k_parse_netdev() 80 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca8k_parse_netdev() [all …]
|
/linux-6.14.4/drivers/net/phy/qcom/ |
D | qca807x.c | 134 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument 140 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 142 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() 144 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev() 146 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev() 148 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev() 150 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev() 152 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev() 156 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 158 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() [all …]
|
D | qca808x.c | 419 static int qca808x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca808x_led_parse_netdev() argument 423 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca808x_led_parse_netdev() 425 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca808x_led_parse_netdev() 427 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca808x_led_parse_netdev() 429 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca808x_led_parse_netdev() 431 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca808x_led_parse_netdev() 433 if (test_bit(TRIGGER_NETDEV_LINK_2500, &rules)) in qca808x_led_parse_netdev() 435 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca808x_led_parse_netdev() 437 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca808x_led_parse_netdev() 440 if (rules && !*offload_trigger) in qca808x_led_parse_netdev() [all …]
|
/linux-6.14.4/net/netfilter/ |
D | nft_set_pipapo.c | 56 * represented as one or more rules, depending on the number of composing 61 * Rules are mapped between fields through an array of x, n pairs, with each 62 * item mapping a matched rule to one or more rules. The position of the pair in 65 * next-field rules the current rule maps to. 108 * or multiple rules for ranges. Ranges are expanded to composing netmasks 116 * - insert references to the rules in the lookup table, selecting buckets 144 * rules from the lookup table to rules belonging to the same entry in 147 * Note that as rules map to contiguous ranges of rules, given how netmask 182 * we need to map rules for 10.0.0.5 in lookup table #0 (rule #0) to 1024 183 * in lookup table #1 (rule #0) and rules for 192.168.1.0-192.168.2.1 [all …]
|
D | nft_set_pipapo.h | 52 /* Each n-bit range maps to up to n * 2 rules */ 86 * @n: Number of rules (in next field) this rule maps to 107 * @rules: Number of inserted rules 109 * @rules_alloc: Number of allocated rules, always >= rules 116 unsigned int rules; member 179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, 236 * of rules (composing netmasks) the entries expand to. We compute the worst 253 unsigned long rules; in pipapo_estimate_size() local 259 * field can expand to up to n * 2 rules in each bucket, and in pipapo_estimate_size() 262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() [all …]
|
/linux-6.14.4/drivers/gpu/drm/xe/ |
D | xe_rtp.c | 22 * rules and actions. This can be used to define tables with multiple entries 24 * the values to the registers that have matching rules. 35 const struct xe_rtp_rule *rules, in rule_matches() argument 42 for (r = rules, i = 0; i < n_rules; r = &rules[++i]) { in rule_matches() 47 * rules passed or none were evaluated. For both cases, in rule_matches() 48 * shortcut the other rules and return the proper value. in rule_matches() 121 * Advance rules until we find XE_RTP_MATCH_OR to check in rule_matches() 124 while (++i < n_rules && rules[i].match_type != XE_RTP_MATCH_OR) in rule_matches() 167 if (!rule_matches(xe, gt, hwe, entry->rules, entry->n_rules)) in rtp_process_one_sr() 206 * their rules match the condition. Bits are never cleared: entries with [all …]
|
/linux-6.14.4/Documentation/admin-guide/aoe/ |
D | udev.txt | 1 # These rules tell udev what device nodes to create for aoe support. 11 # udev_rules="/etc/udev/rules.d/" 12 # bash# ls /etc/udev/rules.d/ 13 # 10-wacom.rules 50-udev.rules 15 # /etc/udev/rules.d/60-aoe.rules
|
D | udev-install.sh | 1 # install the aoe-specific udev rules from udev.txt into 22 # find the directory where udev rules are stored, often 23 # /etc/udev/rules.d 27 rules_d=/etc/udev/rules.d 30 echo "$me Error: cannot find udev rules directory" 1>&2 33 sh -xc "cp `dirname $0`/udev.txt $rules_d/60-aoe.rules"
|
/linux-6.14.4/security/apparmor/include/ |
D | policy.h | 69 APPARMOR_ENFORCE, /* enforce access rules */ 152 /* struct aa_ruleset - data covering mediation rules 155 * @policy: general match rules governing policy 156 * @file: The set of rules governing basic file access and domain transitions 178 /* struct aa_attachment - data and rules for a profiles attachment 205 * @attach: attachment rules for the profile 206 * @rules: rules to be enforced 215 * attachments are determined by profile X transition rules. 237 struct list_head rules; member 291 static inline aa_state_t RULE_MEDIATES(struct aa_ruleset *rules, in RULE_MEDIATES() argument [all …]
|
/linux-6.14.4/kernel/kcsan/ |
D | permissive.h | 3 * Special rules for ignoring entire classes of data-racy memory accesses. None 4 * of the rules here imply that such data races are generally safe! 6 * All rules in this file can be configured via CONFIG_KCSAN_PERMISSIVE. Keep 20 * Access ignore rules based on address. 35 * Data race ignore rules based on access type and value change patterns. 44 * Rules here are only for plain read accesses, so that we still report in kcsan_ignore_data_race() 70 * The rules here will ignore the data races if we observe no more than in kcsan_ignore_data_race()
|
/linux-6.14.4/drivers/net/phy/ |
D | air_en8811h.c | 141 unsigned long rules; member 545 changed |= (priv->led[index].rules != 0); in air_hw_led_on_set() 547 /* clear netdev trigger rules in case LED_OFF has been set */ in air_hw_led_on_set() 549 priv->led[index].rules = 0; in air_hw_led_on_set() 576 changed |= (priv->led[index].rules != 0); in air_hw_led_blink_set() 615 priv->led[index].rules = 0; in air_led_blink_set() 640 priv->led[index].rules = 0; in air_led_brightness_set() 646 unsigned long *rules) in air_led_hw_control_get() argument 653 *rules = priv->led[index].rules; in air_led_hw_control_get() 659 unsigned long rules) in air_led_hw_control_set() argument [all …]
|
D | intel-xway.c | 405 unsigned long rules) in xway_gphy_led_hw_is_supported() argument 413 if (rules & (BIT(TRIGGER_NETDEV_RX) | BIT(TRIGGER_NETDEV_TX)) && in xway_gphy_led_hw_is_supported() 414 !(rules & (BIT(TRIGGER_NETDEV_LINK) | in xway_gphy_led_hw_is_supported() 421 if (rules & ~supported_triggers) in xway_gphy_led_hw_is_supported() 428 unsigned long *rules) in xway_gphy_led_hw_control_get() argument 444 *rules |= BIT(TRIGGER_NETDEV_LINK_10); in xway_gphy_led_hw_control_get() 447 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in xway_gphy_led_hw_control_get() 450 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in xway_gphy_led_hw_control_get() 455 *rules |= BIT(TRIGGER_NETDEV_LINK); in xway_gphy_led_hw_control_get() 458 *rules |= BIT(TRIGGER_NETDEV_TX); in xway_gphy_led_hw_control_get() [all …]
|
/linux-6.14.4/scripts/gendwarfksyms/ |
D | kabi.c | 74 static HASHTABLE_DEFINE(rules, 1 << RULE_HASH_BITS); 93 error("unexpected end of kABI rules"); in get_rule_field() 169 debug("kABI rules not found"); in kabi_read_rules() 181 error("kABI rules are not null-terminated"); in kabi_read_rules() 213 hash_add(rules, &rule->hash, rule_hash(rule)); in kabi_read_rules() 220 warn("unexpected data at the end of the kABI rules section"); in kabi_read_rules() 234 hash_for_each_possible(rules, rule, hash, in kabi_is_declonly() 282 rules, rule, hash, in kabi_is_enumerator_ignored() 309 hash_for_each_possible(rules, rule, hash, in kabi_get_enumerator_value() 329 hash_for_each_safe(rules, rule, tmp, hash) { in kabi_free() [all …]
|