/linux-6.12.1/drivers/net/phy/aquantia/ |
D | aquantia_leds.c | 35 unsigned long rules) in aqr_phy_led_hw_is_supported() argument 41 if (rules & ~supported_triggers) in aqr_phy_led_hw_is_supported() 48 unsigned long *rules) in aqr_phy_led_hw_control_get() argument 59 *rules = 0; in aqr_phy_led_hw_control_get() 61 *rules |= BIT(TRIGGER_NETDEV_LINK_100); in aqr_phy_led_hw_control_get() 64 *rules |= BIT(TRIGGER_NETDEV_LINK_1000); in aqr_phy_led_hw_control_get() 67 *rules |= BIT(TRIGGER_NETDEV_LINK_2500); in aqr_phy_led_hw_control_get() 70 *rules |= BIT(TRIGGER_NETDEV_LINK_5000); in aqr_phy_led_hw_control_get() 73 *rules |= BIT(TRIGGER_NETDEV_LINK_10000); in aqr_phy_led_hw_control_get() 76 *rules |= BIT(TRIGGER_NETDEV_RX); in aqr_phy_led_hw_control_get() [all …]
|
/linux-6.12.1/security/apparmor/ |
D | resource.c | 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local 93 typeof(*rules), list); in profile_setrlimit() 96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local 169 typeof(*rules), in __aa_transition_rlimits() 171 if (rules->rlimits.mask) { in __aa_transition_rlimits() 176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local 189 typeof(*rules), in __aa_transition_rlimits() [all …]
|
D | net.c | 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local 114 typeof(*rules), list); in aa_profile_af_perm() 124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm() 130 state = aa_dfa_match_len(rules->policy->dfa, state, (char *) &buffer, in aa_profile_af_perm() 132 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_af_perm() 226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local 227 typeof(*rules), list); in aa_secmark_perm() 229 if (rules->secmark_count == 0) in aa_secmark_perm() 232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 233 if (!rules->secmark[i].secid) { in aa_secmark_perm() [all …]
|
D | capability.c | 67 struct aa_ruleset *rules = list_first_entry(&profile->rules, in audit_caps() local 68 typeof(*rules), list); in audit_caps() 77 !cap_raised(rules->caps.audit, cap))) in audit_caps() 81 cap_raised(rules->caps.kill, cap)) { in audit_caps() 83 } else if (cap_raised(rules->caps.quiet, cap) && in audit_caps() 119 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_capable() local 120 typeof(*rules), list); in profile_capable() 123 if (cap_raised(rules->caps.allow, cap) && in profile_capable() 124 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
D | policy_unpack.c | 565 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument 575 rules->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 577 if (!rules->secmark) in unpack_secmark() 580 rules->secmark_count = size; in unpack_secmark() 583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 587 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark() 599 if (rules->secmark) { in unpack_secmark() 601 kfree(rules->secmark[i].label); in unpack_secmark() 602 kfree(rules->secmark); in unpack_secmark() [all …]
|
D | mount.c | 314 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt_path_str() local 315 typeof(*rules), list); in match_mnt_path_str() 322 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt_path_str() 337 pos = do_match_mnt(rules->policy, in match_mnt_path_str() 338 rules->policy->start[AA_CLASS_MOUNT], in match_mnt_path_str() 374 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_mnt() local 375 typeof(*rules), list); in match_mnt() 381 if (!RULE_MEDIATES(rules, AA_CLASS_MOUNT)) in match_mnt() 607 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_umount() local 608 typeof(*rules), list); in profile_umount() [all …]
|
D | domain.c | 91 struct aa_ruleset *rules = list_first_entry(&profile->rules, in match_component() local 92 typeof(*rules), list); in match_component() 96 state = aa_dfa_match(rules->file->dfa, state, "&"); in match_component() 98 return aa_dfa_match(rules->file->dfa, state, tp->base.hname); in match_component() 102 state = aa_dfa_match_len(rules->file->dfa, state, ":", 1); in match_component() 103 state = aa_dfa_match(rules->file->dfa, state, ns_name); in match_component() 104 state = aa_dfa_match_len(rules->file->dfa, state, ":", 1); in match_component() 105 return aa_dfa_match(rules->file->dfa, state, tp->base.hname); in match_component() 129 struct aa_ruleset *rules = list_first_entry(&profile->rules, in label_compound_match() local 130 typeof(*rules), list); in label_compound_match() [all …]
|
D | ipc.c | 83 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_signal_perm() local 84 typeof(*rules), list); in profile_signal_perm() 89 !ANY_RULE_MEDIATES(&profile->rules, AA_CLASS_SIGNAL)) in profile_signal_perm() 95 state = aa_dfa_next(rules->policy->dfa, in profile_signal_perm() 96 rules->policy->start[AA_CLASS_SIGNAL], in profile_signal_perm() 98 aa_label_match(profile, rules, peer, state, false, request, &perms); in profile_signal_perm()
|
D | task.c | 231 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_ptrace_perm() local 232 typeof(*rules), list); in profile_ptrace_perm() 237 aa_profile_match_label(profile, rules, peer, AA_CLASS_PTRACE, request, in profile_ptrace_perm() 249 !ANY_RULE_MEDIATES(&tracee->rules, AA_CLASS_PTRACE)) in profile_tracee_perm() 263 if (ANY_RULE_MEDIATES(&tracer->rules, AA_CLASS_PTRACE)) in profile_tracer_perm() 327 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_ns_perm() local 328 typeof(*rules), in aa_profile_ns_perm() 332 state = RULE_MEDIATES(rules, ad->class); in aa_profile_ns_perm() 336 perms = *aa_lookup_perms(rules->policy, state); in aa_profile_ns_perm()
|
D | policy.c | 243 static void free_ruleset(struct aa_ruleset *rules) in free_ruleset() argument 247 aa_put_pdb(rules->file); in free_ruleset() 248 aa_put_pdb(rules->policy); in free_ruleset() 249 aa_free_cap_rules(&rules->caps); in free_ruleset() 250 aa_free_rlimit_rules(&rules->rlimits); in free_ruleset() 252 for (i = 0; i < rules->secmark_count; i++) in free_ruleset() 253 kfree_sensitive(rules->secmark[i].label); in free_ruleset() 254 kfree_sensitive(rules->secmark); in free_ruleset() 255 kfree_sensitive(rules); in free_ruleset() 260 struct aa_ruleset *rules; in aa_alloc_ruleset() local [all …]
|
/linux-6.12.1/drivers/net/phy/qcom/ |
D | qca807x.c | 134 static int qca807x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca807x_led_parse_netdev() argument 140 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 142 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() 144 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca807x_led_parse_netdev() 146 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca807x_led_parse_netdev() 148 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca807x_led_parse_netdev() 150 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca807x_led_parse_netdev() 152 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca807x_led_parse_netdev() 156 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca807x_led_parse_netdev() 158 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca807x_led_parse_netdev() [all …]
|
D | qca808x.c | 419 static int qca808x_led_parse_netdev(struct phy_device *phydev, unsigned long rules, in qca808x_led_parse_netdev() argument 423 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca808x_led_parse_netdev() 425 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca808x_led_parse_netdev() 427 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca808x_led_parse_netdev() 429 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca808x_led_parse_netdev() 431 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca808x_led_parse_netdev() 433 if (test_bit(TRIGGER_NETDEV_LINK_2500, &rules)) in qca808x_led_parse_netdev() 435 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca808x_led_parse_netdev() 437 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca808x_led_parse_netdev() 440 if (rules && !*offload_trigger) in qca808x_led_parse_netdev() [all …]
|
/linux-6.12.1/drivers/net/dsa/qca/ |
D | qca8k-leds.c | 65 qca8k_parse_netdev(unsigned long rules, u32 *offload_trigger) in qca8k_parse_netdev() argument 68 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca8k_parse_netdev() 70 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca8k_parse_netdev() 72 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca8k_parse_netdev() 74 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca8k_parse_netdev() 76 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca8k_parse_netdev() 78 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca8k_parse_netdev() 80 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca8k_parse_netdev() 83 if (rules && !*offload_trigger) in qca8k_parse_netdev() 278 qca8k_cled_hw_control_is_supported(struct led_classdev *ldev, unsigned long rules) in qca8k_cled_hw_control_is_supported() argument [all …]
|
/linux-6.12.1/Documentation/admin-guide/aoe/ |
D | udev.txt | 1 # These rules tell udev what device nodes to create for aoe support. 11 # udev_rules="/etc/udev/rules.d/" 12 # bash# ls /etc/udev/rules.d/ 13 # 10-wacom.rules 50-udev.rules 15 # /etc/udev/rules.d/60-aoe.rules
|
/linux-6.12.1/drivers/net/phy/ |
D | air_en8811h.c | 141 unsigned long rules; member 545 changed |= (priv->led[index].rules != 0); in air_hw_led_on_set() 549 priv->led[index].rules = 0; in air_hw_led_on_set() 576 changed |= (priv->led[index].rules != 0); in air_hw_led_blink_set() 615 priv->led[index].rules = 0; in air_led_blink_set() 640 priv->led[index].rules = 0; in air_led_brightness_set() 646 unsigned long *rules) in air_led_hw_control_get() argument 653 *rules = priv->led[index].rules; in air_led_hw_control_get() 659 unsigned long rules) in air_led_hw_control_set() argument 668 priv->led[index].rules = rules; in air_led_hw_control_set() [all …]
|
/linux-6.12.1/security/ipe/ |
D | policy_parser.c | 39 for (i = 0; i < ARRAY_SIZE(p->rules); ++i) { in new_parsed_policy() 40 t = &p->rules[i]; in new_parsed_policy() 43 INIT_LIST_HEAD(&t->rules); in new_parsed_policy() 420 if (p->rules[op].default_action != IPE_ACTION_INVALID) in parse_rule() 423 p->rules[op].default_action = action; in parse_rule() 435 list_add_tail(&r->next, &p->rules[op].rules); in parse_rule() 457 for (i = 0; i < ARRAY_SIZE(p->rules); ++i) in ipe_free_parsed_policy() 458 list_for_each_entry_safe(pp, t, &p->rules[i].rules, next) { in ipe_free_parsed_policy() 485 for (i = 0; i < ARRAY_SIZE(p->rules); ++i) { in validate_policy() 486 if (p->rules[i].default_action == IPE_ACTION_INVALID) in validate_policy()
|
D | eval.c | 317 const struct ipe_op_table *rules = NULL; in ipe_evaluate_event() local 345 rules = &pol->parsed->rules[ctx->op]; in ipe_evaluate_event() 347 list_for_each_entry(rule, &rules->rules, next) { in ipe_evaluate_event() 363 } else if (rules->default_action != IPE_ACTION_INVALID) { in ipe_evaluate_event() 364 action = rules->default_action; in ipe_evaluate_event()
|
/linux-6.12.1/net/netfilter/ |
D | nft_set_pipapo.c | 362 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, in pipapo_refill() argument 377 if (unlikely(i >= rules)) { in pipapo_refill() 462 b = pipapo_refill(res_map, f->bsize, f->rules, fill_map, f->mt, in nft_pipapo_lookup() 571 b = pipapo_refill(res_map, f->bsize, f->rules, fill_map, f->mt, in pipapo_get() 636 unsigned int old_rules, unsigned int rules) in pipapo_realloc_mt() argument 640 unsigned int rules_alloc = rules; in pipapo_realloc_mt() 644 if (unlikely(rules == 0)) in pipapo_realloc_mt() 648 if (rules > old_rules && f->rules_alloc > rules) in pipapo_realloc_mt() 652 if (rules < old_rules) { in pipapo_realloc_mt() 653 unsigned int remove = f->rules_alloc - rules; in pipapo_realloc_mt() [all …]
|
D | nft_set_pipapo.h | 116 unsigned int rules; member 179 int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules, 253 unsigned long rules; in pipapo_estimate_size() local 262 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() 263 entry_size += rules * in pipapo_estimate_size() 266 entry_size += rules * sizeof(union nft_pipapo_map_bucket); in pipapo_estimate_size()
|
/linux-6.12.1/drivers/gpu/drm/xe/ |
D | xe_gen_wa_oob.c | 58 char *name, *prev_name = NULL, *rules; in parse() local 81 rules = strtok(NULL, ""); in parse() 89 rules = name; in parse() 93 if (rules[0] == '\0') { in parse() 106 name, rules); in parse() 109 fprintf(csource, ", OR,\n\t%s", rules); in parse()
|
/linux-6.12.1/tools/perf/util/ |
D | strfilter.c | 160 struct strfilter *strfilter__new(const char *rules, const char **err) in strfilter__new() argument 166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new() 179 const char *rules, const char **err) in strfilter__append() argument 184 if (!filter || !rules) in strfilter__append() 187 right = strfilter_node__new(rules, &ep); in strfilter__append() 207 int strfilter__or(struct strfilter *filter, const char *rules, const char **err) in strfilter__or() argument 209 return strfilter__append(filter, true, rules, err); in strfilter__or() 212 int strfilter__and(struct strfilter *filter, const char *rules, in strfilter__and() argument 215 return strfilter__append(filter, false, rules, err); in strfilter__and()
|
D | strfilter.h | 30 struct strfilter *strfilter__new(const char *rules, const char **err); 43 const char *rules, const char **err); 56 const char *rules, const char **err);
|
/linux-6.12.1/security/apparmor/include/ |
D | policy.h | 237 struct list_head rules; member 292 static inline aa_state_t RULE_MEDIATES(struct aa_ruleset *rules, in RULE_MEDIATES() argument 296 return rules->policy->start[class]; in RULE_MEDIATES() 298 return aa_dfa_match_len(rules->policy->dfa, in RULE_MEDIATES() 299 rules->policy->start[0], &class, 1); in RULE_MEDIATES() 302 static inline aa_state_t RULE_MEDIATES_AF(struct aa_ruleset *rules, u16 AF) in RULE_MEDIATES_AF() argument 304 aa_state_t state = RULE_MEDIATES(rules, AA_CLASS_NET); in RULE_MEDIATES_AF() 309 return aa_dfa_match_len(rules->policy->dfa, state, (char *) &be_af, 2); in RULE_MEDIATES_AF()
|
/linux-6.12.1/drivers/media/i2c/ccs/ |
D | ccs-data.c | 435 struct ccs_rule *rules_base = NULL, *rules = NULL, *next_rule = NULL; in ccs_data_parse_rules() local 442 bin_alloc(bin, sizeof(*rules) * *__num_rules); in ccs_data_parse_rules() 495 rules = next_rule; in ccs_data_parse_rules() 513 rules->if_rules = if_rule; in ccs_data_parse_rules() 514 rules->num_if_rules = __num_if_rules; in ccs_data_parse_rules() 518 if (bin->base && !rules) in ccs_data_parse_rules() 524 rules ? in ccs_data_parse_rules() 525 &rules->read_only_regs : NULL, in ccs_data_parse_rules() 526 rules ? in ccs_data_parse_rules() 527 &rules->num_read_only_regs : NULL, in ccs_data_parse_rules() [all …]
|
/linux-6.12.1/drivers/net/ethernet/microchip/vcap/ |
D | Kconfig | 13 A VCAP is essentially a TCAM with rules consisting of 24 The VCAP implementation provides switchcore independent handling of rules 27 - Creating and deleting rules 28 - Updating and getting rules 32 access rules via the API in a platform independent way, with the
|