/Linux-v6.1/Documentation/admin-guide/aoe/ |
D | udev.txt | 1 # These rules tell udev what device nodes to create for aoe support. 11 # udev_rules="/etc/udev/rules.d/" 12 # bash# ls /etc/udev/rules.d/ 13 # 10-wacom.rules 50-udev.rules 15 # /etc/udev/rules.d/60-aoe.rules
|
D | examples.rst | 1 Example of udev rules 7 Example of udev install rules script
|
/Linux-v6.1/tools/perf/util/ |
D | strfilter.c | 160 struct strfilter *strfilter__new(const char *rules, const char **err) in strfilter__new() argument 166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new() 179 const char *rules, const char **err) in strfilter__append() argument 184 if (!filter || !rules) in strfilter__append() 187 right = strfilter_node__new(rules, &ep); in strfilter__append() 207 int strfilter__or(struct strfilter *filter, const char *rules, const char **err) in strfilter__or() argument 209 return strfilter__append(filter, true, rules, err); in strfilter__or() 212 int strfilter__and(struct strfilter *filter, const char *rules, in strfilter__and() argument 215 return strfilter__append(filter, false, rules, err); in strfilter__and()
|
D | strfilter.h | 30 struct strfilter *strfilter__new(const char *rules, const char **err); 43 const char *rules, const char **err); 56 const char *rules, const char **err);
|
/Linux-v6.1/net/netfilter/ |
D | nft_set_pipapo.h | 123 unsigned long rules; member 179 int pipapo_refill(unsigned long *map, int len, int rules, unsigned long *dst, 252 unsigned long rules; in pipapo_estimate_size() local 261 rules = ilog2(desc->field_len[i] * BITS_PER_BYTE) * 2; in pipapo_estimate_size() 262 entry_size += rules * in pipapo_estimate_size() 265 entry_size += rules * sizeof(union nft_pipapo_map_bucket); in pipapo_estimate_size()
|
D | nft_set_pipapo.c | 365 int pipapo_refill(unsigned long *map, int len, int rules, unsigned long *dst, in pipapo_refill() argument 378 if (unlikely(i >= rules)) { in pipapo_refill() 460 b = pipapo_refill(res_map, f->bsize, f->rules, fill_map, f->mt, in nft_pipapo_lookup() 563 b = pipapo_refill(res_map, f->bsize, f->rules, fill_map, f->mt, in pipapo_get() 620 static int pipapo_resize(struct nft_pipapo_field *f, int old_rules, int rules) in pipapo_resize() argument 627 new_bucket_size = DIV_ROUND_UP(rules, BITS_PER_LONG); in pipapo_resize() 665 new_mt = kvmalloc(rules * sizeof(*new_mt), GFP_KERNEL); in pipapo_resize() 671 memcpy(new_mt, f->mt, min(old_rules, rules) * sizeof(*new_mt)); in pipapo_resize() 672 if (rules > old_rules) { in pipapo_resize() 674 (rules - old_rules) * sizeof(*new_mt)); in pipapo_resize() [all …]
|
/Linux-v6.1/drivers/net/ethernet/mellanox/mlx5/core/lib/ |
D | fs_ttc.c | 33 struct mlx5_ttc_rule rules[MLX5_NUM_TT]; member 47 if (!IS_ERR_OR_NULL(ttc->rules[i].rule)) { in mlx5_cleanup_ttc_rules() 48 mlx5_del_flow_rules(ttc->rules[i].rule); in mlx5_cleanup_ttc_rules() 49 ttc->rules[i].rule = NULL; in mlx5_cleanup_ttc_rules() 240 struct mlx5_ttc_rule *rules; in mlx5_generate_ttc_table_rules() local 246 rules = ttc->rules; in mlx5_generate_ttc_table_rules() 248 struct mlx5_ttc_rule *rule = &rules[tt]; in mlx5_generate_ttc_table_rules() 400 struct mlx5_ttc_rule *rules; in mlx5_generate_inner_ttc_table_rules() local 406 rules = ttc->rules; in mlx5_generate_inner_ttc_table_rules() 409 struct mlx5_ttc_rule *rule = &rules[tt]; in mlx5_generate_inner_ttc_table_rules() [all …]
|
/Linux-v6.1/tools/testing/selftests/landlock/ |
D | fs_test.c | 531 const struct rule rules[]) in create_ruleset() argument 538 ASSERT_NE(NULL, rules) in create_ruleset() 542 ASSERT_NE(NULL, rules[0].path) in create_ruleset() 554 for (i = 0; rules[i].path; i++) { in create_ruleset() 555 add_path_beneath(_metadata, ruleset_fd, rules[i].access, in create_ruleset() 556 rules[i].path); in create_ruleset() 573 const struct rule rules[] = { in TEST_F_FORK() local 583 _metadata, rules[0].access | LANDLOCK_ACCESS_FS_READ_DIR, in TEST_F_FORK() 584 rules); in TEST_F_FORK() 622 const struct rule rules[] = { in TEST_F_FORK() local [all …]
|
/Linux-v6.1/security/smack/ |
D | Kconfig | 17 bool "Reporting on access granted by Smack rules" 21 Enable the bring-up ("b") access mode in Smack rules. 26 rules. The developer can use the information to 27 identify which rules are necessary and what accesses 54 delivering a signal in the Smack rules.
|
/Linux-v6.1/drivers/net/ethernet/netronome/nfp/flower/ |
D | conntrack.c | 682 static int nfp_fl_merge_actions_offload(struct flow_rule **rules, in nfp_fl_merge_actions_offload() argument 693 num_actions = rules[CT_TYPE_PRE_CT]->action.num_entries + in nfp_fl_merge_actions_offload() 694 rules[CT_TYPE_NFT]->action.num_entries + in nfp_fl_merge_actions_offload() 695 rules[CT_TYPE_POST_CT]->action.num_entries; in nfp_fl_merge_actions_offload() 705 a_rule->match = rules[CT_TYPE_PRE_CT]->match; in nfp_fl_merge_actions_offload() 707 if (rules[CT_TYPE_POST_CT]->action.num_entries != 0) { in nfp_fl_merge_actions_offload() 708 tmp_stats = rules[CT_TYPE_POST_CT]->action.entries[0].hw_stats; in nfp_fl_merge_actions_offload() 716 if (flow_rule_match_key(rules[j], FLOW_DISSECTOR_KEY_BASIC)) { in nfp_fl_merge_actions_offload() 726 flow_rule_match_basic(rules[j], &match); in nfp_fl_merge_actions_offload() 728 a_rule->match = rules[j]->match; in nfp_fl_merge_actions_offload() [all …]
|
/Linux-v6.1/samples/bpf/ |
D | cookie_uid_helper_example.c | 174 char rules[256]; in prog_attach_iptables() local 182 ret = snprintf(rules, sizeof(rules), in prog_attach_iptables() 185 if (ret < 0 || ret >= sizeof(rules)) { in prog_attach_iptables() 189 ret = system(rules); in prog_attach_iptables()
|
/Linux-v6.1/kernel/ |
D | audit_watch.c | 43 struct list_head rules; /* anchor for krule->rlist */ member 109 WARN_ON(!list_empty(&watch->rules)); in audit_put_watch() 168 INIT_LIST_HEAD(&watch->rules); in audit_init_watch() 277 list_for_each_entry_safe(r, nextr, &owatch->rules, rlist) { in audit_update_watch() 298 list_add(&nentry->rule.rlist, &nwatch->rules); in audit_update_watch() 330 list_for_each_entry_safe(r, nextr, &w->rules, rlist) { in audit_remove_parent_watches() 395 list_add(&krule->rlist, &watch->rules); in audit_add_to_parent() 454 if (list_empty(&watch->rules)) { in audit_remove_watch_rule()
|
/Linux-v6.1/net/ceph/crush/ |
D | crush.c | 122 if (map->rules) { in crush_destroy() 125 crush_destroy_rule(map->rules[b]); in crush_destroy() 126 kfree(map->rules); in crush_destroy()
|
/Linux-v6.1/drivers/media/i2c/ccs/ |
D | ccs-data.c | 435 struct ccs_rule *rules_base = NULL, *rules = NULL, *next_rule = NULL; in ccs_data_parse_rules() local 442 bin_alloc(bin, sizeof(*rules) * *__num_rules); in ccs_data_parse_rules() 496 rules = next_rule; in ccs_data_parse_rules() 514 rules->if_rules = if_rule; in ccs_data_parse_rules() 515 rules->num_if_rules = __num_if_rules; in ccs_data_parse_rules() 520 rval = ccs_data_parse_reg_rules(bin, &rules->read_only_regs, in ccs_data_parse_rules() 521 &rules->num_read_only_regs, in ccs_data_parse_rules() 529 rval = ccs_data_parse_ffd(bin, &rules->frame_format, in ccs_data_parse_rules() 538 &rules->manufacturer_regs, in ccs_data_parse_rules() 539 &rules->num_manufacturer_regs, in ccs_data_parse_rules() [all …]
|
/Linux-v6.1/Documentation/sound/designs/ |
D | tracepoints.rst | 116 struct snd_pcm_hardware and rules of constraints in the runtime. The 117 structure describes capabilities of handled hardware. The rules describes 120 to compute the target parameter. ALSA PCM core registers some rules to the 129 2. In the same callback, drivers are also expected to register additional rules 156 device, rules of constraint and name of the changed parameter, in order. The 157 field for rules of constraint consists of two sub-fields; index of applied rule 158 and total number of rules added to the runtime. As an exception, the index 000 159 means that the parameter is changed by ALSA PCM core, regardless of the rules.
|
/Linux-v6.1/tools/testing/selftests/bpf/progs/ |
D | twfw.c | 36 struct rules_map rules SEC(".maps"); 47 struct rule* rule = bpf_map_lookup_elem(&rules, &key); in twfw_verifier()
|
/Linux-v6.1/security/safesetid/ |
D | securityfs.c | 78 hash_for_each_safe(pol->rules, bucket, tmp, rule, next) in __release_ruleset() 91 hash_add(pol->rules, &rule->next, __kuid_val(rule->src_id.uid)); in insert_rule() 93 hash_add(pol->rules, &rule->next, __kgid_val(rule->src_id.gid)); in insert_rule() 104 hash_for_each(pol->rules, bucket, rule, next) { in verify_ruleset() 151 hash_init(pol->rules); in handle_policy_update()
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | sysfs-block-dm | 7 Users: util-linux, device-mapper udev rules 16 Users: util-linux, device-mapper udev rules 25 Users: util-linux, device-mapper udev rules
|
/Linux-v6.1/Documentation/translations/zh_CN/process/ |
D | index.rst | 34 license-rules 46 stable-kernel-rules
|
/Linux-v6.1/Documentation/translations/zh_TW/process/ |
D | index.rst | 36 license-rules 48 stable-kernel-rules
|
/Linux-v6.1/drivers/net/ethernet/mellanox/mlx5/core/lag/ |
D | port_sel.c | 16 u8 rules) in mlx5_create_hash_flow_group() argument 29 MLX5_SET(create_flow_group_in, in, end_flow_index, rules - 1); in mlx5_create_hash_flow_group() 86 lag_definer->rules[idx] = mlx5_add_flow_rules(lag_definer->ft, in mlx5_lag_create_port_sel_table() 89 if (IS_ERR(lag_definer->rules[idx])) { in mlx5_lag_create_port_sel_table() 90 err = PTR_ERR(lag_definer->rules[idx]); in mlx5_lag_create_port_sel_table() 93 mlx5_del_flow_rules(lag_definer->rules[idx]); in mlx5_lag_create_port_sel_table() 348 mlx5_del_flow_rules(lag_definer->rules[idx]); in mlx5_lag_destroy_definer() 582 err = mlx5_modify_rule_destination(def->rules[idx], &dest, NULL); in __mlx5_lag_modify_definers_destinations()
|
/Linux-v6.1/Documentation/filesystems/ |
D | directory-locking.rst | 16 1) read access. Locking rules: caller locks directory we are accessing. 19 2) object creation. Locking rules: same as above, but the lock is taken 22 3) object removal. Locking rules: caller locks parent, finds victim, 25 4) rename() that is _not_ cross-directory. Locking rules: caller locks 34 5) link creation. Locking rules: 44 rules: 61 The rules above obviously guarantee that all directories that are going to be 120 But locking rules for cross-directory rename guarantee that we do not
|
/Linux-v6.1/security/apparmor/include/ |
D | file.h | 207 static inline void aa_free_file_rules(struct aa_file_rules *rules) in aa_free_file_rules() argument 209 aa_put_dfa(rules->dfa); in aa_free_file_rules() 210 aa_free_domain_entries(&rules->trans); in aa_free_file_rules()
|
/Linux-v6.1/Documentation/networking/ |
D | representors.rst | 68 fast-path rules in the virtual switch. Packets transmitted on the 76 3. It acts as a handle by which switching rules (such as TC filters) can refer 77 to the representee, allowing these rules to be offloaded. 114 representor TC rules. 132 access that the IP stack "sees" would then be configurable through tc rules; 172 It is expected that userland will use this information (e.g. through udev rules) 180 How do representors interact with TC rules? 194 ``REP_DEV`` is a VF representor, the following rules:: 210 Of course the rules can (if supported by the NIC) include packet-modifying 217 function uplink netdev or port representor). TC rules such as:: [all …]
|
D | tc-actions-env-rules.rst | 8 The "environmental" rules for authors of any new tc actions are: 23 The "environmental" rules for callers of actions (qdiscs etc) are:
|