/Zephyr-latest/ |
D | .ruff-excludes.toml | 8 "I001", # https://docs.astral.sh/ruff/rules/unsorted-imports 9 "UP031", # https://docs.astral.sh/ruff/rules/printf-string-formatting 12 "I001", # https://docs.astral.sh/ruff/rules/unsorted-imports 13 "UP030", # https://docs.astral.sh/ruff/rules/format-literals 14 "UP031", # https://docs.astral.sh/ruff/rules/printf-string-formatting 17 "I001", # https://docs.astral.sh/ruff/rules/unsorted-imports 18 "UP031", # https://docs.astral.sh/ruff/rules/printf-string-formatting 19 "UP034", # https://docs.astral.sh/ruff/rules/extraneous-parentheses 20 "UP039", # https://docs.astral.sh/ruff/rules/unnecessary-class-parentheses 23 "E501", # https://docs.astral.sh/ruff/rules/line-too-long [all …]
|
D | .gitlint | 15 # Set the extra-path where gitlint will search for user defined rules 40 # Note that the regex can contradict with other rules if not used correctly 61 #files=gitlint/rules.py,README.md
|
D | .yamllint | 5 rules:
|
/Zephyr-latest/subsys/net/pkt_filter/ |
D | base.c | 108 NET_DBG("no rules"); in evaluate() 118 NET_DBG("no matching rules from rule_head %p", rule_head); in evaluate() 122 static enum net_verdict lock_evaluate(struct npf_rule_list *rules, struct net_pkt *pkt) in lock_evaluate() argument 124 k_spinlock_key_t key = k_spin_lock(&rules->lock); in lock_evaluate() 125 enum net_verdict result = evaluate(&rules->rule_head, pkt); in lock_evaluate() 127 k_spin_unlock(&rules->lock, key); in lock_evaluate() 157 struct npf_rule_list *rules = get_ip_rules(net_pkt_family(pkt)); in net_pkt_filter_ip_recv_ok() local 159 if (!rules) { in net_pkt_filter_ip_recv_ok() 160 NET_DBG("no rules"); in net_pkt_filter_ip_recv_ok() 164 enum net_verdict result = lock_evaluate(rules, pkt); in net_pkt_filter_ip_recv_ok() [all …]
|
D | Kconfig | 11 to construct custom rules for accepting and/or denying packet 21 rules on the IP packet. 28 rules on the IP packet. 35 rules for e.g. TCP/UDP packets.
|
/Zephyr-latest/doc/develop/ |
D | beyond-GSG.rst | 233 .. _setting-udev-rules: 235 Setting udev rules 241 define udev rules to grant the needed access permission. 245 removed) from the system. We can add a rules file to grant access 248 The OpenOCD (On-Chip Debugger) project conveniently provides a rules 249 file that defined board-specific rules for most Zephyr-supported 250 arm-based boards, so we recommend installing this rules 252 installed the Zephyr SDK there is a copy of this rules file in the SDK 255 * Either download the OpenOCD rules file and copy it to the right 258 …wget -O 60-openocd.rules https://sf.net/p/openocd/code/ci/master/tree/contrib/60-openocd.rules?for… [all …]
|
/Zephyr-latest/scripts/utils/ |
D | convert_guidelines.py | 9 Or simply use the rule list to generate a filter to suppress all other rules 33 Formatter class to print the rules in a format which can be used by cppcheck 69 # Search for table named Main rules 70 pattern_table_start = re.compile(r'.*list-table:: Main rules') 86 # Done if we find the Additional rules table start 87 if line.find('Additional rules') >= 0:
|
/Zephyr-latest/scripts/ruff/ |
D | gen_lint_exclude.py | 33 rules: dict[str, set[RuffRule]] = {} variable 35 rules.setdefault(v["filename"], set()).add(RuffRule(v["code"], v["url"])) 37 for f, rs in rules.items():
|
/Zephyr-latest/doc/build/dts/ |
D | bindings-upstream.rst | 3 Rules for upstream bindings 6 This section includes general rules for writing bindings that you want to 7 submit to the upstream Zephyr Project. (You don't need to follow these rules 41 General rules 104 Rules for vendor prefixes 107 The following general rules apply to vendor prefixes in :ref:`compatible 141 .. _dt-bindings-default-rules: 143 Rules for default values 172 Examples of how to write descriptions according to these rules:
|
/Zephyr-latest/doc/connectivity/networking/api/ |
D | net_pkt_filter.rst | 14 construct custom rules for accepting and/or denying packet transmission 21 Both the transmission and reception paths may have a list of filter rules. 25 as specified by the current rule and no more rules are considered. If one
|
D | traffic-class.rst | 20 The VLAN priority is mapped to a certain traffic class according to rules
|
/Zephyr-latest/scripts/gitlint/ |
D | zephyr_commit_rules.py | 4 The classes below are examples of user-defined CommitRules. Commit rules are gitlint rules that 5 act on the entire commit at once. Once the rules are discovered, gitlint will automatically take ca… 9 an entire commit. This allows commit rules to implement more complex checks that span multiple line… 16 from gitlint.rules import CommitRule, RuleViolation, CommitMessageTitle, LineRule, CommitMessageBody
|
/Zephyr-latest/include/zephyr/net/ |
D | net_pkt_filter.h | 5 * of an incoming or outgoing packet based on a set of basic rules. 82 * @param rules the affected rule list 85 void npf_insert_rule(struct npf_rule_list *rules, struct npf_rule *rule); 90 * @param rules the affected rule list 93 void npf_append_rule(struct npf_rule_list *rules, struct npf_rule *rule); 98 * @param rules the affected rule list 102 bool npf_remove_rule(struct npf_rule_list *rules, struct npf_rule *rule); 105 * @brief Remove all rules from the given rule list 107 * @param rules the affected rule list 110 bool npf_remove_all_rules(struct npf_rule_list *rules);
|
/Zephyr-latest/scripts/coccinelle/ |
D | macros.h | 8 * to avoid parse errors that prevent application of rules.
|
/Zephyr-latest/samples/subsys/usb/cdc_acm/ |
D | README.rst | 98 ``/lib/udev/rules.d/77-mm-usb-device-blacklist.rules`` as reference.
|
/Zephyr-latest/scripts/schemas/twister/ |
D | quarantine-schema.yaml | 6 # (http://pykwalify.readthedocs.io/en/unstable/validation-rules.html),
|
D | platform-schema.yaml | 5 # (http://pykwalify.readthedocs.io/en/unstable/validation-rules.html),
|
/Zephyr-latest/tests/net/npf/src/ |
D | main.c | 129 /* test with no rules */ in test_npf_iface() 133 /* install rules */ in test_npf_iface() 137 /* test with rules in place */ in test_npf_iface() 158 /* remove all rules */ in test_npf_iface() 208 /* install filter rules */ in ZTEST() 214 /* remove filter rules */ in ZTEST() 231 /* install filter rules */ in ZTEST() 238 /* remove filter rules */ in ZTEST()
|
/Zephyr-latest/scripts/pylib/pytest-twister-harness/tests/resources/ |
D | zen_of_python.py | 17 Special cases aren't special enough to break the rules.
|
/Zephyr-latest/cmake/sca/eclair/ |
D | sca_options.cmake | 3 option(ECLAIR_RULESET_FIRST_ANALYSIS "A tiny selection of the projects coding guideline rules to
|
/Zephyr-latest/doc/develop/flash_debug/ |
D | nordic_segger.rst | 112 You can also `blacklist Segger devices by editing udev rules`_ so ModemManager 118 >> /etc/udev/rules.d/99-segger-modemmanager-blacklist.rules' 248 .. _blacklist Segger devices by editing udev rules: http://www.at91.com/linux4sam/bin/view/Linux4SA…
|
/Zephyr-latest/include/zephyr/arch/ |
D | structs.h | 12 * The following rules must be observed:
|
/Zephyr-latest/boards/openisa/rv32m1_vega/doc/ |
D | index.rst | 476 to install the `60-openocd.rules`_ udev rules file (usually by 477 placing it in :file:`/etc/udev/rules.d`, then unplugging and 620 to install the `60-openocd.rules`_ udev rules file (usually by 621 placing it in :file:`/etc/udev/rules.d`, then unplugging and 648 - On Linux, make sure udev rules are installed, as described above. 665 to install the `60-openocd.rules`_ udev rules file (usually by 666 placing it in :file:`/etc/udev/rules.d`, then unplugging and 707 - On Linux, make sure udev rules are installed, as described above. 812 .. _60-openocd.rules: 813 https://github.com/open-isa-rv32m1/rv32m1-openocd/blob/master/contrib/60-openocd.rules
|
/Zephyr-latest/doc/develop/sca/ |
D | cpptest.rst | 36 …onf -bdf build/sca/cpptest/cpptestscan.bdf -config "builtin://Recommended Rules" -report out/report
|
/Zephyr-latest/doc/develop/toolchains/ |
D | zephyr_sdk.rst | 134 #. Install `udev <https://en.wikipedia.org/wiki/Udev>`_ rules, which 139 …n-trim| /sysroots/x86_64-pokysdk-linux/usr/share/openocd/contrib/60-openocd.rules /etc/udev/rules.d
|