/third_party/node/deps/npm/node_modules/ignore-walk/lib/ |
H A D | index.js | 112 .map(rule => { 113 return new Minimatch(rule.trim(), mmopt) 229 this.ignoreRules[f].forEach(rule => { 233 if (rule.negate !== included) { 234 const isRelativeRule = entryBasename && rule.globParts.some(part => 241 // then, if also the rule is relative, match against basename 242 const match = rule.match('/' + entry) || 243 rule.match(entry) || 245 rule.match('/' + entry + '/') || 246 rule [all...] |
/third_party/pulseaudio/src/modules/ |
H A D | module-match.c | 68 struct rule { struct 73 struct rule *next; 77 struct rule *rules; 86 struct rule *end = NULL; in load_rules() 109 struct rule *rule; in load_rules() local 185 rule = pa_xnew(struct rule, 1); in load_rules() 186 rule->regex = regex; in load_rules() 187 rule in load_rules() [all...] |
/third_party/skia/third_party/externals/icu/source/common/ |
H A D | util.cpp | 290 * Append a character to a rule that is being built up. To flush 291 * the quoteBuf to rule, make one final call with isLiteral == TRUE. 293 * @param rule the string to append the character to 307 void ICU_Utility::appendToRule(UnicodeString& rule, in appendToRule() argument 328 rule.append(BACKSLASH).append(APOSTROPHE); in appendToRule() 341 rule.append(APOSTROPHE); in appendToRule() 342 rule.append(quoteBuf); in appendToRule() 343 rule.append(APOSTROPHE); in appendToRule() 347 rule.append(BACKSLASH).append(APOSTROPHE); in appendToRule() 354 * rule in appendToRule() 396 appendToRule(UnicodeString& rule, const UnicodeString& text, UBool isLiteral, UBool escapeUnprintable, UnicodeString& quoteBuf) appendToRule() argument 410 appendToRule(UnicodeString& rule, const UnicodeMatcher* matcher, UBool escapeUnprintable, UnicodeString& quoteBuf) appendToRule() argument [all...] |
H A D | util_props.cpp | 28 int32_t ICU_Utility::parseInteger(const UnicodeString& rule, int32_t& pos, int32_t limit) { in parseInteger() argument 34 if (p < limit && rule.charAt(p) == 48 /*0*/) { in parseInteger() 35 if (p+1 < limit && (rule.charAt(p+1) == 0x78 /*x*/ || rule.charAt(p+1) == 0x58 /*X*/)) { in parseInteger() 47 int32_t d = u_digit(rule.charAt(p++), radix); in parseInteger() 88 int32_t ICU_Utility::parsePattern(const UnicodeString& rule, int32_t pos, int32_t limit, in parsePattern() argument 101 c = rule.charAt(pos++); in parsePattern() 108 pos = skipWhitespace(rule, pos); in parsePattern() 112 parsedInts[intCount++] = parseInteger(rule, p, limit); in parsePattern() 123 c = (UChar) u_tolower(rule in parsePattern() [all...] |
/kernel/linux/linux-5.10/include/net/ |
H A D | flow_offload.h | 77 void flow_rule_match_meta(const struct flow_rule *rule, 79 void flow_rule_match_basic(const struct flow_rule *rule, 81 void flow_rule_match_control(const struct flow_rule *rule, 83 void flow_rule_match_eth_addrs(const struct flow_rule *rule, 85 void flow_rule_match_vlan(const struct flow_rule *rule, 87 void flow_rule_match_cvlan(const struct flow_rule *rule, 89 void flow_rule_match_ipv4_addrs(const struct flow_rule *rule, 91 void flow_rule_match_ipv6_addrs(const struct flow_rule *rule, 93 void flow_rule_match_ip(const struct flow_rule *rule, 95 void flow_rule_match_ports(const struct flow_rule *rule, 384 flow_rule_match_key(const struct flow_rule *rule, enum flow_dissector_key_id key) flow_rule_match_key() argument 543 struct flow_rule *rule; global() member [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | spectrum_acl.c | 66 struct rhash_head ht_node; /* Member of rule HT */ 820 struct mlxsw_sp_acl_rule *rule; in mlxsw_sp_acl_rule_create() local 824 rule = kzalloc(sizeof(*rule) + ops->rule_priv_size, in mlxsw_sp_acl_rule_create() 826 if (!rule) { in mlxsw_sp_acl_rule_create() 830 rule->cookie = cookie; in mlxsw_sp_acl_rule_create() 831 rule->ruleset = ruleset; in mlxsw_sp_acl_rule_create() 833 rule->rulei = mlxsw_sp_acl_rulei_create(mlxsw_sp->acl, afa_block); in mlxsw_sp_acl_rule_create() 834 if (IS_ERR(rule->rulei)) { in mlxsw_sp_acl_rule_create() 835 err = PTR_ERR(rule in mlxsw_sp_acl_rule_create() 848 mlxsw_sp_acl_rule_destroy(struct mlxsw_sp *mlxsw_sp, struct mlxsw_sp_acl_rule *rule) mlxsw_sp_acl_rule_destroy() argument 858 mlxsw_sp_acl_rule_add(struct mlxsw_sp *mlxsw_sp, struct mlxsw_sp_acl_rule *rule) mlxsw_sp_acl_rule_add() argument 902 mlxsw_sp_acl_rule_del(struct mlxsw_sp *mlxsw_sp, struct mlxsw_sp_acl_rule *rule) mlxsw_sp_acl_rule_del() argument 923 mlxsw_sp_acl_rule_action_replace(struct mlxsw_sp *mlxsw_sp, struct mlxsw_sp_acl_rule *rule, struct mlxsw_afa_block *afa_block) mlxsw_sp_acl_rule_action_replace() argument 947 mlxsw_sp_acl_rule_rulei(struct mlxsw_sp_acl_rule *rule) mlxsw_sp_acl_rule_rulei() argument 952 mlxsw_sp_acl_rule_activity_update(struct mlxsw_sp *mlxsw_sp, struct mlxsw_sp_acl_rule *rule) mlxsw_sp_acl_rule_activity_update() argument 970 struct mlxsw_sp_acl_rule *rule; mlxsw_sp_acl_rules_activity_update() local 1009 mlxsw_sp_acl_rule_get_stats(struct mlxsw_sp *mlxsw_sp, struct mlxsw_sp_acl_rule *rule, u64 *packets, u64 *bytes, u64 *drops, u64 *last_use, enum flow_action_hw_stats *used_hw_stats) mlxsw_sp_acl_rule_get_stats() argument [all...] |
/third_party/python/Doc/tools/extensions/ |
H A D | suspicious.py | 20 - each line defines a rule; if the rule matches, the issue 24 rule matches anywhere in the file). 29 Rules are processed sequentially. A rule matches when: 34 * the rule text is completely contained into the source line 62 """A rule for ignoring issues""" 63 self.docname = docname # document to which this rule applies 65 # this rule matches only near that. 67 self.issue = issue # the markup fragment that triggered this rule 113 unused_rules = [rule fo [all...] |
/kernel/linux/linux-6.6/security/integrity/ima/ |
H A D | ima_policy.c | 117 void *rule; /* LSM file metadata specific */ member 142 * The minimum rule set to allow for full TCB coverage. Measures all files 383 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_free_rule() 428 &nentry->lsm[i].rule); in ima_lsm_copy_rule() 429 if (!nentry->lsm[i].rule) in ima_lsm_copy_rule() 430 pr_warn("rule for LSM \'%s\' is undefined\n", in ima_lsm_copy_rule() 454 ima_filter_rule_free(entry->lsm[i].rule); in ima_lsm_update_rule() 487 pr_err("lsm rule update error %d\n", result); in ima_lsm_update_rules() 504 * ima_match_rule_data - determine whether func_data matches the policy rule 505 * @rule 511 ima_match_rule_data(struct ima_rule_entry *rule, const char *func_data, const struct cred *cred) ima_match_rule_data() argument 565 ima_match_rules(struct ima_rule_entry *rule, struct mnt_idmap *idmap, struct inode *inode, const struct cred *cred, u32 secid, enum ima_hooks func, int mask, const char *func_data) ima_match_rules() argument 693 get_subaction(struct ima_rule_entry *rule, enum ima_hooks func) get_subaction() argument 916 char rule[255]; ima_init_arch_policy() local 1404 ima_parse_rule(char *rule, struct ima_rule_entry *entry) ima_parse_rule() argument 1919 ima_parse_add_rule(char *rule) ima_parse_add_rule() argument [all...] |
/third_party/icu/icu4c/source/common/ |
H A D | util_props.cpp | 28 int32_t ICU_Utility::parseInteger(const UnicodeString& rule, int32_t& pos, int32_t limit) { in parseInteger() argument 34 if (p < limit && rule.charAt(p) == 48 /*0*/) { in parseInteger() 35 if (p+1 < limit && (rule.charAt(p+1) == 0x78 /*x*/ || rule.charAt(p+1) == 0x58 /*X*/)) { in parseInteger() 47 int32_t d = u_digit(rule.charAt(p++), radix); in parseInteger() 88 int32_t ICU_Utility::parsePattern(const UnicodeString& rule, int32_t pos, int32_t limit, in parsePattern() argument 101 c = rule.charAt(pos++); in parsePattern() 108 pos = skipWhitespace(rule, pos); in parsePattern() 112 parsedInts[intCount++] = parseInteger(rule, p, limit); in parsePattern() 123 c = (UChar) u_tolower(rule in parsePattern() [all...] |
/third_party/node/deps/icu-small/source/common/ |
H A D | util_props.cpp | 28 int32_t ICU_Utility::parseInteger(const UnicodeString& rule, int32_t& pos, int32_t limit) { in parseInteger() argument 34 if (p < limit && rule.charAt(p) == 48 /*0*/) { in parseInteger() 35 if (p+1 < limit && (rule.charAt(p+1) == 0x78 /*x*/ || rule.charAt(p+1) == 0x58 /*X*/)) { in parseInteger() 47 int32_t d = u_digit(rule.charAt(p++), radix); in parseInteger() 88 int32_t ICU_Utility::parsePattern(const UnicodeString& rule, int32_t pos, int32_t limit, in parsePattern() argument 101 c = rule.charAt(pos++); in parsePattern() 108 pos = skipWhitespace(rule, pos); in parsePattern() 112 parsedInts[intCount++] = parseInteger(rule, p, limit); in parsePattern() 123 c = (char16_t) u_tolower(rule in parsePattern() [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlx5/core/en/tc/ |
H A D | post_meter.c | 23 struct mlx5_flow_handle *rule; member 155 struct mlx5_flow_handle *rule; in mlx5e_post_meter_rate_rules_create() local 166 rule = mlx5e_post_meter_add_rule(priv, post_meter, spec, red_attr, in mlx5e_post_meter_rate_rules_create() 168 if (IS_ERR(rule)) { in mlx5e_post_meter_rate_rules_create() 169 mlx5_core_warn(priv->mdev, "Failed to create post_meter exceed rule\n"); in mlx5e_post_meter_rate_rules_create() 170 err = PTR_ERR(rule); in mlx5e_post_meter_rate_rules_create() 173 table->red_rule = rule; in mlx5e_post_meter_rate_rules_create() 179 rule = mlx5e_post_meter_add_rule(priv, post_meter, spec, green_attr, in mlx5e_post_meter_rate_rules_create() 181 if (IS_ERR(rule)) { in mlx5e_post_meter_rate_rules_create() 182 mlx5_core_warn(priv->mdev, "Failed to create post_meter notexceed rule\ in mlx5e_post_meter_rate_rules_create() 345 struct mlx5_flow_handle *rule; mlx5e_post_meter_mtu_create() local [all...] |
/kernel/linux/linux-5.10/drivers/net/dsa/ |
H A D | bcm_sf2_cfp.c | 383 /* Locate the first rule available */ in bcm_sf2_cfp_ipv4_rule_set() 398 flow_rule_match_ipv4_addrs(flow->rule, &ipv4); in bcm_sf2_cfp_ipv4_rule_set() 399 flow_rule_match_ports(flow->rule, &ports); in bcm_sf2_cfp_ipv4_rule_set() 400 flow_rule_match_ip(flow->rule, &ip); in bcm_sf2_cfp_ipv4_rule_set() 465 /* Turn on CFP for this rule now */ in bcm_sf2_cfp_ipv4_rule_set() 470 /* Flag the rule as being used and return it */ in bcm_sf2_cfp_ipv4_rule_set() 570 struct cfp_rule *rule; in bcm_sf2_cfp_rule_find() local 572 list_for_each_entry(rule, &priv->cfp.rules_list, next) { in bcm_sf2_cfp_rule_find() 573 if (rule->port == port && rule in bcm_sf2_cfp_rule_find() 583 struct cfp_rule *rule = NULL; bcm_sf2_cfp_rule_cmp() local 933 struct cfp_rule *rule = NULL; bcm_sf2_cfp_rule_set() local 1030 struct cfp_rule *rule; bcm_sf2_cfp_rule_del() local 1071 struct cfp_rule *rule; bcm_sf2_cfp_rule_get() local 1219 struct cfp_rule *rule, *n; bcm_sf2_cfp_exit() local 1231 struct cfp_rule *rule; bcm_sf2_cfp_resume() local 1316 struct cfp_rule *rule; bcm_sf2_cfp_get_ethtool_stats() local [all...] |
/kernel/linux/linux-6.6/drivers/net/dsa/ |
H A D | bcm_sf2_cfp.c | 383 /* Locate the first rule available */ in bcm_sf2_cfp_ipv4_rule_set() 398 flow_rule_match_ipv4_addrs(flow->rule, &ipv4); in bcm_sf2_cfp_ipv4_rule_set() 399 flow_rule_match_ports(flow->rule, &ports); in bcm_sf2_cfp_ipv4_rule_set() 400 flow_rule_match_ip(flow->rule, &ip); in bcm_sf2_cfp_ipv4_rule_set() 465 /* Turn on CFP for this rule now */ in bcm_sf2_cfp_ipv4_rule_set() 470 /* Flag the rule as being used and return it */ in bcm_sf2_cfp_ipv4_rule_set() 570 struct cfp_rule *rule; in bcm_sf2_cfp_rule_find() local 572 list_for_each_entry(rule, &priv->cfp.rules_list, next) { in bcm_sf2_cfp_rule_find() 573 if (rule->port == port && rule in bcm_sf2_cfp_rule_find() 583 struct cfp_rule *rule = NULL; bcm_sf2_cfp_rule_cmp() local 930 struct cfp_rule *rule = NULL; bcm_sf2_cfp_rule_set() local 1026 struct cfp_rule *rule; bcm_sf2_cfp_rule_del() local 1067 struct cfp_rule *rule; bcm_sf2_cfp_rule_get() local 1215 struct cfp_rule *rule, *n; bcm_sf2_cfp_exit() local 1227 struct cfp_rule *rule; bcm_sf2_cfp_resume() local 1312 struct cfp_rule *rule; bcm_sf2_cfp_get_ethtool_stats() local [all...] |
/kernel/linux/linux-6.6/tools/perf/tests/shell/lib/ |
H A D | perf_metric_validation.py | 38 self.pctgmetrics = set() # Percentage rule 219 def relationship_test(self, rule: dict): 221 Validate if the metrics follow the required relationship in the rule. 223 One rule is counted as ont test. 226 @param rule: dict with metric name(+alias), formula, and required upper and lower bounds. 229 for m in rule['Metrics']: 231 lbv, ubv, t = self.get_bounds(rule['RangeLower'], rule['RangeUpper'], rule['ErrorThreshold'], alias, ridx=rule['RuleInde [all...] |
/third_party/icu/icu4c/source/i18n/ |
H A D | funcrepl.cpp | 99 UnicodeString& FunctionReplacer::toReplacerPattern(UnicodeString& rule, in toReplacerPattern() argument 102 rule.truncate(0); in toReplacerPattern() 103 rule.append(AMPERSAND); in toReplacerPattern() 104 rule.append(translit->getID()); in toReplacerPattern() 105 rule.append(OPEN, 2); in toReplacerPattern() 106 rule.append(replacer->toReplacer()->toReplacerPattern(str, escapeUnprintable)); in toReplacerPattern() 107 rule.append(CLOSE, 2); in toReplacerPattern() 108 return rule; in toReplacerPattern()
|
/third_party/node/deps/icu-small/source/i18n/ |
H A D | funcrepl.cpp | 99 UnicodeString& FunctionReplacer::toReplacerPattern(UnicodeString& rule, in toReplacerPattern() argument 102 rule.truncate(0); in toReplacerPattern() 103 rule.append(AMPERSAND); in toReplacerPattern() 104 rule.append(translit->getID()); in toReplacerPattern() 105 rule.append(OPEN, 2); in toReplacerPattern() 106 rule.append(replacer->toReplacer()->toReplacerPattern(str, escapeUnprintable)); in toReplacerPattern() 107 rule.append(CLOSE, 2); in toReplacerPattern() 108 return rule; in toReplacerPattern()
|
/third_party/skia/third_party/externals/icu/source/i18n/ |
H A D | funcrepl.cpp | 99 UnicodeString& FunctionReplacer::toReplacerPattern(UnicodeString& rule, in toReplacerPattern() argument 102 rule.truncate(0); in toReplacerPattern() 103 rule.append(AMPERSAND); in toReplacerPattern() 104 rule.append(translit->getID()); in toReplacerPattern() 105 rule.append(OPEN, 2); in toReplacerPattern() 106 rule.append(replacer->toReplacer()->toReplacerPattern(str, escapeUnprintable)); in toReplacerPattern() 107 rule.append(CLOSE, 2); in toReplacerPattern() 108 return rule; in toReplacerPattern()
|
/kernel/linux/linux-5.10/drivers/net/ethernet/sfc/ |
H A D | ethtool_common.c | 644 struct ethtool_rx_flow_spec *rule, in efx_ethtool_get_class_rule() 647 struct ethtool_tcpip4_spec *ip_entry = &rule->h_u.tcp_ip4_spec; in efx_ethtool_get_class_rule() 648 struct ethtool_tcpip4_spec *ip_mask = &rule->m_u.tcp_ip4_spec; in efx_ethtool_get_class_rule() 649 struct ethtool_usrip4_spec *uip_entry = &rule->h_u.usr_ip4_spec; in efx_ethtool_get_class_rule() 650 struct ethtool_usrip4_spec *uip_mask = &rule->m_u.usr_ip4_spec; in efx_ethtool_get_class_rule() 651 struct ethtool_tcpip6_spec *ip6_entry = &rule->h_u.tcp_ip6_spec; in efx_ethtool_get_class_rule() 652 struct ethtool_tcpip6_spec *ip6_mask = &rule->m_u.tcp_ip6_spec; in efx_ethtool_get_class_rule() 653 struct ethtool_usrip6_spec *uip6_entry = &rule->h_u.usr_ip6_spec; in efx_ethtool_get_class_rule() 654 struct ethtool_usrip6_spec *uip6_mask = &rule->m_u.usr_ip6_spec; in efx_ethtool_get_class_rule() 655 struct ethhdr *mac_entry = &rule in efx_ethtool_get_class_rule() 643 efx_ethtool_get_class_rule(struct efx_nic *efx, struct ethtool_rx_flow_spec *rule, u32 *rss_context) efx_ethtool_get_class_rule() argument 915 efx_ethtool_set_class_rule(struct efx_nic *efx, struct ethtool_rx_flow_spec *rule, u32 rss_context) efx_ethtool_set_class_rule() argument [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/sfc/ |
H A D | ethtool_common.c | 645 struct ethtool_rx_flow_spec *rule, in efx_ethtool_get_class_rule() 648 struct ethtool_tcpip4_spec *ip_entry = &rule->h_u.tcp_ip4_spec; in efx_ethtool_get_class_rule() 649 struct ethtool_tcpip4_spec *ip_mask = &rule->m_u.tcp_ip4_spec; in efx_ethtool_get_class_rule() 650 struct ethtool_usrip4_spec *uip_entry = &rule->h_u.usr_ip4_spec; in efx_ethtool_get_class_rule() 651 struct ethtool_usrip4_spec *uip_mask = &rule->m_u.usr_ip4_spec; in efx_ethtool_get_class_rule() 652 struct ethtool_tcpip6_spec *ip6_entry = &rule->h_u.tcp_ip6_spec; in efx_ethtool_get_class_rule() 653 struct ethtool_tcpip6_spec *ip6_mask = &rule->m_u.tcp_ip6_spec; in efx_ethtool_get_class_rule() 654 struct ethtool_usrip6_spec *uip6_entry = &rule->h_u.usr_ip6_spec; in efx_ethtool_get_class_rule() 655 struct ethtool_usrip6_spec *uip6_mask = &rule->m_u.usr_ip6_spec; in efx_ethtool_get_class_rule() 656 struct ethhdr *mac_entry = &rule in efx_ethtool_get_class_rule() 644 efx_ethtool_get_class_rule(struct efx_nic *efx, struct ethtool_rx_flow_spec *rule, u32 *rss_context) efx_ethtool_get_class_rule() argument 916 efx_ethtool_set_class_rule(struct efx_nic *efx, struct ethtool_rx_flow_spec *rule, u32 rss_context) efx_ethtool_set_class_rule() argument [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/sfc/siena/ |
H A D | ethtool_common.c | 645 struct ethtool_rx_flow_spec *rule, in efx_ethtool_get_class_rule() 648 struct ethtool_tcpip4_spec *ip_entry = &rule->h_u.tcp_ip4_spec; in efx_ethtool_get_class_rule() 649 struct ethtool_tcpip4_spec *ip_mask = &rule->m_u.tcp_ip4_spec; in efx_ethtool_get_class_rule() 650 struct ethtool_usrip4_spec *uip_entry = &rule->h_u.usr_ip4_spec; in efx_ethtool_get_class_rule() 651 struct ethtool_usrip4_spec *uip_mask = &rule->m_u.usr_ip4_spec; in efx_ethtool_get_class_rule() 652 struct ethtool_tcpip6_spec *ip6_entry = &rule->h_u.tcp_ip6_spec; in efx_ethtool_get_class_rule() 653 struct ethtool_tcpip6_spec *ip6_mask = &rule->m_u.tcp_ip6_spec; in efx_ethtool_get_class_rule() 654 struct ethtool_usrip6_spec *uip6_entry = &rule->h_u.usr_ip6_spec; in efx_ethtool_get_class_rule() 655 struct ethtool_usrip6_spec *uip6_mask = &rule->m_u.usr_ip6_spec; in efx_ethtool_get_class_rule() 656 struct ethhdr *mac_entry = &rule in efx_ethtool_get_class_rule() 644 efx_ethtool_get_class_rule(struct efx_nic *efx, struct ethtool_rx_flow_spec *rule, u32 *rss_context) efx_ethtool_get_class_rule() argument 917 efx_ethtool_set_class_rule(struct efx_nic *efx, struct ethtool_rx_flow_spec *rule, u32 rss_context) efx_ethtool_set_class_rule() argument [all...] |
/third_party/icu/icu4c/source/python/icutools/databuilder/renderers/ |
H A D | makefile.py | 41 for rule in make_rules: 42 if isinstance(rule, MakeFilesVar): 44 NAME = rule.name, 45 FILE_LIST = files_to_makefile(rule.files, wrap = True, **kwargs), 49 if isinstance(rule, MakeStringVar): 51 NAME = rule.name, 52 CONTENT = rule.content 56 assert isinstance(rule, MakeRule) 58 OUT_FILE = files_to_makefile([rule.output_file], **kwargs), 59 DEP_FILES = files_to_makefile(rule [all...] |
/third_party/skia/third_party/externals/icu/source/python/icutools/databuilder/renderers/ |
H A D | makefile.py | 41 for rule in make_rules: 42 if isinstance(rule, MakeFilesVar): 44 NAME = rule.name, 45 FILE_LIST = files_to_makefile(rule.files, wrap = True, **kwargs), 49 if isinstance(rule, MakeStringVar): 51 NAME = rule.name, 52 CONTENT = rule.content 56 assert isinstance(rule, MakeRule) 58 OUT_FILE = files_to_makefile([rule.output_file], **kwargs), 59 DEP_FILES = files_to_makefile(rule [all...] |
/kernel/linux/linux-5.10/drivers/net/ethernet/sfc/falcon/ |
H A D | ethtool.c | 783 struct ethtool_rx_flow_spec *rule) in ef4_ethtool_get_class_rule() 785 struct ethtool_tcpip4_spec *ip_entry = &rule->h_u.tcp_ip4_spec; in ef4_ethtool_get_class_rule() 786 struct ethtool_tcpip4_spec *ip_mask = &rule->m_u.tcp_ip4_spec; in ef4_ethtool_get_class_rule() 787 struct ethtool_usrip4_spec *uip_entry = &rule->h_u.usr_ip4_spec; in ef4_ethtool_get_class_rule() 788 struct ethtool_usrip4_spec *uip_mask = &rule->m_u.usr_ip4_spec; in ef4_ethtool_get_class_rule() 789 struct ethtool_tcpip6_spec *ip6_entry = &rule->h_u.tcp_ip6_spec; in ef4_ethtool_get_class_rule() 790 struct ethtool_tcpip6_spec *ip6_mask = &rule->m_u.tcp_ip6_spec; in ef4_ethtool_get_class_rule() 791 struct ethtool_usrip6_spec *uip6_entry = &rule->h_u.usr_ip6_spec; in ef4_ethtool_get_class_rule() 792 struct ethtool_usrip6_spec *uip6_mask = &rule->m_u.usr_ip6_spec; in ef4_ethtool_get_class_rule() 793 struct ethhdr *mac_entry = &rule in ef4_ethtool_get_class_rule() 782 ef4_ethtool_get_class_rule(struct ef4_nic *efx, struct ethtool_rx_flow_spec *rule) ef4_ethtool_get_class_rule() argument 1018 ef4_ethtool_set_class_rule(struct ef4_nic *efx, struct ethtool_rx_flow_spec *rule) ef4_ethtool_set_class_rule() argument [all...] |
/kernel/linux/linux-6.6/drivers/net/ethernet/sfc/falcon/ |
H A D | ethtool.c | 793 struct ethtool_rx_flow_spec *rule) in ef4_ethtool_get_class_rule() 795 struct ethtool_tcpip4_spec *ip_entry = &rule->h_u.tcp_ip4_spec; in ef4_ethtool_get_class_rule() 796 struct ethtool_tcpip4_spec *ip_mask = &rule->m_u.tcp_ip4_spec; in ef4_ethtool_get_class_rule() 797 struct ethtool_usrip4_spec *uip_entry = &rule->h_u.usr_ip4_spec; in ef4_ethtool_get_class_rule() 798 struct ethtool_usrip4_spec *uip_mask = &rule->m_u.usr_ip4_spec; in ef4_ethtool_get_class_rule() 799 struct ethtool_tcpip6_spec *ip6_entry = &rule->h_u.tcp_ip6_spec; in ef4_ethtool_get_class_rule() 800 struct ethtool_tcpip6_spec *ip6_mask = &rule->m_u.tcp_ip6_spec; in ef4_ethtool_get_class_rule() 801 struct ethtool_usrip6_spec *uip6_entry = &rule->h_u.usr_ip6_spec; in ef4_ethtool_get_class_rule() 802 struct ethtool_usrip6_spec *uip6_mask = &rule->m_u.usr_ip6_spec; in ef4_ethtool_get_class_rule() 803 struct ethhdr *mac_entry = &rule in ef4_ethtool_get_class_rule() 792 ef4_ethtool_get_class_rule(struct ef4_nic *efx, struct ethtool_rx_flow_spec *rule) ef4_ethtool_get_class_rule() argument 1028 ef4_ethtool_set_class_rule(struct ef4_nic *efx, struct ethtool_rx_flow_spec *rule) ef4_ethtool_set_class_rule() argument [all...] |
/kernel/linux/linux-6.6/kernel/ |
H A D | audit_tree.c | 63 * time and used in AUDIT_TREE rule matching. 69 * tree.rules anchors rule.rlist audit_filter_mutex 526 struct audit_krule *rule) in audit_tree_log_remove_rule() 536 audit_log_untrustedstring(ab, rule->tree->pathname); in audit_tree_log_remove_rule() 537 audit_log_key(ab, rule->filterkey); in audit_tree_log_remove_rule() 538 audit_log_format(ab, " list=%d res=1", rule->listnr); in audit_tree_log_remove_rule() 544 struct audit_krule *rule, *next; in kill_rules() local 547 list_for_each_entry_safe(rule, next, &tree->rules, rlist) { in kill_rules() 548 entry = container_of(rule, struct audit_entry, rule); in kill_rules() 525 audit_tree_log_remove_rule(struct audit_context *context, struct audit_krule *rule) audit_tree_log_remove_rule() argument 647 audit_remove_tree_rule(struct audit_krule *rule) audit_remove_tree_rule() argument 725 audit_make_tree(struct audit_krule *rule, char *pathname, u32 op) audit_make_tree() argument 800 audit_add_tree_rule(struct audit_krule *rule) audit_add_tree_rule() argument [all...] |