/linux-master/tools/net/ynl/samples/ |
H A D | netdev.c | 19 static void netdev_print_device(struct netdev_dev_get_rsp *d, unsigned int op) argument 55 name = netdev_op_str(op);
|
/linux-master/tools/net/ynl/lib/ |
H A D | ynl.py | 389 def decode(self, ynl, nl_msg, op): 391 fixed_header_size = ynl._struct_size(op.fixed_header) 496 for op_name, op in self.ops.items(): 498 setattr(self, op.ident_name, bound_f) 793 def _decode_extack(self, request, op, extack): 797 msg = self.nlproto.decode(self, NlMsg(request, 0, op.attr_set), op) 798 offset = self.nlproto.msghdr_size() + self._struct_size(op.fixed_header) 799 path = self._decode_extack_path(msg.raw_attrs, op.attr_set, offset, 895 op [all...] |
H A D | nlspec.py | 375 raise Exception(f"Can't resolve attribute set for op '{self.name}'") 516 op = self.new_operation(elem, val, val) 519 self.msgs[op.name] = op 556 op = self.new_operation(elem, req_val, rsp_val) 561 self.msgs[op.name] = op 567 for op in self.yaml['operations']['list']: 568 if name == op['name']: 569 return op [all...] |
/linux-master/tools/net/ynl/ |
H A D | cli.py | 87 for op_name, op in ynl.ops.items(): 88 print(op_name, " [", ", ".join(op.modes), "]") 90 for op_name, op in ynl.msgs.items(): 91 print(op_name, " [", ", ".join(op.modes), "]")
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 23 #define BPF_ATOMIC 0xc0 /* atomic memory ops - op type in immediate */ 49 /* atomic op type fields (stored in immediate) */ 4595 * * **BPF_CSUM_LEVEL_QUERY**: No-op, returns the current 4676 * *skops*\ **->op**. 4729 * *skops*\ **->op**. 4762 * *skops*\ **->op**. 4784 * *skops*\ **->op**. 5570 * through the dynptr interface. This is a no-op if the dynptr is 5581 * interface. This is a no-op if the dynptr is invalid/null. 6770 __u32 op; member in struct:bpf_sock_ops [all...] |
/linux-master/tools/include/linux/ |
H A D | bitops.h | 35 #define bitop(op, nr, addr) \ 36 op(nr, addr)
|
/linux-master/tools/bpf/bpftool/ |
H A D | link.c | 395 const char *hw_cache, *result, *op; local 409 op = perf_event_name(evsel__hw_cache_op, (config >> 8) & 0xff); 410 if (op) 412 "%s-", op);
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 4693 * @op: required testing operator (=, !=, >, <, ...) 4697 * Prepare to audit cases where (@field @op @rulestr) is true. 4700 static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) argument 4709 if (op != Audit_equal && op != Audit_not_equal) 4748 * @op: required testing operator 4754 static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule) argument 4774 if (op == Audit_equal) 4776 if (op == Audit_not_equal)
|
/linux-master/security/selinux/ss/ |
H A D | services.c | 311 switch (e->op) { 355 switch (e->op) { 381 switch (e->op) { 417 switch (e->op) { 505 audit_log_format(ab, "op=security_compute_av reason=%s " 733 "op=security_validate_transition seresult=denied" 919 "op=security_bounded_transition " 1659 "op=security_compute_sid invalid_context="); 3222 "op=security_sid_mls_copy invalid_context="); 3510 int selinux_audit_rule_init(u32 field, u32 op, cha argument 3635 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) argument [all...] |
H A D | policydb.c | 1261 e->op = le32_to_cpu(buf[2]); 3058 buf[2] = cpu_to_le32(e->op);
|
/linux-master/security/selinux/ |
H A D | hooks.c | 3243 audit_log_format(ab, "op=setxattr invalid_context="); 3670 ad.u.op = &ioctl; 3671 ad.u.op->cmd = cmd; 3672 ad.u.op->path = file->f_path; 6458 audit_log_format(ab, "op=fscreate invalid_context=");
|
/linux-master/security/ |
H A D | security.c | 2478 * security_inode_post_removexattr() - Update the inode after a removexattr op 2612 * security_inode_copy_up() - Create new creds for an overlayfs copy-up op 2630 * security_inode_copy_up_xattr() - Filter xattrs in an overlayfs copy-up op 2883 * security_file_fcntl() - Check if fcntl() op is allowed 3516 * security_task_prctl() - Check if a prctl op is allowed 3526 * Return: Return -ENOSYS if no-one wanted to handle this op, any other value 5332 * @op: rule operator 5341 int security_audit_rule_init(u32 field, u32 op, char *rulestr, void **lsmrule) argument 5343 return call_int_hook(audit_rule_init, field, op, rulestr, lsmrule); 5376 * @op 5385 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule) argument [all...] |
/linux-master/security/integrity/ |
H A D | integrity.h | 203 const unsigned char *fname, const char *op, 207 const unsigned char *fname, const char *op, 220 const char *op, const char *cause, 228 const char *op, const char *cause, 218 integrity_audit_msg(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info) argument 225 integrity_audit_message(int audit_msgno, struct inode *inode, const unsigned char *fname, const char *op, const char *cause, int result, int info, int errno) argument
|
/linux-master/security/integrity/ima/ |
H A D | ima_init.c | 44 static const char op[] = "add_boot_aggregate"; local 98 integrity_audit_msg(AUDIT_INTEGRITY_PCR, NULL, boot_aggregate_name, op,
|
H A D | ima_appraise.c | 485 static const char op[] = "appraise_data"; local 573 op, cause, rc, 0); 593 op, cause, rc, 0);
|
H A D | ima.h | 253 const char *op, struct inode *inode, 262 struct ima_iint_cache *iint, const char *op, 548 static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, argument 558 static inline int ima_filter_rule_match(u32 secid, u32 field, u32 op, argument
|
H A D | ima_api.c | 106 static const char op[] = "add_template_measure"; local 116 template_name, op, 122 result = ima_add_template_entry(entry, violation, op, inode, filename); 134 struct ima_iint_cache *iint, const char *op, 160 op, cause, result, 0); 354 static const char op[] = "add_template_measure"; local 379 op, audit_cause, result, 0); 133 ima_add_violation(struct file *file, const unsigned char *filename, struct ima_iint_cache *iint, const char *op, const char *cause) argument
|
/linux-master/security/apparmor/ |
H A D | lsm.c | 212 * @op: operation being checked 219 static int common_perm(const char *op, const struct path *path, u32 mask, argument 227 error = aa_path_perm(op, current_cred(), label, path, 0, mask, 236 * @op: operation being checked 242 static int common_perm_cond(const char *op, const struct path *path, u32 mask) argument 254 return common_perm(op, path, mask, &cond); 259 * @op: operation being checked 267 static int common_perm_dir_dentry(const char *op, const struct path *dir, argument 273 return common_perm(op, &path, mask, cond); 278 * @op 285 common_perm_rm(const char *op, const struct path *dir, struct dentry *dentry, u32 mask) argument 312 common_perm_create(const char *op, const struct path *dir, struct dentry *dentry, u32 mask, umode_t mode) argument 521 common_file_perm(const char *op, struct file *file, u32 mask, bool in_atomic) argument 559 common_mmap(const char *op, struct file *file, unsigned long prot, unsigned long flags, bool in_atomic) argument 1210 aa_sock_msg_perm(const char *op, u32 request, struct socket *sock, struct msghdr *msg, int size) argument 1236 aa_sock_perm(const char *op, u32 request, struct socket *sock) argument 1258 aa_sock_opt_perm(const char *op, u32 request, struct socket *sock, int level, int optname) argument [all...] |
/linux-master/net/wireless/ |
H A D | nl80211.c | 2055 #define CMD(op, n) \ 2057 if (rdev->ops->op) { \
|
/linux-master/net/sctp/ |
H A D | socket.c | 994 * op Operation to perform (add or remove, see the flags of 1000 int addrs_size, int op) 1010 __func__, sk, addr_buf, addrs_size, op); 1034 switch (op) { 999 sctp_setsockopt_bindx(struct sock *sk, struct sockaddr *addrs, int addrs_size, int op) argument
|
/linux-master/net/sched/ |
H A D | sch_fq.c | 821 struct rb_node *op, **np, *parent; local 829 while ((op = rb_first(oroot)) != NULL) { 830 rb_erase(op, oroot); 831 of = rb_entry(op, struct fq_flow, fq_node);
|
H A D | cls_flower.c | 1968 fl_set_key_val(tb, &key->arp.op, TCA_FLOWER_KEY_ARP_OP, 1969 &mask->arp.op, TCA_FLOWER_KEY_ARP_OP_MASK, 1970 sizeof(key->arp.op)); 3511 fl_dump_key_val(skb, &key->arp.op, 3512 TCA_FLOWER_KEY_ARP_OP, &mask->arp.op, 3514 sizeof(key->arp.op)) ||
|
/linux-master/net/netlink/ |
H A D | genetlink.c | 107 struct genl_ops *op) 111 if (op->policy || op->cmd < family->resv_start_op) 114 op->policy = genl_policy_reject_all; 115 op->maxattr = 1; 120 struct genl_split_ops *op) 122 if (op->policy) 125 op->policy = genl_policy_reject_all; 126 op->maxattr = 1; 157 unsigned int i, struct genl_ops *op) 106 genl_op_fill_in_reject_policy(const struct genl_family *family, struct genl_ops *op) argument 119 genl_op_fill_in_reject_policy_split(const struct genl_family *family, struct genl_split_ops *op) argument 156 genl_op_from_full(const struct genl_family *family, unsigned int i, struct genl_ops *op) argument 169 genl_get_cmd_full(u32 cmd, const struct genl_family *family, struct genl_ops *op) argument 183 genl_op_from_small(const struct genl_family *family, unsigned int i, struct genl_ops *op) argument 200 genl_get_cmd_small(u32 cmd, const struct genl_family *family, struct genl_ops *op) argument 244 genl_get_cmd_split(u32 cmd, u8 flag, const struct genl_family *family, struct genl_split_ops *op) argument 260 genl_cmd_full_to_split(struct genl_split_ops *op, const struct genl_family *family, const struct genl_ops *full, u8 flags) argument 302 genl_get_cmd(u32 cmd, u8 flags, const struct genl_family *family, struct genl_split_ops *op) argument 354 struct genl_ops op; local 563 genl_split_op_check(const struct genl_split_ops *op) argument 1163 struct genl_split_ops op; local 1521 u32 op; member in struct:ctrl_dump_policy_ctx [all...] |
/linux-master/net/netfilter/ |
H A D | nft_dynset.c | 18 enum nft_dynset_ops op:8; member in struct:nft_dynset 89 if (priv->op == NFT_DYNSET_OP_DELETE) { 96 if (priv->op == NFT_DYNSET_OP_UPDATE && 204 priv->op = ntohl(nla_get_be32(tb[NFTA_DYNSET_OP])); 205 if (priv->op > NFT_DYNSET_OP_DELETE) 381 if (nla_put_be32(skb, NFTA_DYNSET_OP, htonl(priv->op)))
|
H A D | nf_tables_api.c | 76 int op; member in struct:nft_audit_data 10084 struct nft_table *table, u32 op) 10096 if (!adp->op || adp->op > op) 10097 adp->op = op; 10111 nft2audit_op[adp->op], GFP_KERNEL); 10083 nf_tables_commit_audit_collect(struct list_head *adl, struct nft_table *table, u32 op) argument
|