Home
last modified time | relevance | path

Searched full:filter (Results 1 – 25 of 2300) sorted by relevance

12345678910>>...92

/Linux-v6.1/drivers/net/ethernet/mscc/
Docelot_flower.c147 struct ocelot_vcap_filter *filter; in ocelot_find_vcap_filter_that_points_at() local
158 list_for_each_entry(filter, &block->rules, list) in ocelot_find_vcap_filter_that_points_at()
159 if (filter->type == OCELOT_VCAP_FILTER_PAG && in ocelot_find_vcap_filter_that_points_at()
160 filter->goto_target == chain) in ocelot_find_vcap_filter_that_points_at()
161 return filter; in ocelot_find_vcap_filter_that_points_at()
164 list_for_each_entry(filter, &ocelot->dummy_rules, list) in ocelot_find_vcap_filter_that_points_at()
165 if (filter->goto_target == chain) in ocelot_find_vcap_filter_that_points_at()
166 return filter; in ocelot_find_vcap_filter_that_points_at()
173 struct ocelot_vcap_filter *filter, in ocelot_flower_parse_ingress_vlan_modify() argument
179 if (filter->goto_target != -1) { in ocelot_flower_parse_ingress_vlan_modify()
[all …]
Docelot_vcap.c331 struct ocelot_vcap_filter *filter) in is2_action_set() argument
334 struct ocelot_vcap_action *a = &filter->action; in is2_action_set()
346 struct ocelot_vcap_filter *filter) in is2_entry_set() argument
349 struct ocelot_vcap_key_vlan *tag = &filter->vlan; in is2_entry_set()
366 if (filter->prio != 0) in is2_entry_set()
371 vcap_key_set(vcap, &data, VCAP_IS2_HK_PAG, filter->pag, 0xff); in is2_entry_set()
373 (filter->lookup == 0) ? OCELOT_VCAP_BIT_1 : in is2_entry_set()
376 ~filter->ingress_port_mask); in is2_entry_set()
379 vcap_key_bit_set(vcap, &data, VCAP_IS2_HK_L2_MC, filter->dmac_mc); in is2_entry_set()
380 vcap_key_bit_set(vcap, &data, VCAP_IS2_HK_L2_BC, filter->dmac_bc); in is2_entry_set()
[all …]
Docelot_mrp.c39 struct ocelot_vcap_filter *filter; in ocelot_mrp_del_vcap() local
42 filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id, in ocelot_mrp_del_vcap()
44 if (!filter) in ocelot_mrp_del_vcap()
47 return ocelot_vcap_filter_del(ocelot, filter); in ocelot_mrp_del_vcap()
54 struct ocelot_vcap_filter *filter; in ocelot_mrp_redirect_add_vcap() local
57 filter = kzalloc(sizeof(*filter), GFP_KERNEL); in ocelot_mrp_redirect_add_vcap()
58 if (!filter) in ocelot_mrp_redirect_add_vcap()
61 filter->key_type = OCELOT_VCAP_KEY_ETYPE; in ocelot_mrp_redirect_add_vcap()
62 filter->prio = 1; in ocelot_mrp_redirect_add_vcap()
63 filter->id.cookie = OCELOT_VCAP_IS2_MRP_REDIRECT(ocelot, src_port); in ocelot_mrp_redirect_add_vcap()
[all …]
/Linux-v6.1/tools/testing/selftests/tc-testing/tc-tests/filters/
Dcgroup.json4 "name": "Add cgroup filter with cmp ematch u8/link layer and drop action",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 cgroup match 'c…
17 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
18 …"matchPattern": "^filter protocol ip pref [0-9]+ cgroup chain [0-9]+.*handle 0x1.*cmp\\(u8 at 0 la…
26 "name": "Add cgroup filter with cmp ematch u8/link layer with trans flag and pass action",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 cgroup match 'c…
39 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
40 …"matchPattern": "^filter protocol ip pref [0-9]+ cgroup chain [0-9]+.*handle 0x1.*cmp\\(u8 at 0 la…
[all …]
Dfw.json4 "name": "Add fw filter with prio at 32-bit maxixum",
6 "filter",
15 "cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 65535 fw action ok",
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 65535 protocol all fw",
26 "name": "Add fw filter with prio exceeding 32-bit maxixum",
28 "filter",
37 "cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 65536 fw action ok",
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 65536 protocol all fw",
48 "name": "Add fw filter with action ok",
50 "filter",
[all …]
Dbasic.json4 "name": "Add basic filter with cmp ematch u8/link layer and default action",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 basic match 'cm…
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip basic",
18 …"matchPattern": "^filter parent ffff: protocol ip pref 1 basic.*handle 0x1 flowid 1:1.*cmp\\(u8 at…
26 "name": "Add basic filter with cmp ematch u8/link layer with trans flag and default action",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 basic match 'cm…
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip basic",
40 …"matchPattern": "^filter parent ffff: protocol ip pref 1 basic.*handle 0x1 flowid 1:1.*cmp\\(u8 at…
[all …]
Dflow.json4 "name": "Add flow filter with map key and ops",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 1 protocol ip flow map key ds…
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 1 flow",
18 …"matchPattern": "filter parent ffff: protocol ip pref 1 flow chain [0-9]+ handle 0x1 map keys dst …
26 "name": "Add flow filter with map key or ops",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 1 protocol ip flow map key ds…
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 1 flow",
40 …"matchPattern": "filter parent ffff: protocol ip pref 1 flow chain [0-9]+ handle 0x1 map keys dst.…
[all …]
Dmatchall.json4 "name": "Add ingress matchall filter for protocol ipv4 and action PASS",
6 "filter",
13 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 1 protocol ip matchall act…
15 "verifyCmd": "$TC filter get dev $DUMMY parent ffff: handle 1 prio 1 protocol ip matchall",
16 …"matchPattern": "^filter parent ffff: protocol ip pref 1 matchall.*handle 0x1.*gact action pass.*r…
25 "name": "Add egress matchall filter for protocol ipv4 and action PASS",
27 "filter",
34 …"cmdUnderTest": "$TC filter add dev $DUMMY parent 1: handle 0x1 prio 1 protocol ip matchall action…
36 "verifyCmd": "$TC filter get dev $DUMMY parent 1: handle 1 prio 1 protocol ip matchall",
37 …"matchPattern": "^filter parent 1: protocol ip pref 1 matchall.*handle 0x1.*gact action pass.*ref …
[all …]
Dbpf.json4 "name": "Add cBPF filter with valid bytecode",
6 "filter",
7 "bpf-filter"
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf bytecode …
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf",
18 …"matchPattern": "filter parent ffff: protocol ip pref 100 bpf chain [0-9]+ handle 0x1.*bytecode '4…
26 "name": "Add cBPF filter with invalid bytecode",
28 "filter",
29 "bpf-filter"
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf bytecode …
[all …]
Dtcindex.json4 "name": "Add tcindex filter with default action",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 tcindex classid…
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip tcindex",
18 …"matchPattern": "^filter parent ffff: protocol ip pref 1 tcindex chain 0 handle 0x0001 classid 1:1…
26 "name": "Add tcindex filter with hash size and pass action",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 tcindex hash 32…
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip tcindex",
40 …"matchPattern": "^filter parent ffff: protocol ip pref.*tcindex chain [0-9]+ handle 0x0001 classid…
[all …]
Drsvp.json4 "name": "Add rsvp filter with tcp proto and specific IP address",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 1 rsvp ipproto tcp session…
17 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
18 …"matchPattern": "^filter protocol ip pref [0-9]+ rsvp chain [0-9]+ fh 0x.*session 198.168.10.64 ip…
26 "name": "Add rsvp filter with udp proto and specific IP address",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 1 rsvp ipproto udp session…
39 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
40 …"matchPattern": "^filter protocol ip pref [0-9]+ rsvp chain [0-9]+ fh 0x.*session 1.1.1.1 ipproto …
[all …]
Droute.json4 "name": "Add route filter with from and to tag",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 100 route from 1 to 10 cla…
17 "verifyCmd": "$TC filter ls dev $DEV1 parent ffff:",
26 "name": "Add route filter with fromif and to tag",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 100 route fromif $DEV1 to …
39 "verifyCmd": "$TC filter ls dev $DEV1 parent ffff:",
48 "name": "Add route filter with to flag and reclassify action",
50 "filter",
[all …]
Du32.json6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.1/32…
17 "verifyCmd": "$TC filter show dev $DEV1 ingress",
18 …"matchPattern": "filter protocol ip pref 1 u32 chain (0[ ]+$|0 fh 800: ht divisor 1|0 fh 800::800 …
28 "filter",
37 …"cmdUnderTest": "$TC filter replace dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.…
39 "verifyCmd": "$TC filter show dev $DEV1 ingress",
40 "matchPattern": "filter protocol ip pref 1 u32 chain 0",
50 "filter",
58 …"$TC filter add dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.3/32 flowid 1:3 acti…
[all …]
Dtests.json6 "filter",
14 "$TC filter add dev $DEV1 protocol all pref 1 ingress handle 0x1234 matchall action ok"
16 … "cmdUnderTest": "$TC filter get dev $DEV1 protocol all pref 1 ingress handle 0x1234 matchall",
18 "verifyCmd": "$TC filter show dev $DEV1 ingress",
19 "matchPattern": "filter protocol all pref 1 matchall chain 0 handle 0x1234",
29 "filter",
35 …"cmdUnderTest": "$TC filter add dev $DEV2 protocol ip pref 1 ingress handle 0xffffffff flower acti…
37 "verifyCmd": "$TC filter show dev $DEV2 ingress",
38 "matchPattern": "filter protocol ip pref 1 flower.*handle 0xffffffff",
48 "filter",
[all …]
/Linux-v6.1/tools/testing/selftests/net/forwarding/
Dtc_flower.sh44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
53 check_fail $? "Matched on a wrong filter"
56 check_err $? "Did not match on correct filter"
58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower
70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
72 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
79 check_fail $? "Matched on a wrong filter"
82 check_err $? "Did not match on correct filter"
[all …]
Dtc_chains.sh38 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \
45 check_fail $? "matched on filter in unreachable chain"
47 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \
57 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \
59 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
61 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
68 check_fail $? "Matched on a wrong filter"
71 check_err $? "Did not match on correct filter with goto chain action"
74 check_err $? "Did not match on correct filter in chain 1"
76 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
[all …]
/Linux-v6.1/tools/perf/util/
Dstrfilter.h4 /* General purpose glob matching filter */
9 /* A node of string filter */
16 /* String filter */
22 * strfilter__new - Create a new string filter
23 * @rules: Filter rule, which is a combination of glob expressions.
34 * @filter: Original string filter
35 * @rules: Filter rule to be appended at left of the root of
36 * @filter by using logical-or.
39 * Parse @rules and join it to the @filter by using logical-or.
42 int strfilter__or(struct strfilter *filter,
[all …]
/Linux-v6.1/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/
Dtc_flower.sh96 # filter is matched
100 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
107 check_err $? "Single filter - did not match"
109 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
124 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
130 check_err $? "Single filter - did not match after delete"
132 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower
142 # filter is matched
146 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
148 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
[all …]
/Linux-v6.1/tools/testing/selftests/drivers/net/mlxsw/
Dtc_restrictions.sh47 tc filter add block 22 protocol ip pref 1 handle 101 flower \
59 tc filter del block 22 protocol ip pref 1 handle 101 flower
64 tc filter add block 22 protocol ip pref 1 handle 101 flower \
73 tc filter add block 22 protocol ip pref 1 handle 101 flower \
77 tc filter del block 22 protocol ip pref 1 handle 101 flower
95 tc filter add block 22 protocol ip pref 1 handle 101 flower \
108 tc filter del block 22 protocol ip pref 1 handle 101 flower
113 tc filter add block 22 protocol ip pref 1 handle 101 flower \
123 tc filter add block 22 protocol ip pref 1 handle 101 flower \
130 tc filter add block 22 protocol ip pref 1 handle 101 flower \
[all …]
/Linux-v6.1/tools/lib/traceevent/Documentation/
Dlibtraceevent-filter.txt9 Event filter related APIs.
32 Filters can be attached to traced events. They can be used to filter out various
37 The _tep_filter_alloc()_ function creates a new event filter. The _tep_ argument
40 The _tep_filter_free()_ function frees an event filter and all resources that it
43 The _tep_filter_reset()_ function removes all rules from an event filter and
47 _filter_str_ argument is the filter string, that contains the rule.
57 The _tep_filter_copy()_ function copies a _source_ filter into a _dest_ filter.
71 filter, or NULL in case of an error.
77 The _tep_event_filtered()_ function returns 1 if the filter is found for given
86 _pass:[TEP_ERRNO__FILTER_MATCH]_ - filter found for event, the record matches.
[all …]
/Linux-v6.1/kernel/
Dseccomp.c41 #include <linux/filter.h>
64 /* The struct pid of the task whose filter triggered the notification */
67 /* The "cookie" for this request; this is unique for this filter. */
143 * filter->notify_lock.
155 * struct action_cache - per-filter cache of seccomp actions per
159 * filter will always allow the syscall, for the
162 * filter will always allow the syscall, for the
189 * A filter's reference count is incremented for each directly
190 * attached task, once for the dependent filter, and if
192 * the filter can be freed.
[all …]
/Linux-v6.1/tools/lib/traceevent/
Dparse-filter.c106 find_filter_type(struct tep_event_filter *filter, int id) in find_filter_type() argument
113 filter_type = bsearch(&key, filter->event_filters, in find_filter_type()
114 filter->filters, in find_filter_type()
115 sizeof(*filter->event_filters), in find_filter_type()
122 add_filter_type(struct tep_event_filter *filter, int id) in add_filter_type() argument
127 filter_type = find_filter_type(filter, id); in add_filter_type()
131 filter_type = realloc(filter->event_filters, in add_filter_type()
132 sizeof(*filter->event_filters) * in add_filter_type()
133 (filter->filters + 1)); in add_filter_type()
137 filter->event_filters = filter_type; in add_filter_type()
[all …]
/Linux-v6.1/include/media/
Ddmxdev.h40 * enum dmxdev_type - type of demux filter type.
42 * @DMXDEV_TYPE_NONE: no filter set.
43 * @DMXDEV_TYPE_SEC: section filter.
44 * @DMXDEV_TYPE_PES: Program Elementary Stream (PES) filter.
55 * @DMXDEV_STATE_FREE: indicates that the filter is freed.
56 * @DMXDEV_STATE_ALLOCATED: indicates that the filter was allocated
58 * @DMXDEV_STATE_SET: indicates that the filter parameters are set.
59 * @DMXDEV_STATE_GO: indicates that the filter is running.
61 * and the filter is now disabled.
90 * struct dmxdev_filter - digital TV dmxdev filter
[all …]
/Linux-v6.1/kernel/trace/
Dtrace_events_filter.c19 "### global filter ###\n" \
103 C(INVALID_FILTER, "Meaningless filter expression"), \
107 C(NO_FILTER, "No filter found")
131 * prog_entry - a singe entry in the filter program
744 /* Filter predicate for fixed sized arrays of characters */
769 /* Filter predicate for char * pointers */
782 /* Filter predicate for char * pointers in user space*/
796 * Filter predicate for dynamic sized arrays of characters.
821 * Filter predicate for relative dynamic sized arrays of characters.
843 /* Filter predicate for CPUs. */
[all …]
/Linux-v6.1/tools/perf/tests/
Dhists_filter.c71 /* make sure it has no filter at first */ in add_hist_entries()
167 /* now applying thread filter for 'bash' */ in test__hists_filter()
172 pr_info("Histogram for thread filter\n"); in test__hists_filter()
184 /* but filter stats are changed */ in test__hists_filter()
185 TEST_ASSERT_VAL("Unmatched nr samples for thread filter", in test__hists_filter()
187 TEST_ASSERT_VAL("Unmatched nr hist entries for thread filter", in test__hists_filter()
189 TEST_ASSERT_VAL("Unmatched total period for thread filter", in test__hists_filter()
192 /* remove thread filter first */ in test__hists_filter()
196 /* now applying dso filter for 'kernel' */ in test__hists_filter()
201 pr_info("Histogram for dso filter\n"); in test__hists_filter()
[all …]

12345678910>>...92