/linux-6.12.1/drivers/net/ethernet/mscc/ |
D | ocelot_flower.c | 147 struct ocelot_vcap_filter *filter; in ocelot_find_vcap_filter_that_points_at() local 158 list_for_each_entry(filter, &block->rules, list) in ocelot_find_vcap_filter_that_points_at() 159 if (filter->type == OCELOT_VCAP_FILTER_PAG && in ocelot_find_vcap_filter_that_points_at() 160 filter->goto_target == chain) in ocelot_find_vcap_filter_that_points_at() 161 return filter; in ocelot_find_vcap_filter_that_points_at() 164 list_for_each_entry(filter, &ocelot->dummy_rules, list) in ocelot_find_vcap_filter_that_points_at() 165 if (filter->goto_target == chain) in ocelot_find_vcap_filter_that_points_at() 166 return filter; in ocelot_find_vcap_filter_that_points_at() 173 struct ocelot_vcap_filter *filter, in ocelot_flower_parse_ingress_vlan_modify() argument 179 if (filter->goto_target != -1) { in ocelot_flower_parse_ingress_vlan_modify() [all …]
|
D | ocelot_vcap.c | 331 struct ocelot_vcap_filter *filter) in is2_action_set() argument 334 struct ocelot_vcap_action *a = &filter->action; in is2_action_set() 346 struct ocelot_vcap_filter *filter) in is2_entry_set() argument 349 struct ocelot_vcap_key_vlan *tag = &filter->vlan; in is2_entry_set() 366 if (filter->prio != 0) in is2_entry_set() 371 vcap_key_set(vcap, &data, VCAP_IS2_HK_PAG, filter->pag, 0xff); in is2_entry_set() 373 (filter->lookup == 0) ? OCELOT_VCAP_BIT_1 : in is2_entry_set() 376 ~filter->ingress_port_mask); in is2_entry_set() 379 vcap_key_bit_set(vcap, &data, VCAP_IS2_HK_L2_MC, filter->dmac_mc); in is2_entry_set() 380 vcap_key_bit_set(vcap, &data, VCAP_IS2_HK_L2_BC, filter->dmac_bc); in is2_entry_set() [all …]
|
D | ocelot_mrp.c | 39 struct ocelot_vcap_filter *filter; in ocelot_mrp_del_vcap() local 42 filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id, in ocelot_mrp_del_vcap() 44 if (!filter) in ocelot_mrp_del_vcap() 47 return ocelot_vcap_filter_del(ocelot, filter); in ocelot_mrp_del_vcap() 54 struct ocelot_vcap_filter *filter; in ocelot_mrp_redirect_add_vcap() local 57 filter = kzalloc(sizeof(*filter), GFP_KERNEL); in ocelot_mrp_redirect_add_vcap() 58 if (!filter) in ocelot_mrp_redirect_add_vcap() 61 filter->key_type = OCELOT_VCAP_KEY_ETYPE; in ocelot_mrp_redirect_add_vcap() 62 filter->prio = 1; in ocelot_mrp_redirect_add_vcap() 63 filter->id.cookie = OCELOT_VCAP_IS2_MRP_REDIRECT(ocelot, src_port); in ocelot_mrp_redirect_add_vcap() [all …]
|
/linux-6.12.1/tools/testing/selftests/tc-testing/tc-tests/filters/ |
D | cgroup.json | 4 "name": "Add cgroup filter with cmp ematch u8/link layer and drop action", 6 "filter", 15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 cgroup match 'c… 17 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:", 18 …"matchPattern": "^filter protocol ip pref [0-9]+ cgroup chain [0-9]+.*handle 0x1.*cmp\\(u8 at 0 la… 26 "name": "Add cgroup filter with cmp ematch u8/link layer with trans flag and pass action", 28 "filter", 37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 cgroup match 'c… 39 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:", 40 …"matchPattern": "^filter protocol ip pref [0-9]+ cgroup chain [0-9]+.*handle 0x1.*cmp\\(u8 at 0 la… [all …]
|
D | fw.json | 4 "name": "Add fw filter with prio at 32-bit maxixum", 6 "filter", 15 "cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 65535 fw action ok", 17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 65535 protocol all fw", 26 "name": "Add fw filter with prio exceeding 32-bit maxixum", 28 "filter", 37 "cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 65536 fw action ok", 39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 65536 protocol all fw", 48 "name": "Add fw filter with action ok", 50 "filter", [all …]
|
D | basic.json | 4 "name": "Add basic filter with cmp ematch u8/link layer and default action", 6 "filter", 15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 basic match 'cm… 17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip basic", 18 …"matchPattern": "^filter parent ffff: protocol ip pref 1 basic.*handle 0x1 flowid 1:1.*cmp\\(u8 at… 26 "name": "Add basic filter with cmp ematch u8/link layer with trans flag and default action", 28 "filter", 37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 basic match 'cm… 39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip basic", 40 …"matchPattern": "^filter parent ffff: protocol ip pref 1 basic.*handle 0x1 flowid 1:1.*cmp\\(u8 at… [all …]
|
D | flow.json | 4 "name": "Add flow filter with map key and ops", 6 "filter", 15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 1 protocol ip flow map key ds… 17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 1 flow", 18 …"matchPattern": "filter parent ffff: protocol ip pref 1 flow chain [0-9]+ handle 0x1 map keys dst … 26 "name": "Add flow filter with map key or ops", 28 "filter", 37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 1 protocol ip flow map key ds… 39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 1 flow", 40 …"matchPattern": "filter parent ffff: protocol ip pref 1 flow chain [0-9]+ handle 0x1 map keys dst.… [all …]
|
D | matchall.json | 4 "name": "Add ingress matchall filter for protocol ipv4 and action PASS", 6 "filter", 15 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 1 protocol ip matchall act… 17 "verifyCmd": "$TC filter get dev $DUMMY parent ffff: handle 1 prio 1 protocol ip matchall", 18 …"matchPattern": "^filter parent ffff: protocol ip pref 1 matchall.*handle 0x1.*gact action pass.*r… 26 "name": "Add egress matchall filter for protocol ipv4 and action PASS", 28 "filter", 37 …"cmdUnderTest": "$TC filter add dev $DUMMY parent 1: handle 0x1 prio 1 protocol ip matchall action… 39 "verifyCmd": "$TC filter get dev $DUMMY parent 1: handle 1 prio 1 protocol ip matchall", 40 …"matchPattern": "^filter parent 1: protocol ip pref 1 matchall.*handle 0x1.*gact action pass.*ref … [all …]
|
D | u32.json | 6 "filter", 15 …"cmdUnderTest": "$TC filter add dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.1/32… 17 "verifyCmd": "$TC filter show dev $DEV1 ingress", 18 …"matchPattern": "filter protocol ip pref 1 u32 chain (0[ ]+$|0 fh 800: ht divisor 1|0 fh 800::800 … 28 "filter", 37 …"cmdUnderTest": "$TC filter replace dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.… 39 "verifyCmd": "$TC filter show dev $DEV1 ingress", 40 "matchPattern": "filter protocol ip pref 1 u32 chain 0", 50 "filter", 58 …"$TC filter add dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.3/32 flowid 1:3 acti… [all …]
|
D | bpf.json | 4 "name": "Add cBPF filter with valid bytecode", 6 "filter", 7 "bpf-filter" 15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf bytecode … 17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf", 18 …"matchPattern": "filter parent ffff: protocol ip pref 100 bpf chain [0-9]+ handle 0x1.*bytecode '4… 26 "name": "Add cBPF filter with invalid bytecode", 28 "filter", 29 "bpf-filter" 37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf bytecode … [all …]
|
D | route.json | 4 "name": "Add route filter with from and to tag", 6 "filter", 15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 100 route from 1 to 10 cla… 17 "verifyCmd": "$TC filter ls dev $DEV1 parent ffff:", 26 "name": "Add route filter with fromif and to tag", 28 "filter", 37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 100 route fromif $DEV1 to … 39 "verifyCmd": "$TC filter ls dev $DEV1 parent ffff:", 48 "name": "Add route filter with to flag and reclassify action", 50 "filter", [all …]
|
D | flower.json | 6 "filter", 17 "verifyCmd": "$TC -s filter show dev $DEV2 ingress", 18 "matchPattern": "filter protocol ip pref 1 flower chain 0 handle", 29 "filter", 42 "verifyCmd": "$TC -s filter show dev $DEV2 ingress", 43 "matchPattern": "filter protocol ip pref 1 flower chain 0 handle", 54 "filter", 67 "verifyCmd": "$TC -s filter show dev $DEV2 ingress", 68 "matchPattern": "filter protocol ip pref 1 flower chain 0 handle", 79 "filter", [all …]
|
/linux-6.12.1/tools/testing/selftests/net/forwarding/ |
D | tc_flower.sh | 44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 53 check_fail $? "Matched on a wrong filter" 56 check_fail $? "Did not match on correct filter" 58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 72 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 79 check_fail $? "Matched on a wrong filter" 82 check_fail $? "Did not match on correct filter" [all …]
|
D | tc_chains.sh | 38 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 45 check_fail $? "matched on filter in unreachable chain" 47 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 57 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 59 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 61 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 68 check_fail $? "Matched on a wrong filter" 71 check_err $? "Did not match on correct filter with goto chain action" 74 check_err $? "Did not match on correct filter in chain 1" 76 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower [all …]
|
D | tc_actions.sh | 66 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 75 tc filter add dev $swp1 ingress protocol $protocol pref 1 handle 101 \ 85 tc filter del dev $swp1 ingress protocol $protocol pref 1 handle 101 \ 87 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 96 tc filter add dev $swp1 ingress protocol ip pref 2 handle 102 flower \ 105 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 117 tc filter del dev $swp1 ingress protocol ip pref 2 handle 102 flower 118 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 131 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 133 tc filter add dev $swp1 ingress protocol ip pref 3 handle 103 flower \ [all …]
|
/linux-6.12.1/tools/perf/util/ |
D | strfilter.h | 4 /* General purpose glob matching filter */ 9 /* A node of string filter */ 16 /* String filter */ 22 * strfilter__new - Create a new string filter 23 * @rules: Filter rule, which is a combination of glob expressions. 34 * @filter: Original string filter 35 * @rules: Filter rule to be appended at left of the root of 36 * @filter by using logical-or. 39 * Parse @rules and join it to the @filter by using logical-or. 42 int strfilter__or(struct strfilter *filter, [all …]
|
/linux-6.12.1/tools/testing/selftests/tc-testing/tc-tests/infra/ |
D | actions.json | 4 "name": "Reference pedit action object in filter", 16 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 1 protocol ip matchall act… 18 "verifyCmd": "$TC filter get dev $DUMMY parent ffff: handle 1 prio 1 protocol ip matchall", 19 "matchPattern": "^filter parent ffff: protocol ip pref 1 matchall.*handle 0x1.*", 27 "name": "Reference mpls action object in filter", 39 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 1 protocol ip matchall act… 41 "verifyCmd": "$TC filter get dev $DUMMY parent ffff: handle 1 prio 1 protocol ip matchall", 42 "matchPattern": "^filter parent ffff: protocol ip pref 1 matchall.*handle 0x1.*", 50 "name": "Reference bpf action object in filter", 62 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 1 protocol ip matchall act… [all …]
|
/linux-6.12.1/tools/perf/tests/shell/ |
D | record_bpf_filter.sh | 23 echo "Checking BPF-filter privilege" 25 if ! perf record -e task-clock --filter 'period > 1' \ 30 echo "try 'sudo perf record --setup-filter pin' first." 31 echo "bpf-filter test [Skipped permission]" 35 echo "bpf-filter test [Skipped missing BPF support]" 42 echo "Basic bpf-filter test" 44 if ! perf record -e task-clock -c 10000 --filter 'ip < 0xffffffff00000000' \ 47 echo "Basic bpf-filter test [Failed record]" 55 echo "Basic bpf-filter test [Skipped unsupported kernel]" 59 echo "Basic bpf-filter test [Failed invalid output]" [all …]
|
/linux-6.12.1/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
D | tc_flower.sh | 97 # filter is matched 101 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 108 check_err $? "Single filter - did not match" 110 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 125 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 131 check_err $? "Single filter - did not match after delete" 133 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 143 # filter is matched 147 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 149 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ [all …]
|
/linux-6.12.1/tools/testing/selftests/drivers/net/mlxsw/ |
D | tc_restrictions.sh | 47 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 59 tc filter del block 22 protocol ip pref 1 handle 101 flower 64 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 73 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 77 tc filter del block 22 protocol ip pref 1 handle 101 flower 95 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 108 tc filter del block 22 protocol ip pref 1 handle 101 flower 113 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 123 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 130 tc filter add block 22 protocol ip pref 1 handle 101 flower \ [all …]
|
/linux-6.12.1/kernel/ |
D | seccomp.c | 41 #include <linux/filter.h> 64 /* The struct pid of the task whose filter triggered the notification */ 67 /* The "cookie" for this request; this is unique for this filter. */ 145 * filter->notify_lock. 160 * struct action_cache - per-filter cache of seccomp actions per 164 * filter will always allow the syscall, for the 167 * filter will always allow the syscall, for the 194 * A filter's reference count is incremented for each directly 195 * attached task, once for the dependent filter, and if 197 * the filter can be freed. [all …]
|
/linux-6.12.1/drivers/net/ipa/ |
D | ipa_table.c | 25 * DOC: IPA Filter and Route Tables 28 * filter and routing rules. An entry in either of these tables is a little 32 * Separate tables (both filter and route) are used for IPv4 and IPv6. There 33 * is normally another set of "hashed" filter and route tables, which are 38 * an object (such as a route or filter table) in IPA-resident memory must 39 * 128-byte aligned. An object in system memory (such as a route or filter 41 * route or filter rules in system memory. 46 * filter or route table rules. 48 * Each filter rule is associated with an AP or modem TX endpoint, though 50 * filter table is a bitmap indicating which endpoints have entries in [all …]
|
/linux-6.12.1/include/media/ |
D | dmxdev.h | 40 * enum dmxdev_type - type of demux filter type. 42 * @DMXDEV_TYPE_NONE: no filter set. 43 * @DMXDEV_TYPE_SEC: section filter. 44 * @DMXDEV_TYPE_PES: Program Elementary Stream (PES) filter. 55 * @DMXDEV_STATE_FREE: indicates that the filter is freed. 56 * @DMXDEV_STATE_ALLOCATED: indicates that the filter was allocated 58 * @DMXDEV_STATE_SET: indicates that the filter parameters are set. 59 * @DMXDEV_STATE_GO: indicates that the filter is running. 61 * and the filter is now disabled. 90 * struct dmxdev_filter - digital TV dmxdev filter [all …]
|
/linux-6.12.1/lib/kunit/ |
D | attributes.c | 31 * @filter: function to indicate whether a given attribute value passes a 32 * filter 40 int (*filter)(void *attr, const char *input, int *err); member 82 /* Filter Methods */ 87 * Returns whether the inputted integer value matches the filter given 105 pr_err("kunit executor: invalid filter operation: %s\n", op); in int_filter() 110 * Returns whether the inputted enum value "attr" matches the filter given 130 pr_err("kunit executor: filter value not found: %s\n", input); in attr_enum_filter() 141 pr_err("kunit executor: invalid filter input: %s\n", input); in attr_enum_filter() 154 * Returns whether the inputted string value (attr) matches the filter given [all …]
|
/linux-6.12.1/drivers/hwtracing/ptt/ |
D | hisi_ptt.c | 233 val |= FIELD_PREP(HISI_PTT_TRACE_CTRL_TARGET_SEL, hisi_ptt->trace_ctrl.filter); in hisi_ptt_trace_start() 361 struct hisi_ptt_filter_desc *filter) in hisi_ptt_del_free_filter() argument 363 if (filter->is_port) in hisi_ptt_del_free_filter() 364 hisi_ptt->port_mask &= ~hisi_ptt_get_filter_val(filter->devid, true); in hisi_ptt_del_free_filter() 366 list_del(&filter->list); in hisi_ptt_del_free_filter() 367 kfree(filter->name); in hisi_ptt_del_free_filter() 368 kfree(filter); in hisi_ptt_del_free_filter() 374 struct hisi_ptt_filter_desc *filter; in hisi_ptt_alloc_add_filter() local 381 pci_err(hisi_ptt->pdev, "failed to allocate name for filter %04x:%02x:%02x.%d\n", in hisi_ptt_alloc_add_filter() 387 filter = kzalloc(sizeof(*filter), GFP_KERNEL); in hisi_ptt_alloc_add_filter() [all …]
|