/linux-6.12.1/net/ipv4/netfilter/ |
D | Kconfig | 51 This module enables IPv4 FIB lookups, e.g. for reverse path filtering. 124 tristate "IP tables support (required for filtering/masq/NAT)" 129 The packet filtering and full NAT (masquerading, port forwarding, 178 tristate "Packet filtering" 182 Packet filtering defines a table `filter', which has a series of 183 rules for simple packet filtering at local input, forwarding and 194 The REJECT target allows a filtering rule to specify that an ICMP 330 tristate "arptables-legacy packet filtering support" 335 ARP packet filtering defines a table `filter', which has a series of 336 rules for simple ARP packet filtering at local input and
|
/linux-6.12.1/include/media/ |
D | demux.h | 83 * @is_filtering: Set to non-zero when filtering in progress 87 * @start_filtering: starts TS filtering 88 * @stop_filtering: stops TS filtering 91 * Using this API, the client can set the filtering properties to start/stop 92 * filtering TS packets on a particular TS feed. 141 * @is_filtering: Set to non-zero when filtering in progress 147 * the demux. It should only be called when no filtering 152 * should not be called while filtering is in progress 156 * @start_filtering: starts section filtering 157 * @stop_filtering: stops section filtering [all …]
|
/linux-6.12.1/drivers/net/ethernet/intel/ice/ |
D | ice_vf_vsi_vlan_ops.c | 50 * so prevent disabling Rx VLAN filtering in ice_port_vlan_on() 181 /* Rx VLAN filtering always disabled to allow software offloaded VLANs in ice_vf_vsi_cfg_dvm_legacy_vlan_mode() 186 /* Don't fail when attempting to enable Rx VLAN filtering */ in ice_vf_vsi_cfg_dvm_legacy_vlan_mode() 189 /* Tx VLAN filtering always disabled to allow software offloaded VLANs in ice_vf_vsi_cfg_dvm_legacy_vlan_mode() 194 /* Don't fail when attempting to enable Tx VLAN filtering */ in ice_vf_vsi_cfg_dvm_legacy_vlan_mode() 198 …dev_dbg(dev, "Failed to disable Rx VLAN filtering for old VF without VIRTCHNL_VF_OFFLOAD_VLAN_V2 s… in ice_vf_vsi_cfg_dvm_legacy_vlan_mode() 200 …dev_dbg(dev, "Failed to disable Tx VLAN filtering for old VF without VIRTHCNL_VF_OFFLOAD_VLAN_V2 s… in ice_vf_vsi_cfg_dvm_legacy_vlan_mode() 234 * default Rx VLAN filtering should be turned off by default in this case. 247 …dev_dbg(ice_pf_to_dev(vf->pf), "Failed to disable Rx VLAN filtering for old VF with VIRTCHNL_VF_OF… in ice_vf_vsi_cfg_svm_legacy_vlan_mode()
|
/linux-6.12.1/net/bridge/netfilter/ |
D | Kconfig | 35 into connections. This is used to enhance packet filtering via 53 filtering/NAT/brouting on the Ethernet bridge. 75 The ebtables filter table is used to define frame filtering rules at 113 filtering. 121 filtering. 130 filtering. 168 allows STP header field filtering. 175 This option adds the 802.1Q vlan match, which allows the filtering of
|
/linux-6.12.1/Documentation/networking/ |
D | switchdev.rst | 222 traffic. To enable VLAN support, turn on VLAN filtering:: 442 If the device implements e.g.: VLAN filtering, putting the interface in 454 Bridge VLAN filtering 457 The Linux bridge allows the configuration of a VLAN filtering mode (statically, 461 - with VLAN filtering turned off: the bridge is strictly VLAN unaware and its 464 have no effect while VLAN filtering is turned off. Frames ingressing the 468 - with VLAN filtering turned on: the bridge is VLAN-aware and frames ingressing 477 - with VLAN filtering turned off, the bridge will process all ingress traffic 494 - with VLAN filtering turned on, these VLAN devices can be created as long as 500 way by the enabling of VLAN filtering on the bridge device(s). If the VLAN [all …]
|
/linux-6.12.1/net/ipv6/netfilter/ |
D | Kconfig | 47 This module enables IPv6 FIB lookups, e.g. for reverse path filtering. 74 tristate "IP6 tables support (required for filtering)" 80 Currently only the packet filtering and packet mangling subsystem 191 tristate "Packet filtering" 196 Packet filtering defines a table `filter', which has a series of 197 rules for simple packet filtering at local input, forwarding and 208 The REJECT target allows a filtering rule to specify that an ICMPv6
|
/linux-6.12.1/net/can/ |
D | Kconfig | 24 tristate "Raw CAN Protocol (raw access with CAN-ID filtering)" 34 tristate "Broadcast Manager CAN Protocol (with content filtering)" 37 The Broadcast Manager offers content filtering, timeout monitoring, 50 It is based on the PF_CAN core infrastructure for msg filtering and
|
/linux-6.12.1/drivers/net/ethernet/marvell/mvpp2/ |
D | mvpp2_prs.h | 74 /* TCAM range for unicast and multicast filtering. We have 25 entries per port, 75 * with 4 dedicated to UC filtering and the rest to multicast filtering. 82 /* Number of entries per port dedicated to UC and MC filtering */ 87 /* There is a TCAM range reserved for VLAN filtering entries, range size is 33 102 /* MAC filtering range */ 106 /* VLAN filtering range */
|
/linux-6.12.1/Documentation/userspace-api/media/dvb/ |
D | dmx-start.rst | 31 This ioctl call is used to start the actual filtering operation defined 52 - Invalid argument, i.e. no filtering parameters provided via the 60 There are active filters filtering data from another input source.
|
D | dmx-set-filter.rst | 40 be a "one-shot" filter, i.e. if the filtering operation should be 41 stopped after the first section is received, and whether the filtering
|
/linux-6.12.1/tools/testing/selftests/ftrace/test.d/ftrace/ |
D | fgraph-filter-stack.tc | 6 # Make sure that function graph filtering works, and is not 46 fail "Graph filtering not working with stack tracer?" 63 fail "Graph filtering not working after stack tracer disabled?"
|
D | fgraph-filter.tc | 6 # Make sure that function graph filtering works 31 fail "Graph filtering not working by itself?"
|
/linux-6.12.1/net/ncsi/ |
D | internal.h | 25 NCSI_CAP_GENERIC_MC = 0x10, /* Global MC filtering */ 32 NCSI_CAP_BC_ARP = 0x01, /* ARP packet filtering */ 33 NCSI_CAP_BC_DHCPC = 0x02, /* DHCP client filtering */ 34 NCSI_CAP_BC_DHCPS = 0x04, /* DHCP server filtering */ 35 NCSI_CAP_BC_NETBIOS = 0x08, /* NetBIOS packet filtering */ 37 NCSI_CAP_MC_IPV6_NEIGHBOR = 0x01, /* IPv6 neighbor filtering */ 41 NCSI_CAP_MC_IPV6_MLD = 0x10, /* IPv6 MLD filtering */ 42 NCSI_CAP_MC_IPV6_NEIGHBOR_S = 0x20, /* IPv6 neighbour filtering */ 228 /* Filtering Settings */
|
/linux-6.12.1/Documentation/networking/device_drivers/ethernet/freescale/ |
D | gianfar.rst | 27 extraction of VLAN headers, but not filtering. Filtering will be 35 filtering. On the eTSEC, the exact-match MAC registers are used
|
/linux-6.12.1/drivers/net/ethernet/intel/e1000e/ |
D | manage.c | 86 * e1000e_enable_tx_pkt_filtering - Enable packet filtering on Tx 89 * Enables packet filtering on transmit packets if manageability is enabled 102 /* No manageability, no filtering */ in e1000e_enable_tx_pkt_filtering() 109 * reason, disable filtering. in e1000e_enable_tx_pkt_filtering() 129 * take the safe route of assuming Tx filtering is enabled. in e1000e_enable_tx_pkt_filtering() 136 /* Cookie area is valid, make the final check for filtering. */ in e1000e_enable_tx_pkt_filtering()
|
/linux-6.12.1/drivers/net/wireless/ti/wl18xx/ |
D | scan.h | 40 s8 rssi_threshold; /* for filtering (in dBm) */ 41 s8 snr_threshold; /* for filtering (in dB) */ 43 u8 bss_type; /* for filtering */
|
/linux-6.12.1/drivers/net/ethernet/actions/ |
D | owl-emac.h | 85 #define OWL_EMAC_BIT_MAC_CSR6_IF BIT(4) /* Inverse filtering */ 87 #define OWL_EMAC_BIT_MAC_CSR6_HO BIT(2) /* Hash only filtering mode */ 89 #define OWL_EMAC_BIT_MAC_CSR6_HP BIT(0) /* Hash/perfect receive filtering mode */ 179 #define OWL_EMAC_BIT_RDES0_FF BIT(30) /* Filtering fail */ 215 #define OWL_EMAC_BIT_TDES1_FT1 BIT(28) /* Filtering type */ 220 #define OWL_EMAC_BIT_TDES1_FT0 BIT(22) /* Filtering type */
|
/linux-6.12.1/include/linux/ |
D | ieee802154.h | 287 * enum ieee802154_filtering_level - Filtering levels applicable to a PHY 289 * @IEEE802154_FILTERING_NONE: No filtering at all, what is received is 291 * @IEEE802154_FILTERING_1_FCS: First filtering level, frames with an invalid 293 * @IEEE802154_FILTERING_2_PROMISCUOUS: Second filtering level, promiscuous 294 * mode as described in the spec, identical in terms of filtering to the 297 * @IEEE802154_FILTERING_3_SCAN: Third filtering level, scan related, where 299 * @IEEE802154_FILTERING_4_FRAME_FIELDS: Fourth filtering level actually
|
/linux-6.12.1/net/ |
D | Kconfig | 157 bool "Network packet filtering framework (Netfilter)" 159 Netfilter is a framework for filtering and mangling network packets 162 The most common use of packet filtering is to run your Linux box as 198 a bridge with Network packet filtering enabled makes iptables "see" 199 the bridged traffic. For filtering on the lower network and Ethernet 204 masquerading (ipmasqadm), packet filtering (ipchains), transparent 223 tristate "Bridged IP/ARP packets filtering"
|
/linux-6.12.1/drivers/net/wireless/intel/iwlwifi/fw/api/ |
D | power.h | 675 * @bf_energy_delta: Used for RSSI filtering, if in 'normal' state. Send beacon 678 * the Energy change is ignored for beacon filtering, and beacon will 681 * @bf_roaming_energy_delta: Used for RSSI filtering, if in 'roaming' state. 684 * means that the Energy change is ignored for beacon filtering while in 686 * @bf_roaming_state: Used for RSSI filtering. If absolute Energy values 691 * filtering (Slow or Fast) that is selected (Units are in Celsuis): 698 * beacon filtering; beacons will not be forced to be sent to driver 703 * beacon filtering; beacons will not be forced to be sent to driver 705 * @bf_enable_beacon_filter: 1, beacon filtering is enabled; 0, disabled. 706 * @bf_debug_flag: beacon filtering debug configuration [all …]
|
/linux-6.12.1/drivers/net/wireless/ti/wl12xx/ |
D | scan.h | 72 s8 rssi_threshold; /* for filtering (in dBm) */ 73 s8 snr_threshold; /* for filtering (in dB) */ 80 u8 bss_type; /* for filtering */
|
/linux-6.12.1/net/mac802154/ |
D | driver-ops.h | 174 /* In practice other filtering levels can be requested, but as in drv_start() 177 * filtering level in hardware and make our own additional in drv_start() 178 * filtering in mac802154 receive path. in drv_start() 187 local->phy->filtering = IEEE802154_FILTERING_NONE; in drv_start() 200 local->phy->filtering = IEEE802154_FILTERING_4_FRAME_FIELDS; in drv_start()
|
/linux-6.12.1/include/linux/avf/ |
D | virtchnl.h | 527 * The VF would interpret this as VLAN filtering can be supported on both 0x8100 554 * VLAN filtering if the underlying PF supports it. 558 * allows the VF to toggle VLAN filtering, stripping, and/or insertion it should 577 * for filtering, insertion, and stripping capabilities. 579 * If only outer capabilities are supported (for filtering, insertion, and/or 583 * If only inner capabilities are supported (for filtering, insertion, and/or 589 * If both outer and inner capabilities are supported (for filtering, insertion, 601 /* The PF populates these fields based on the supported VLAN filtering. If a 606 * Also, a VF is only allowed to toggle its VLAN filtering setting if the 610 * enabled for VLAN filtering. VLAN filtering in this case refers to the outer [all …]
|
/linux-6.12.1/Documentation/dev-tools/kunit/ |
D | running_tips.rst | 278 Test Attributes and Filtering 327 for filtering purposes. 366 Filtering section in Test Attributes and Filtering 396 You can use this filtering feature when running KUnit manually by passing 404 Rules of Filtering Procedure 408 between attributes during filtering. The process of filtering follows these 411 - Filtering always operates at a per-test level.
|
/linux-6.12.1/drivers/net/ipa/ |
D | ipa_table.c | 45 * represents "no filtering" or "no routing," and is the reset value for 49 * not all TX endpoints support filtering. The first 64-bit slot in a 73 * filtering functionality. 137 /* A "zero rule" is used to represent no filtering or no routing. in ipa_table_validate_build() 173 dev_err(dev, "at least one filtering endpoint is required\n"); in ipa_filtered_valid() 180 dev_err(dev, "too many filtering endpoints (%u > %u)\n", in ipa_filtered_valid() 414 /* The number of filtering endpoints determines number of in ipa_table_init_add() 491 * Endpoint must be for the AP (not modem) and support filtering. Updates 645 * an entry for each endpoint that supports filtering in ipa_table_mem_valid() 692 * address of a filter rule. A "zero rule" indicates no filtering, and [all …]
|