Home
last modified time | relevance | path

Searched +full:- +full:- +full:filter (Results 1 – 25 of 1122) sorted by relevance

12345678910>>...45

/openbmc/linux/drivers/net/ethernet/mscc/
H A Docelot_flower.c1 // SPDX-License-Identifier: (GPL-2.0 OR MIT)
35 return -EOPNOTSUPP; in ocelot_chain_to_block()
38 /* Backwards compatibility with older, single-chain tc-flower in ocelot_chain_to_block()
56 return -EOPNOTSUPP; in ocelot_chain_to_block()
64 /* Backwards compatibility with older, single-chain tc-flower in ocelot_chain_to_lookup()
80 /* Backwards compatibility with older, single-chain tc-flower in ocelot_chain_to_pag()
89 return chain - VCAP_IS2_CHAIN(lookup, 0); in ocelot_chain_to_pag()
101 /* Non-optional GOTOs */ in ocelot_is_goto_target_valid()
117 /* Lookup 2 of VCAP IS1 can really support non-optional GOTOs, in ocelot_is_goto_target_valid()
118 * using a Policy Association Group (PAG) value, which is an 8-bit in ocelot_is_goto_target_valid()
[all …]
H A Docelot_vcap.c1 // SPDX-License-Identifier: (GPL-2.0 OR MIT)
40 u32 tg_sw; /* Current type-group */
45 u32 tg_value; /* Current type-group value */
46 u32 tg_mask; /* Current type-group mask */
52 return ocelot_target_read(ocelot, vcap->target, VCAP_CORE_UPDATE_CTRL); in vcap_read_update_ctrl()
62 if ((sel & VCAP_SEL_ENTRY) && ix >= vcap->entry_count) in vcap_cmd()
74 ocelot_target_write(ocelot, vcap->target, value, VCAP_CORE_UPDATE_CTRL); in vcap_cmd()
81 /* Convert from 0-based row to VCAP entry row and run command */
85 vcap_cmd(ocelot, vcap, vcap->entry_count - row - 1, cmd, sel); in vcap_row_cmd()
94 entry_words = DIV_ROUND_UP(vcap->entry_width, ENTRY_WIDTH); in vcap_entry2cache()
[all …]
/openbmc/linux/tools/testing/selftests/tc-testing/tc-tests/filters/
H A Dflow.json4 "name": "Add flow filter with map key and ops",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 1 protocol ip flow map key ds…
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 1 flow",
18 …"matchPattern": "filter parent ffff: protocol ip pref 1 flow chain [0-9]+ handle 0x1 map keys dst …
26 "name": "Add flow filter with map key or ops",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 1 protocol ip flow map key ds…
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 1 flow",
40 …"matchPattern": "filter parent ffff: protocol ip pref 1 flow chain [0-9]+ handle 0x1 map keys dst.…
[all …]
H A Dcgroup.json4 "name": "Add cgroup filter with cmp ematch u8/link layer and drop action",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 cgroup match 'c…
17 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
18 …"matchPattern": "^filter protocol ip pref [0-9]+ cgroup chain [0-9]+.*handle 0x1.*cmp\\(u8 at 0 la…
26 "name": "Add cgroup filter with cmp ematch u8/link layer with trans flag and pass action",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 cgroup match 'c…
39 "verifyCmd": "$TC filter show dev $DEV1 parent ffff:",
40 …"matchPattern": "^filter protocol ip pref [0-9]+ cgroup chain [0-9]+.*handle 0x1.*cmp\\(u8 at 0 la…
[all …]
H A Dfw.json4 "name": "Add fw filter with prio at 32-bit maxixum",
6 "filter",
15 "cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 65535 fw action ok",
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 65535 protocol all fw",
26 "name": "Add fw filter with prio exceeding 32-bit maxixum",
28 "filter",
37 "cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 prio 65536 fw action ok",
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 65536 protocol all fw",
48 "name": "Add fw filter with action ok",
50 "filter",
[all …]
H A Dbpf.json4 "name": "Add cBPF filter with valid bytecode",
6 "filter",
7 "bpf-filter"
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf bytecode …
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf",
18 …"matchPattern": "filter parent ffff: protocol ip pref 100 bpf chain [0-9]+ handle 0x1.*bytecode '4…
26 "name": "Add cBPF filter with invalid bytecode",
28 "filter",
29 "bpf-filter"
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 100 bpf bytecode …
[all …]
H A Droute.json4 "name": "Add route filter with from and to tag",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 100 route from 1 to 10 cla…
17 "verifyCmd": "$TC filter ls dev $DEV1 parent ffff:",
26 "name": "Add route filter with fromif and to tag",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: protocol ip prio 100 route fromif $DEV1 to …
39 "verifyCmd": "$TC filter ls dev $DEV1 parent ffff:",
48 "name": "Add route filter with to flag and reclassify action",
50 "filter",
[all …]
H A Dbasic.json4 "name": "Add basic filter with cmp ematch u8/link layer and default action",
6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 basic match 'cm…
17 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip basic",
18 …"matchPattern": "^filter parent ffff: protocol ip pref 1 basic.*handle 0x1 flowid 1:1.*cmp\\(u8 at…
26 "name": "Add basic filter with cmp ematch u8/link layer with trans flag and default action",
28 "filter",
37 …"cmdUnderTest": "$TC filter add dev $DEV1 parent ffff: handle 1 protocol ip prio 1 basic match 'cm…
39 "verifyCmd": "$TC filter get dev $DEV1 parent ffff: handle 1 prio 1 protocol ip basic",
40 …"matchPattern": "^filter parent ffff: protocol ip pref 1 basic.*handle 0x1 flowid 1:1.*cmp\\(u8 at…
[all …]
H A Dmatchall.json4 "name": "Add ingress matchall filter for protocol ipv4 and action PASS",
6 "filter",
13 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 1 protocol ip matchall act…
15 "verifyCmd": "$TC filter get dev $DUMMY parent ffff: handle 1 prio 1 protocol ip matchall",
16 …"matchPattern": "^filter parent ffff: protocol ip pref 1 matchall.*handle 0x1.*gact action pass.*r…
25 "name": "Add egress matchall filter for protocol ipv4 and action PASS",
27 "filter",
34 …"cmdUnderTest": "$TC filter add dev $DUMMY parent 1: handle 0x1 prio 1 protocol ip matchall action…
36 "verifyCmd": "$TC filter get dev $DUMMY parent 1: handle 1 prio 1 protocol ip matchall",
37 …"matchPattern": "^filter parent 1: protocol ip pref 1 matchall.*handle 0x1.*gact action pass.*ref …
[all …]
H A Du32.json6 "filter",
15 …"cmdUnderTest": "$TC filter add dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.1/32…
17 "verifyCmd": "$TC filter show dev $DEV1 ingress",
18 …"matchPattern": "filter protocol ip pref 1 u32 chain (0[ ]+$|0 fh 800: ht divisor 1|0 fh 800::800 …
28 "filter",
37 …"cmdUnderTest": "$TC filter replace dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.…
39 "verifyCmd": "$TC filter show dev $DEV1 ingress",
40 "matchPattern": "filter protocol ip pref 1 u32 chain 0",
50 "filter",
58 …"$TC filter add dev $DEV1 ingress protocol ip prio 1 u32 match ip src 127.0.0.3/32 flowid 1:3 acti…
[all …]
H A Dtests.json6 "filter",
14 "$TC filter add dev $DEV1 protocol all pref 1 ingress handle 0x1234 matchall action ok"
16 … "cmdUnderTest": "$TC filter get dev $DEV1 protocol all pref 1 ingress handle 0x1234 matchall",
18 "verifyCmd": "$TC filter show dev $DEV1 ingress",
19 "matchPattern": "filter protocol all pref 1 matchall chain 0 handle 0x1234",
29 "filter",
35 …"cmdUnderTest": "$TC filter add dev $DEV2 protocol ip pref 1 ingress handle 0xffffffff flower acti…
37 "verifyCmd": "$TC filter show dev $DEV2 ingress",
38 "matchPattern": "filter protocol ip pref 1 flower.*handle 0xffffffff",
48 "filter",
[all …]
/openbmc/linux/tools/testing/selftests/net/forwarding/
H A Dtc_flower.sh2 # SPDX-License-Identifier: GPL-2.0
44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
49 $MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \
50 -t ip -q
53 check_fail $? "Matched on a wrong filter"
56 check_fail $? "Did not match on correct filter"
58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower
70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
[all …]
H A Dtc_chains.sh2 # SPDX-License-Identifier: GPL-2.0
38 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \
41 $MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \
42 -t ip -q
45 check_fail $? "matched on filter in unreachable chain"
47 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \
57 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \
59 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
61 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
64 $MZ $h1 -c 1 -p 64 -a $h1mac -b $h2mac -A 192.0.2.1 -B 192.0.2.2 \
[all …]
/openbmc/linux/tools/perf/util/
H A Dstrfilter.h1 /* SPDX-License-Identifier: GPL-2.0 */
4 /* General purpose glob matching filter */
9 /* A node of string filter */
16 /* String filter */
22 * strfilter__new - Create a new string filter
23 * @rules: Filter rule, which is a combination of glob expressions.
33 * strfilter__or - Append an additional rule by logical-or
34 * @filter: Original string filter
35 * @rules: Filter rule to be appended at left of the root of
36 * @filter by using logical-or.
[all …]
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/
H A Dtc_flower.sh2 # SPDX-License-Identifier: GPL-2.0
4 # This test is for checking the A-TCAM and C-TCAM operation in Spectrum-2.
49 perf record -q -e $tracepoint $cmd
58 perf record -a -q -e $tracepoint sleep $seconds
66 local perf_output=`perf script -F trace:event,trace`
67 return `echo $perf_output | grep "$tracepoint:" | wc -l`
76 if [[ "$?" -ne "$count" ]]; then
87 if [[ "$?" -eq "0" ]]; then
97 # filter is matched
101 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
[all …]
/openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/templatetags/
H A Dprojecttags.py6 # SPDX-License-Identifier: GPL-2.0-only
22 return end_time - start_time
24 @register.filter(name = 'sectohms')
31 return "%02d:%02d:%02d" % (hours, int((tdsec - (hours * 3600))/ 60), int(tdsec) % 60)
34 @register.filter(name = 'get_tasks')
40 @register.filter(name = "json")
42 …# JSON spec says that "\/" is functionally identical to "/" to allow for HTML-tag embedding in JSO…
43 …# unfortunately, I can't find any option in the json module to turn on forward-slash escaping, so …
55 return qs.filter(**kwargs)
58 @register.filter("whitespace_slice")
[all …]
/openbmc/phosphor-host-ipmid/include/ipmid/
H A Dfilter.hpp8 * http://www.apache.org/licenses/LICENSE-2.0
18 #include <ipmid/api-types.hpp>
33 * @brief Filter base class for dealing with IPMI request/response
49 * @brief filter concrete class
52 * essentially just a wrapper to hold the filter callback so it can be stored in
53 * the filter list.
56 * commands in priority order and each filter has the opportunity to reject the
62 template <typename Filter>
66 IpmiFilter(Filter&& filter) : filter_(std::move(filter)) {} in IpmiFilter() argument
74 Filter filter_;
[all …]
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/syslog-ng/files/
H A Dsyslog-ng.conf.sysvinit3 # Syslog-ng configuration file, compatible with default Debian syslogd
24 source s_src { unix-dgram("/dev/log"); internal();
60 # Some 'catch-all' logfiles.
75 # you must invoke nsole' with the -file' option:
77 # $ xconsole -file /dev/xconsole [...]
91 # Here's come the filter options. With this rules, we can set which
94 filter f_dbg { level(debug); };
95 filter f_info { level(info); };
96 filter f_notice { level(notice); };
97 filter f_warn { level(warn); };
[all …]
H A Dsyslog-ng.conf.systemd3 # Syslog-ng configuration file, compatible with default Debian syslogd
60 # Some 'catch-all' logfiles.
75 # you must invoke nsole' with the -file' option:
77 # $ xconsole -file /dev/xconsole [...]
91 # Here's come the filter options. With this rules, we can set which
94 filter f_dbg { level(debug); };
95 filter f_info { level(info); };
96 filter f_notice { level(notice); };
97 filter f_warn { level(warn); };
98 filter f_err { level(err); };
[all …]
/openbmc/linux/tools/perf/tests/shell/
H A Drecord_bpf_filter.sh3 # SPDX-License-Identifier: GPL-2.0
5 set -e
11 rm -f "${perfdata}"
12 rm -f "${perfdata}".old
13 trap - EXIT TERM INT
23 echo "Checking BPF-filter privilege"
25 if [ "$(id -u)" != 0 ]
27 echo "bpf-filter test [Skipped permission]"
31 if ! perf record -e task-clock --filter 'period > 1' \
32 -o /dev/null --quiet true 2>&1
[all …]
/openbmc/linux/kernel/
H A Dseccomp.c1 // SPDX-License-Identifier: GPL-2.0
5 * Copyright 2004-2005 Andrea Arcangeli <andrea@cpushare.com>
10 * This defines a simple but solid secure-computing facility.
13 * Mode 2 allows user-defined system call filters in the form
41 #include <linux/filter.h>
64 /* The struct pid of the task whose filter triggered the notification */
67 /* The "cookie" for this request; this is unique for this filter. */
105 * struct seccomp_kaddfd - container for seccomp_addfd ioctl messages
108 * @fd: The fd number to install it at. If the fd number is -1, it means the
138 * struct notification - container for seccomp userspace notifications. Since
[all …]
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/
H A Dtc_restrictions.sh2 # SPDX-License-Identifier: GPL-2.0
41 # It is forbidden in mlxsw driver to have mixed-bound
47 tc filter add block 22 protocol ip pref 1 handle 101 flower \
59 tc filter del block 22 protocol ip pref 1 handle 101 flower
64 tc filter add block 22 protocol ip pref 1 handle 101 flower \
73 tc filter add block 22 protocol ip pref 1 handle 101 flower \
77 tc filter del block 22 protocol ip pref 1 handle 101 flower
90 # egress-bound block.
95 tc filter add block 22 protocol ip pref 1 handle 101 flower \
108 tc filter del block 22 protocol ip pref 1 handle 101 flower
[all …]
/openbmc/linux/drivers/net/ipa/
H A Dipa_table.c1 // SPDX-License-Identifier: GPL-2.0
3 /* Copyright (c) 2012-2018, The Linux Foundation. All rights reserved.
4 * Copyright (C) 2018-2023 Linaro Ltd.
15 #include <linux/dma-mapping.h>
28 * DOC: IPA Filter and Route Tables
30 * The IPA has tables defined in its local (IPA-resident) memory that define
31 * filter and routing rules. An entry in either of these tables is a little
32 * endian 64-bit "slot" that holds the address of a rule definition. (The
35 * Separate tables (both filter and route) are used for IPv4 and IPv6. There
36 * is normally another set of "hashed" filter and route tables, which are
[all …]
/openbmc/linux/include/media/
H A Ddmxdev.h40 * enum dmxdev_type - type of demux filter type.
42 * @DMXDEV_TYPE_NONE: no filter set.
43 * @DMXDEV_TYPE_SEC: section filter.
44 * @DMXDEV_TYPE_PES: Program Elementary Stream (PES) filter.
53 * enum dmxdev_state - state machine for the dmxdev.
55 * @DMXDEV_STATE_FREE: indicates that the filter is freed.
56 * @DMXDEV_STATE_ALLOCATED: indicates that the filter was allocated
58 * @DMXDEV_STATE_SET: indicates that the filter parameters are set.
59 * @DMXDEV_STATE_GO: indicates that the filter is running.
61 * and the filter is now disabled.
[all …]
/openbmc/bmcweb/redfish-core/schema/dmtf/csdl/
H A DFilter_v1.xml1 <?xml version="1.0" encoding="UTF-8"?>
2 <!---->
3 <!--################################################################################ -->
4 <!--# Redfish Schema: Filter v1.1.0 -->
5 <!--# -->
6 <!--# For a detailed change log, see the README file contained in the DSP8010 bundle, -->
7 <!--# available at http://www.dmtf.org/standards/redfish -->
8 <!--# Copyright 2014-2025 DMTF. -->
9 <!--# For the full DMTF copyright policy, see http://www.dmtf.org/about/policies/copyright -->
10 <!--################################################################################ -->
[all …]

12345678910>>...45