/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en/rep/ |
H A D | tc.c | 714 goto forward; 748 forward:
|
/linux-master/tools/testing/selftests/net/netfilter/ |
H A D | nft_flowtable.sh | 160 chain forward { 161 type filter hook forward priority 0; policy drop; 251 # flowtable fastpath should bypass normal routing one, i.e. the counters in forward hook 423 ip netns exec "$nsr1" nft -a insert rule inet filter forward ip dscp set cs3 481 # Same, but with NAT enabled. Same as in first test: we expect normal forward path
|
H A D | nft_nat.sh | 770 chain forward { 771 type filter hook forward priority 0; policy accept;
|
/linux-master/drivers/input/mouse/ |
H A D | alps.c | 255 int back = 0, forward = 0; local 275 forward = packet[2] & 4; 280 forward = packet[2] & 4; 281 if ((middle = forward && back)) 282 forward = back = 0; 342 input_report_key(dev, BTN_FORWARD, forward);
|
/linux-master/net/mac80211/ |
H A D | mesh_hwmp.c | 586 bool forward = true; local 603 forward = false; 668 if (forward && ifmsh->mshcfg.dot11MeshForwarding) {
|
/linux-master/drivers/net/ethernet/ti/ |
H A D | tlan.h | 143 u32 forward; member in struct:tlan_list
|
/linux-master/drivers/net/wireless/ath/ath10k/ |
H A D | rx_desc.h | 1321 forward:1, member in struct:fw_rx_desc_hl::__anon1736::__anon1737
|
/linux-master/include/net/ |
H A D | ax25.h | 226 struct net_device *forward; member in struct:ax25_dev
|
/linux-master/arch/s390/kernel/ |
H A D | entry.S | 127 larl %r9,sie_exit # skip forward to sie_exit
|
/linux-master/lib/zstd/compress/ |
H A D | zstd_opt.c | 542 U32 const forward = ZSTD_insertBt1(ms, base+idx, iend, target, mls, dictMode == ZSTD_extDict); local 543 assert(idx < (U32)(idx + forward)); 544 idx += forward; 878 * Moves forward in @rawSeqStore by @nbBytes, 1093 * it is static for the duration of the forward pass, and is included 1122 opt[pos].price = ZSTD_MAX_PRICE; /* mlen, litlen and price will be fixed during forward scanning */
|
/linux-master/drivers/net/ethernet/mellanox/mlxsw/ |
H A D | core_acl_flex_actions.c | 1164 * The ACL Trap / Discard separates the forward/discard control from CPU 1644 MLXSW_ITEM32(afa, forward, type, 0x00, 24, 2); 1650 MLXSW_ITEM32(afa, forward, pbs_ptr, 0x08, 0, 24); 1655 MLXSW_ITEM32(afa, forward, in_port, 0x0C, 0, 1); 1681 NL_SET_ERR_MSG_MOD(extack, "Cannot create forward action"); 1689 NL_SET_ERR_MSG_MOD(extack, "Cannot append forward action");
|
/linux-master/net/ipv6/ |
H A D | ip6mr.c | 2127 goto forward; 2156 forward: 2172 * the upstream: forward the packet to the upstream 2182 /* For (*,G) entry, don't forward to the incoming interface */
|
/linux-master/arch/arm64/crypto/ |
H A D | poly1305-armv8.pl | 57 // forward "declarations" are required for Apple
|
/linux-master/drivers/scsi/ |
H A D | st.c | 731 static int cross_eof(struct scsi_tape * STp, int forward) 738 if (forward) { 746 forward ? "forward" : "backward"); 760 forward ? "forward" : "backward"); 2698 direction ? "backward" : "forward", sc, units); 729 cross_eof(struct scsi_tape * STp, int forward) argument
|
/linux-master/net/ipv4/ |
H A D | ipmr.c | 1910 /* FIXME: forward and output firewalls used to be called here. 1977 goto forward; 2019 forward: 2033 * the upstream: forward the packet to the upstream 2043 /* For (*,G) entry, don't forward to the incoming interface */ 2124 /* Packet is looped back after forward, it should not be 2144 * that we can forward NO IGMP messages.
|
/linux-master/arch/s390/kvm/ |
H A D | interrupt.c | 3399 if ((info->forward || info->error) &&
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 6678 /* forward declarations for arch-specific underlying types of bpf_user_pt_regs_t typedef, 6711 /* now we can ignore typedefs moving forward */ 9058 bool forward) 9068 return forward ? &obj->programs[0] : 9076 idx = (p - obj->programs) + (forward ? 1 : -1); 9057 __bpf_program__iter(const struct bpf_program *p, const struct bpf_object *obj, bool forward) argument
|
/linux-master/tools/testing/radix-tree/ |
H A D | maple.c | 34720 rcu_stress(struct maple_tree *mt, bool forward) argument [all...] |