Searched refs:filter (Results 1 - 25 of 912) sorted by relevance

1234567891011>>

/linux-master/tools/perf/util/
H A Dstrfilter.h4 /* General purpose glob matching filter */
9 /* A node of string filter */
16 /* String filter */
22 * strfilter__new - Create a new string filter
34 * @filter: Original string filter
36 * @filter by using logical-or.
39 * Parse @rules and join it to the @filter by using logical-or.
42 int strfilter__or(struct strfilter *filter,
47 * @filter
[all...]
H A Dstrfilter.c30 void strfilter__delete(struct strfilter *filter) argument
32 if (filter) {
33 strfilter_node__delete(filter->root);
34 free(filter);
157 * Parse filter rule and return new strfilter.
162 struct strfilter *filter = zalloc(sizeof(*filter)); local
165 if (filter)
166 filter->root = strfilter_node__new(rules, &ep);
168 if (!filter || !filte
178 strfilter__append(struct strfilter *filter, bool _or, const char *rules, const char **err) argument
207 strfilter__or(struct strfilter *filter, const char *rules, const char **err) argument
212 strfilter__and(struct strfilter *filter, const char *rules, const char **err) argument
239 strfilter__compare(struct strfilter *filter, const char *str) argument
298 strfilter__string(struct strfilter *filter) argument
[all...]
/linux-master/drivers/infiniband/hw/usnic/
H A Dusnic_fwd.h91 usnic_fwd_alloc_flow(struct usnic_fwd_dev *ufdev, struct filter *filter,
97 static inline void usnic_fwd_init_usnic_filter(struct filter *filter, argument
100 filter->type = FILTER_USNIC_ID;
101 filter->u.usnic.ethtype = ETH_P_IBOE;
102 filter->u.usnic.flags = FILTER_FIELD_USNIC_ETHTYPE |
105 filter->u.usnic.proto_version = (USNIC_ROCE_GRH_VER <<
108 filter->u.usnic.usnic_id = usnic_id;
111 static inline void usnic_fwd_init_udp_filter(struct filter *filte argument
[all...]
/linux-master/drivers/net/ethernet/mscc/
H A Docelot_flower.c147 struct ocelot_vcap_filter *filter; local
158 list_for_each_entry(filter, &block->rules, list)
159 if (filter->type == OCELOT_VCAP_FILTER_PAG &&
160 filter->goto_target == chain)
161 return filter;
164 list_for_each_entry(filter, &ocelot->dummy_rules, list)
165 if (filter->goto_target == chain)
166 return filter;
173 struct ocelot_vcap_filter *filter,
179 if (filter
172 ocelot_flower_parse_ingress_vlan_modify(struct ocelot *ocelot, int port, struct ocelot_vcap_filter *filter, const struct flow_action_entry *a, struct netlink_ext_ack *extack) argument
201 ocelot_flower_parse_egress_vlan_modify(struct ocelot_vcap_filter *filter, const struct flow_action_entry *a, struct netlink_ext_ack *extack) argument
231 ocelot_flower_parse_action(struct ocelot *ocelot, int port, bool ingress, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument
520 ocelot_flower_parse_indev(struct ocelot *ocelot, int port, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument
572 ocelot_flower_parse_key(struct ocelot *ocelot, int port, bool ingress, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument
782 ocelot_flower_parse(struct ocelot *ocelot, int port, bool ingress, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument
807 struct ocelot_vcap_filter *filter; local
826 ocelot_vcap_dummy_filter_add(struct ocelot *ocelot, struct ocelot_vcap_filter *filter) argument
834 ocelot_vcap_dummy_filter_del(struct ocelot *ocelot, struct ocelot_vcap_filter *filter) argument
849 ocelot_flower_patch_es0_vlan_modify(struct ocelot_vcap_filter *filter, struct netlink_ext_ack *extack) argument
872 struct ocelot_vcap_filter *filter; local
940 struct ocelot_vcap_filter *filter; local
977 struct ocelot_vcap_filter *filter; local
[all...]
H A Docelot_mrp.c39 struct ocelot_vcap_filter *filter; local
42 filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id,
44 if (!filter)
47 return ocelot_vcap_filter_del(ocelot, filter);
54 struct ocelot_vcap_filter *filter; local
57 filter = kzalloc(sizeof(*filter), GFP_KERNEL);
58 if (!filter)
61 filter->key_type = OCELOT_VCAP_KEY_ETYPE;
62 filter
80 ocelot_populate_mrp_trap_key(struct ocelot_vcap_filter *filter) argument
[all...]
/linux-master/include/sound/
H A Dspear_spdif.h12 bool (*filter)(struct dma_chan *chan, void *slave); member in struct:spear_spdif_platform_data
/linux-master/sound/soc/samsung/
H A Ddma.h15 int samsung_asoc_dma_platform_register(struct device *dev, dma_filter_fn filter,
/linux-master/sound/soc/spear/
H A Dspear_pcm.h11 bool (*filter)(struct dma_chan *chan, void *slave));
/linux-master/include/net/tc_act/
H A Dtc_bpf.h9 #include <linux/filter.h>
14 struct bpf_prog __rcu *filter; member in struct:tcf_bpf
/linux-master/include/kunit/
H A Dattributes.h13 * struct kunit_attr_filter - representation of attributes filter with the
22 * Returns the name of the filter's attribute.
24 const char *kunit_attr_filter_name(struct kunit_attr_filter filter);
39 * Parse attributes filter input and return an objects containing the
40 * attribute object and the string input of the next filter.
45 * Returns a copy of the suite containing only tests that pass the filter.
48 struct kunit_attr_filter filter, char *action, int *err);
/linux-master/samples/seccomp/
H A Dbpf-helper.c20 struct sock_filter *filter, size_t count)
32 struct sock_filter *instr = &filter[offset];
90 void seccomp_bpf_print(struct sock_filter *filter, size_t count) argument
92 struct sock_filter *end = filter + count;
93 for ( ; filter < end; ++filter)
95 filter->code, filter->jt, filter->jf, filter
19 bpf_resolve_jumps(struct bpf_labels *labels, struct sock_filter *filter, size_t count) argument
[all...]
H A Ddropper.c19 #include <linux/filter.h>
30 struct sock_filter filter[] = { local
42 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])),
43 .filter = filter,
47 filter[4] = kill;
H A Dbpf-fancy.c13 #include <linux/filter.h>
35 struct sock_filter filter[] = { local
82 .filter = filter,
83 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])),
86 bpf_resolve_jumps(&l, filter, sizeof(filter)/sizeof(*filter));
/linux-master/include/uapi/linux/netfilter/
H A Dxt_bpf.h5 #include <linux/filter.h>
19 struct bpf_prog *filter __attribute__((aligned(8))); member in struct:xt_bpf_info
39 struct bpf_prog *filter __attribute__((aligned(8))); member in struct:xt_bpf_info_v1
/linux-master/drivers/hid/
H A Dhid-uclogic-core-test.c67 struct uclogic_raw_event_hook *filter; local
77 filter = kunit_kzalloc(test, sizeof(*filter), GFP_KERNEL);
78 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, filter);
80 filter->size = hook_events[n].size;
81 filter->event = kunit_kzalloc(test, filter->size, GFP_KERNEL);
82 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, filter->event);
83 memcpy(filter->event, &hook_events[n].event[0], filter
[all...]
/linux-master/arch/s390/net/
H A Dbpf_jit.h16 #include <linux/filter.h>
/linux-master/arch/um/drivers/
H A Dpcap_user.h12 char *filter; member in struct:pcap_data
/linux-master/include/linux/
H A Dseccomp_types.h16 * @filter: must always point to a valid seccomp-filter or NULL as it is
19 * @filter must only be accessed from the context of current as there
25 struct seccomp_filter *filter; member in struct:seccomp
/linux-master/tools/testing/selftests/net/forwarding/
H A Dtc_flower.sh44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
53 check_fail $? "Matched on a wrong filter"
56 check_fail $? "Did not match on correct filter"
58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower
59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower
70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \
72 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \
79 check_fail $? "Matched on a wrong filter"
82 check_fail $? "Did not match on correct filter"
[all...]
/linux-master/tools/perf/tests/shell/
H A Drecord_bpf_filter.sh23 echo "Checking BPF-filter privilege"
27 echo "bpf-filter test [Skipped permission]"
31 if ! perf record -e task-clock --filter 'period > 1' \
34 echo "bpf-filter test [Skipped missing BPF support]"
41 echo "Basic bpf-filter test"
43 if ! perf record -e task-clock -c 10000 --filter 'ip < 0xffffffff00000000' \
46 echo "Basic bpf-filter test [Failed record]"
54 echo "Basic bpf-filter test [Skipped unsupported kernel]"
58 echo "Basic bpf-filter test [Failed invalid output]"
62 echo "Basic bpf-filter tes
[all...]
/linux-master/kernel/
H A Dseccomp.c41 #include <linux/filter.h>
64 /* The struct pid of the task whose filter triggered the notification */
67 /* The "cookie" for this request; this is unique for this filter. */
145 * filter->notify_lock.
160 * struct action_cache - per-filter cache of seccomp actions per
164 * filter will always allow the syscall, for the
167 * filter will always allow the syscall, for the
194 * A filter's reference count is incremented for each directly
195 * attached task, once for the dependent filter, and if
197 * the filter ca
280 seccomp_check_filter(struct sock_filter *filter, unsigned int flen) argument
523 seccomp_filter_free(struct seccomp_filter *filter) argument
704 struct seccomp_filter *filter = ERR_PTR(-EFAULT); local
876 seccomp_attach_filter(unsigned int flags, struct seccomp_filter *filter) argument
928 __get_seccomp_filter(struct seccomp_filter *filter) argument
1055 seccomp_next_notify_id(struct seccomp_filter *filter) argument
1401 seccomp_notify_free(struct seccomp_filter *filter) argument
1407 seccomp_notify_detach(struct seccomp_filter *filter) argument
1442 struct seccomp_filter *filter = file->private_data; local
1451 find_notification(struct seccomp_filter *filter, u64 id) argument
1474 recv_wait_event(struct seccomp_filter *filter) argument
1497 seccomp_notify_recv(struct seccomp_filter *filter, void __user *buf) argument
1570 seccomp_notify_send(struct seccomp_filter *filter, void __user *buf) argument
1617 seccomp_notify_id_valid(struct seccomp_filter *filter, void __user *buf) argument
1641 seccomp_notify_set_flags(struct seccomp_filter *filter, unsigned long flags) argument
1657 seccomp_notify_addfd(struct seccomp_filter *filter, struct seccomp_notif_addfd __user *uaddfd, unsigned int size) argument
1774 struct seccomp_filter *filter = file->private_data; local
1803 struct seccomp_filter *filter = file->private_data; local
1836 init_listener(struct seccomp_filter *filter) argument
1901 seccomp_set_mode_filter(unsigned int flags, const char __user *filter) argument
2000 seccomp_set_mode_filter(unsigned int flags, const char __user *filter) argument
2084 prctl_set_seccomp(unsigned long seccomp_mode, void __user *filter) argument
2115 struct seccomp_filter *orig, *filter; local
2161 struct seccomp_filter *filter; local
2200 struct seccomp_filter *filter; local
[all...]
/linux-master/samples/bpf/
H A Dtracex5_user.c5 #include <linux/filter.h>
24 struct sock_filter filter[] = { local
28 .len = (unsigned short)ARRAY_SIZE(filter),
29 .filter = filter,
/linux-master/lib/kunit/
H A Dattributes.c31 * @filter: function to indicate whether a given attribute value passes a
32 * filter
40 int (*filter)(void *attr, const char *input, int *err); member in struct:kunit_attr
87 * Returns whether the inputted integer value matches the filter given
105 pr_err("kunit executor: invalid filter operation: %s\n", op);
110 * Returns whether the inputted enum value "attr" matches the filter given
130 pr_err("kunit executor: filter value not found: %s\n", input);
141 pr_err("kunit executor: invalid filter input: %s\n", input);
154 * Returns whether the inputted string value (attr) matches the filter given
163 pr_err("kunit executor: invalid filter inpu
280 kunit_attr_filter_name(struct kunit_attr_filter filter) argument
338 struct kunit_attr_filter filter = {}; local
397 kunit_filter_attr_tests(const struct kunit_suite *const suite, struct kunit_attr_filter filter, char *action, int *err) argument
[all...]
/linux-master/net/netfilter/
H A Dxt_bpf.c2 /* Xtables module to match packets using a BPF filter.
12 #include <linux/filter.h>
19 MODULE_DESCRIPTION("Xtables: BPF filter match");
33 program.filter = insns;
70 &info->filter);
80 &info->filter);
82 return __bpf_mt_check_fd(info->fd, &info->filter);
84 return __bpf_mt_check_path(info->path, &info->filter);
93 return bpf_prog_run(info->filter, skb);
100 return !!bpf_prog_run_save_cb(info->filter, (struc
[all...]
/linux-master/drivers/input/serio/
H A Di8042.h70 #define filter_dbg(filter, data, format, args...) \
75 if (!filter || i8042_unmask_kbd_data) \
88 #define filter_dbg(filter, data, format, args...) do { } while (0)

Completed in 191 milliseconds

1234567891011>>