/linux-master/tools/perf/util/ |
H A D | strfilter.h | 4 /* General purpose glob matching filter */ 9 /* A node of string filter */ 16 /* String filter */ 22 * strfilter__new - Create a new string filter 34 * @filter: Original string filter 36 * @filter by using logical-or. 39 * Parse @rules and join it to the @filter by using logical-or. 42 int strfilter__or(struct strfilter *filter, 47 * @filter [all...] |
H A D | strfilter.c | 30 void strfilter__delete(struct strfilter *filter) argument 32 if (filter) { 33 strfilter_node__delete(filter->root); 34 free(filter); 157 * Parse filter rule and return new strfilter. 162 struct strfilter *filter = zalloc(sizeof(*filter)); local 165 if (filter) 166 filter->root = strfilter_node__new(rules, &ep); 168 if (!filter || !filte 178 strfilter__append(struct strfilter *filter, bool _or, const char *rules, const char **err) argument 207 strfilter__or(struct strfilter *filter, const char *rules, const char **err) argument 212 strfilter__and(struct strfilter *filter, const char *rules, const char **err) argument 239 strfilter__compare(struct strfilter *filter, const char *str) argument 298 strfilter__string(struct strfilter *filter) argument [all...] |
/linux-master/drivers/infiniband/hw/usnic/ |
H A D | usnic_fwd.h | 91 usnic_fwd_alloc_flow(struct usnic_fwd_dev *ufdev, struct filter *filter, 97 static inline void usnic_fwd_init_usnic_filter(struct filter *filter, argument 100 filter->type = FILTER_USNIC_ID; 101 filter->u.usnic.ethtype = ETH_P_IBOE; 102 filter->u.usnic.flags = FILTER_FIELD_USNIC_ETHTYPE | 105 filter->u.usnic.proto_version = (USNIC_ROCE_GRH_VER << 108 filter->u.usnic.usnic_id = usnic_id; 111 static inline void usnic_fwd_init_udp_filter(struct filter *filte argument [all...] |
/linux-master/drivers/net/ethernet/mscc/ |
H A D | ocelot_flower.c | 147 struct ocelot_vcap_filter *filter; local 158 list_for_each_entry(filter, &block->rules, list) 159 if (filter->type == OCELOT_VCAP_FILTER_PAG && 160 filter->goto_target == chain) 161 return filter; 164 list_for_each_entry(filter, &ocelot->dummy_rules, list) 165 if (filter->goto_target == chain) 166 return filter; 173 struct ocelot_vcap_filter *filter, 179 if (filter 172 ocelot_flower_parse_ingress_vlan_modify(struct ocelot *ocelot, int port, struct ocelot_vcap_filter *filter, const struct flow_action_entry *a, struct netlink_ext_ack *extack) argument 201 ocelot_flower_parse_egress_vlan_modify(struct ocelot_vcap_filter *filter, const struct flow_action_entry *a, struct netlink_ext_ack *extack) argument 231 ocelot_flower_parse_action(struct ocelot *ocelot, int port, bool ingress, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument 520 ocelot_flower_parse_indev(struct ocelot *ocelot, int port, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument 572 ocelot_flower_parse_key(struct ocelot *ocelot, int port, bool ingress, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument 779 ocelot_flower_parse(struct ocelot *ocelot, int port, bool ingress, struct flow_cls_offload *f, struct ocelot_vcap_filter *filter) argument 804 struct ocelot_vcap_filter *filter; local 823 ocelot_vcap_dummy_filter_add(struct ocelot *ocelot, struct ocelot_vcap_filter *filter) argument 831 ocelot_vcap_dummy_filter_del(struct ocelot *ocelot, struct ocelot_vcap_filter *filter) argument 846 ocelot_flower_patch_es0_vlan_modify(struct ocelot_vcap_filter *filter, struct netlink_ext_ack *extack) argument 869 struct ocelot_vcap_filter *filter; local 937 struct ocelot_vcap_filter *filter; local 974 struct ocelot_vcap_filter *filter; local [all...] |
H A D | ocelot_mrp.c | 39 struct ocelot_vcap_filter *filter; local 42 filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id, 44 if (!filter) 47 return ocelot_vcap_filter_del(ocelot, filter); 54 struct ocelot_vcap_filter *filter; local 57 filter = kzalloc(sizeof(*filter), GFP_KERNEL); 58 if (!filter) 61 filter->key_type = OCELOT_VCAP_KEY_ETYPE; 62 filter 80 ocelot_populate_mrp_trap_key(struct ocelot_vcap_filter *filter) argument [all...] |
/linux-master/include/sound/ |
H A D | spear_spdif.h | 12 bool (*filter)(struct dma_chan *chan, void *slave); member in struct:spear_spdif_platform_data
|
/linux-master/sound/soc/samsung/ |
H A D | dma.h | 15 int samsung_asoc_dma_platform_register(struct device *dev, dma_filter_fn filter,
|
/linux-master/sound/soc/spear/ |
H A D | spear_pcm.h | 11 bool (*filter)(struct dma_chan *chan, void *slave));
|
/linux-master/include/net/tc_act/ |
H A D | tc_bpf.h | 9 #include <linux/filter.h> 14 struct bpf_prog __rcu *filter; member in struct:tcf_bpf
|
/linux-master/include/kunit/ |
H A D | attributes.h | 13 * struct kunit_attr_filter - representation of attributes filter with the 22 * Returns the name of the filter's attribute. 24 const char *kunit_attr_filter_name(struct kunit_attr_filter filter); 39 * Parse attributes filter input and return an objects containing the 40 * attribute object and the string input of the next filter. 45 * Returns a copy of the suite containing only tests that pass the filter. 48 struct kunit_attr_filter filter, char *action, int *err);
|
/linux-master/samples/seccomp/ |
H A D | bpf-helper.c | 20 struct sock_filter *filter, size_t count) 32 struct sock_filter *instr = &filter[offset]; 90 void seccomp_bpf_print(struct sock_filter *filter, size_t count) argument 92 struct sock_filter *end = filter + count; 93 for ( ; filter < end; ++filter) 95 filter->code, filter->jt, filter->jf, filter 19 bpf_resolve_jumps(struct bpf_labels *labels, struct sock_filter *filter, size_t count) argument [all...] |
H A D | dropper.c | 19 #include <linux/filter.h> 30 struct sock_filter filter[] = { local 42 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])), 43 .filter = filter, 47 filter[4] = kill;
|
H A D | bpf-fancy.c | 13 #include <linux/filter.h> 35 struct sock_filter filter[] = { local 82 .filter = filter, 83 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])), 86 bpf_resolve_jumps(&l, filter, sizeof(filter)/sizeof(*filter));
|
/linux-master/include/uapi/linux/netfilter/ |
H A D | xt_bpf.h | 5 #include <linux/filter.h> 19 struct bpf_prog *filter __attribute__((aligned(8))); member in struct:xt_bpf_info 39 struct bpf_prog *filter __attribute__((aligned(8))); member in struct:xt_bpf_info_v1
|
/linux-master/drivers/hid/ |
H A D | hid-uclogic-core-test.c | 67 struct uclogic_raw_event_hook *filter; local 77 filter = kunit_kzalloc(test, sizeof(*filter), GFP_KERNEL); 78 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, filter); 80 filter->size = hook_events[n].size; 81 filter->event = kunit_kzalloc(test, filter->size, GFP_KERNEL); 82 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, filter->event); 83 memcpy(filter->event, &hook_events[n].event[0], filter [all...] |
/linux-master/arch/s390/net/ |
H A D | bpf_jit.h | 16 #include <linux/filter.h>
|
/linux-master/arch/um/drivers/ |
H A D | pcap_user.h | 12 char *filter; member in struct:pcap_data
|
/linux-master/include/linux/ |
H A D | seccomp_types.h | 16 * @filter: must always point to a valid seccomp-filter or NULL as it is 19 * @filter must only be accessed from the context of current as there 25 struct seccomp_filter *filter; member in struct:seccomp
|
/linux-master/tools/testing/selftests/net/forwarding/ |
H A D | tc_flower.sh | 44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 53 check_fail $? "Matched on a wrong filter" 56 check_fail $? "Did not match on correct filter" 58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 72 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 79 check_fail $? "Matched on a wrong filter" 82 check_fail $? "Did not match on correct filter" [all...] |
/linux-master/tools/perf/tests/shell/ |
H A D | record_bpf_filter.sh | 23 echo "Checking BPF-filter privilege" 27 echo "bpf-filter test [Skipped permission]" 31 if ! perf record -e task-clock --filter 'period > 1' \ 34 echo "bpf-filter test [Skipped missing BPF support]" 41 echo "Basic bpf-filter test" 43 if ! perf record -e task-clock -c 10000 --filter 'ip < 0xffffffff00000000' \ 46 echo "Basic bpf-filter test [Failed record]" 54 echo "Basic bpf-filter test [Skipped unsupported kernel]" 58 echo "Basic bpf-filter test [Failed invalid output]" 62 echo "Basic bpf-filter tes [all...] |
/linux-master/kernel/ |
H A D | seccomp.c | 41 #include <linux/filter.h> 64 /* The struct pid of the task whose filter triggered the notification */ 67 /* The "cookie" for this request; this is unique for this filter. */ 145 * filter->notify_lock. 160 * struct action_cache - per-filter cache of seccomp actions per 164 * filter will always allow the syscall, for the 167 * filter will always allow the syscall, for the 194 * A filter's reference count is incremented for each directly 195 * attached task, once for the dependent filter, and if 197 * the filter ca 280 seccomp_check_filter(struct sock_filter *filter, unsigned int flen) argument 523 seccomp_filter_free(struct seccomp_filter *filter) argument 704 struct seccomp_filter *filter = ERR_PTR(-EFAULT); local 876 seccomp_attach_filter(unsigned int flags, struct seccomp_filter *filter) argument 928 __get_seccomp_filter(struct seccomp_filter *filter) argument 1055 seccomp_next_notify_id(struct seccomp_filter *filter) argument 1401 seccomp_notify_free(struct seccomp_filter *filter) argument 1407 seccomp_notify_detach(struct seccomp_filter *filter) argument 1442 struct seccomp_filter *filter = file->private_data; local 1451 find_notification(struct seccomp_filter *filter, u64 id) argument 1474 recv_wait_event(struct seccomp_filter *filter) argument 1497 seccomp_notify_recv(struct seccomp_filter *filter, void __user *buf) argument 1570 seccomp_notify_send(struct seccomp_filter *filter, void __user *buf) argument 1617 seccomp_notify_id_valid(struct seccomp_filter *filter, void __user *buf) argument 1641 seccomp_notify_set_flags(struct seccomp_filter *filter, unsigned long flags) argument 1657 seccomp_notify_addfd(struct seccomp_filter *filter, struct seccomp_notif_addfd __user *uaddfd, unsigned int size) argument 1774 struct seccomp_filter *filter = file->private_data; local 1803 struct seccomp_filter *filter = file->private_data; local 1836 init_listener(struct seccomp_filter *filter) argument 1901 seccomp_set_mode_filter(unsigned int flags, const char __user *filter) argument 2000 seccomp_set_mode_filter(unsigned int flags, const char __user *filter) argument 2084 prctl_set_seccomp(unsigned long seccomp_mode, void __user *filter) argument 2115 struct seccomp_filter *orig, *filter; local 2161 struct seccomp_filter *filter; local 2200 struct seccomp_filter *filter; local [all...] |
/linux-master/samples/bpf/ |
H A D | tracex5_user.c | 5 #include <linux/filter.h> 24 struct sock_filter filter[] = { local 28 .len = (unsigned short)ARRAY_SIZE(filter), 29 .filter = filter,
|
/linux-master/lib/kunit/ |
H A D | attributes.c | 31 * @filter: function to indicate whether a given attribute value passes a 32 * filter 40 int (*filter)(void *attr, const char *input, int *err); member in struct:kunit_attr 87 * Returns whether the inputted integer value matches the filter given 105 pr_err("kunit executor: invalid filter operation: %s\n", op); 110 * Returns whether the inputted enum value "attr" matches the filter given 130 pr_err("kunit executor: filter value not found: %s\n", input); 141 pr_err("kunit executor: invalid filter input: %s\n", input); 154 * Returns whether the inputted string value (attr) matches the filter given 163 pr_err("kunit executor: invalid filter inpu 280 kunit_attr_filter_name(struct kunit_attr_filter filter) argument 338 struct kunit_attr_filter filter = {}; local 397 kunit_filter_attr_tests(const struct kunit_suite *const suite, struct kunit_attr_filter filter, char *action, int *err) argument [all...] |
/linux-master/net/netfilter/ |
H A D | xt_bpf.c | 2 /* Xtables module to match packets using a BPF filter. 12 #include <linux/filter.h> 19 MODULE_DESCRIPTION("Xtables: BPF filter match"); 33 program.filter = insns; 70 &info->filter); 80 &info->filter); 82 return __bpf_mt_check_fd(info->fd, &info->filter); 84 return __bpf_mt_check_path(info->path, &info->filter); 93 return bpf_prog_run(info->filter, skb); 100 return !!bpf_prog_run_save_cb(info->filter, (struc [all...] |
/linux-master/drivers/input/serio/ |
H A D | i8042.h | 70 #define filter_dbg(filter, data, format, args...) \ 75 if (!filter || i8042_unmask_kbd_data) \ 88 #define filter_dbg(filter, data, format, args...) do { } while (0)
|