/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | arg_parsing.c | 34 if (!ASSERT_EQ(set.cnt, 1, "test filters count")) in test_parse_test_list() 36 if (!ASSERT_OK_PTR(set.tests, "test filters initialized")) in test_parse_test_list() 38 ASSERT_EQ(set.tests[0].subtest_cnt, 0, "subtest filters count"); in test_parse_test_list() 44 if (!ASSERT_EQ(set.cnt, 2, "count of test filters")) in test_parse_test_list() 46 if (!ASSERT_OK_PTR(set.tests, "test filters initialized")) in test_parse_test_list() 48 ASSERT_EQ(set.tests[0].subtest_cnt, 0, "subtest filters count"); in test_parse_test_list() 49 ASSERT_EQ(set.tests[1].subtest_cnt, 0, "subtest filters count"); in test_parse_test_list() 58 if (!ASSERT_EQ(set.cnt, 2, "count of test filters")) in test_parse_test_list() 60 if (!ASSERT_OK_PTR(set.tests, "test filters initialized")) in test_parse_test_list() 62 if (!ASSERT_EQ(set.tests[0].subtest_cnt, 1, "subtest filters count")) in test_parse_test_list() [all …]
|
/linux/drivers/net/wireless/intel/iwlwifi/mei/ |
H A D | net.c | 30 * pass_to_csme and rx_handler_res are set. Otherwise, next level of filters 34 const struct iwl_sap_oob_filters *filters, in iwl_mei_rx_filter_eth() argument 45 for (filt = &filters->eth_filters[0]; in iwl_mei_rx_filter_eth() 46 filt < &filters->eth_filters[0] + ARRAY_SIZE(filters->eth_filters); in iwl_mei_rx_filter_eth() 70 /* MCAST frames that don't match layer 2 filters are not sent to ME */ in iwl_mei_rx_filter_eth() 81 const struct iwl_sap_oob_filters *filters, in iwl_mei_rx_filter_arp() argument 84 const struct iwl_sap_ipv4_filter *filt = &filters->ipv4_filter; in iwl_mei_rx_filter_arp() 139 const struct iwl_sap_oob_filters *filters, in iwl_mei_rx_filter_tcp_udp() argument 144 for (filt = &filters->flex_filters[0]; in iwl_mei_rx_filter_tcp_udp() 145 filt < &filters->flex_filters[0] + ARRAY_SIZE(filters->flex_filters); in iwl_mei_rx_filter_tcp_udp() [all …]
|
/linux/tools/perf/util/ |
H A D | bpf_lock_contention.c | 225 if (con->filters->nr_types) { in lock_contention_prepare() 227 ntypes = con->filters->nr_types; in lock_contention_prepare() 229 if (con->filters->nr_cgrps) { in lock_contention_prepare() 231 ncgrps = con->filters->nr_cgrps; in lock_contention_prepare() 234 /* resolve lock name filters to addr */ in lock_contention_prepare() 235 if (con->filters->nr_syms) { in lock_contention_prepare() 240 for (i = 0; i < con->filters->nr_syms; i++) { in lock_contention_prepare() 242 con->filters->syms[i], in lock_contention_prepare() 246 con->filters->syms[i]); in lock_contention_prepare() 250 addrs = realloc(con->filters->addrs, in lock_contention_prepare() [all …]
|
H A D | bpf-filter.c | 5 * The BPF program is fixed and just to read filter expressions in the 'filters' 15 * To support non-root users, the filters map can be loaded and pinned in the BPF 17 * a new entry in the shared filters map to fill the filter expressions. And the 24 * event->id ---> | id | ---+ idx_hash | filters 35 * it can proceed even if a lot of non-root users are using the filters at the 36 * same time. In this case the filters map has a single entry and no need to use 37 * the hash maps to get the index (key) of the filters map (IOW it's always 0). 73 /* Index in the pinned 'filters' map. Should be released after use. */ 325 fd = get_pinned_fd("filters"); in destroy_idx_hash() 359 fd = get_pinned_fd("filters"); in create_idx_hash() [all …]
|
/linux/drivers/net/ethernet/intel/ice/ |
H A D | ice_fltr.c | 29 * @list: pointer to the list which contains MAC filters entry 144 * ice_fltr_add_mac_list - add list of MAC filters 146 * @list: list of filters 154 * ice_fltr_remove_mac_list - remove list of MAC filters 156 * @list: list of filters 164 * ice_fltr_add_vlan_list - add list of VLAN filters 166 * @list: list of filters 174 * ice_fltr_remove_vlan_list - remove list of VLAN filters 176 * @list: list of filters 185 * ice_fltr_add_eth_list - add list of ethertype filters [all …]
|
/linux/tools/perf/pmu-events/arch/x86/ivytown/ |
H A D | uncore-io.json | 97 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 107 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 117 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 127 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 147 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 157 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 167 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 177 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 197 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 207 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… [all …]
|
H A D | uncore-cache.json | 24 …filters available. Note the non-standard filtering equation. This event will count requests that… 34 …udes code, data, prefetches and hints coming from L2. This has numerous filters available. Note … 44 …udes code, data, prefetches and hints coming from L2. This has numerous filters available. Note … 54 …filters available. Note the non-standard filtering equation. This event will count requests that… 64 …udes code, data, prefetches and hints coming from L2. This has numerous filters available. Note … 254 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 264 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 274 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 284 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 304 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Up and Ev… [all …]
|
/linux/tools/perf/ |
H A D | builtin-lock.c | 64 static struct lock_filter filters; variable 993 for (i = 0; i < filters.nr_syms; i++) { in report_lock_contention_begin_event() 995 filters.syms[i], in report_lock_contention_begin_event() 999 filters.syms[i]); in report_lock_contention_begin_event() 1003 addrs = realloc(filters.addrs, in report_lock_contention_begin_event() 1004 (filters.nr_addrs + 1) * sizeof(*addrs)); in report_lock_contention_begin_event() 1010 addrs[filters.nr_addrs++] = map__unmap_ip(kmap, sym->start); in report_lock_contention_begin_event() 1011 filters.addrs = addrs; in report_lock_contention_begin_event() 1042 if (filters.nr_types) { in report_lock_contention_begin_event() 1045 for (i = 0; i < filters.nr_types; i++) { in report_lock_contention_begin_event() [all …]
|
/linux/Documentation/networking/device_drivers/ethernet/aquantia/ |
H A D | atlantic.rst | 256 RX flow rules (ntuple filters) 266 The driver utilizes the ethtool interface for configuring ntuple filters, 273 When disabling ntuple filters, all the user programmed filters are 274 flushed from the driver cache and hardware. All needed filters must 277 Because of the fixed order of the rules, the location of filters is also fixed: 279 - Locations 0 - 15 for VLAN ID filters 280 - Locations 16 - 31 for L2 EtherType filters 281 - Locations 32 - 39 for L3/L4 5-tuple filters (locations 32, 36 for IPv6) 284 destination TCP/UDP/SCTP port) is compared against 8 filters. For IPv4, up to 302 At the moment you can not use IPv4 and IPv6 filters at the same time. [all …]
|
/linux/Documentation/userspace-api/ |
H A D | seccomp_filter.rst | 2 Seccomp BPF (SECure COMPuting with filters) 18 Filter (BPF) program, as with socket filters, except that the data 27 pointers which constrains all filters to solely evaluating the system 38 choosing. Expressive, dynamic filters provide further options down this 48 ``CONFIG_HAVE_ARCH_SECCOMP_FILTER``, then filters may be added as below: 68 processes will be constrained to the same filters and system 78 additional filters may be layered on which will increase evaluation 88 filters exist, the return value for the evaluation of a given system 166 If multiple filters exist, the return value for the evaluation of a 170 multiple filters return values of the same precedence, only the [all …]
|
/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
H A D | tc_flower.sh | 117 check_err $? "Two filters - did not match highest priority" 123 check_err $? "Two filters - did not match lowest priority" 140 # When two filters that only differ in their priority are used, 142 # that filters are correctly spilled to C-TCAM and that the right 185 log_test "identical filters test ($tcflags)" 204 check_err $? "Two filters - did not match highest priority" 221 check_err $? "Two filters - did not match highest priority after add" 232 # number of masks has been reached filters that require new 254 err_msg="$i filters - C-TCAM spill did not happen when it was expected" 257 err_msg="$i filters - C-TCAM spill happened when it should not" [all …]
|
/linux/tools/perf/pmu-events/arch/x86/haswellx/ |
H A D | uncore-cache.json | 9 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 21 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 33 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 45 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 57 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 69 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 81 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 93 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 105 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 117 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' bu [all...] |
/linux/tools/perf/pmu-events/arch/x86/broadwellx/ |
H A D | uncore-cache.json | 9 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 21 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 33 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 45 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 57 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 69 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 81 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 93 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 105 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 117 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' bu [all...] |
/linux/tools/testing/selftests/powerpc/pmu/sampling_tests/ |
H A D | bhrb_filter_map_test.c | 15 * map. All the branch filters are not supported 16 * in powerpc. Supported filters in: 27 /* Valid bhrb filters in power9/power10/power11 */ 33 /* Valid bhrb filters in power10/power11 */ 51 * bhrb filters is not supported in bhrb_filter_map_test()
|
/linux/tools/testing/selftests/seccomp/ |
H A D | seccomp_benchmark.c | 235 ksft_print_msg("getpid RET_ALLOW 2 filters (bitmap): %llu ns\n", bitmap2); in main() 242 ksft_print_msg("getpid RET_ALLOW 3 filters (full): %llu ns\n", filter1); in main() 249 ksft_print_msg("getpid RET_ALLOW 4 filters (full): %llu ns\n", filter2); in main() 263 ESTIMATE("total seccomp overhead for 2 bitmapped filters", calc, in main() 265 ESTIMATE("total seccomp overhead for 3 full filters", calc, in main() 267 ESTIMATE("total seccomp overhead for 4 full filters", calc, in main() 273 ESTIMATE("seccomp per-filter overhead (filters / 4)", per_filter2, in main() 284 ret |= compare("per-filter (last 2 diff)", "≈", "per-filter (filters / 4)", in main() 298 ret |= compare("native + entry + (per filter * 4)", "≈", "4 filters total", in main()
|
/linux/drivers/net/ethernet/sfc/ |
H A D | mcdi_filters.h | 40 /* Per-VLAN filters information */ 64 /* AUTO_OLD is used to mark and sweep MAC filters for the device address lists. */ 82 /* filters have yet to be restored after MC reboot */ 84 /* Multicast filter chaining allows less-specific filters to receive 85 * multicast packets that matched more-specific filters. Early EF10 105 * access. When removing filters we must identify them to the
|
H A D | mcdi_filters.c | 60 * filters for specific local unicast MAC and IP addresses are 126 * Handle encap filters first. They will always be mismatch in efx_mcdi_filter_push_prep_set_match_fields() 127 * (unknown UC or MC) filters in efx_mcdi_filter_push_prep_set_match_fields() 365 /* For now, only support RX filters */ in efx_mcdi_filter_insert_locked() 399 /* Find any existing filters with the same match tuple or in efx_mcdi_filter_insert_locked() 651 /* Remove filters that weren't renewed. */ 676 "%s: failed to remove %d filters\n", in efx_mcdi_filter_remove_old() 680 "%s: failed to remove %d non-existent filters\n", in efx_mcdi_filter_remove_old() 769 /* Insert/renew filters */ in efx_mcdi_filter_insert_addr_list() 850 * don't insert encap filters on non-supporting in efx_mcdi_filter_insert_def() [all …]
|
/linux/drivers/net/ethernet/broadcom/bnx2x/ |
H A D | bnx2x_vfpf.c | 742 req->filters[0].flags = VFPF_Q_FILTER_DEST_MAC_VALID; in bnx2x_vfpf_config_mac() 744 req->filters[0].flags |= VFPF_Q_FILTER_SET; in bnx2x_vfpf_config_mac() 750 memcpy(req->filters[0].mac, addr, ETH_ALEN); in bnx2x_vfpf_config_mac() 777 memcpy(req->filters[0].mac, bp->dev->dev_addr, in bnx2x_vfpf_config_mac() 951 req->filters[0].flags = VFPF_Q_FILTER_VLAN_TAG_VALID; in bnx2x_vfpf_update_vlan() 954 req->filters[0].flags |= VFPF_Q_FILTER_SET; in bnx2x_vfpf_update_vlan() 965 req->filters[0].vlan_tag = vid; in bnx2x_vfpf_update_vlan() 1657 fl = kzalloc(struct_size(fl, filters, tlv->n_mac_vlan_filters), in bnx2x_vf_mbx_macvlan_list() 1663 struct vfpf_q_mac_vlan_filter *msg_filter = &tlv->filters[i]; in bnx2x_vf_mbx_macvlan_list() 1667 memset(&fl->filters[j], 0, sizeof(fl->filters[j])); in bnx2x_vf_mbx_macvlan_list() [all …]
|
/linux/mm/damon/ |
H A D | sysfs-schemes.c | 313 * enum damos_sysfs_filter_handle_layer - Layers handling filters of a dir. 671 * filters directory 684 struct damon_sysfs_scheme_filters *filters; in damon_sysfs_scheme_filters_alloc() local 686 filters = kzalloc(sizeof(struct damon_sysfs_scheme_filters), GFP_KERNEL); in damon_sysfs_scheme_filters_alloc() 687 if (filters) in damon_sysfs_scheme_filters_alloc() 688 filters->handle_layer = layer; in damon_sysfs_scheme_filters_alloc() 689 return filters; in damon_sysfs_scheme_filters_alloc() 693 struct damon_sysfs_scheme_filters *filters) in damon_sysfs_scheme_filters_rm_dirs() argument 695 struct damon_sysfs_scheme_filter **filters_arr = filters->filters_arr; in damon_sysfs_scheme_filters_rm_dirs() 698 for (i = 0; i < filters->nr; i++) in damon_sysfs_scheme_filters_rm_dirs() [all …]
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-kernel-mm-damon | 361 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/nr_filters 365 directories for setting filters of the scheme named '0' to 366 'N-1' under the filters/ directory. 368 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/type 377 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/memcg_path 384 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/addr_start 391 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/addr_end 398 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/min 405 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/max 412 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/target_idx [all …]
|
/linux/tools/perf/pmu-events/arch/x86/broadwellde/ |
H A D | uncore-cache.json | 41 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Filters for any transaction originating from the IPQ or IRQ. This does not include lookups originating from the ISMQ.", 51 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Read transactions", 61 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Qualify one of the other subevents by the Target NID. The NID is programmed in Cn_MSR_PMON_BOX_FILTER.nid. In conjunction with STATE = I, it is possible to monitor misses to specific NIDs in the system.", 71 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Read transactions", 81 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Filters for only snoop requests coming from the remote socket(s) through the IPQ.", 91 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Writeback transactions from L2 to the LLC This includes all write transactions -- both Cacheable and UC.", 311 "PublicDescription": "Counts the number of cycles that the AD ring is being used at this ring stop. This includes when packets are passing by and when packets are being sunk, but does not include when packets are being sent from the ring stop. We really have two rings in BDX -- a clockwise ring and a counter-clockwise ring. On the left side of the ring, the UP direction is on the clockwise ring and DN is on the counter-clockwise ring. On the right side of the ring, this is reversed. The first half of the CBos are on the left side of the ring, and the 2nd half are on the right side of the ring. In other words (for example), in a 4c part, Cbo 0 UP AD is NOT the same ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and Even ring polarity.", 321 "PublicDescription": "Counts the number of cycles that the AD ring is being used at this ring stop. This includes when packets are passing by and when packets are being sunk, but does not include when packets are being sent from the ring stop. We really have two rings in BDX -- a clockwise ring and a counter-clockwise ring. On the left side of the ring, the UP direction is on the clockwise ring and DN is on the counter-clockwise ring. On the right side of the ring, this is reversed. The first half of the CBos are on the left side of the ring, and the 2nd half are on the right side of the ring. In other words (for example), in a 4c part, Cbo 0 UP AD is NOT the same ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters fo [all...] |
/linux/Documentation/mm/damon/ |
H A D | design.rst | 621 Filters subsection 632 a feature called DAMOS filters. The feature allows users to set an arbitrary 633 number of filters for each scheme. Each filter specifies 641 For efficient handling of filters, some types of filters are handled by the 644 case of the core layer-handled filters, the memory regions that excluded by the 649 When multiple filters are installed, the group of filters that handled by the 650 core layer are evaluated first. After that, the group of filters that handled 651 by the operations layer are evaluated. Filters in each of the groups are 653 filter, next filters are ignored. If the part passes through the filters 654 evaluation stage because it is not matched to any of the filters, applying the [all …]
|
/linux/drivers/gpio/ |
H A D | gpio-idio-16.h | 18 * @filters: device has input filters 27 bool filters; member
|
/linux/sound/soc/meson/ |
H A D | axg-pdm.c | 87 const struct axg_pdm_filters *filters; member 150 const struct axg_pdm_filters *filters = priv->cfg->filters; in axg_pdm_get_os() local 151 unsigned int os = filters->hcic.ds; in axg_pdm_get_os() 160 os *= filters->lpf[i].ds; in axg_pdm_get_os() 282 /* Enable the filters */ in axg_pdm_startup() 299 const struct axg_pdm_hcic *hcic = &priv->cfg->filters->hcic; in axg_pdm_set_hcic_ctrl() 317 const struct axg_pdm_lpf *lpf = &priv->cfg->filters->lpf[index]; in axg_pdm_set_lpf_ctrl() 335 const struct axg_pdm_hpf *hpf = &priv->cfg->filters->hpf; in axg_pdm_set_hpf_ctrl() 349 const struct axg_pdm_lpf *lpf = priv->cfg->filters->lpf; in axg_pdm_set_lpf_filters() 363 /* Set the tap filter values of all 3 filters */ in axg_pdm_set_lpf_filters() [all …]
|
/linux/drivers/hwtracing/ptt/ |
H A D | hisi_ptt.h | 145 * sysfs attribute group name for root port filters and requester filters: 210 * @filter_lock: lock to protect the filters 211 * @sysfs_inited: whether the filters' sysfs entries has been initialized 215 * @filter_update_fifo: fifo of the filters waiting to update the filter list 232 * root port, or by the requester ID. Organize the filters
|