| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | arg_parsing.c | 34 if (!ASSERT_EQ(set.cnt, 1, "test filters count")) in test_parse_test_list() 36 if (!ASSERT_OK_PTR(set.tests, "test filters initialized")) in test_parse_test_list() 38 ASSERT_EQ(set.tests[0].subtest_cnt, 0, "subtest filters count"); in test_parse_test_list() 44 if (!ASSERT_EQ(set.cnt, 2, "count of test filters")) in test_parse_test_list() 46 if (!ASSERT_OK_PTR(set.tests, "test filters initialized")) in test_parse_test_list() 48 ASSERT_EQ(set.tests[0].subtest_cnt, 0, "subtest filters count"); in test_parse_test_list() 49 ASSERT_EQ(set.tests[1].subtest_cnt, 0, "subtest filters count"); in test_parse_test_list() 58 if (!ASSERT_EQ(set.cnt, 2, "count of test filters")) in test_parse_test_list() 60 if (!ASSERT_OK_PTR(set.tests, "test filters initialized")) in test_parse_test_list() 62 if (!ASSERT_EQ(set.tests[0].subtest_cnt, 1, "subtest filters count")) in test_parse_test_list() [all …]
|
| /linux/drivers/net/wireless/intel/iwlwifi/mei/ |
| H A D | net.c | 30 * pass_to_csme and rx_handler_res are set. Otherwise, next level of filters 34 const struct iwl_sap_oob_filters *filters, in iwl_mei_rx_filter_eth() argument 45 for (filt = &filters->eth_filters[0]; in iwl_mei_rx_filter_eth() 46 filt < &filters->eth_filters[0] + ARRAY_SIZE(filters->eth_filters); in iwl_mei_rx_filter_eth() 70 /* MCAST frames that don't match layer 2 filters are not sent to ME */ in iwl_mei_rx_filter_eth() 81 const struct iwl_sap_oob_filters *filters, in iwl_mei_rx_filter_arp() argument 84 const struct iwl_sap_ipv4_filter *filt = &filters->ipv4_filter; in iwl_mei_rx_filter_arp() 139 const struct iwl_sap_oob_filters *filters, in iwl_mei_rx_filter_tcp_udp() argument 144 for (filt = &filters->flex_filters[0]; in iwl_mei_rx_filter_tcp_udp() 145 filt < &filters->flex_filters[0] + ARRAY_SIZE(filters->flex_filters); in iwl_mei_rx_filter_tcp_udp() [all …]
|
| /linux/tools/perf/util/ |
| H A D | bpf_lock_contention.c | 225 if (con->filters->nr_types) { in lock_contention_prepare() 227 ntypes = con->filters->nr_types; in lock_contention_prepare() 229 if (con->filters->nr_cgrps) { in lock_contention_prepare() 231 ncgrps = con->filters->nr_cgrps; in lock_contention_prepare() 234 /* resolve lock name filters to addr */ in lock_contention_prepare() 235 if (con->filters->nr_syms) { in lock_contention_prepare() 240 for (i = 0; i < con->filters->nr_syms; i++) { in lock_contention_prepare() 242 con->filters->syms[i], in lock_contention_prepare() 246 con->filters->syms[i]); in lock_contention_prepare() 250 addrs = realloc(con->filters->addrs, in lock_contention_prepare() [all …]
|
| H A D | bpf-filter.c | 5 * The BPF program is fixed and just to read filter expressions in the 'filters' 15 * To support non-root users, the filters map can be loaded and pinned in the BPF 17 * a new entry in the shared filters map to fill the filter expressions. And the 24 * event->id ---> | id | ---+ idx_hash | filters 35 * it can proceed even if a lot of non-root users are using the filters at the 36 * same time. In this case the filters map has a single entry and no need to use 37 * the hash maps to get the index (key) of the filters map (IOW it's always 0). 73 /* Index in the pinned 'filters' map. Should be released after use. */ 325 fd = get_pinned_fd("filters"); in destroy_idx_hash() 359 fd = get_pinned_fd("filters"); in create_idx_hash() [all …]
|
| /linux/drivers/net/ethernet/intel/ice/ |
| H A D | ice_fltr.c | 29 * @list: pointer to the list which contains MAC filters entry 144 * ice_fltr_add_mac_list - add list of MAC filters 146 * @list: list of filters 154 * ice_fltr_remove_mac_list - remove list of MAC filters 156 * @list: list of filters 164 * ice_fltr_add_vlan_list - add list of VLAN filters 166 * @list: list of filters 174 * ice_fltr_remove_vlan_list - remove list of VLAN filters 176 * @list: list of filters 185 * ice_fltr_add_eth_list - add list of ethertype filters [all …]
|
| /linux/tools/perf/pmu-events/arch/x86/ivytown/ |
| H A D | uncore-io.json | 97 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 107 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 117 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 127 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 147 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 157 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 167 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 177 …k, but does not include when packets are being sent from the ring stop.; Filters for the Clockwise… 197 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… 207 …k, but does not include when packets are being sent from the ring stop.; Filters for the Countercl… [all …]
|
| H A D | uncore-cache.json | 24 …filters available. Note the non-standard filtering equation. This event will count requests that… 34 …udes code, data, prefetches and hints coming from L2. This has numerous filters available. Note … 44 …udes code, data, prefetches and hints coming from L2. This has numerous filters available. Note … 54 …filters available. Note the non-standard filtering equation. This event will count requests that… 64 …udes code, data, prefetches and hints coming from L2. This has numerous filters available. Note … 254 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 264 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 274 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 284 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and … 304 …ame ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Up and Ev… [all …]
|
| /linux/tools/testing/selftests/damon/ |
| H A D | _damon_sysfs.py | 243 filters = None # owner filters variable in DamosFilter 259 return os.path.join(self.filters.sysfs_dir(), '%d' % self.idx) 298 filters = None variable in DamosFilters 301 def __init__(self, name, filters=[]): argument 303 self.filters = filters 304 for idx, filter_ in enumerate(self.filters): 306 filter_.filters = self 313 len(self.filters)) 316 for filter_ in self.filters: 396 filters = None variable in Damos [all …]
|
| /linux/tools/perf/ |
| H A D | builtin-lock.c | 64 static struct lock_filter filters; variable 993 for (i = 0; i < filters.nr_syms; i++) { in report_lock_contention_begin_event() 995 filters.syms[i], in report_lock_contention_begin_event() 999 filters.syms[i]); in report_lock_contention_begin_event() 1003 addrs = realloc(filters.addrs, in report_lock_contention_begin_event() 1004 (filters.nr_addrs + 1) * sizeof(*addrs)); in report_lock_contention_begin_event() 1010 addrs[filters.nr_addrs++] = map__unmap_ip(kmap, sym->start); in report_lock_contention_begin_event() 1011 filters.addrs = addrs; in report_lock_contention_begin_event() 1042 if (filters.nr_types) { in report_lock_contention_begin_event() 1045 for (i = 0; i < filters.nr_types; i++) { in report_lock_contention_begin_event() [all …]
|
| /linux/Documentation/networking/device_drivers/ethernet/aquantia/ |
| H A D | atlantic.rst | 256 RX flow rules (ntuple filters) 266 The driver utilizes the ethtool interface for configuring ntuple filters, 273 When disabling ntuple filters, all the user programmed filters are 274 flushed from the driver cache and hardware. All needed filters must 277 Because of the fixed order of the rules, the location of filters is also fixed: 279 - Locations 0 - 15 for VLAN ID filters 280 - Locations 16 - 31 for L2 EtherType filters 281 - Locations 32 - 39 for L3/L4 5-tuple filters (locations 32, 36 for IPv6) 284 destination TCP/UDP/SCTP port) is compared against 8 filters. For IPv4, up to 302 At the moment you can not use IPv4 and IPv6 filters at the same time. [all …]
|
| /linux/Documentation/userspace-api/ |
| H A D | seccomp_filter.rst | 2 Seccomp BPF (SECure COMPuting with filters) 18 Filter (BPF) program, as with socket filters, except that the data 27 pointers which constrains all filters to solely evaluating the system 38 choosing. Expressive, dynamic filters provide further options down this 48 ``CONFIG_HAVE_ARCH_SECCOMP_FILTER``, then filters may be added as below: 68 processes will be constrained to the same filters and system 78 additional filters may be layered on which will increase evaluation 88 filters exist, the return value for the evaluation of a given system 166 If multiple filters exist, the return value for the evaluation of a 170 multiple filters return values of the same precedence, only the [all …]
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
| H A D | tc_flower.sh | 117 check_err $? "Two filters - did not match highest priority" 123 check_err $? "Two filters - did not match lowest priority" 140 # When two filters that only differ in their priority are used, 142 # that filters are correctly spilled to C-TCAM and that the right 185 log_test "identical filters test ($tcflags)" 204 check_err $? "Two filters - did not match highest priority" 221 check_err $? "Two filters - did not match highest priority after add" 232 # number of masks has been reached filters that require new 254 err_msg="$i filters - C-TCAM spill did not happen when it was expected" 257 err_msg="$i filters - C-TCAM spill happened when it should not" [all …]
|
| /linux/tools/perf/pmu-events/arch/x86/haswellx/ |
| H A D | uncore-cache.json | 9 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 21 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 33 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 45 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 57 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 69 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 81 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 93 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 105 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 117 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' bu [all...] |
| /linux/tools/perf/pmu-events/arch/x86/broadwellx/ |
| H A D | uncore-cache.json | 9 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 21 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 33 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 45 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 57 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 69 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 81 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 93 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 105 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' but only a subset of the subevent combinations are valid. Subevents that require an opcode or NID match require the Cn_MSR_PMON_BOX_FILTER.{opc, nid} field to be set. If, for example, one wanted to count DRD Local Misses, one should select MISS_OPC_MATCH and set Cn_MSR_PMON_BOX_FILTER.opc to DRD (0x182).; Miss transactions inserted into the TOR that match an opcode.", 117 "PublicDescription": "Counts the number of entries successfully inserted into the TOR that match qualifications specified by the subevent. There are a number of subevent 'filters' bu [all...] |
| /linux/tools/testing/selftests/powerpc/pmu/sampling_tests/ |
| H A D | bhrb_filter_map_test.c | 15 * map. All the branch filters are not supported 16 * in powerpc. Supported filters in: 27 /* Valid bhrb filters in power9/power10/power11 */ 33 /* Valid bhrb filters in power10/power11 */ 51 * bhrb filters is not supported in bhrb_filter_map_test()
|
| /linux/tools/testing/selftests/seccomp/ |
| H A D | seccomp_benchmark.c | 235 ksft_print_msg("getpid RET_ALLOW 2 filters (bitmap): %llu ns\n", bitmap2); in main() 242 ksft_print_msg("getpid RET_ALLOW 3 filters (full): %llu ns\n", filter1); in main() 249 ksft_print_msg("getpid RET_ALLOW 4 filters (full): %llu ns\n", filter2); in main() 263 ESTIMATE("total seccomp overhead for 2 bitmapped filters", calc, in main() 265 ESTIMATE("total seccomp overhead for 3 full filters", calc, in main() 267 ESTIMATE("total seccomp overhead for 4 full filters", calc, in main() 273 ESTIMATE("seccomp per-filter overhead (filters / 4)", per_filter2, in main() 284 ret |= compare("per-filter (last 2 diff)", "≈", "per-filter (filters / 4)", in main() 298 ret |= compare("native + entry + (per filter * 4)", "≈", "4 filters total", in main()
|
| /linux/drivers/net/ethernet/broadcom/bnx2x/ |
| H A D | bnx2x_vfpf.c | 742 req->filters[0].flags = VFPF_Q_FILTER_DEST_MAC_VALID; in bnx2x_vfpf_config_mac() 744 req->filters[0].flags |= VFPF_Q_FILTER_SET; in bnx2x_vfpf_config_mac() 750 memcpy(req->filters[0].mac, addr, ETH_ALEN); in bnx2x_vfpf_config_mac() 777 memcpy(req->filters[0].mac, bp->dev->dev_addr, in bnx2x_vfpf_config_mac() 951 req->filters[0].flags = VFPF_Q_FILTER_VLAN_TAG_VALID; in bnx2x_vfpf_update_vlan() 954 req->filters[0].flags |= VFPF_Q_FILTER_SET; in bnx2x_vfpf_update_vlan() 965 req->filters[0].vlan_tag = vid; in bnx2x_vfpf_update_vlan() 1657 fl = kzalloc(struct_size(fl, filters, tlv->n_mac_vlan_filters), in bnx2x_vf_mbx_macvlan_list() 1663 struct vfpf_q_mac_vlan_filter *msg_filter = &tlv->filters[i]; in bnx2x_vf_mbx_macvlan_list() 1667 memset(&fl->filters[j], 0, sizeof(fl->filters[j])); in bnx2x_vf_mbx_macvlan_list() [all …]
|
| /linux/mm/damon/ |
| H A D | sysfs-schemes.c | 313 * enum damos_sysfs_filter_handle_layer - Layers handling filters of a dir. 671 * filters directory 684 struct damon_sysfs_scheme_filters *filters; in damon_sysfs_scheme_filters_alloc() local 686 filters = kzalloc(sizeof(struct damon_sysfs_scheme_filters), GFP_KERNEL); in damon_sysfs_scheme_filters_alloc() 687 if (filters) in damon_sysfs_scheme_filters_alloc() 688 filters->handle_layer = layer; in damon_sysfs_scheme_filters_alloc() 689 return filters; in damon_sysfs_scheme_filters_alloc() 693 struct damon_sysfs_scheme_filters *filters) in damon_sysfs_scheme_filters_rm_dirs() argument 695 struct damon_sysfs_scheme_filter **filters_arr = filters->filters_arr; in damon_sysfs_scheme_filters_rm_dirs() 698 for (i = 0; i < filters->nr; i++) in damon_sysfs_scheme_filters_rm_dirs() [all …]
|
| /linux/drivers/net/ethernet/sfc/ |
| H A D | mcdi_filters.h | 40 /* Per-VLAN filters information */ 64 /* AUTO_OLD is used to mark and sweep MAC filters for the device address lists. */ 82 /* filters have yet to be restored after MC reboot */ 84 /* Multicast filter chaining allows less-specific filters to receive 85 * multicast packets that matched more-specific filters. Early EF10 105 * access. When removing filters we must identify them to the
|
| /linux/tools/perf/pmu-events/arch/x86/broadwellde/ |
| H A D | uncore-cache.json | 41 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Filters for any transaction originating from the IPQ or IRQ. This does not include lookups originating from the ISMQ.", 51 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Read transactions", 61 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Qualify one of the other subevents by the Target NID. The NID is programmed in Cn_MSR_PMON_BOX_FILTER.nid. In conjunction with STATE = I, it is possible to monitor misses to specific NIDs in the system.", 71 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Read transactions", 81 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Filters for only snoop requests coming from the remote socket(s) through the IPQ.", 91 "PublicDescription": "Counts the number of times the LLC was accessed - this includes code, data, prefetches and hints coming from L2. This has numerous filters available. Note the non-standard filtering equation. This event will count requests that lookup the cache multiple times with multiple increments. One must ALWAYS set umask bit 0 and select a state or states to match. Otherwise, the event will count nothing. CBoGlCtrl[22:18] bits correspond to [FMESI] state.; Writeback transactions from L2 to the LLC This includes all write transactions -- both Cacheable and UC.", 311 "PublicDescription": "Counts the number of cycles that the AD ring is being used at this ring stop. This includes when packets are passing by and when packets are being sunk, but does not include when packets are being sent from the ring stop. We really have two rings in BDX -- a clockwise ring and a counter-clockwise ring. On the left side of the ring, the UP direction is on the clockwise ring and DN is on the counter-clockwise ring. On the right side of the ring, this is reversed. The first half of the CBos are on the left side of the ring, and the 2nd half are on the right side of the ring. In other words (for example), in a 4c part, Cbo 0 UP AD is NOT the same ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters for the Down and Even ring polarity.", 321 "PublicDescription": "Counts the number of cycles that the AD ring is being used at this ring stop. This includes when packets are passing by and when packets are being sunk, but does not include when packets are being sent from the ring stop. We really have two rings in BDX -- a clockwise ring and a counter-clockwise ring. On the left side of the ring, the UP direction is on the clockwise ring and DN is on the counter-clockwise ring. On the right side of the ring, this is reversed. The first half of the CBos are on the left side of the ring, and the 2nd half are on the right side of the ring. In other words (for example), in a 4c part, Cbo 0 UP AD is NOT the same ring as CBo 2 UP AD because they are on opposite sides of the ring.; Filters fo [all...] |
| /linux/Documentation/mm/damon/ |
| H A D | design.rst | 630 Filters subsection 641 a feature called DAMOS filters. The feature allows users to set an arbitrary 642 number of filters for each scheme. Each filter specifies 650 For efficient handling of filters, some types of filters are handled by the 653 case of the core layer-handled filters, the memory regions that excluded by the 658 When multiple filters are installed, the group of filters that handled by the 659 core layer are evaluated first. After that, the group of filters that handled 660 by the operations layer are evaluated. Filters in each of the groups are 662 filter, next filters are ignored. If the part passes through the filters 663 evaluation stage because it is not matched to any of the filters, applying the [all …]
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-kernel-mm-damon | 374 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/nr_filters 378 directories for setting filters of the scheme named '0' to 379 'N-1' under the filters/ directory. 381 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/type 390 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/memcg_path 397 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/addr_start 404 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/addr_end 411 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/min 418 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/max 425 What: /sys/kernel/mm/damon/admin/kdamonds/<K>/contexts/<C>/schemes/<S>/filters/<F>/target_idx [all …]
|
| /linux/sound/soc/meson/ |
| H A D | axg-pdm.c | 87 const struct axg_pdm_filters *filters; member 150 const struct axg_pdm_filters *filters = priv->cfg->filters; in axg_pdm_get_os() local 151 unsigned int os = filters->hcic.ds; in axg_pdm_get_os() 160 os *= filters->lpf[i].ds; in axg_pdm_get_os() 282 /* Enable the filters */ in axg_pdm_startup() 299 const struct axg_pdm_hcic *hcic = &priv->cfg->filters->hcic; in axg_pdm_set_hcic_ctrl() 317 const struct axg_pdm_lpf *lpf = &priv->cfg->filters->lpf[index]; in axg_pdm_set_lpf_ctrl() 335 const struct axg_pdm_hpf *hpf = &priv->cfg->filters->hpf; in axg_pdm_set_hpf_ctrl() 349 const struct axg_pdm_lpf *lpf = priv->cfg->filters->lpf; in axg_pdm_set_lpf_filters() 363 /* Set the tap filter values of all 3 filters */ in axg_pdm_set_lpf_filters() [all …]
|
| /linux/drivers/gpio/ |
| H A D | gpio-idio-16.h | 18 * @filters: device has input filters 27 bool filters; member
|
| /linux/Documentation/admin-guide/mm/damon/ |
| H A D | usage.rst | 86 │ │ │ │ │ │ │ :ref:`{core_,ops_,}filters <sysfs_filters>`/nr_filters 336 ``watermarks``, ``core_filters``, ``ops_filters``, ``filters``, ``dests``, 449 schemes/<N>/{core\_,ops\_,}filters/ 452 Directories for :ref:`filters <damon_design_damos_filters>` of the given 455 ``core_filters`` and ``ops_filters`` directories are for the filters handled by 456 the DAMON core layer and operations set layer, respectively. ``filters`` 457 directory can be used for installing filters regardless of their handled 458 layers. Filters that requested by ``core_filters`` and ``ops_filters`` will be 459 installed before those of ``filters``. All three directories have same files. 461 Use of ``filters`` directory can make expecting evaluation orders of given [all …]
|