| /linux/kernel/ |
| H A D | seccomp.c | 278 static int seccomp_check_filter(struct sock_filter *filter, unsigned int flen) in seccomp_check_filter() argument 282 struct sock_filter *ftest = &filter[pc]; in seccomp_check_filter() 410 READ_ONCE(current->seccomp.filter); in seccomp_run_filters() 509 is_ancestor(thread->seccomp.filter, in seccomp_can_sync_threads() 510 caller->seccomp.filter))) in seccomp_can_sync_threads() 524 static inline void seccomp_filter_free(struct seccomp_filter *filter) in seccomp_filter_free() argument 526 if (filter) { in seccomp_filter_free() 527 bpf_prog_destroy(filter->prog); in seccomp_filter_free() 528 kfree(filter); in seccomp_filter_free() 577 if (READ_ONCE(tsk->seccomp.filter) == NULL) in seccomp_filter_release() [all …]
|
| /linux/drivers/infiniband/hw/usnic/ |
| H A D | usnic_fwd.h | 91 usnic_fwd_alloc_flow(struct usnic_fwd_dev *ufdev, struct filter *filter, 97 static inline void usnic_fwd_init_usnic_filter(struct filter *filter, in usnic_fwd_init_usnic_filter() argument 100 filter->type = FILTER_USNIC_ID; in usnic_fwd_init_usnic_filter() 101 filter->u.usnic.ethtype = ETH_P_IBOE; in usnic_fwd_init_usnic_filter() 102 filter->u.usnic.flags = FILTER_FIELD_USNIC_ETHTYPE | in usnic_fwd_init_usnic_filter() 105 filter->u.usnic.proto_version = (USNIC_ROCE_GRH_VER << in usnic_fwd_init_usnic_filter() 108 filter->u.usnic.usnic_id = usnic_id; in usnic_fwd_init_usnic_filter() 111 static inline void usnic_fwd_init_udp_filter(struct filter *filter, in usnic_fwd_init_udp_filter() argument 114 filter->type = FILTER_IPV4_5TUPLE; in usnic_fwd_init_udp_filter() 115 filter->u.ipv4.flags = FILTER_FIELD_5TUP_PROTO; in usnic_fwd_init_udp_filter() [all …]
|
| H A D | usnic_fwd.c | 160 struct filter *filter) in validate_filter_locked() argument 165 if (filter->type == FILTER_IPV4_5TUPLE) { in validate_filter_locked() 166 if (!(filter->u.ipv4.flags & FILTER_FIELD_5TUP_DST_AD)) in validate_filter_locked() 168 if (!(filter->u.ipv4.flags & FILTER_FIELD_5TUP_DST_PT)) in validate_filter_locked() 172 else if (filter->u.ipv4.dst_port == 0) in validate_filter_locked() 174 else if (ntohl(ufdev->inaddr) != filter->u.ipv4.dst_addr) in validate_filter_locked() 183 static void fill_tlv(struct filter_tlv *tlv, struct filter *filter, in fill_tlv() argument 187 tlv->length = sizeof(struct filter); in fill_tlv() 188 *((struct filter *)&tlv->val) = *filter; in fill_tlv() 191 sizeof(struct filter)); in fill_tlv() [all …]
|
| /linux/tools/testing/selftests/net/forwarding/ |
| H A D | tc_flower.sh | 44 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 46 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 58 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 59 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 70 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 72 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 84 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 85 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 94 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 96 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ [all …]
|
| H A D | tc_actions.sh | 66 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 75 tc filter add dev $swp1 ingress protocol $protocol pref 1 handle 101 \ 85 tc filter del dev $swp1 ingress protocol $protocol pref 1 handle 101 \ 87 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 96 tc filter add dev $swp1 ingress protocol ip pref 2 handle 102 flower \ 105 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 117 tc filter del dev $swp1 ingress protocol ip pref 2 handle 102 flower 118 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 131 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 133 tc filter add dev $swp1 ingress protocol ip pref 3 handle 103 flower \ [all …]
|
| H A D | router_multicast.sh | 217 tc filter add dev $h2 ingress protocol ip pref 1 handle 122 flower \ 219 tc filter add dev $h3 ingress protocol ip pref 1 handle 133 flower \ 243 tc filter del dev $h3 ingress protocol ip pref 1 handle 133 flower 244 tc filter del dev $h2 ingress protocol ip pref 1 handle 122 flower 257 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 122 flower \ 259 tc filter add dev $h3 ingress protocol ipv6 pref 1 handle 133 flower \ 283 tc filter del dev $h3 ingress protocol ipv6 pref 1 handle 133 flower 284 tc filter del dev $h2 ingress protocol ipv6 pref 1 handle 122 flower 300 tc filter add dev $h1 ingress protocol ip pref 1 handle 1 flower \ 302 tc filter add dev $h2 ingress protocol ip pref 1 handle 1 flower \ [all …]
|
| H A D | tc_chains.sh | 38 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 47 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 57 tc filter add dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 59 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 61 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 76 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 77 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 78 tc filter del dev $h2 ingress chain 1 protocol ip pref 1 handle 1101 \ 133 tc filter add dev $h2 ingress protocol ip pref 1 handle 1101 \ 137 tc filter add dev $h2 ingress protocol ip pref 1 handle 1102 \ [all …]
|
| /linux/drivers/net/ethernet/mscc/ |
| H A D | ocelot_mrp.c | 39 struct ocelot_vcap_filter *filter; in ocelot_mrp_del_vcap() local 42 filter = ocelot_vcap_block_find_filter_by_id(block_vcap_is2, id, in ocelot_mrp_del_vcap() 44 if (!filter) in ocelot_mrp_del_vcap() 47 return ocelot_vcap_filter_del(ocelot, filter); in ocelot_mrp_del_vcap() 54 struct ocelot_vcap_filter *filter; in ocelot_mrp_redirect_add_vcap() local 57 filter = kzalloc(sizeof(*filter), GFP_KERNEL); in ocelot_mrp_redirect_add_vcap() 58 if (!filter) in ocelot_mrp_redirect_add_vcap() 61 filter->key_type = OCELOT_VCAP_KEY_ETYPE; in ocelot_mrp_redirect_add_vcap() 62 filter->prio = 1; in ocelot_mrp_redirect_add_vcap() 63 filter->id.cookie = OCELOT_VCAP_IS2_MRP_REDIRECT(ocelot, src_port); in ocelot_mrp_redirect_add_vcap() [all …]
|
| H A D | ocelot_vcap.c | 331 struct ocelot_vcap_filter *filter) in is2_action_set() argument 334 struct ocelot_vcap_action *a = &filter->action; in is2_action_set() 346 struct ocelot_vcap_filter *filter) in is2_entry_set() argument 349 struct ocelot_vcap_key_vlan *tag = &filter->vlan; in is2_entry_set() 366 if (filter->prio != 0) in is2_entry_set() 371 vcap_key_set(vcap, &data, VCAP_IS2_HK_PAG, filter->pag, 0xff); in is2_entry_set() 373 (filter->lookup == 0) ? OCELOT_VCAP_BIT_1 : in is2_entry_set() 376 ~filter->ingress_port_mask); in is2_entry_set() 379 vcap_key_bit_set(vcap, &data, VCAP_IS2_HK_L2_MC, filter->dmac_mc); in is2_entry_set() 380 vcap_key_bit_set(vcap, &data, VCAP_IS2_HK_L2_BC, filter->dmac_bc); in is2_entry_set() [all …]
|
| /linux/tools/perf/util/ |
| H A D | strfilter.c | 30 void strfilter__delete(struct strfilter *filter) in strfilter__delete() argument 32 if (filter) { in strfilter__delete() 33 strfilter_node__delete(filter->root); in strfilter__delete() 34 free(filter); in strfilter__delete() 162 struct strfilter *filter = zalloc(sizeof(*filter)); in strfilter__new() local 165 if (filter) in strfilter__new() 166 filter->root = strfilter_node__new(rules, &ep); in strfilter__new() 168 if (!filter || !filter->root || *ep != '\0') { in strfilter__new() 171 strfilter__delete(filter); in strfilter__new() 172 filter = NULL; in strfilter__new() [all …]
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/ |
| H A D | tc_restrictions.sh | 47 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 59 tc filter del block 22 protocol ip pref 1 handle 101 flower 64 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 73 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 77 tc filter del block 22 protocol ip pref 1 handle 101 flower 95 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 108 tc filter del block 22 protocol ip pref 1 handle 101 flower 113 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 123 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 130 tc filter add block 22 protocol ip pref 1 handle 101 flower \ [all …]
|
| /linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
| H A D | tc_flower.sh | 101 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 110 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 125 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 133 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 147 tc filter add dev $h2 ingress protocol ip pref 1 handle 101 flower \ 149 tc filter add dev $h2 ingress protocol ip pref 2 handle 102 flower \ 158 tc filter del dev $h2 ingress protocol ip pref 1 handle 101 flower 166 tc filter add dev $h2 ingress protocol ip pref 3 handle 103 flower \ 175 tc filter del dev $h2 ingress protocol ip pref 2 handle 102 flower 183 tc filter del dev $h2 ingress protocol ip pref 3 handle 103 flower [all …]
|
| /linux/tools/testing/selftests/landlock/ |
| H A D | audit.h | 142 const struct audit_filter *const filter, in audit_filter_exe() argument 148 NLMSG_ALIGN(filter->exe_len), in audit_filter_exe() 156 .fields[0] = filter->record_type, in audit_filter_exe() 158 .values[0] = filter->exe_len, in audit_filter_exe() 159 .buflen = filter->exe_len, in audit_filter_exe() 163 if (filter->record_type != AUDIT_EXE) in audit_filter_exe() 166 memcpy(msg.rule.buf, filter->exe, filter->exe_len); in audit_filter_exe() 397 static int audit_init_filter_exe(struct audit_filter *filter, const char *path) in audit_init_filter_exe() argument 402 filter->record_type = AUDIT_EXE; in audit_init_filter_exe() 404 int ret = readlink("/proc/self/exe", filter->exe, in audit_init_filter_exe() [all …]
|
| /linux/kernel/trace/ |
| H A D | trace_events_filter.c | 1171 int filter_match_preds(struct event_filter *filter, void *rec) in filter_match_preds() argument 1177 if (!filter) in filter_match_preds() 1181 prog = rcu_dereference_raw(filter->prog); in filter_match_preds() 1195 static void remove_filter_string(struct event_filter *filter) in remove_filter_string() argument 1197 if (!filter) in remove_filter_string() 1200 kfree(filter->filter_string); in remove_filter_string() 1201 filter->filter_string = NULL; in remove_filter_string() 1206 struct event_filter *filter) in append_filter_err() argument 1213 if (WARN_ON(!filter->filter_string)) in append_filter_err() 1221 len = strlen(filter->filter_string); in append_filter_err() [all …]
|
| /linux/drivers/hid/ |
| H A D | hid-uclogic-core-test.c | 67 struct uclogic_raw_event_hook *filter; in hid_test_uclogic_exec_event_hook_test() local 77 filter = kunit_kzalloc(test, sizeof(*filter), GFP_KERNEL); in hid_test_uclogic_exec_event_hook_test() 78 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, filter); in hid_test_uclogic_exec_event_hook_test() 80 filter->size = hook_events[n].size; in hid_test_uclogic_exec_event_hook_test() 81 filter->event = kunit_kzalloc(test, filter->size, GFP_KERNEL); in hid_test_uclogic_exec_event_hook_test() 82 KUNIT_ASSERT_NOT_ERR_OR_NULL(test, filter->event); in hid_test_uclogic_exec_event_hook_test() 83 memcpy(filter->event, &hook_events[n].event[0], filter->size); in hid_test_uclogic_exec_event_hook_test() 85 INIT_WORK(&filter->work, fake_work); in hid_test_uclogic_exec_event_hook_test() 87 list_add_tail(&filter->list, &p.event_hooks->list); in hid_test_uclogic_exec_event_hook_test()
|
| /linux/lib/kunit/ |
| H A D | attributes.c | 40 int (*filter)(void *attr, const char *input, int *err); member 256 .filter = attr_speed_filter, 264 .filter = attr_string_filter, 272 .filter = attr_bool_filter, 280 const char *kunit_attr_filter_name(struct kunit_attr_filter filter) in kunit_attr_filter_name() argument 282 return filter.attr->name; in kunit_attr_filter_name() 338 struct kunit_attr_filter filter = {}; in kunit_next_attr_filter() local 359 return filter; in kunit_next_attr_filter() 380 filter.attr = &kunit_attr_list[attr_index]; in kunit_next_attr_filter() 385 filter.input = input + op_index; in kunit_next_attr_filter() [all …]
|
| H A D | executor_test.c | 28 struct kunit_glob_filter filter = {NULL, NULL}; in parse_filter_test() local 30 kunit_parse_glob_filter(&filter, "suite"); in parse_filter_test() 31 KUNIT_EXPECT_STREQ(test, filter.suite_glob, "suite"); in parse_filter_test() 32 KUNIT_EXPECT_FALSE(test, filter.test_glob); in parse_filter_test() 33 kfree(filter.suite_glob); in parse_filter_test() 34 kfree(filter.test_glob); in parse_filter_test() 36 kunit_parse_glob_filter(&filter, "suite.test"); in parse_filter_test() 37 KUNIT_EXPECT_STREQ(test, filter.suite_glob, "suite"); in parse_filter_test() 38 KUNIT_EXPECT_STREQ(test, filter.test_glob, "test"); in parse_filter_test() 39 kfree(filter.suite_glob); in parse_filter_test() [all …]
|
| /linux/arch/x86/kvm/ |
| H A D | pmu.c | 471 static bool is_fixed_event_allowed(struct kvm_x86_pmu_event_filter *filter, in is_fixed_event_allowed() argument 476 if (filter->action == KVM_PMU_EVENT_DENY && in is_fixed_event_allowed() 477 test_bit(fixed_idx, (ulong *)&filter->fixed_counter_bitmap)) in is_fixed_event_allowed() 479 if (filter->action == KVM_PMU_EVENT_ALLOW && in is_fixed_event_allowed() 480 !test_bit(fixed_idx, (ulong *)&filter->fixed_counter_bitmap)) in is_fixed_event_allowed() 488 struct kvm_x86_pmu_event_filter *filter; in pmc_is_event_allowed() local 491 filter = srcu_dereference(kvm->arch.pmu_event_filter, &kvm->srcu); in pmc_is_event_allowed() 492 if (!filter) in pmc_is_event_allowed() 496 return is_gp_event_allowed(filter, pmc->eventsel); in pmc_is_event_allowed() 498 return is_fixed_event_allowed(filter, pmc->idx); in pmc_is_event_allowed() [all …]
|
| /linux/tools/perf/tests/shell/ |
| H A D | record_bpf_filter.sh | 25 if ! perf record -e task-clock --filter 'period > 1' \ 44 if ! perf record -e task-clock -c 10000 --filter 'ip < 0xffffffff00000000' \ 70 if ! perf record -e task-clock --filter 'cpu > 0' \ 78 if ! perf record --sample-cpu -e task-clock --filter 'cpu > 0' \ 92 if ! perf record -e task-clock --filter 'period > 1000, ip > 0' \ 100 if ! perf record -e task-clock --filter 'period > 1000 , cpu > 0 || ip > 0' \ 108 if ! perf record -e task-clock --filter 'period > 0 || code_pgsz > 4096' \ 122 if ! perf record -e task-clock --filter 'period > 100000' \ 123 -e page-faults --filter 'ip < 0xffffffff00000000' \ 153 if ! perf record -e task-clock --filter 'cgroup == /' \ [all …]
|
| /linux/tools/tracing/rtla/src/ |
| H A D | trace.c | 262 if (free_event->filter) in trace_events_free() 263 free(free_event->filter); in trace_events_free() 300 int trace_event_add_filter(struct trace_events *event, char *filter) in trace_event_add_filter() argument 302 if (event->filter) in trace_event_add_filter() 303 free(event->filter); in trace_event_add_filter() 305 event->filter = strdup(filter); in trace_event_add_filter() 306 if (!event->filter) in trace_event_add_filter() 333 char filter[1024]; in trace_event_disable_filter() local 336 if (!tevent->filter) in trace_event_disable_filter() 343 tevent->event ? : "*", tevent->filter); in trace_event_disable_filter() [all …]
|
| /linux/samples/seccomp/ |
| H A D | bpf-helper.c | 20 struct sock_filter *filter, size_t count) in bpf_resolve_jumps() argument 32 struct sock_filter *instr = &filter[offset]; in bpf_resolve_jumps() 90 void seccomp_bpf_print(struct sock_filter *filter, size_t count) in seccomp_bpf_print() argument 92 struct sock_filter *end = filter + count; in seccomp_bpf_print() 93 for ( ; filter < end; ++filter) in seccomp_bpf_print() 95 filter->code, filter->jt, filter->jf, filter->k); in seccomp_bpf_print()
|
| /linux/net/netfilter/ |
| H A D | xt_bpf.c | 33 program.filter = insns; in __bpf_mt_check_bytecode() 70 &info->filter); in bpf_mt_check() 80 &info->filter); in bpf_mt_check_v1() 82 return __bpf_mt_check_fd(info->fd, &info->filter); in bpf_mt_check_v1() 84 return __bpf_mt_check_path(info->path, &info->filter); in bpf_mt_check_v1() 93 return bpf_prog_run(info->filter, skb); in bpf_mt() 100 return !!bpf_prog_run_save_cb(info->filter, (struct sk_buff *) skb); in bpf_mt_v1() 107 bpf_prog_destroy(info->filter); in bpf_mt_destroy() 114 bpf_prog_destroy(info->filter); in bpf_mt_destroy_v1() 126 .usersize = offsetof(struct xt_bpf_info, filter), [all …]
|
| /linux/arch/x86/entry/vdso/ |
| H A D | Makefile | 55 $(filter -g%,$(KBUILD_CFLAGS)) -fno-stack-protector \ 65 $(vobjs): KBUILD_CFLAGS := $(filter-out $(PADDING_CFLAGS) $(CC_FLAGS_LTO) $(CC_FLAGS_CFI) $(RANDSTR… 117 KBUILD_AFLAGS_32 := $(filter-out -m64,$(KBUILD_AFLAGS)) -DBUILD_VDSO 121 KBUILD_CFLAGS_32 := $(filter-out -m64,$(KBUILD_CFLAGS)) 122 KBUILD_CFLAGS_32 := $(filter-out -mcmodel=kernel,$(KBUILD_CFLAGS_32)) 123 KBUILD_CFLAGS_32 := $(filter-out -fno-pic,$(KBUILD_CFLAGS_32)) 124 KBUILD_CFLAGS_32 := $(filter-out -mfentry,$(KBUILD_CFLAGS_32)) 125 KBUILD_CFLAGS_32 := $(filter-out $(RANDSTRUCT_CFLAGS),$(KBUILD_CFLAGS_32)) 126 KBUILD_CFLAGS_32 := $(filter-out $(KSTACK_ERASE_CFLAGS),$(KBUILD_CFLAGS_32)) 127 KBUILD_CFLAGS_32 := $(filter-out $(GCC_PLUGINS_CFLAGS),$(KBUILD_CFLAGS_32)) [all …]
|
| /linux/tools/testing/selftests/net/netfilter/ |
| H A D | nft_nat.sh | 69 ip netns exec "$ns" nft list counter inet filter "$counter" 1>&2 77 if ! ip netns exec "$ns" nft list counter inet filter ns0in | grep -q "packets 1 bytes 84";then 82 if ! ip netns exec "$ns" nft list counter inet filter ns0out | grep -q "packets 1 bytes 84";then 88 if ! ip netns exec "$ns" nft list counter inet filter ns0in6 | grep -q "$expect";then 92 if ! ip netns exec "$ns" nft list counter inet filter ns0out6 | grep -q "$expect";then 105 if ! ip netns exec "$ns0" nft list counter inet filter ns0in | grep -q "packets 0 bytes 0";then 110 if ! ip netns exec "$ns0" nft list counter inet filter ns0in6 | grep -q "packets 0 bytes 0";then 115 if ! ip netns exec "$ns0" nft list counter inet filter ns0out | grep -q "packets 0 bytes 0";then 119 if ! ip netns exec "$ns0" nft list counter inet filter ns0out6 | grep -q "packets 0 bytes 0";then 126 if ! ip netns exec "$ns0" nft list counter inet filter " [all...] |
| /linux/net/sched/ |
| H A D | act_bpf.c | 26 struct bpf_prog *filter; member 41 struct bpf_prog *filter; in tcf_bpf_act() local 47 filter = rcu_dereference(prog->filter); in tcf_bpf_act() 50 filter_res = bpf_prog_run_data_pointers(filter, skb); in tcf_bpf_act() 53 filter_res = bpf_prog_run_data_pointers(filter, skb); in tcf_bpf_act() 124 if (nla_put_u32(skb, TCA_ACT_BPF_ID, prog->filter->aux->id)) in tcf_bpf_dump_ebpf_info() 127 nla = nla_reserve(skb, TCA_ACT_BPF_TAG, sizeof(prog->filter->tag)); in tcf_bpf_dump_ebpf_info() 131 memcpy(nla_data(nla), prog->filter->tag, nla_len(nla)); in tcf_bpf_dump_ebpf_info() 206 fprog_tmp.filter = bpf_ops; in tcf_bpf_init_from_ops() 216 cfg->filter = fp; in tcf_bpf_init_from_ops() [all …]
|