| /external/linux-kselftest/tools/testing/selftests/drivers/net/mlxsw/ |
| D | vxlan.sh | 89 ip link add dev br0 type bridge mcast_snooping 0 106 ip link add dev br0 type bridge mcast_snooping 0 vlan_filtering 1 116 log_test "vxlan device with a vlan-aware bridge" 123 ip link add dev br0 type bridge 133 log_test "vxlan device with a multicast enabled bridge" 140 ip link add dev br0 type bridge mcast_snooping 0 160 ip link add dev br0 type bridge mcast_snooping 0 177 ip link add dev br0 type bridge mcast_snooping 0 194 ip link add dev br0 type bridge mcast_snooping 0 213 ip link add dev br0 type bridge mcast_snooping 0 [all …]
|
| D | q_in_q_veto.sh | 49 ip link add dev br0 type bridge vlan_filtering 1 \ 57 check_fail $? "$netdev_proto vlan upper creation on top of an $bridge_proto bridge not rejected" 62 …check_err $? "$netdev_proto vlan upper creation on top of an $bridge_proto bridge rejected without… 64 log_test "create $netdev_proto vlan upper on top $bridge_proto bridge" 89 ip link add dev br0 type bridge vlan_filtering 1 \ 97 check_fail $? "802.1ad vlan upper creation on top of a bridge port not rejected" 102 check_err $? "802.1ad vlan upper creation on top of a bridge port rejected without extack" 104 log_test "create 802.1ad vlan upper on top of a bridge port" 156 ip link add dev br0 type bridge vlan_filtering 1 \ 163 check_fail $? "vlan upper creation on top of front panel enslaved to 802.1ad bridge not rejected" [all …]
|
| D | extack.sh | 38 ip link add name br1 up type bridge vlan_filtering 0 mcast_snooping 0 49 ip link add name br2 up type bridge vlan_filtering 0 mcast_snooping 0 84 ip link add name br1 up type bridge vlan_filtering 1 mcast_snooping 0 94 bridge vlan add dev vx1 vid 1 100 bridge vlan add dev vx1 vid 1 pvid untagged 2>&1 >/dev/null \ 119 # Test with VLAN-aware bridge. 120 ip link add name br1 up type bridge vlan_filtering 1 mcast_snooping 0 128 # Test with VLAN-unaware bridge. 129 ip link set dev br1 type bridge vlan_filtering 0 135 log_test "extack - bridge creation with VXLAN" [all …]
|
| /external/iproute2/man/man8/ |
| D | bridge.8 | 1 .TH BRIDGE 8 "1 August 2012" "iproute2" "Linux" 3 bridge \- show / manipulate bridge addresses and devices 9 .B bridge 122 .B bridge 138 .B bridge 145 .B bridge 151 .B bridge 158 First failure will cause termination of bridge command. 162 Don't terminate bridge command on errors in batch mode. 170 .SH BRIDGE - COMMAND SYNTAX [all …]
|
| /external/bcc/examples/networking/vlan_filter/ |
| D | test_setup.sh | 43 # set up bridge brx and its ports 51 # set up bridge bry and its ports 69 ip netns exec netns3 bridge vlan add vid 100 tagged dev vethx 70 ip netns exec netns3 bridge vlan add vid 200 tagged dev vethx 71 ip netns exec netns3 bridge vlan del vid 1 dev vethx 72 ip netns exec netns3 bridge vlan show 76 ip netns exec netns4 bridge vlan add vid 100 tagged dev vethy 77 ip netns exec netns4 bridge vlan add vid 200 tagged dev vethy 78 ip netns exec netns4 bridge vlan del vid 1 dev vethy 79 ip netns exec netns4 bridge vlan show [all …]
|
| /external/linux-kselftest/tools/testing/selftests/drivers/net/dsa/ |
| D | bridge_vlan_mcast.sh | 40 ip link add dev br0 type bridge mcast_snooping 1 mcast_querier 1 vlan_filtering 1 52 bridge vlan add vid 10-11 dev $swp1 master 53 bridge vlan add vid 10-11 dev $swp2 master 55 ip link set dev br0 type bridge mcast_vlan_snooping 1 105 bridge -j mdb show dev br0 | 117 bridge -j mdb show dev br0 | 127 local goutput=`bridge -j vlan global show` 141 bridge vlan global set vid 10 dev br0 mcast_snooping 0 173 ip link set dev br0 type bridge mcast_stats_enabled 1 180 ip link set dev br0 type bridge mcast_stats_enabled 0 [all …]
|
| D | bridge_locked_port.sh | 35 ip link add dev br0 type bridge vlan_filtering 1 40 bridge link set dev $swp1 learning off 92 bridge link set dev $swp1 locked on 97 bridge fdb add `mac_get $h1` dev $swp1 master static 102 bridge link set dev $swp1 locked off 103 bridge fdb del `mac_get $h1` dev $swp1 master static 117 bridge vlan add vid 100 dev $swp1 118 bridge vlan add vid 100 dev $swp2 123 bridge link set dev $swp1 locked on 127 bridge fdb add `mac_get $h1` dev $swp1 vlan 100 master static [all …]
|
| /external/linux-kselftest/tools/testing/selftests/net/forwarding/ |
| D | bridge_vlan_mcast.sh | 40 ip link add dev br0 type bridge mcast_snooping 1 mcast_querier 1 vlan_filtering 1 52 bridge vlan add vid 10-11 dev $swp1 master 53 bridge vlan add vid 10-11 dev $swp2 master 55 ip link set dev br0 type bridge mcast_vlan_snooping 1 105 bridge -j mdb show dev br0 | 117 bridge -j mdb show dev br0 | 127 local goutput=`bridge -j vlan global show` 141 bridge vlan global set vid 10 dev br0 mcast_snooping 0 173 ip link set dev br0 type bridge mcast_stats_enabled 1 180 ip link set dev br0 type bridge mcast_stats_enabled 0 [all …]
|
| D | bridge_locked_port.sh | 35 ip link add dev br0 type bridge vlan_filtering 1 40 bridge link set dev $swp1 learning off 92 bridge link set dev $swp1 locked on 97 bridge fdb add `mac_get $h1` dev $swp1 master static 102 bridge link set dev $swp1 locked off 103 bridge fdb del `mac_get $h1` dev $swp1 master static 117 bridge vlan add vid 100 dev $swp1 118 bridge vlan add vid 100 dev $swp2 123 bridge link set dev $swp1 locked on 127 bridge fdb add `mac_get $h1` dev $swp1 vlan 100 master static [all …]
|
| D | vxlan_bridge_1q.sh | 154 ip link add name br1 type bridge vlan_filtering 1 vlan_default_pvid 0 \ 156 # Make sure the bridge uses the MAC address of the local port and not 170 bridge vlan add vid 10 dev vx10 pvid untagged 178 bridge vlan add vid 20 dev vx20 pvid untagged 182 bridge vlan add vid 10 dev $swp1 183 bridge vlan add vid 20 dev $swp1 187 bridge vlan add vid 10 dev $swp2 188 bridge vlan add vid 20 dev $swp2 190 bridge fdb append dev vx10 00:00:00:00:00:00 dst 192.0.2.34 self 191 bridge fdb append dev vx10 00:00:00:00:00:00 dst 192.0.2.50 self [all …]
|
| D | vxlan_bridge_1q_ipv6.sh | 167 ip link add name br1 type bridge vlan_filtering 1 vlan_default_pvid 0 \ 169 # Make sure the bridge uses the MAC address of the local port and not 184 bridge vlan add vid 10 dev vx10 pvid untagged 192 bridge vlan add vid 20 dev vx20 pvid untagged 197 bridge vlan add vid 10 dev $swp1 198 bridge vlan add vid 20 dev $swp1 202 bridge vlan add vid 10 dev $swp2 203 bridge vlan add vid 20 dev $swp2 205 bridge fdb append dev vx10 00:00:00:00:00:00 dst 2001:db8:4::1 self 206 bridge fdb append dev vx10 00:00:00:00:00:00 dst 2001:db8:5::1 self [all …]
|
| D | bridge_vlan_aware.sh | 31 ip link add dev br0 type bridge \ 102 # Test that the deletion of a VLAN on a bridge port does not affect 104 log_info "Add and delete a VLAN on bridge port $swp1" 106 bridge vlan add vid 10 dev $swp1 107 bridge vlan del vid 10 dev $swp1 121 bridge fdb add de:ad:be:ef:13:37 dev $swp1 master extern_learn vlan 1 123 bridge fdb show brport $swp1 | grep -q de:ad:be:ef:13:37 131 bridge fdb show brport $swp1 | grep -q de:ad:be:ef:13:37 136 bridge fdb show brport $swp2 | grep -q de:ad:be:ef:13:37 141 bridge fdb del de:ad:be:ef:13:37 dev $swp2 master vlan 1 &> /dev/null [all …]
|
| /external/sl4a/ScriptingLayerForAndroid/src/org/connectbot/ |
| D | TerminalView.java | 48 public final TerminalBridge bridge; field in TerminalView 63 public TerminalView(Context context, TerminalBridge bridge) { in TerminalView() argument 67 this.bridge = bridge; in TerminalView() 75 cursorPaint.setColor(bridge.getForegroundColor()); in TerminalView() 76 cursorPaint.setXfermode(new PixelXorXfermode(bridge.getBackgroundColor())); in TerminalView() 108 bridge.addFontSizeChangedListener(this); in TerminalView() 110 // connect our view up to the bridge in TerminalView() 111 setOnKeyListener(bridge.getKeyHandler()); in TerminalView() 115 // tell bridge to destroy its bitmap in destroy() 116 bridge.parentDestroyed(); in destroy() [all …]
|
| D | ConsoleActivity.java | 160 "We couldnt find an existing bridge with id = %d, so creating one now", processID)); 163 Log.e("Problem while trying to create new requested bridge", e); 168 for (TerminalBridge bridge : manager.getBridgeList()) { 170 final int currentIndex = addNewTerminalView(bridge); 172 // check to see if this bridge was requested 173 if (bridge == requestedBridge) { 200 TerminalBridge bridge = (TerminalBridge) msg.obj; 201 closeBridge(bridge); 206 * @param bridge 208 private void closeBridge(final TerminalBridge bridge) { in closeBridge() argument [all …]
|
| /external/tensorflow/tensorflow/compiler/tf2xla/ |
| D | mlir_bridge_pass.cc | 23 #include "tensorflow/compiler/mlir/tensorflow/transforms/bridge.h" 40 "Tracks usage of the MLIR-based TF2XLA bridge among TF1 models"); 43 "Tracks usage of the MLIR-based TF2XLA bridge among TF2 models"); 61 // device type is not set by default before bridge, only if eager context in HasTPUOp() 72 // markers is expanded beyond bridge we can remove this check for in HasTPUOp() 157 // function_library_definition to determine whether the MLIR Bridge should be 160 // If the user explicitly requests the bridge be enabled or disabled, this 162 // enabled or disabled, it will decide whether or not to run the bridge. 170 // Skip MLIR TF XLA Bridge if no TPU devices found and the non TPU graph is in GetPassState() 178 // phase of the bridge is not affected by uninitialized resource args. in GetPassState() [all …]
|
| /external/tcpdump/tests/ |
| D | rstp-v.out | 1 …1 11:50:35.352170 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 4 …2 11:50:37.214151 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 7 …3 11:50:39.227534 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 10 …4 11:50:41.240343 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 13 …5 11:50:43.253615 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 16 …6 11:50:45.266889 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 19 …7 11:50:47.280508 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 22 …8 11:50:49.293428 STP 802.1w, Rapid STP, Flags [Proposal], bridge-id 8001.00:19:06:ea:b8:80.800c,… 25 …9 11:50:51.306707 STP 802.1w, Rapid STP, Flags [Proposal, Learn], bridge-id 8001.00:19:06:ea:b8:8… 28 …10 11:50:53.320006 STP 802.1w, Rapid STP, Flags [Proposal, Learn], bridge-id 8001.00:19:06:ea:b8:… [all …]
|
| D | mstp-v.out | 7 CIST bridge-id 8000.00:1e:f7:05:a8:80, CIST remaining-hops 20 10 MSTI bridge-prio 6, port-prio 8, hops 20 13 MSTI bridge-prio 8, port-prio 8, hops 20 20 CIST bridge-id 8000.00:16:46:b5:8c:80, CIST remaining-hops 20 23 MSTI bridge-prio 8, port-prio 8, hops 20 26 MSTI bridge-prio 8, port-prio 8, hops 20 33 CIST bridge-id 8000.00:1e:f7:05:a8:80, CIST remaining-hops 20 36 MSTI bridge-prio 6, port-prio 8, hops 20 39 MSTI bridge-prio 8, port-prio 8, hops 20 46 CIST bridge-id 8000.00:16:46:b5:8c:80, CIST remaining-hops 20 [all …]
|
| D | spb_bpduv4-v.out | 7 CIST bridge-id 8000.52:54:00:45:5f:15, CIST remaining-hops 20 10 MSTI bridge-prio 8, port-prio 8, hops 20 22 CIST bridge-id 8000.52:54:00:45:5f:15, CIST remaining-hops 20 25 MSTI bridge-prio 8, port-prio 8, hops 20 37 CIST bridge-id 8000.52:54:00:45:5f:15, CIST remaining-hops 20 40 MSTI bridge-prio 8, port-prio 8, hops 20 52 CIST bridge-id 8000.52:54:00:45:5f:15, CIST remaining-hops 20 55 MSTI bridge-prio 8, port-prio 8, hops 20 67 CIST bridge-id 8000.52:54:00:45:5f:15, CIST remaining-hops 20 70 MSTI bridge-prio 8, port-prio 8, hops 20 [all …]
|
| D | stp-v.out | 1 …1 11:44:05.787073 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 4 …2 11:44:07.794807 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 7 …3 11:44:09.797264 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 10 …4 11:44:11.802411 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 13 …5 11:44:13.807350 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 16 …6 11:44:15.812636 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 19 …7 11:44:17.820778 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 22 …8 11:44:19.822950 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 25 …9 11:44:21.828161 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, length… 28 …10 11:44:23.832784 STP 802.1d, Config, Flags [none], bridge-id 8001.00:19:06:ea:b8:80.8005, lengt… [all …]
|
| /external/toybox/toys/pending/ |
| D | brctl.c | 1 /* brctl.c - ethernet bridge control 14 usage: brctl COMMAND [BRIDGE [INTERFACE]] 20 addbr BRIDGE Create BRIDGE 21 delbr BRIDGE Delete BRIDGE 22 addif BRIDGE IFACE Add IFACE to BRIDGE 23 delif BRIDGE IFACE Delete IFACE from BRIDGE 24 setageing BRIDGE TIME Set ageing time 25 setfd BRIDGE TIME Set bridge forward delay 26 sethello BRIDGE TIME Set hello time 27 setmaxage BRIDGE TIME Set max message age [all …]
|
| /external/tensorflow/tensorflow/compiler/mlir/tf2xla/ |
| D | mlir_bridge_rollout_policy.h | 27 // The MLIR bridge is explicitly disabled by the user and must not be run. 29 // The MLIR bridge is explicitly enabled by the user and must be run. If the 30 // MLIR bridge errors, the fallback path should NOT be used. 32 // The bridge was not explicitly enabled or disabled by the user. Based on the 33 // features in the model, the MLIR bridge should not be run. 35 // The bridge was not explicitly enabled or disabled by the user. Based on the 36 // features in the model, the MLIR bridge should be run. If the MLIR Bridge 39 // The bridge was fallback enabled in a safe mode and passed all graph 45 // returns true when the MLIR Bridge should be run. 47 // If the user explicitly requests the bridge be enabled or disabled, this [all …]
|
| /external/libnl/lib/route/link/ |
| D | bridge.c | 8 * @defgroup bridge Bridging 21 #include <netlink/route/link/bridge.h> 99 APPBUG("A function was expecting a link object of type bridge."); \ 552 nl_dump_line(p, " bridge: "); in bridge_dump_details() 614 * Allocate link object of type bridge 625 if (rtnl_link_set_type(link, "bridge") < 0) { in rtnl_link_bridge_alloc() 634 * Create a new kernel bridge device 636 * @arg name name of the bridge device or NULL 638 * Creates a new bridge device in the kernel. If no name is 662 * Check if a link is a bridge [all …]
|
| /external/rust/cxx/book/src/ |
| D | extern-rust.md | 5 #[cxx::bridge] 13 The `extern "Rust"` section of a CXX bridge declares Rust types and signatures 18 has the same path as the Rust source file containing the bridge, except with a 21 A bridge module may contain zero or more extern "Rust" blocks. 29 # #[cxx::bridge] 41 later passed a `&mut MultiBuf` back across the bridge to Rust. 48 module, the parent module of the CXX bridge. You can think of an opaque type `T` 60 crate that contains the bridge using them. This restriction may be lifted in the 63 The bridge's parent module will contain the appropriate imports or definitions 73 # #[cxx::bridge] [all …]
|
| /external/trusty/arm-trusted-firmware/plat/intel/soc/common/soc/ |
| D | socfpga_reset_manager.c | 273 /* Reset s2f bridge */ in socfpga_bridges_reset() 277 /* Request handshake with SOC2FPGA bridge to clear traffic */ in socfpga_bridges_reset() 281 /* Wait for bridge to idle status */ in socfpga_bridges_reset() 288 /* Request handshake with LWSOC2FPGA bridge to clear traffic */ in socfpga_bridges_reset() 292 /* Wait for bridge to idle status */ in socfpga_bridges_reset() 299 ERROR("S2F Bridge reset: Timeout waiting for idle ack\n"); in socfpga_bridges_reset() 303 /* Assert reset to bridge */ in socfpga_bridges_reset() 307 /* Clear idle requests to bridge */ in socfpga_bridges_reset() 322 /* Reset f2s bridge */ in socfpga_bridges_reset() 340 ERROR("F2S Bridge disable: Timeout waiting for idle req\n"); in socfpga_bridges_reset() [all …]
|
| /external/iptables/extensions/ |
| D | libebt_ip6.txlate | 2 nft 'add rule bridge filter FORWARD ip6 saddr != dead::/64 counter accept' 5 nft 'add rule bridge filter FORWARD ip6 daddr != dead:beef::/64 counter accept' 8 nft 'insert rule bridge filter FORWARD ip6 daddr f00:ba:: counter' 11 nft 'insert rule bridge filter OUTPUT oifname "eth0" ip6 dscp 0x3f counter' 14 nft 'add rule bridge filter FORWARD ether type ip6 tcp dport 22 counter' 17 nft 'add rule bridge filter FORWARD ether type ip6 udp sport 1024-65535 counter' 20 nft 'add rule bridge filter FORWARD ether type ip6 meta l4proto 253 counter' 23 nft 'add rule bridge filter FORWARD icmpv6 type 128 counter' 26 nft 'add rule bridge filter FORWARD icmpv6 type 1 icmpv6 code 1 counter' 29 nft 'add rule bridge filter FORWARD icmpv6 type != 1-10 counter'
|