/tools/testing/selftests/netfilter/ |
D | nft_queue.sh | 97 type filter hook prerouting priority $prio; policy accept; 101 type filter hook input priority $prio; policy accept; 105 type filter hook forward priority $prio; policy accept; 110 type filter hook output priority $prio; policy accept; 115 type filter hook postrouting priority $prio; policy accept; 128 type filter hook prerouting priority $prio; policy accept; 132 type filter hook input priority $prio; policy accept; 136 type filter hook forward priority $prio; policy accept; 140 type filter hook output priority $prio; policy accept; 144 type filter hook postrouting priority $prio; policy accept; [all …]
|
D | conntrack_vrf.sh | 111 type filter hook prerouting priority raw; 121 type filter hook output priority raw; 165 type filter hook output priority raw; 170 type filter hook postrouting priority mangle; 175 type nat hook postrouting priority 0; 214 type nat hook postrouting priority 0;
|
D | conntrack_icmp_related.sh | 137 type filter hook forward priority 0; policy accept; 154 type filter hook input priority 0; policy accept; 174 type filter hook input priority 0; policy accept; 182 type filter hook output priority 0; policy accept; 199 type nat hook postrouting priority 0; policy accept; 205 type nat hook postrouting priority 0; policy accept;
|
D | nft_nat.sh | 187 type nat hook output priority 0; policy accept; 262 type nat hook output priority 0; policy accept; 388 type nat hook output priority 0; policy accept; 455 type nat hook postrouting priority 0; policy accept; 556 type nat hook postrouting priority 0; policy accept; 655 type nat hook prerouting priority 0; policy accept; 737 type nat hook prerouting priority 0; policy accept; 840 type filter hook forward priority 0; policy accept; 858 type filter hook prerouting priority -300; policy accept; 863 type filter hook output priority -300; policy accept; [all …]
|
D | nft_flowtable.sh | 164 hook ingress priority 0 169 type filter hook forward priority 0; policy drop; 345 type nat hook prerouting priority 0; policy accept; 350 type nat hook postrouting priority 0; policy accept; 400 type nat hook prerouting priority 0; policy accept; 405 type nat hook postrouting priority 0; policy accept; 487 … src $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 489 … src $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 1 action allow
|
D | nft_meta.sh | 52 type filter hook input priority 0; policy accept; 67 type filter hook output priority 0; policy accept;
|
D | nft_conntrack_helper.sh | 79 type filter hook prerouting priority 0; policy accept; 83 type filter hook output priority 0; policy accept;
|
D | conntrack_tcp_unreplied.sh | 96 type filter hook input priority 0; policy accept; 120 type nat hook prerouting priority 0; policy accept;
|
D | nft_nat_zones.sh | 186 type filter hook prerouting priority -64000; policy accept; 196 type nat hook postrouting priority 0; policy accept; 201 type filter hook prerouting priority -100; policy accept;
|
D | nft_fib.sh | 62 type filter hook prerouting priority 0; policy accept; 75 type filter hook prerouting priority 0; policy accept;
|
/tools/testing/selftests/bpf/prog_tests/ |
D | tc_bpf.c | 12 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_p, .priority = 1); \ 14 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hp, .handle = 1, .priority = 1); \ 16 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_pf, .priority = 1, .prog_fd = __fd); \ 17 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpf, .handle = 1, .priority = 1, .prog_fd = __fd); \ 18 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpi, .handle = 1, .priority = 1, .prog_id = 42); \ 19 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpr, .handle = 1, .priority = 1, \ 21 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpfi, .handle = 1, .priority = 1, .prog_fd = __fd, \ 23 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_prio_max, .handle = 1, .priority = UINT16_MAX + 1); 27 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts, .handle = 1, .priority = 1, .prog_fd = fd); in test_tc_bpf_basic() 41 !ASSERT_EQ(opts.priority, 1, "priority set") || in test_tc_bpf_basic() [all …]
|
D | skb_ctx.c | 13 .priority = 6, in test_skb_ctx() 92 CHECK_ATTR(skb.priority != 7, in test_skb_ctx() 95 skb.priority, 7); in test_skb_ctx()
|
/tools/power/cpupower/bench/ |
D | system.c | 102 int set_process_priority(int priority) in set_process_priority() argument 106 dprintf("set scheduler priority to %i\n", priority); in set_process_priority() 108 param.sched_priority = priority; in set_process_priority()
|
D | system.h | 13 int set_process_priority(int priority);
|
D | example.cfg | 4 priority = LOW
|
D | README-BENCH | 13 - Possibly Real time priority testing? -> what happens if there are 114 -p, --prio=<priority> scheduler priority, HIGH, LOW or DEFAULT 122 Due to the high priority, the application may not be responsible for some time.
|
/tools/lib/bpf/ |
D | netlink.c | 563 OPTS_SET(info->opts, priority, TC_H_MAJ(tc->tcm_info) >> 16); in __get_tc_info() 607 __u32 protocol, bpf_flags, handle, priority, parent, prog_id, flags; in bpf_tc_attach() local 623 priority = OPTS_GET(opts, priority, 0); in bpf_tc_attach() 630 if (priority > UINT16_MAX) in bpf_tc_attach() 646 req.tc.tcm_info = TC_H_MAKE(priority << 16, htons(protocol)); in bpf_tc_attach() 682 __u32 protocol = 0, handle, priority, parent, prog_id, flags; in __bpf_tc_detach() local 696 priority = OPTS_GET(opts, priority, 0); in __bpf_tc_detach() 703 if (priority > UINT16_MAX) in __bpf_tc_detach() 706 if (!handle || !priority) in __bpf_tc_detach() 710 if (handle || priority) in __bpf_tc_detach() [all …]
|
/tools/testing/selftests/net/ |
D | xfrm_policy.sh | 39 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 41 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 76 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block 79 ip -net $ns xfrm policy add src 10.2.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block 82 ip -net $ns xfrm policy add src 10.2.0.0/23 dst 10.0.1.0/24 dir fwd priority 200 action block 108 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/23 dir fwd priority 200 action block 113 …src 10.253.1.$((RANDOM%255))/$p dst 10.254.1.$((RANDOM%255))/$p dir fwd priority $((200+k)) action… 146 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 149 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 273 …st ff01::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow … [all …]
|
/tools/testing/selftests/cpu-hotplug/ |
D | cpu-on-off-test.sh | 153 priority=0 176 priority=$OPTARG 245 /sbin/modprobe -q cpu-notifier-error-inject priority=$priority
|
/tools/testing/selftests/memory-hotplug/ |
D | mem-on-off-test.sh | 138 priority=0 153 priority=$OPTARG 238 /sbin/modprobe -q memory-notifier-error-inject priority=$priority
|
/tools/power/cpupower/ |
D | ToDo | 1 ToDos sorted by priority: 14 priority in fork_it.
|
/tools/testing/selftests/bpf/progs/ |
D | test_skb_ctx.c | 18 skb->priority++; in process()
|
/tools/testing/selftests/bpf/verifier/ |
D | raw_stack.c | 112 offsetof(struct __sk_buff, priority)), 157 offsetof(struct __sk_buff, priority)), 187 offsetof(struct __sk_buff, priority)),
|
D | cgroup_skb.c | 42 offsetof(struct __sk_buff, priority)), 44 offsetof(struct __sk_buff, priority)),
|
/tools/lib/traceevent/Documentation/ |
D | libtraceevent-plugins.txt | 31 - Directories, specified in _tep_->plugins_dir with priority TEP_PLUGIN_FIRST 37 - Directories, specified in _tep_->plugins_dir with priority TEP_PLUGIN_LAST
|