| /tools/testing/selftests/bpf/prog_tests/ |
| D | netfilter_link_attach.c | 12 __s32 priority; member 23 { .pf = NFPROTO_IPV4, .priority = INT_MIN, .name = "invalid-priority-min", }, 24 { .pf = NFPROTO_IPV4, .priority = INT_MAX, .name = "invalid-priority-max", }, 27 { .pf = NFPROTO_INET, .priority = 1, .name = "invalid-inet-not-supported", }, 32 .priority = -10000, 40 .priority = 10001, 62 ASSERT_EQ(info.netfilter.priority, nf_expected.priority, "info nf priority"); in verify_netfilter_link_info() 90 X(opts, priority, i); in test_netfilter_link_attach()
|
| D | tc_bpf.c | 13 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_p, .priority = 1); \ 15 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hp, .handle = 1, .priority = 1); \ 17 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_pf, .priority = 1, .prog_fd = __fd); \ 18 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpf, .handle = 1, .priority = 1, .prog_fd = __fd); \ 19 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpi, .handle = 1, .priority = 1, .prog_id = 42); \ 20 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpr, .handle = 1, .priority = 1, \ 22 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_hpfi, .handle = 1, .priority = 1, .prog_fd = __fd, \ 24 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts_prio_max, .handle = 1, .priority = UINT16_MAX + 1); 28 DECLARE_LIBBPF_OPTS(bpf_tc_opts, opts, .handle = 1, .priority = 1, .prog_fd = fd); in test_tc_bpf_basic() 42 !ASSERT_EQ(opts.priority, 1, "priority set") || in test_tc_bpf_basic() [all …]
|
| D | skb_ctx.c | 13 .priority = 6, in test_skb_ctx() 84 ASSERT_EQ(skb.priority, 7, "ctx_out_priority"); in test_skb_ctx()
|
| /tools/testing/selftests/net/netfilter/ |
| D | nft_queue.sh | 95 type filter hook prerouting priority $prio; policy accept; 99 type filter hook input priority $prio; policy accept; 103 type filter hook forward priority $prio; policy accept; 108 type filter hook output priority $prio; policy accept; 114 type filter hook postrouting priority $prio; policy accept; 127 type filter hook prerouting priority $prio; policy accept; 131 type filter hook input priority $prio; policy accept; 135 type filter hook forward priority $prio; policy accept; 139 type filter hook output priority $prio; policy accept; 143 type filter hook postrouting priority $prio; policy accept; [all …]
|
| D | conntrack_vrf.sh | 101 type filter hook prerouting priority raw; 111 type filter hook output priority raw; 155 type filter hook output priority raw; 160 type filter hook postrouting priority mangle; 165 type nat hook postrouting priority 0; 202 type nat hook postrouting priority 0; 230 type filter hook prerouting priority 0;
|
| D | conntrack_icmp_related.sh | 119 type filter hook forward priority 0; policy accept; 136 type filter hook input priority 0; policy accept; 156 type filter hook input priority 0; policy accept; 164 type filter hook output priority 0; policy accept; 180 type nat hook postrouting priority 0; policy accept; 186 type nat hook postrouting priority 0; policy accept;
|
| D | conntrack_tcp_unreplied.sh | 71 type filter hook input priority 0; policy accept; 90 type filter hook input priority 0; policy accept; 129 type nat hook prerouting priority 0; policy accept;
|
| D | nft_nat.sh | 161 type nat hook output priority 0; policy accept; 231 type nat hook output priority 0; policy accept; 353 type nat hook output priority 0; policy accept; 415 type nat hook postrouting priority 0; policy accept; 506 type nat hook postrouting priority 0; policy accept; 595 type nat hook prerouting priority 0; policy accept; 670 type nat hook prerouting priority 0; policy accept; 771 type filter hook forward priority 0; policy accept; 789 type filter hook prerouting priority -300; policy accept; 793 type filter hook output priority -300; policy accept; [all …]
|
| D | nft_flowtable.sh | 161 hook ingress priority 0 169 type filter hook forward priority 0; policy drop; 196 type filter hook input priority 0; policy accept; 410 type filter hook ingress device "veth0" priority 0; policy accept 427 type filter hook egress device "veth1" priority 0; policy accept 511 type nat hook prerouting priority 0; policy accept; 516 type nat hook postrouting priority 0; policy accept; 583 type nat hook prerouting priority 0; policy accept; 588 type nat hook postrouting priority 0; policy accept; 670 …net" dst "$rnet" dir out tmpl src "$me" dst "$remote" proto esp mode tunnel priority 1 action allow [all …]
|
| D | conntrack_reverse_clash.sh | 22 type nat hook postrouting priority srcnat; policy accept;
|
| D | nft_synproxy.sh | 65 type filter hook prerouting priority -300; policy accept; 70 type filter hook forward priority 0; policy accept;
|
| D | nft_conntrack_helper.sh | 55 type filter hook prerouting priority 0; policy accept; 59 type filter hook output priority 0; policy accept;
|
| D | nft_meta.sh | 52 type filter hook input priority 0; policy accept; 67 type filter hook output priority 0; policy accept;
|
| /tools/testing/selftests/net/forwarding/ |
| D | tsn_lib.sh | 157 --sched-priority 98 \ 187 local priority=$1; shift 230 --priority ${priority} \ 239 --sched-priority 98 \
|
| /tools/power/cpupower/bench/ |
| D | system.c | 102 int set_process_priority(int priority) in set_process_priority() argument 106 dprintf("set scheduler priority to %i\n", priority); in set_process_priority() 108 param.sched_priority = priority; in set_process_priority()
|
| D | system.h | 13 int set_process_priority(int priority);
|
| D | example.cfg | 4 priority = LOW
|
| D | README-BENCH | 13 - Possibly Real time priority testing? -> what happens if there are 114 -p, --prio=<priority> scheduler priority, HIGH, LOW or DEFAULT 122 Due to the high priority, the application may not be responsible for some time.
|
| /tools/testing/selftests/net/ |
| D | xfrm_policy.sh | 38 …rc $lnet dst $rnet dir out tmpl src $me dst $remote proto esp mode tunnel priority 100 action allow 40 …rc $rnet dst $lnet dir fwd tmpl src $remote dst $me proto esp mode tunnel priority 100 action allow 75 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block 78 ip -net $ns xfrm policy add src 10.2.0.0/24 dst 10.0.0.0/24 dir fwd priority 200 action block 81 ip -net $ns xfrm policy add src 10.2.0.0/23 dst 10.0.1.0/24 dir fwd priority 200 action block 107 ip -net $ns xfrm policy add src 10.1.0.0/24 dst 10.0.0.0/23 dir fwd priority 200 action block 112 …src 10.253.1.$((RANDOM%255))/$p dst 10.254.1.$((RANDOM%255))/$p dir fwd priority $((200+k)) action… 145 ip -net $ns xfrm policy add dst $plain dir out priority 10 action allow 148 …y add dst $encryptip dir out tmpl src $me dst $remote proto esp mode tunnel priority 1 action allow 272 …st ff01::0014:0000:0001 dir in tmpl src :: dst :: proto esp mode tunnel priority 100 action allow … [all …]
|
| D | cmsg_sender.c | 54 unsigned int priority; member 145 opt.sockopt.priority = atoi(optarg); in cs_parse_args() 411 if (opt.sockopt.priority && in ca_set_sockopts() 413 &opt.sockopt.priority, sizeof(opt.sockopt.priority))) in ca_set_sockopts()
|
| /tools/lib/bpf/ |
| D | netlink.c | 675 OPTS_SET(info->opts, priority, TC_H_MAJ(tc->tcm_info) >> 16); in __get_tc_info() 720 __u32 protocol, bpf_flags, handle, priority, parent, prog_id, flags; in bpf_tc_attach() local 736 priority = OPTS_GET(opts, priority, 0); in bpf_tc_attach() 743 if (priority > UINT16_MAX) in bpf_tc_attach() 759 req.tc.tcm_info = TC_H_MAKE(priority << 16, htons(protocol)); in bpf_tc_attach() 796 __u32 protocol = 0, handle, priority, parent, prog_id, flags; in __bpf_tc_detach() local 810 priority = OPTS_GET(opts, priority, 0); in __bpf_tc_detach() 817 if (priority > UINT16_MAX) in __bpf_tc_detach() 820 if (!handle || !priority) in __bpf_tc_detach() 824 if (handle || priority) in __bpf_tc_detach() [all …]
|
| /tools/testing/selftests/bpf/progs/ |
| D | verifier_raw_stack.c | 147 __imm_const(__sk_buff_priority, offsetof(struct __sk_buff, priority)) in bytes_spilled_regs_around_bounds() 203 __imm_const(__sk_buff_priority, offsetof(struct __sk_buff, priority)) in __flag() 233 __imm_const(__sk_buff_priority, offsetof(struct __sk_buff, priority)) in load_bytes_spilled_regs_data()
|
| D | test_skb_ctx.c | 19 skb->priority++; in process()
|
| /tools/testing/selftests/memory-hotplug/ |
| D | mem-on-off-test.sh | 147 priority=0 162 priority=$OPTARG 250 /sbin/modprobe -q memory-notifier-error-inject priority=$priority
|
| /tools/power/cpupower/ |
| D | TODO | 1 ToDos sorted by priority: 14 priority in fork_it.
|