| /tools/testing/selftests/net/netfilter/ |
| A D | conntrack_clash.sh | 7 dport=22111 33 udp dport $dport counter jump lb 39 udp dport $dport counter jump lb 98 local dport="$4" 102 if ! ip netns exec "$ns" ./udpclash $daddr $dport;then 103 echo "INFO: did not receive expected number of replies for $daddr:$dport" 127 local dport="$4" 131 run_one_clash_test "$ns" "$ctns" "$daddr" "$dport" 134 echo "PASS: clash resolution test for $daddr:$dport on attempt $i" 141 [ $softerr -eq 1 ] && echo "SKIP: clash resolution for $daddr:$dport did not trigger" [all …]
|
| A D | conntrack_tcp_unreplied.sh | 91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 111 count=$(ip netns exec "$ns2" conntrack -L -p tcp --dport 80 2>/dev/null | wc -l) 130 ip daddr 10.99.99.99 tcp dport 80 redirect to :8080
|
| A D | nf_nat_edemux.sh | 47 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest… 71 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5202 -j REDIRECT --to-ports 5201 72 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5203 -j REDIRECT --to-ports 5201
|
| A D | nft_zones_many.sh | 42 udp dport 12345 ct zone set numgen inc mod 65536 map @rndzone 121 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i >/dev/null 2>&1 124 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i > /dev/null
|
| A D | nft_conntrack_helper.sh | 56 tcp dport 2121 ct helper set "ftp" 60 tcp dport 2121 ct helper set "ftp" 79 …if ! ip netns exec "$netns" conntrack -L -f $family -p tcp --dport "$port" 2> /dev/null |grep -q '…
|
| A D | nft_queue.sh | 106 tcp dport 12345 queue num 2 111 tcp dport 12345 queue num 3 326 tcp dport 12345 limit rate 1/second burst 1 packets counter queue num 0 330 tcp dport 12345 limit rate 1/second burst 1 packets counter queue num 0 449 sctp dport 12345 queue num 10 481 sctp dport 12345 queue num 11 528 …ip daddr 10.6.6.6 udp dport 12345 counter dnat to numgen inc mod 2 map { 0 : 10.0.2.99, 1 : 10.0.3… 532 udp dport 12345 counter queue num 12 564 ip netns exec "$nsrouter" conntrack -L -p udp --dport 12345
|
| /tools/testing/selftests/bpf/progs/ |
| A D | test_sk_assign.c | 107 __be16 dport; in handle_udp() local 118 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp() 119 if (dport != bpf_htons(4321)) in handle_udp() 138 __be16 dport; in handle_tcp() local 152 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp() 153 if (dport != bpf_htons(4321)) in handle_tcp()
|
| A D | test_xdp.c | 90 int dport; in handle_ipv4() local 97 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4() 98 if (dport == -1) in handle_ipv4() 104 vip.dport = dport; in handle_ipv4() 162 int dport; in handle_ipv6() local 167 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6() 168 if (dport == -1) in handle_ipv6() 174 vip.dport = dport; in handle_ipv6()
|
| A D | test_xdp_loop.c | 86 int dport; in handle_ipv4() local 93 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4() 94 if (dport == -1) in handle_ipv4() 100 vip.dport = dport; in handle_ipv4() 158 int dport; in handle_ipv6() local 163 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6() 164 if (dport == -1) in handle_ipv6() 170 vip.dport = dport; in handle_ipv6()
|
| A D | test_xdp_dynptr.c | 90 int dport; in handle_ipv4() local 106 dport = get_dport(iph + 1, iph->protocol); in handle_ipv4() 107 if (dport == -1) in handle_ipv4() 113 vip.dport = dport; in handle_ipv4() 171 int dport; in handle_ipv6() local 185 dport = get_dport(ip6h + 1, ip6h->nexthdr); in handle_ipv6() 186 if (dport == -1) in handle_ipv6() 192 vip.dport = dport; in handle_ipv6()
|
| A D | test_bpf_nf.c | 43 __be16 dport = 0; variable 169 bpf_tuple.ipv4.dport = bpf_get_prandom_u32(); /* dst port */ in nf_ct_test() 175 __u16 dport = bpf_get_prandom_u32(); in nf_ct_test() local 188 bpf_ct_set_nat_info(ct, &daddr, dport, NF_NAT_MANIP_DST___local); in nf_ct_test() 205 tuple->src.u.all == bpf_htons(dport)) in nf_ct_test() 229 bpf_tuple.ipv4.dport = dport; in nf_ct_test() 269 bpf_tuple.ipv4.dport = bpf_get_prandom_u32(); /* dst port */ in nf_ct_opts_new_test() 278 __u16 dport = bpf_get_prandom_u32(); in nf_ct_opts_new_test() local 290 bpf_ct_set_nat_info(ct, &daddr, dport, NF_NAT_MANIP_DST___local); in nf_ct_opts_new_test()
|
| A D | cgroup_ancestor.c | 11 __u16 dport; variable 30 if (sk->sk_protocol == IPPROTO_UDP && sk->sk_dport == dport) { in log_cgroup_id()
|
| A D | xdpwall.c | 100 int dport; member 199 info->dport = bpf_ntohs(tcp->dest); in parse_tcp() 214 info->dport = bpf_ntohs(udp->dest); in parse_udp() 244 match_info->tcp_dp_match = filter_tcp_port(info->dport); in filter_transport_hdr() 249 match_info->udp_dp_match = filter_udp_port(info->dport); in filter_transport_hdr()
|
| A D | test_tc_dtime.c | 144 __u16 sport, dport; in skb_get_type() local 189 dport = th->dest; in skb_get_type() 196 dport = uh->dest; in skb_get_type() 203 if ((ns == SRC_NS && dport == dst_ns_port) || in skb_get_type()
|
| A D | xdp_flowtable.c | 105 tuple.dport = ports->dest; in xdp_flowtable_do_lookup() 130 tuple.dport = ports->dest; in xdp_flowtable_do_lookup()
|
| /tools/testing/cxl/test/ |
| A D | mock.c | 253 struct cxl_dport *dport; in __wrap_devm_cxl_add_rch_dport() local 257 dport = devm_cxl_add_dport(port, dport_dev, port_id, in __wrap_devm_cxl_add_rch_dport() 259 if (!IS_ERR(dport)) { in __wrap_devm_cxl_add_rch_dport() 260 dport->rcrb.base = rcrb; in __wrap_devm_cxl_add_rch_dport() 261 dport->rch = true; in __wrap_devm_cxl_add_rch_dport() 264 dport = devm_cxl_add_rch_dport(port, dport_dev, port_id, rcrb); in __wrap_devm_cxl_add_rch_dport() 267 return dport; in __wrap_devm_cxl_add_rch_dport() 272 struct cxl_dport *dport) in __wrap_cxl_rcd_component_reg_phys() argument 281 component_reg_phys = cxl_rcd_component_reg_phys(dev, dport); in __wrap_cxl_rcd_component_reg_phys() 307 if (!ops || !ops->is_mock_port(dport->dport_dev)) in __wrap_cxl_dport_init_ras_reporting() [all …]
|
| /tools/testing/selftests/net/netfilter/packetdrill/ |
| A D | conntrack_rst_invalid.pkt | 31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED` 35 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED` 39 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED` 44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED` 49 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED` 59 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q CLOSE\ `
|
| A D | conntrack_syn_challenge_ack.pkt | 29 +0.01 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep UNREPLIED | grep -q … 40 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ESTABLISHED | grep -q A…
|
| A D | conntrack_synack_old.pkt | 31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep UNREPLIED | grep -q SYN… 40 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ESTABLISHED | grep -q A… 44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null | grep ASSURED | grep -q ESTAB…
|
| /tools/testing/selftests/bpf/ |
| A D | generate_udp_fragments.py | 68 dport = SERVER_PORT 72 pkt = IP(src=sip,dst=dip) / UDP(sport=sport,dport=dport,chksum=0) / Raw(load=payload) 75 …pkt6 = IPv6(src=sip6,dst=dip6) / IPv6ExtHdrFragment(id=0xBEEF) / UDP(sport=sport,dport=dport) / Ra…
|
| A D | test_iptunnel_common.h | 16 __u16 dport; member
|
| A D | test_tc_tunnel.sh | 227 dport=${mplsudpport} 231 dport=${udpport} 234 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto} 235 targs="encap fou encap-sport auto encap-dport $dport"
|
| /tools/testing/selftests/net/forwarding/ |
| A D | tc_flower_port_range.sh | 211 local dport=5000 218 dst_port $dport \ 223 -t $ip_proto "sp=$((sport_min - 1)),dp=$dport" 225 -t $ip_proto "sp=$((sport_max + 1)),dp=$dport" 229 -t $ip_proto "sp=$sport_min,dp=$dport" 231 -t $ip_proto "sp=$sport_mid,dp=$dport" 233 -t $ip_proto "sp=$sport_max,dp=$dport"
|
| A D | pedit_l4port.sh | 177 do_test_pedit_l4port "dev $swp1 ingress" udp dport dst_port 178 do_test_pedit_l4port "dev $swp2 egress" udp dport dst_port 189 do_test_pedit_l4port "dev $swp1 ingress" tcp dport dst_port 190 do_test_pedit_l4port "dev $swp2 egress" tcp dport dst_port
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | flow_dissector.c | 117 .dport = 8080, 138 .dport = 8080, 161 .dport = 8080, 185 .dport = 8080, 211 .dport = 8080, 261 .dport = 8080, 307 .dport = 8080, 354 .dport = 8080, 384 .dport = 8080, 464 .dport = 8080, [all …]
|