| /kernel/linux/linux-6.6/tools/testing/selftests/net/ |
| D | test_bridge_backup_port.sh | 267 log_test $? 0 "Forwarding out of swp1" 269 log_test $? 0 "No forwarding out of vx0" 277 log_test $? 0 "No forwarding out of swp1" 279 log_test $? 0 "No forwarding out of vx0" 282 busywait $BUSYWAIT_TIMEOUT bridge_link_check $sw1 swp1 forwarding 294 log_test $? 0 "Forwarding out of swp1" 296 log_test $? 0 "No forwarding out of vx0" 304 log_test $? 0 "No forwarding out of swp1" 306 log_test $? 0 "Forwarding out of vx0" 309 busywait $BUSYWAIT_TIMEOUT bridge_link_check $sw1 swp1 forwarding [all …]
|
| D | ndisc_unsolicited_na_test.sh | 75 local forwarding=$3 87 # forwarding=0 case is to check that a non-router 91 ${ROUTER_CONF}.forwarding=${forwarding} 147 local forwarding=$3 153 [ ${forwarding} -eq 1 ]; then 182 "forwarding=$3") 188 # Args: drop_unsolicited_na accept_untracked_na forwarding
|
| /kernel/linux/linux-5.10/tools/testing/selftests/net/forwarding/ |
| D | router_broadcast.sh | 188 log_test "h1 -> net2: reply from r1 (not forwarding)" 190 log_test "h1 -> net3: reply from r1 (not forwarding)" 194 log_test "h1 -> 255.255.255.255: reply from r1 (not forwarding)" 197 log_test "h2 -> net1: reply from r1 (not forwarding)" 199 log_test "h2 -> net3: reply from r1 (not forwarding)" 203 log_test "h2 -> 255.255.255.255: reply from r1 (not forwarding)" 209 log_test "h1 -> net2: reply from h2 (forwarding)" 211 log_test "h1 -> net3: reply from h3 (forwarding)" 215 log_test "h1 -> 255.255.255.255: reply from r1 (not forwarding)" 218 log_test "h2 -> net1: reply from h1 (forwarding)" [all …]
|
| D | ip6_forward_instats_vrf.sh | 4 # Test ipv6 stats on the incoming if when forwarding with VRF 129 # Disable forwarding temporary while sending the packet 130 sysctl -qw net.ipv6.conf.all.forwarding=0 133 sysctl -qw net.ipv6.conf.all.forwarding=1
|
| /kernel/linux/linux-6.6/tools/testing/selftests/net/forwarding/ |
| D | router_broadcast.sh | 188 log_test "h1 -> net2: reply from r1 (not forwarding)" 190 log_test "h1 -> net3: reply from r1 (not forwarding)" 194 log_test "h1 -> 255.255.255.255: reply from r1 (not forwarding)" 197 log_test "h2 -> net1: reply from r1 (not forwarding)" 199 log_test "h2 -> net3: reply from r1 (not forwarding)" 203 log_test "h2 -> 255.255.255.255: reply from r1 (not forwarding)" 209 log_test "h1 -> net2: reply from h2 (forwarding)" 211 log_test "h1 -> net3: reply from h3 (forwarding)" 215 log_test "h1 -> 255.255.255.255: reply from r1 (not forwarding)" 218 log_test "h2 -> net1: reply from h1 (forwarding)" [all …]
|
| D | ip6_forward_instats_vrf.sh | 4 # Test ipv6 stats on the incoming if when forwarding with VRF 131 # Disable forwarding temporary while sending the packet 132 sysctl -qw net.ipv6.conf.all.forwarding=0 135 sysctl -qw net.ipv6.conf.all.forwarding=1
|
| /kernel/linux/linux-6.6/Documentation/networking/ |
| D | nf_flowtable.rst | 15 Once the first packet of the flow successfully goes through the IP forwarding 22 classic IP forwarding path (the visible effect is that you do not see these 25 follows the classic IP forwarding path. 34 classic IP forwarding path unless the user explicitly instruct flows to use this 35 new alternative forwarding path via policy. 38 forwarding path including the Netfilter hooks and the flowtable fastpath bypass. 74 forwarding path. The TTL is decremented before calling neigh_xmit(). Fragmented 75 traffic is passed up to follow the classic IP forwarding path given that the 77 TCP RST and FIN packets are also passed up to the classic IP forwarding path to 79 the classic forwarding path to report packet-too-big ICMP errors to the sender. [all …]
|
| D | vxlan.rst | 20 use of statically-configured forwarding entries. 33 entry in the forwarding table. The destination port number is set to 48 forwarding table using the new bridge command. 50 1. Create forwarding table entry:: 54 2. Delete forwarding table entry:: 58 3. Show forwarding table::
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/x86/goldmont/ |
| D | cache.json | 216 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 221 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 226 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 231 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 266 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 271 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 276 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 281 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 316 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 321 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… [all …]
|
| /kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/goldmont/ |
| D | cache.json | 254 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 262 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 267 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 275 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 319 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 327 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 332 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 340 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 384 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 392 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", [all …]
|
| /kernel/linux/linux-5.10/Documentation/networking/ |
| D | nf_flowtable.rst | 13 Initial packets follow the classic forwarding path, once the flow enters the 19 output netdevice via neigh_xmit(), hence, they bypass the classic forwarding 31 follow the classic forwarding path unless the user explicitly instruct packets 32 to use this new alternative forwarding path via nftables policy. 34 This is represented in Fig.1, which describes the classic forwarding path 71 through the classic forwarding path. The TTL is decremented before calling 72 neigh_xmit(). Fragmented traffic is passed up to follow the classic forwarding 104 forwarding bypass.
|
| D | vxlan.rst | 20 use of statically-configured forwarding entries. 33 entry in the forwarding table. The destination port number is set to 48 forwarding table using the new bridge command. 50 1. Create forwarding table entry:: 54 2. Delete forwarding table entry:: 58 3. Show forwarding table::
|
| /kernel/linux/linux-6.6/samples/bpf/ |
| D | tc_l2_redirect.sh | 12 IPV6_FORWARDING=$(< /proc/sys/net/ipv6/conf/all/forwarding) 67 sysctl -q -w net.ipv6.conf.all.forwarding=1 81 sysctl -q -w net.ipv6.conf.all.forwarding=$IPV6_FORWARDING 98 sysctl -q -w net.ipv4.conf.ipt.forwarding=1 103 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 114 # test direct egress to ve2 (i.e. not forwarding from 134 sysctl -q -w net.ipv4.conf.ip6t.forwarding=1 140 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 152 # test direct egress to ve2 (i.e. not forwarding from
|
| /kernel/linux/linux-5.10/samples/bpf/ |
| D | tc_l2_redirect.sh | 11 IPV6_FORWARDING=$(< /proc/sys/net/ipv6/conf/all/forwarding) 66 sysctl -q -w net.ipv6.conf.all.forwarding=1 79 sysctl -q -w net.ipv6.conf.all.forwarding=$IPV6_FORWARDING 95 sysctl -q -w net.ipv4.conf.ipt.forwarding=1 100 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 111 # test direct egress to ve2 (i.e. not forwarding from 131 sysctl -q -w net.ipv4.conf.ip6t.forwarding=1 137 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 149 # test direct egress to ve2 (i.e. not forwarding from
|
| /kernel/linux/linux-6.6/tools/perf/pmu-events/arch/x86/goldmontplus/ |
| D | cache.json | 216 …h) miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 221 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 266 …rs miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 271 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 316 …h) miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 321 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 366 …em miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 371 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 416 …h) miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 421 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… [all …]
|
| /kernel/linux/linux-6.6/Documentation/virt/kvm/s390/ |
| D | s390-diag.rst | 101 DIAG 'X'9C forwarding 110 Forwarding the DIAGNOSE 0x9c initially sent by the guest to yield to 117 0x9c forwarding per second in the purpose of avoiding a DIAGNOSE 0x9c 118 forwarding storm. 119 A value of 0 turns the forwarding off.
|
| /kernel/linux/linux-5.10/net/batman-adv/ |
| D | send.c | 462 * batadv_forw_packet_free() - free a forwarding packet 466 * This frees a forwarding packet and releases any resources it might 487 * batadv_forw_packet_alloc() - allocate a forwarding packet 492 * @skb: The raw packet this forwarding packet shall contain 494 * Allocates a forwarding packet and tries to get a reference to the 498 * Return: An allocated forwarding packet on success, NULL otherwise. 554 * @forw_packet: the forwarding packet to check 556 * This function checks whether the given forwarding packet was claimed by 569 * @forw_packet: the forwarding packet to steal 605 * given hard_iface. If hard_iface is NULL forwarding packets on all hard [all …]
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
| D | mirred.c | 31 /* Forwarding non encapsulated traffic between in verify_uplink_forwarding() 48 "devices are both uplink, can't offload forwarding"); in verify_uplink_forwarding() 52 "devices are not the same uplink, can't offload forwarding"); in verify_uplink_forwarding() 149 "can't support more output ports, can't offload forwarding"); in tc_act_can_offload_mirred() 151 "can't support more than %d output ports, can't offload forwarding\n", in tc_act_can_offload_mirred() 170 NL_SET_ERR_MSG_MOD(extack, "devices are not on same switch HW, can't offload forwarding"); in tc_act_can_offload_mirred() 262 "devices are not on same switch HW, can't offload forwarding"); in parse_mirred()
|
| /kernel/linux/linux-5.10/tools/perf/pmu-events/arch/x86/goldmontplus/ |
| D | cache.json | 314 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 324 …es miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 389 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 399 …ne miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 464 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 474 …he miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 539 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 549 …ns miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 614 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 624 …er miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", [all …]
|
| /kernel/linux/linux-6.6/net/batman-adv/ |
| D | send.c | 458 * batadv_forw_packet_free() - free a forwarding packet 462 * This frees a forwarding packet and releases any resources it might 481 * batadv_forw_packet_alloc() - allocate a forwarding packet 486 * @skb: The raw packet this forwarding packet shall contain 488 * Allocates a forwarding packet and tries to get a reference to the 492 * Return: An allocated forwarding packet on success, NULL otherwise. 548 * @forw_packet: the forwarding packet to check 550 * This function checks whether the given forwarding packet was claimed by 563 * @forw_packet: the forwarding packet to steal 599 * given hard_iface. If hard_iface is NULL forwarding packets on all hard [all …]
|
| /kernel/linux/linux-5.10/tools/testing/selftests/bpf/ |
| D | test_lwt_seg6local.sh | 130 ip netns exec ns1 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 131 ip netns exec ns2 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 132 ip netns exec ns3 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 133 ip netns exec ns4 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 134 ip netns exec ns5 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
|
| /kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
| D | bridge_brouter.sh | 71 # ping netns1, expected to not work (ip forwarding is off) 78 # enable forwarding on both interfaces. 82 ip netns exec ns0 sysctl -q net.ipv4.conf.veth0.forwarding=1 83 ip netns exec ns0 sysctl -q net.ipv4.conf.veth1.forwarding=1
|
| /kernel/linux/linux-5.10/tools/testing/selftests/netfilter/ |
| D | bridge_brouter.sh | 71 # ping netns1, expected to not work (ip forwarding is off) 78 # enable forwarding on both interfaces. 82 ip netns exec ns0 sysctl -q net.ipv4.conf.veth0.forwarding=1 83 ip netns exec ns0 sysctl -q net.ipv4.conf.veth1.forwarding=1
|
| /kernel/linux/linux-5.10/include/net/ |
| D | nsh.h | 27 * discussion of MPLS-related forwarding requirements. 39 * a configurable parameter to enable forwarding received SFC OAM 40 * packets unmodified to the next element in the chain. Forwarding OAM 44 * analyze the impact of forwarding an OAM packet for all OAM functions 53 * involved in forwarding an NSH packet MUST decrement the TTL value by 54 * 1 prior to NSH forwarding lookup. Decrementing by 1 from an incoming 128 * the identified SFP for forwarding along an SFP. If re-classification
|
| /kernel/linux/linux-6.6/include/net/ |
| D | nsh.h | 27 * discussion of MPLS-related forwarding requirements. 39 * a configurable parameter to enable forwarding received SFC OAM 40 * packets unmodified to the next element in the chain. Forwarding OAM 44 * analyze the impact of forwarding an OAM packet for all OAM functions 53 * involved in forwarding an NSH packet MUST decrement the TTL value by 54 * 1 prior to NSH forwarding lookup. Decrementing by 1 from an incoming 128 * the identified SFP for forwarding along an SFP. If re-classification
|