Home
last modified time | relevance | path

Searched refs:ipv6 (Results 1 – 25 of 59) sorted by relevance

123

/tools/testing/selftests/bpf/progs/
Dconnect6_prog.c37 memset(&tuple.ipv6.saddr, 0, sizeof(tuple.ipv6.saddr)); in connect_v6_prog()
38 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog()
40 tuple.ipv6.daddr[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog()
41 tuple.ipv6.daddr[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog()
42 tuple.ipv6.daddr[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog()
43 tuple.ipv6.daddr[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog()
45 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog()
50 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog()
53 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog()
59 if (sk->src_ip6[0] != tuple.ipv6.daddr[0] || in connect_v6_prog()
[all …]
Dtest_cls_redirect.c95 offsetofend(struct bpf_sock_tuple, ipv6.dport) -
96 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1,
279 const struct ipv6hdr *ipv6, in pkt_skip_ipv6_extension_headers() argument
292 .next = ipv6->nexthdr, in pkt_skip_ipv6_extension_headers()
350 struct ipv6hdr *ipv6 = buf_assign(pkt, sizeof(*ipv6), scratch); in pkt_parse_ipv6() local
351 if (ipv6 == NULL) { in pkt_parse_ipv6()
355 if (!pkt_skip_ipv6_extension_headers(pkt, ipv6, proto, is_fragment)) { in pkt_parse_ipv6()
359 return ipv6; in pkt_parse_ipv6()
625 struct ipv6hdr *ipv6 = (struct ipv6hdr *)iph; in fill_tuple() local
626 memcpy(&tuple->ipv6.daddr, &ipv6->daddr, in fill_tuple()
[all …]
Dcgroup_skb_sk_lookup_kern.c34 set_ip(tuple->ipv6.saddr, &ip6h->daddr); in set_tuple()
35 set_ip(tuple->ipv6.daddr, &ip6h->saddr); in set_tuple()
36 tuple->ipv6.sport = tcph->dest; in set_tuple()
37 tuple->ipv6.dport = tcph->source; in set_tuple()
46 size_t tuple_len = sizeof(tuple.ipv6); in is_allowed_peer_cg()
Dtest_tcp_check_syncookie_kern.c109 memcpy(tup.ipv6.saddr, &ipv6h->saddr, sizeof(tup.ipv6.saddr)); in check_syncookie()
110 memcpy(tup.ipv6.daddr, &ipv6h->daddr, sizeof(tup.ipv6.daddr)); in check_syncookie()
111 tup.ipv6.sport = tcph->source; in check_syncookie()
112 tup.ipv6.dport = tcph->dest; in check_syncookie()
114 sk = bpf_skc_lookup_tcp(ctx, &tup, sizeof(tup.ipv6), in check_syncookie()
Dtest_sk_assign.c111 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp()
119 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp()
143 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp()
154 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp()
Dbpf_tracing_net.h22 #define fib_nh_gw6 nh_common.nhc_gw.ipv6
/tools/testing/selftests/net/
Dip_defrag.c135 int offset, bool ipv6) in send_fragment() argument
140 uint8_t *frag_start = ipv6 ? ip_frame + IP6_HLEN + FRAG_HLEN : in send_fragment()
149 if (ipv6) in send_fragment()
156 if (ipv6) { in send_fragment()
204 socklen_t alen, bool ipv6) in send_udp_frags() argument
219 if (ipv6) { in send_udp_frags()
248 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags()
259 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags()
264 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags()
269 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags()
[all …]
Dreuseaddr_conflict.c21 int open_port(int ipv6, int any) in open_port() argument
29 int family = ipv6 ? AF_INET6 : AF_INET; in open_port()
43 if (ipv6) { in open_port()
56 if (ipv6 && setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void*)&v6only, in open_port()
Dip_defrag.sh21 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1
22 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1
23 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1
30 ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1
Dtraceroute.sh86 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.keep_addr_on_down=1
87 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.forwarding=1
88 ip netns exec ${ns} sysctl -qw net.ipv6.conf.default.forwarding=1
89 ip netns exec ${ns} sysctl -qw net.ipv6.conf.default.accept_dad=0
Dvrf_route_leaking.sh221 h[12]) ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=0
222 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.keep_addr_on_down=1
225 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1
302 h[12]) ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=0
303 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.keep_addr_on_down=1
306 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1
578 6) TESTS=ipv6;;
Dfib_nexthop_multiprefix.sh81 ip netns exec ${ns} sysctl -q -w net.ipv6.conf.all.keep_addr_on_down=1
84 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=0
88 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1
/tools/testing/selftests/drivers/net/mlxsw/
Done_armed_router.sh177 tc filter add dev $swp1 ingress protocol ipv6 pref 1 handle 101 flower \
181 tc filter add dev $swp2 egress protocol ipv6 pref 1 handle 101 flower \
185 tc filter add dev $swp2 egress protocol ipv6 pref 2 handle 102 flower \
213 tc filter del dev $swp2 egress protocol ipv6 pref 2 handle 102 flower
214 tc filter del dev $swp2 egress protocol ipv6 pref 1 handle 101 flower
215 tc filter del dev $swp1 ingress protocol ipv6 pref 1 handle 101 flower
230 sysctl_set net.ipv6.conf.all.accept_redirects 0
245 sysctl_restore net.ipv6.conf.all.accept_redirects
Dblackhole_routes.sh147 tc filter add dev $rp1 ingress protocol ipv6 pref 1 handle 101 flower \
162 tc filter del dev $rp1 ingress protocol ipv6 pref 1 handle 101 flower
Dtc_police_scale.sh44 prot ipv6 \
Ddevlink_trap_l3_exceptions.sh466 sysctl_set net.ipv6.conf.$rp1.keep_addr_on_down 1
467 sysctl_set net.ipv6.conf.$rp2.keep_addr_on_down 1
484 sysctl_restore net.ipv6.conf.$rp2.keep_addr_on_down
485 sysctl_restore net.ipv6.conf.$rp1.keep_addr_on_down
/tools/testing/selftests/net/forwarding/
Drouter_multicast.sh280 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 122 flower \
282 tc filter add dev $h3 ingress protocol ipv6 pref 1 handle 133 flower \
306 tc filter del dev $h3 ingress protocol ipv6 pref 1 handle 133 flower
307 tc filter del dev $h2 ingress protocol ipv6 pref 1 handle 122 flower
368 tc filter add dev $h1 ingress protocol ipv6 pref 1 handle 1 flower \
370 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 1 flower \
372 tc filter add dev $h3 ingress protocol ipv6 pref 1 handle 1 flower \
374 tc filter add dev $rp3 ingress protocol ipv6 pref 1 handle 1 flower \
401 tc filter del dev $rp3 ingress protocol ipv6 pref 1 handle 1 flower
402 tc filter del dev $h3 ingress protocol ipv6 pref 1 handle 1 flower
[all …]
Dip6_forward_instats_vrf.sh130 sysctl -qw net.ipv6.conf.all.forwarding=0
133 sysctl -qw net.ipv6.conf.all.forwarding=1
Dpedit_dsfield.sh255 ipv6 "ip_tos $dsfield" \
274 ipv6 "ip_tos $(((dscp << 2) | 1))" \
293 ipv6 "ip_tos $((124 | $ecn))" \
Dmirror_gre_changes.sh41 sysctl_set net.ipv6.conf.$swp3.keep_addr_on_down 1
60 sysctl_restore net.ipv6.conf.$swp3.keep_addr_on_down
212 test_span_gre_ttl gt6 ip6gretap ipv6 "mirror to ip6gretap"
/tools/testing/selftests/bpf/
Dtest_lwt_seg6local.sh130 ip netns exec ns1 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
131 ip netns exec ns2 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
132 ip netns exec ns3 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
133 ip netns exec ns4 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
134 ip netns exec ns5 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
136 ip netns exec ns6 sysctl net.ipv6.conf.all.seg6_enabled=1 > /dev/null
137 ip netns exec ns6 sysctl net.ipv6.conf.lo.seg6_enabled=1 > /dev/null
138 ip netns exec ns6 sysctl net.ipv6.conf.veth10.seg6_enabled=1 > /dev/null
Dtest_tc_tunnel.sh103 $0 ipv6 ip6tnl none 100
106 $0 ipv6 sit none 100
113 $0 ipv6 ip6gre $mac 100
119 $0 ipv6 ip6gre $mac 2000
125 $0 ipv6 ip6udp $mac 100
131 $0 ipv6 ip6udp $mac 2000
Dtest_lwt_ip_encap.sh124 ip netns exec ${NS1} sysctl -wq net.ipv6.conf.all.accept_dad=0
125 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0
126 ip netns exec ${NS3} sysctl -wq net.ipv6.conf.all.accept_dad=0
127 ip netns exec ${NS1} sysctl -wq net.ipv6.conf.default.accept_dad=0
128 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0
129 ip netns exec ${NS3} sysctl -wq net.ipv6.conf.default.accept_dad=0
137 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.forwarding=1
/tools/usb/usbip/src/
Dusbipd.c491 static int do_standalone_mode(int daemonize, int ipv4, int ipv6) in do_standalone_mode() argument
523 if (ipv4 && ipv6) in do_standalone_mode()
609 int ipv4 = 0, ipv6 = 0; in main() local
633 ipv6 = 1; in main()
663 if (!ipv4 && !ipv6) in main()
664 ipv4 = ipv6 = 1; in main()
668 rc = do_standalone_mode(daemonize, ipv4, ipv6); in main()
/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/
Dtc_flower.sh596 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 101 flower \
598 tc filter add dev $h2 ingress protocol ipv6 pref 2 handle 102 flower \
600 tc filter add dev $h2 ingress protocol ipv6 pref 3 handle 103 flower \
642 tc filter del dev $h2 ingress protocol ipv6 pref 3 handle 103 flower
643 tc filter del dev $h2 ingress protocol ipv6 pref 2 handle 102 flower
644 tc filter del dev $h2 ingress protocol ipv6 pref 1 handle 101 flower
765 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 101 flower \
767 tc filter add dev $h2 ingress protocol ipv6 pref 2 handle 102 flower \
769 tc filter add dev $h2 ingress protocol ipv6 pref 3 handle 103 flower \
802 tc filter del dev $h2 ingress protocol ipv6 pref 3 handle 103 flower
[all …]

123