/tools/testing/selftests/bpf/progs/ |
D | connect6_prog.c | 37 memset(&tuple.ipv6.saddr, 0, sizeof(tuple.ipv6.saddr)); in connect_v6_prog() 38 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog() 40 tuple.ipv6.daddr[0] = bpf_htonl(DST_REWRITE_IP6_0); in connect_v6_prog() 41 tuple.ipv6.daddr[1] = bpf_htonl(DST_REWRITE_IP6_1); in connect_v6_prog() 42 tuple.ipv6.daddr[2] = bpf_htonl(DST_REWRITE_IP6_2); in connect_v6_prog() 43 tuple.ipv6.daddr[3] = bpf_htonl(DST_REWRITE_IP6_3); in connect_v6_prog() 45 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog() 50 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog() 53 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv6), in connect_v6_prog() 59 if (sk->src_ip6[0] != tuple.ipv6.daddr[0] || in connect_v6_prog() [all …]
|
D | test_cls_redirect.c | 95 offsetofend(struct bpf_sock_tuple, ipv6.dport) - 96 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1, 279 const struct ipv6hdr *ipv6, in pkt_skip_ipv6_extension_headers() argument 292 .next = ipv6->nexthdr, in pkt_skip_ipv6_extension_headers() 350 struct ipv6hdr *ipv6 = buf_assign(pkt, sizeof(*ipv6), scratch); in pkt_parse_ipv6() local 351 if (ipv6 == NULL) { in pkt_parse_ipv6() 355 if (!pkt_skip_ipv6_extension_headers(pkt, ipv6, proto, is_fragment)) { in pkt_parse_ipv6() 359 return ipv6; in pkt_parse_ipv6() 625 struct ipv6hdr *ipv6 = (struct ipv6hdr *)iph; in fill_tuple() local 626 memcpy(&tuple->ipv6.daddr, &ipv6->daddr, in fill_tuple() [all …]
|
D | cgroup_skb_sk_lookup_kern.c | 34 set_ip(tuple->ipv6.saddr, &ip6h->daddr); in set_tuple() 35 set_ip(tuple->ipv6.daddr, &ip6h->saddr); in set_tuple() 36 tuple->ipv6.sport = tcph->dest; in set_tuple() 37 tuple->ipv6.dport = tcph->source; in set_tuple() 46 size_t tuple_len = sizeof(tuple.ipv6); in is_allowed_peer_cg()
|
D | test_tcp_check_syncookie_kern.c | 109 memcpy(tup.ipv6.saddr, &ipv6h->saddr, sizeof(tup.ipv6.saddr)); in check_syncookie() 110 memcpy(tup.ipv6.daddr, &ipv6h->daddr, sizeof(tup.ipv6.daddr)); in check_syncookie() 111 tup.ipv6.sport = tcph->source; in check_syncookie() 112 tup.ipv6.dport = tcph->dest; in check_syncookie() 114 sk = bpf_skc_lookup_tcp(ctx, &tup, sizeof(tup.ipv6), in check_syncookie()
|
D | test_sk_assign.c | 111 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp() 119 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp() 143 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp() 154 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp()
|
D | bpf_tracing_net.h | 22 #define fib_nh_gw6 nh_common.nhc_gw.ipv6
|
/tools/testing/selftests/net/ |
D | ip_defrag.c | 135 int offset, bool ipv6) in send_fragment() argument 140 uint8_t *frag_start = ipv6 ? ip_frame + IP6_HLEN + FRAG_HLEN : in send_fragment() 149 if (ipv6) in send_fragment() 156 if (ipv6) { in send_fragment() 204 socklen_t alen, bool ipv6) in send_udp_frags() argument 219 if (ipv6) { in send_udp_frags() 248 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags() 259 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags() 264 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags() 269 send_fragment(fd_raw, addr, alen, offset, ipv6); in send_udp_frags() [all …]
|
D | reuseaddr_conflict.c | 21 int open_port(int ipv6, int any) in open_port() argument 29 int family = ipv6 ? AF_INET6 : AF_INET; in open_port() 43 if (ipv6) { in open_port() 56 if (ipv6 && setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void*)&v6only, in open_port()
|
D | ip_defrag.sh | 21 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1 22 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1 23 ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1 30 ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1
|
D | traceroute.sh | 86 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.keep_addr_on_down=1 87 ip netns exec ${ns} sysctl -qw net.ipv6.conf.all.forwarding=1 88 ip netns exec ${ns} sysctl -qw net.ipv6.conf.default.forwarding=1 89 ip netns exec ${ns} sysctl -qw net.ipv6.conf.default.accept_dad=0
|
D | vrf_route_leaking.sh | 221 h[12]) ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=0 222 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.keep_addr_on_down=1 225 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1 302 h[12]) ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=0 303 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.keep_addr_on_down=1 306 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1 578 6) TESTS=ipv6;;
|
D | fib_nexthop_multiprefix.sh | 81 ip netns exec ${ns} sysctl -q -w net.ipv6.conf.all.keep_addr_on_down=1 84 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=0 88 ip netns exec $ns sysctl -q -w net.ipv6.conf.all.forwarding=1
|
/tools/testing/selftests/drivers/net/mlxsw/ |
D | one_armed_router.sh | 177 tc filter add dev $swp1 ingress protocol ipv6 pref 1 handle 101 flower \ 181 tc filter add dev $swp2 egress protocol ipv6 pref 1 handle 101 flower \ 185 tc filter add dev $swp2 egress protocol ipv6 pref 2 handle 102 flower \ 213 tc filter del dev $swp2 egress protocol ipv6 pref 2 handle 102 flower 214 tc filter del dev $swp2 egress protocol ipv6 pref 1 handle 101 flower 215 tc filter del dev $swp1 ingress protocol ipv6 pref 1 handle 101 flower 230 sysctl_set net.ipv6.conf.all.accept_redirects 0 245 sysctl_restore net.ipv6.conf.all.accept_redirects
|
D | blackhole_routes.sh | 147 tc filter add dev $rp1 ingress protocol ipv6 pref 1 handle 101 flower \ 162 tc filter del dev $rp1 ingress protocol ipv6 pref 1 handle 101 flower
|
D | tc_police_scale.sh | 44 prot ipv6 \
|
D | devlink_trap_l3_exceptions.sh | 466 sysctl_set net.ipv6.conf.$rp1.keep_addr_on_down 1 467 sysctl_set net.ipv6.conf.$rp2.keep_addr_on_down 1 484 sysctl_restore net.ipv6.conf.$rp2.keep_addr_on_down 485 sysctl_restore net.ipv6.conf.$rp1.keep_addr_on_down
|
/tools/testing/selftests/net/forwarding/ |
D | router_multicast.sh | 280 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 122 flower \ 282 tc filter add dev $h3 ingress protocol ipv6 pref 1 handle 133 flower \ 306 tc filter del dev $h3 ingress protocol ipv6 pref 1 handle 133 flower 307 tc filter del dev $h2 ingress protocol ipv6 pref 1 handle 122 flower 368 tc filter add dev $h1 ingress protocol ipv6 pref 1 handle 1 flower \ 370 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 1 flower \ 372 tc filter add dev $h3 ingress protocol ipv6 pref 1 handle 1 flower \ 374 tc filter add dev $rp3 ingress protocol ipv6 pref 1 handle 1 flower \ 401 tc filter del dev $rp3 ingress protocol ipv6 pref 1 handle 1 flower 402 tc filter del dev $h3 ingress protocol ipv6 pref 1 handle 1 flower [all …]
|
D | ip6_forward_instats_vrf.sh | 130 sysctl -qw net.ipv6.conf.all.forwarding=0 133 sysctl -qw net.ipv6.conf.all.forwarding=1
|
D | pedit_dsfield.sh | 255 ipv6 "ip_tos $dsfield" \ 274 ipv6 "ip_tos $(((dscp << 2) | 1))" \ 293 ipv6 "ip_tos $((124 | $ecn))" \
|
D | mirror_gre_changes.sh | 41 sysctl_set net.ipv6.conf.$swp3.keep_addr_on_down 1 60 sysctl_restore net.ipv6.conf.$swp3.keep_addr_on_down 212 test_span_gre_ttl gt6 ip6gretap ipv6 "mirror to ip6gretap"
|
/tools/testing/selftests/bpf/ |
D | test_lwt_seg6local.sh | 130 ip netns exec ns1 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 131 ip netns exec ns2 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 132 ip netns exec ns3 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 133 ip netns exec ns4 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 134 ip netns exec ns5 sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 136 ip netns exec ns6 sysctl net.ipv6.conf.all.seg6_enabled=1 > /dev/null 137 ip netns exec ns6 sysctl net.ipv6.conf.lo.seg6_enabled=1 > /dev/null 138 ip netns exec ns6 sysctl net.ipv6.conf.veth10.seg6_enabled=1 > /dev/null
|
D | test_tc_tunnel.sh | 103 $0 ipv6 ip6tnl none 100 106 $0 ipv6 sit none 100 113 $0 ipv6 ip6gre $mac 100 119 $0 ipv6 ip6gre $mac 2000 125 $0 ipv6 ip6udp $mac 100 131 $0 ipv6 ip6udp $mac 2000
|
D | test_lwt_ip_encap.sh | 124 ip netns exec ${NS1} sysctl -wq net.ipv6.conf.all.accept_dad=0 125 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.accept_dad=0 126 ip netns exec ${NS3} sysctl -wq net.ipv6.conf.all.accept_dad=0 127 ip netns exec ${NS1} sysctl -wq net.ipv6.conf.default.accept_dad=0 128 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.default.accept_dad=0 129 ip netns exec ${NS3} sysctl -wq net.ipv6.conf.default.accept_dad=0 137 ip netns exec ${NS2} sysctl -wq net.ipv6.conf.all.forwarding=1
|
/tools/usb/usbip/src/ |
D | usbipd.c | 491 static int do_standalone_mode(int daemonize, int ipv4, int ipv6) in do_standalone_mode() argument 523 if (ipv4 && ipv6) in do_standalone_mode() 609 int ipv4 = 0, ipv6 = 0; in main() local 633 ipv6 = 1; in main() 663 if (!ipv4 && !ipv6) in main() 664 ipv4 = ipv6 = 1; in main() 668 rc = do_standalone_mode(daemonize, ipv4, ipv6); in main()
|
/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
D | tc_flower.sh | 596 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 101 flower \ 598 tc filter add dev $h2 ingress protocol ipv6 pref 2 handle 102 flower \ 600 tc filter add dev $h2 ingress protocol ipv6 pref 3 handle 103 flower \ 642 tc filter del dev $h2 ingress protocol ipv6 pref 3 handle 103 flower 643 tc filter del dev $h2 ingress protocol ipv6 pref 2 handle 102 flower 644 tc filter del dev $h2 ingress protocol ipv6 pref 1 handle 101 flower 765 tc filter add dev $h2 ingress protocol ipv6 pref 1 handle 101 flower \ 767 tc filter add dev $h2 ingress protocol ipv6 pref 2 handle 102 flower \ 769 tc filter add dev $h2 ingress protocol ipv6 pref 3 handle 103 flower \ 802 tc filter del dev $h2 ingress protocol ipv6 pref 3 handle 103 flower [all …]
|