/tools/testing/selftests/bpf/progs/ |
D | test_sk_assign.c | 108 __be16 dport; in handle_udp() local 119 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp() 120 if (dport != bpf_htons(4321)) in handle_udp() 140 __be16 dport; in handle_tcp() local 154 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp() 155 if (dport != bpf_htons(4321)) in handle_tcp()
|
D | test_xdp_loop.c | 87 int dport; in handle_ipv4() local 94 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4() 95 if (dport == -1) in handle_ipv4() 101 vip.dport = dport; in handle_ipv4() 159 int dport; in handle_ipv6() local 164 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6() 165 if (dport == -1) in handle_ipv6() 171 vip.dport = dport; in handle_ipv6()
|
D | test_xdp.c | 91 int dport; in handle_ipv4() local 98 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4() 99 if (dport == -1) in handle_ipv4() 105 vip.dport = dport; in handle_ipv4() 163 int dport; in handle_ipv6() local 168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6() 169 if (dport == -1) in handle_ipv6() 175 vip.dport = dport; in handle_ipv6()
|
D | test_tcp_check_syncookie_kern.c | 80 tup.ipv4.dport = tcph->dest; in check_syncookie() 112 tup.ipv6.dport = tcph->dest; in check_syncookie()
|
D | test_tc_neigh_fib.c | 42 fib_params->dport = 0; in fill_fib_params_v4() 70 fib_params->dport = 0; in fill_fib_params_v6()
|
D | test_cls_redirect.c | 91 offsetofend(struct bpf_sock_tuple, ipv4.dport) - 96 offsetofend(struct bpf_sock_tuple, ipv6.dport) - 619 uint64_t iphlen, uint16_t sport, uint16_t dport) in fill_tuple() argument 627 tuple->ipv4.dport = dport; in fill_tuple() 638 tuple->ipv6.dport = dport; in fill_tuple()
|
D | cgroup_skb_sk_lookup_kern.c | 37 tuple->ipv6.dport = tcph->source; in set_tuple()
|
D | connect6_prog.c | 45 tuple.ipv6.dport = bpf_htons(DST_REWRITE_PORT6); in connect_v6_prog()
|
D | bpf_flow.c | 77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 224 keys->dport = tcp->dest; in parse_ip_proto() 233 keys->dport = udp->dest; in parse_ip_proto()
|
D | connect4_prog.c | 158 tuple.ipv4.dport = bpf_htons(DST_REWRITE_PORT4); in connect_v4_prog()
|
D | test_l4lb_noinline.c | 408 vip.dport = pckt.port16[1]; in process_packet() 412 vip.dport = 0; in process_packet()
|
D | test_l4lb.c | 411 vip.dport = pckt.port16[1]; in process_packet() 415 vip.dport = 0; in process_packet()
|
/tools/testing/selftests/net/forwarding/ |
D | pedit_l4port.sh | 177 do_test_pedit_l4port "dev $swp1 ingress" udp dport dst_port 178 do_test_pedit_l4port "dev $swp2 egress" udp dport dst_port 189 do_test_pedit_l4port "dev $swp1 ingress" tcp dport dst_port 190 do_test_pedit_l4port "dev $swp2 egress" tcp dport dst_port
|
/tools/testing/selftests/netfilter/ |
D | conntrack_tcp_unreplied.sh | 97 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept 98 ct state new ct status dnat tcp dport 8080 counter name "redir" accept 121 ip daddr 10.99.99.99 tcp dport 80 redirect to :8080 130 count=$(ip netns exec $ns2 conntrack -L -p tcp --dport 80 2>/dev/null | wc -l)
|
D | nft_zones_many.sh | 49 udp dport 12345 ct zone set numgen inc mod 65536 map @rndzone 115 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i >/dev/null 2>&1 118 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i > /dev/null
|
D | nft_conntrack_helper.sh | 80 tcp dport 2121 ct helper set "ftp" 84 tcp dport 2121 ct helper set "ftp" 103 …ip netns exec ${netns} conntrack -L -f $family -p tcp --dport $port 2> /dev/null |grep -q 'helper=…
|
D | nft_queue.sh | 106 tcp dport 12345 queue num 2 111 tcp dport 12345 queue num 3 302 tcp dport 12345 limit rate 1/second burst 1 packets counter queue num 0 306 tcp dport 12345 limit rate 1/second burst 1 packets counter queue num 0
|
D | nft_flowtable.sh | 172 meta oif "veth1" tcp dport 12345 flow offload @f1 counter 177 tcp dport 12345 meta length gt 200 ct mark set 1 counter 196 meta length lt 200 oif "veth1" tcp dport 12345 counter accept 346 meta iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter dnat ip to 10.0.2.99:12345 401 meta iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter dnat ip to 10.0.2.99:12345
|
D | nf_nat_edemux.sh | 71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
|
D | nft_nat_zones.sh | 190 …syn|ack) == ack add @inflows { ip saddr . tcp sport . meta iifname . ip daddr . tcp dport counter } 191 add @inflows6 { ip6 saddr . tcp sport . meta iifname . ip6 daddr . tcp dport counter }
|
/tools/testing/selftests/bpf/prog_tests/ |
D | flow_dissector.c | 39 got.dport, expected.dport) 126 .dport = 8080, 146 .dport = 8080, 168 .dport = 8080, 191 .dport = 8080, 216 .dport = 8080, 264 .dport = 8080, 308 .dport = 8080, 359 .dport = 8080, 493 tests[i].keys.dport; in run_tests_skb_less()
|
/tools/testing/selftests/bpf/ |
D | test_iptunnel_common.h | 16 __u16 dport; member
|
D | test_tc_tunnel.sh | 212 dport=${mplsudpport} 216 dport=${udpport} 219 ip netns exec "${ns2}" ip fou add port $dport ipproto ${dproto} 220 targs="encap fou encap-sport auto encap-dport $dport"
|
/tools/testing/selftests/net/ |
D | udpgro_fwd.sh | 127 ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 4789 128 ip netns exec $NS_DST $ipt -A INPUT -p udp --dport 8000
|
/tools/include/uapi/linux/ |
D | bpf.h | 5414 __be16 dport; member 5420 __be16 dport; member 6066 __be16 dport; member 6156 __be16 dport; member
|