/tools/testing/selftests/net/forwarding/ |
D | pedit_l4port.sh | 171 do_test_pedit_l4port "dev $swp1 ingress" udp sport src_port 172 do_test_pedit_l4port "dev $swp2 egress" udp sport src_port 183 do_test_pedit_l4port "dev $swp1 ingress" tcp sport src_port 184 do_test_pedit_l4port "dev $swp2 egress" tcp sport src_port
|
/tools/testing/selftests/bpf/prog_tests/ |
D | flow_dissector.c | 38 got.sport, expected.sport, \ 125 .sport = 80, 145 .sport = 80, 167 .sport = 80, 190 .sport = 80, 215 .sport = 80, 263 .sport = 80, 307 .sport = 80, 358 .sport = 80, 492 __u32 key = (__u32)(tests[i].keys.sport) << 16 | in run_tests_skb_less()
|
D | cls_redirect.c | 278 in_port_t sport = tuple->src.port; in build_input() local 331 sport--; in build_input() 336 .source = sport, in build_input() 347 .source = sport, in build_input()
|
/tools/testing/selftests/bpf/progs/ |
D | connect6_prog.c | 38 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog()
|
D | test_cls_redirect.c | 92 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1, 97 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1, 619 uint64_t iphlen, uint16_t sport, uint16_t dport) in fill_tuple() argument 626 tuple->ipv4.sport = sport; in fill_tuple() 637 tuple->ipv6.sport = sport; in fill_tuple() 753 if (!pkt_parse_icmp_l4_ports(pkt, (flow_ports_t *)&tuple.ipv4.sport)) { in process_icmpv4() 805 if (!pkt_parse_icmp_l4_ports(pkt, (flow_ports_t *)&tuple.ipv6.sport)) { in process_icmpv6()
|
D | test_tcp_check_syncookie_kern.c | 79 tup.ipv4.sport = tcph->source; in check_syncookie() 111 tup.ipv6.sport = tcph->source; in check_syncookie()
|
D | test_tc_neigh_fib.c | 41 fib_params->sport = 0; in fill_fib_params_v4() 69 fib_params->sport = 0; in fill_fib_params_v6()
|
D | connect4_prog.c | 155 memset(&tuple.ipv4.sport, 0, sizeof(tuple.ipv4.sport)); in connect_v4_prog()
|
D | cgroup_skb_sk_lookup_kern.c | 36 tuple->ipv6.sport = tcph->dest; in set_tuple()
|
D | bpf_flow.c | 77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys() 223 keys->sport = tcp->source; in parse_ip_proto() 232 keys->sport = udp->source; in parse_ip_proto()
|
/tools/testing/selftests/netfilter/ |
D | nft_zones_many.sh | 115 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i >/dev/null 2>&1 118 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i > /dev/null
|
D | nft_nat_zones.sh | 190 …tcp flags & (syn|ack) == ack add @inflows { ip saddr . tcp sport . meta iifname . ip daddr . tcp d… 191 add @inflows6 { ip6 saddr . tcp sport . meta iifname . ip6 daddr . tcp dport counter }
|
D | nft_nat.sh | 841 meta iif veth1 udp sport 1405 drop 864 udp sport 1405 notrack 882 meta iif veth1 udp sport <= 1405 masquerade to : 1406-65535 random
|
D | nft_flowtable.sh | 191 tcp sport 12345 ct mark 1 counter log prefix "mark failure " drop
|
/tools/testing/selftests/net/ |
D | reuseport_bpf.c | 188 static void send_from(struct test_params p, uint16_t sport, char *buf, in send_from() argument 191 struct sockaddr * const saddr = new_any_sockaddr(p.send_family, sport); in send_from() 219 int epfd, conn, i, sport, expected; in test_recv_order() local 237 sport = p.send_port_min + data; in test_recv_order() 240 send_from(p, sport, send_buf, sizeof(ndata)); in test_recv_order() 267 expected = (sport % mod); in test_recv_order()
|
D | fib_tests.sh | 1807 $IP rule add pref 100 ipproto udp sport 12345 dport 54321 table 123 1865 $IP -6 rule add pref 100 ipproto udp sport 12345 dport 54321 table 123
|
D | pmtu.sh | 424 …ype ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${encap} encap-sport auto encap-dport 5… 427 …ype ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${encap} encap-sport auto encap-dport 5…
|
/tools/include/uapi/linux/ |
D | bpf.h | 5427 __be16 sport; member 5433 __be16 sport; member 6083 __be16 sport; member 6186 __be16 sport; member
|