Home
last modified time | relevance | path

Searched refs:sport (Results 1 – 18 of 18) sorted by relevance

/tools/testing/selftests/net/forwarding/
Dpedit_l4port.sh171 do_test_pedit_l4port "dev $swp1 ingress" udp sport src_port
172 do_test_pedit_l4port "dev $swp2 egress" udp sport src_port
183 do_test_pedit_l4port "dev $swp1 ingress" tcp sport src_port
184 do_test_pedit_l4port "dev $swp2 egress" tcp sport src_port
/tools/testing/selftests/bpf/prog_tests/
Dflow_dissector.c38 got.sport, expected.sport, \
125 .sport = 80,
145 .sport = 80,
167 .sport = 80,
190 .sport = 80,
215 .sport = 80,
263 .sport = 80,
307 .sport = 80,
358 .sport = 80,
492 __u32 key = (__u32)(tests[i].keys.sport) << 16 | in run_tests_skb_less()
Dcls_redirect.c278 in_port_t sport = tuple->src.port; in build_input() local
331 sport--; in build_input()
336 .source = sport, in build_input()
347 .source = sport, in build_input()
/tools/testing/selftests/bpf/progs/
Dconnect6_prog.c38 memset(&tuple.ipv6.sport, 0, sizeof(tuple.ipv6.sport)); in connect_v6_prog()
Dtest_cls_redirect.c92 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1,
97 offsetof(struct bpf_sock_tuple, ipv6.sport) - 1,
619 uint64_t iphlen, uint16_t sport, uint16_t dport) in fill_tuple() argument
626 tuple->ipv4.sport = sport; in fill_tuple()
637 tuple->ipv6.sport = sport; in fill_tuple()
753 if (!pkt_parse_icmp_l4_ports(pkt, (flow_ports_t *)&tuple.ipv4.sport)) { in process_icmpv4()
805 if (!pkt_parse_icmp_l4_ports(pkt, (flow_ports_t *)&tuple.ipv6.sport)) { in process_icmpv6()
Dtest_tcp_check_syncookie_kern.c79 tup.ipv4.sport = tcph->source; in check_syncookie()
111 tup.ipv6.sport = tcph->source; in check_syncookie()
Dtest_tc_neigh_fib.c41 fib_params->sport = 0; in fill_fib_params_v4()
69 fib_params->sport = 0; in fill_fib_params_v6()
Dconnect4_prog.c155 memset(&tuple.ipv4.sport, 0, sizeof(tuple.ipv4.sport)); in connect_v4_prog()
Dcgroup_skb_sk_lookup_kern.c36 tuple->ipv6.sport = tcph->dest; in set_tuple()
Dbpf_flow.c77 __u32 key = (__u32)(keys->sport) << 16 | keys->dport; in export_flow_keys()
223 keys->sport = tcp->source; in parse_ip_proto()
232 keys->sport = udp->source; in parse_ip_proto()
/tools/testing/selftests/netfilter/
Dnft_zones_many.sh115 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i >/dev/null 2>&1
118 … --timeout 3600 --state ESTABLISHED --sport 12345 --dport 1000 --zone $i > /dev/null
Dnft_nat_zones.sh190 …tcp flags & (syn|ack) == ack add @inflows { ip saddr . tcp sport . meta iifname . ip daddr . tcp d…
191 add @inflows6 { ip6 saddr . tcp sport . meta iifname . ip6 daddr . tcp dport counter }
Dnft_nat.sh841 meta iif veth1 udp sport 1405 drop
864 udp sport 1405 notrack
882 meta iif veth1 udp sport <= 1405 masquerade to : 1406-65535 random
Dnft_flowtable.sh191 tcp sport 12345 ct mark 1 counter log prefix "mark failure " drop
/tools/testing/selftests/net/
Dreuseport_bpf.c188 static void send_from(struct test_params p, uint16_t sport, char *buf, in send_from() argument
191 struct sockaddr * const saddr = new_any_sockaddr(p.send_family, sport); in send_from()
219 int epfd, conn, i, sport, expected; in test_recv_order() local
237 sport = p.send_port_min + data; in test_recv_order()
240 send_from(p, sport, send_buf, sizeof(ndata)); in test_recv_order()
267 expected = (sport % mod); in test_recv_order()
Dfib_tests.sh1807 $IP rule add pref 100 ipproto udp sport 12345 dport 54321 table 123
1865 $IP -6 rule add pref 100 ipproto udp sport 12345 dport 54321 table 123
Dpmtu.sh424 …ype ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${encap} encap-sport auto encap-dport 5…
427 …ype ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${encap} encap-sport auto encap-dport 5…
/tools/include/uapi/linux/
Dbpf.h5427 __be16 sport; member
5433 __be16 sport; member
6083 __be16 sport; member
6186 __be16 sport; member