/linux-master/tools/testing/selftests/net/ |
H A D | pmtu.sh | 401 encap="${3}" 430 run_cmd ${ns_a} ip link add ${encap}_a type ${type} ${mode} local ${a_addr} remote ${b_addr} encap ${encap} encap-sport auto encap-dport 5556 || return $ksft_skip 433 run_cmd ${ns_b} ip link add ${encap}_b type ${type} ${mode} local ${b_addr} remote ${a_addr} encap ${encap} encap [all...] |
H A D | srv6_end_dt46_l3vpn_test.sh | 137 # |cafe::2 |apply seg6 encap segs fc00:12:100::6046| 141 # |10.0.0.2 |apply seg6 encap segs fc00:12:100::6046| 150 # |cafe::4 |apply seg6 encap segs fc00:12:200::6046| 154 # |10.0.0.4 |apply seg6 encap segs fc00:12:200::6046| 173 # |cafe::1 |apply seg6 encap segs fc00:21:100::6046| 177 # |10.0.0.1 |apply seg6 encap segs fc00:21:100::6046| 186 # |cafe::3 |apply seg6 encap segs fc00:21:200::6046| 190 # |10.0.0.3 |apply seg6 encap segs fc00:21:200::6046| 335 # set the encap route for encapsulating packets which arrive from the 338 encap seg [all...] |
H A D | srv6_end_dt4_l3vpn_test.sh | 123 # |10.0.0.2 |apply seg6 encap segs fc00:12:100::6004| 132 # |10.0.0.4 |apply seg6 encap segs fc00:12:200::6004| 151 # |10.0.0.1 |apply seg6 encap segs fc00:21:100::6004| 160 # |10.0.0.3 |apply seg6 encap segs fc00:21:200::6004| 291 # set the encap route for encapsulating packets which arrive from the 294 encap seg6 mode encap segs ${vpn_sid} dev veth0 301 encap seg6local action End.DT4 vrftable ${tid} dev vrf-${tid}
|
H A D | srv6_end_dt6_l3vpn_test.sh | 124 # |cafe::2 |apply seg6 encap segs fc00:12:100::6006| 133 # |cafe::4 |apply seg6 encap segs fc00:12:200::6006| 152 # |cafe::1 |apply seg6 encap segs fc00:21:100::6006| 161 # |cafe::3 |apply seg6 encap segs fc00:21:200::6006| 296 # set the encap route for encapsulating packets which arrive from the 299 encap seg6 mode encap segs ${vpn_sid} dev veth0 306 encap seg6local action End.DT6 vrftable ${tid} dev vrf-${tid}
|
H A D | srv6_hl2encap_red_l2vpn_test.sh | 379 encap seg6local action End dev "${DUMMY_DEVNAME}" 396 # $5 - encap mode (full or red) 422 encap seg6 mode "${mode}" segs "${policy}" \ 427 encap seg6 mode "${mode}" segs "${policy}" \ 455 encap seg6local action End.DX2 oif "${RT2HS_DEVNAME}" \
|
H A D | srv6_end_flavors_test.sh | 479 encap seg6local action End dev "${DUMMY_DEVNAME}" 553 encap seg6local action ${behavior_cfg} \ 565 encap seg6 mode inline segs "${policy}" \ 806 add "${IPv6_TESTS_ADDR}" encap seg6local \
|
H A D | l2tp.sh | 143 encap ip local 10.1.1.1 remote 10.1.2.1 153 encap ip local 10.1.2.1 remote 10.1.1.1 172 encap ip local 2001:db8:1::1 remote 2001:db8:2::1 182 encap ip local 2001:db8:2::1 remote 2001:db8:1::1
|
/linux-master/net/l2tp/ |
H A D | l2tp_core.c | 366 /* IP encap expects session IDs to be globally unique, while 367 * UDP encap doesn't. 371 (session_walk->tunnel->encap == L2TP_ENCAPTYPE_IP || 372 tunnel->encap == L2TP_ENCAPTYPE_IP)) { 1008 if (tunnel->encap == L2TP_ENCAPTYPE_UDP) { 1070 uhlen = (tunnel->encap == L2TP_ENCAPTYPE_UDP) ? sizeof(*uh) : 0; 1104 /* Report transmitted length before we add encap header, which keeps 1105 * statistics consistent for both UDP and IP encap tx/rx paths. 1110 switch (tunnel->encap) { 1183 switch (tunnel->encap) { 1437 enum l2tp_encap_type encap = L2TP_ENCAPTYPE_UDP; local 1476 l2tp_validate_socket(const struct sock *sk, const struct net *net, enum l2tp_encap_type encap) argument [all...] |
H A D | l2tp_debugfs.c | 156 if (tunnel->encap == L2TP_ENCAPTYPE_UDP) 161 tunnel->encap == L2TP_ENCAPTYPE_UDP ? "UDP" : 162 tunnel->encap == L2TP_ENCAPTYPE_IP ? "IP" :
|
H A D | l2tp_netlink.c | 218 cfg.encap = nla_get_u16(attrs[L2TP_ATTR_ENCAP_TYPE]); 233 switch (cfg.encap) { 318 enum l2tp_encap_type encap) 323 switch (encap) { 346 enum l2tp_encap_type encap) 350 switch (encap) { 379 return l2tp_nl_tunnel_send_addr6(skb, sk, tunnel->encap); 381 return l2tp_nl_tunnel_send_addr4(skb, sk, tunnel->encap); 398 nla_put_u16(skb, L2TP_ATTR_ENCAP_TYPE, tunnel->encap)) 317 l2tp_nl_tunnel_send_addr6(struct sk_buff *skb, struct sock *sk, enum l2tp_encap_type encap) argument 345 l2tp_nl_tunnel_send_addr4(struct sk_buff *skb, struct sock *sk, enum l2tp_encap_type encap) argument
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | cls_redirect.c | 218 static void encap_init(encap_headers_t *encap, uint8_t hop_count, uint8_t proto) argument 222 *encap = (encap_headers_t){ 248 encap_headers_t encap; local 261 encap_init(&encap, test->hops == ONE_HOP ? 1 : 0, proto); 262 p = mempcpy(p, &encap, sizeof(encap));
|
/linux-master/drivers/crypto/caam/ |
H A D | blob_gen.c | 63 struct caam_blob_info *info, bool encap) 78 if (encap) { 62 caam_process_blob(struct caam_blob_priv *priv, struct caam_blob_info *info, bool encap) argument
|
/linux-master/net/core/ |
H A D | lwtunnel.c | 34 * the encap need to return a string here. 52 /* module autoload not supported for encap type */ 112 struct nlattr *encap, unsigned int family, 122 NL_SET_ERR_MSG_ATTR(extack, encap, 135 ret = ops->build_state(net, encap, family, cfg, lws, extack); 142 NL_SET_ERR_MSG_ATTR(extack, encap, 111 lwtunnel_build_state(struct net *net, u16 encap_type, struct nlattr *encap, unsigned int family, const void *cfg, struct lwtunnel_state **lws, struct netlink_ext_ack *extack) argument
|
/linux-master/samples/bpf/ |
H A D | lwt_len_hist.sh | 33 ip route add 192.168.253.2/32 encap bpf out obj $BPF_PROG section len_hist dev $VETH0
|
/linux-master/net/ipv4/ |
H A D | xfrm4_tunnel.c | 32 if (x->encap) {
|
/linux-master/include/net/ |
H A D | lwtunnel.h | 40 int (*build_state)(struct net *net, struct nlattr *encap, 123 struct nlattr *encap, 219 struct nlattr *encap, 218 lwtunnel_build_state(struct net *net, u16 encap_type, struct nlattr *encap, unsigned int family, const void *cfg, struct lwtunnel_state **lws, struct netlink_ext_ack *extack) argument
|
/linux-master/tools/testing/selftests/net/forwarding/ |
H A D | ipip_lib.sh | 335 local encap=$1; shift 340 check_fail $? "ping $encap should not pass with size 1800" 347 log_test "ping $encap packet size 1800 after MTU change"
|
/linux-master/net/ipv6/ |
H A D | ip6_offload.c | 118 bool encap, udpfrag; local 130 encap = SKB_GSO_CB(skb)->encap_level > 0; 131 if (encap) 143 udpfrag = proto == IPPROTO_UDP && encap && 187 if (encap)
|
/linux-master/net/netfilter/ |
H A D | nf_flow_table_offload.c | 120 tuple->encap[0].proto == htons(ETH_P_8021Q)) { 123 tuple->encap[0].id, 124 tuple->encap[0].proto); 129 tuple->encap[1].proto == htons(ETH_P_8021Q)) { 134 tuple->encap[1].id, 135 tuple->encap[1].proto); 140 tuple->encap[1].id, 141 tuple->encap[1].proto); 650 if (tuple->encap[i].proto == htons(ETH_P_8021Q)) { 666 switch (other_tuple->encap[ [all...] |
/linux-master/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
H A D | mirred.c | 156 if (parse_state->encap || 191 parse_state->encap = false; 200 /* attr->dests[].vport is resolved when we handle encap */ 312 if (parse_state->encap)
|
H A D | act.h | 20 bool encap; member in struct:mlx5e_tc_act_parse_state
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lwt_seg6local.sh | 121 ip netns exec ${NS2} ip -6 route add fb00::6 encap bpf in obj ${BPF_FILE} sec encap_srh dev veth2 125 ip netns exec ${NS3} ip -6 route add fd00::1 encap seg6local action End.BPF endpoint obj ${BPF_FILE} sec add_egr_x dev veth4 127 ip netns exec ${NS4} ip -6 route add fd00::2 encap seg6local action End.BPF endpoint obj ${BPF_FILE} sec pop_egr dev veth6 132 ip netns exec ${NS5} ip -6 route add fd00::3 encap seg6local action End.BPF endpoint obj ${BPF_FILE} sec inspect_t dev veth8
|
H A D | test_lwt_ip_encap.sh | 32 # ping: SRC->[encap at veth1:egress]->GRE:decap->DST 38 # ping: SRC->[encap at veth2:ingress]->GRE:decap->DST 361 echo "starting egress ${ENCAP} encap test ${VRF}" 376 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \ 378 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \ 381 ip -netns ${NS1} route add ${IPv4_DST} encap bpf xmit obj \ 383 ip -netns ${NS1} -6 route add ${IPv6_DST} encap bpf xmit obj \ 386 echo " unknown encap ${ENCAP}" 416 echo "starting ingress ${ENCAP} encap test ${VRF}" 434 ip -netns ${NS2} route add ${IPv4_DST} encap bp [all...] |
/linux-master/drivers/net/ethernet/sfc/ |
H A D | ef100_tx.c | 196 bool encap = skb->encapsulation; local 211 if (encap) { 247 ESF_GZ_TX_TSO_ED_OUTER_IP_LEN, encap && !gso_partial, 248 ESF_GZ_TX_TSO_ED_OUTER_IP4_ID, encap ? mangleid :
|
/linux-master/net/xfrm/ |
H A D | xfrm_state.c | 455 .encap = XFRM_MODE_BEET, 460 .encap = XFRM_MODE_TRANSPORT, 464 .encap = XFRM_MODE_TUNNEL, 472 .encap = XFRM_MODE_BEET, 477 .encap = XFRM_MODE_ROUTEOPTIMIZATION, 481 .encap = XFRM_MODE_TRANSPORT, 485 .encap = XFRM_MODE_TUNNEL, 491 static const struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family) argument 495 if (unlikely(encap >= XFRM_MODE_MAX)) 500 mode = &xfrm4_mode_map[encap]; 1657 xfrm_state_clone(struct xfrm_state *orig, struct xfrm_encap_tmpl *encap) argument 1810 xfrm_state_migrate(struct xfrm_state *x, struct xfrm_migrate *m, struct xfrm_encap_tmpl *encap) argument 2488 km_migrate(const struct xfrm_selector *sel, u8 dir, u8 type, const struct xfrm_migrate *m, int num_migrate, const struct xfrm_kmaddress *k, const struct xfrm_encap_tmpl *encap) argument [all...] |