/openbmc/linux/tools/testing/selftests/net/ |
H A D | test_bridge_backup_port.sh | 267 log_test $? 0 "Forwarding out of swp1" 269 log_test $? 0 "No forwarding out of vx0" 277 log_test $? 0 "No forwarding out of swp1" 279 log_test $? 0 "No forwarding out of vx0" 282 busywait $BUSYWAIT_TIMEOUT bridge_link_check $sw1 swp1 forwarding 294 log_test $? 0 "Forwarding out of swp1" 296 log_test $? 0 "No forwarding out of vx0" 304 log_test $? 0 "No forwarding out of swp1" 306 log_test $? 0 "Forwarding out of vx0" 309 busywait $BUSYWAIT_TIMEOUT bridge_link_check $sw1 swp1 forwarding [all …]
|
H A D | ndisc_unsolicited_na_test.sh | 75 local forwarding=$3 87 # forwarding=0 case is to check that a non-router 91 ${ROUTER_CONF}.forwarding=${forwarding} 147 local forwarding=$3 153 [ ${forwarding} -eq 1 ]; then 182 "forwarding=$3") 188 # Args: drop_unsolicited_na accept_untracked_na forwarding
|
H A D | amt.sh | 221 printf "TEST: %-60s [ OK ]\n" "IPv4 amt multicast forwarding" 224 printf "TEST: %-60s [FAIL]\n" "IPv4 amt multicast forwarding" 233 printf "TEST: %-60s [ OK ]\n" "IPv6 amt multicast forwarding" 236 printf "TEST: %-60s [FAIL]\n" "IPv6 amt multicast forwarding" 282 printf "TEST: %-60s [ OK ]\n" "IPv4 amt traffic forwarding torture" 284 printf "TEST: %-60s [ OK ]\n" "IPv6 amt traffic forwarding torture"
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | router_broadcast.sh | 188 log_test "h1 -> net2: reply from r1 (not forwarding)" 190 log_test "h1 -> net3: reply from r1 (not forwarding)" 194 log_test "h1 -> 255.255.255.255: reply from r1 (not forwarding)" 197 log_test "h2 -> net1: reply from r1 (not forwarding)" 199 log_test "h2 -> net3: reply from r1 (not forwarding)" 203 log_test "h2 -> 255.255.255.255: reply from r1 (not forwarding)" 209 log_test "h1 -> net2: reply from h2 (forwarding)" 211 log_test "h1 -> net3: reply from h3 (forwarding)" 215 log_test "h1 -> 255.255.255.255: reply from r1 (not forwarding)" 218 log_test "h2 -> net1: reply from h1 (forwarding)" [all …]
|
H A D | ip6_forward_instats_vrf.sh | 4 # Test ipv6 stats on the incoming if when forwarding with VRF 131 # Disable forwarding temporary while sending the packet 132 sysctl -qw net.ipv6.conf.all.forwarding=0 135 sysctl -qw net.ipv6.conf.all.forwarding=1
|
/openbmc/linux/Documentation/networking/ |
H A D | nf_flowtable.rst | 15 Once the first packet of the flow successfully goes through the IP forwarding 22 classic IP forwarding path (the visible effect is that you do not see these 25 follows the classic IP forwarding path. 34 classic IP forwarding path unless the user explicitly instruct flows to use this 35 new alternative forwarding path via policy. 38 forwarding path including the Netfilter hooks and the flowtable fastpath bypass. 74 forwarding path. The TTL is decremented before calling neigh_xmit(). Fragmented 75 traffic is passed up to follow the classic IP forwarding path given that the 77 TCP RST and FIN packets are also passed up to the classic IP forwarding path to 79 the classic forwarding path to report packet-too-big ICMP errors to the sender. [all …]
|
H A D | vxlan.rst | 20 use of statically-configured forwarding entries. 33 entry in the forwarding table. The destination port number is set to 48 forwarding table using the new bridge command. 50 1. Create forwarding table entry:: 54 2. Delete forwarding table entry:: 58 3. Show forwarding table::
|
H A D | switchdev.rst | 15 model for switch devices which offload the forwarding (data) plane from the 154 router port, used to offload L3 forwarding. Two or more ports can be bonded 168 L2 Forwarding Offload 171 The idea is to offload the L2 data forwarding (switching) path from the kernel 173 FDB entry is the {port, MAC, VLAN} tuple forwarding destination. 338 The hardware implementation should be forwarding all registered multicast 345 the kernel, with the device doing the FIB lookup and forwarding. The device 481 interfaces. Some approaches to ensure that the forwarding domain for traffic 484 * If forwarding destinations can be managed per VLAN, the hardware could be 492 forwarding be handled in the software data path. [all …]
|
/openbmc/linux/tools/perf/pmu-events/arch/x86/goldmont/ |
H A D | cache.json | 216 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 221 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 226 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 231 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 266 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 271 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 276 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 281 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 316 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 321 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… [all …]
|
/openbmc/openbmc/meta-google/recipes-google/systemd/files/ |
H A D | 40-gbmc-forward.conf | 2 net.ipv4.conf.default.forwarding=1 3 net.ipv4.conf.all.forwarding=1 4 net.ipv6.conf.default.forwarding=1 5 net.ipv6.conf.all.forwarding=1
|
/openbmc/linux/samples/bpf/ |
H A D | tc_l2_redirect.sh | 12 IPV6_FORWARDING=$(< /proc/sys/net/ipv6/conf/all/forwarding) 67 sysctl -q -w net.ipv6.conf.all.forwarding=1 81 sysctl -q -w net.ipv6.conf.all.forwarding=$IPV6_FORWARDING 98 sysctl -q -w net.ipv4.conf.ipt.forwarding=1 103 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 114 # test direct egress to ve2 (i.e. not forwarding from 134 sysctl -q -w net.ipv4.conf.ip6t.forwarding=1 140 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 152 # test direct egress to ve2 (i.e. not forwarding from
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/radvd/files/ |
H A D | radvd.init | 40 echo -e "$if_conf/forwarding\t `cat $if_conf/forwarding`" >> $file 80 # We must enable IPv6 forwarding for radvd to work 81 echo 1 > /proc/sys/net/ipv6/conf/all/forwarding 121 echo 1 > /proc/sys/net/ipv6/conf/all/forwarding
|
/openbmc/linux/tools/perf/pmu-events/arch/x86/goldmontplus/ |
H A D | cache.json | 216 …h) miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 221 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 266 …rs miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 271 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 316 …h) miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 321 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 366 …em miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 371 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 416 …h) miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 421 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… [all …]
|
/openbmc/linux/Documentation/virt/kvm/s390/ |
H A D | s390-diag.rst | 101 DIAG 'X'9C forwarding 110 Forwarding the DIAGNOSE 0x9c initially sent by the guest to yield to 117 0x9c forwarding per second in the purpose of avoiding a DIAGNOSE 0x9c 118 forwarding storm. 119 A value of 0 turns the forwarding off.
|
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
H A D | mirred.c | 31 /* Forwarding non encapsulated traffic between in verify_uplink_forwarding() 48 "devices are both uplink, can't offload forwarding"); in verify_uplink_forwarding() 52 "devices are not the same uplink, can't offload forwarding"); in verify_uplink_forwarding() 149 "can't support more output ports, can't offload forwarding"); in tc_act_can_offload_mirred() 151 "can't support more than %d output ports, can't offload forwarding\n", in tc_act_can_offload_mirred() 170 NL_SET_ERR_MSG_MOD(extack, "devices are not on same switch HW, can't offload forwarding"); in tc_act_can_offload_mirred() 262 "devices are not on same switch HW, can't offload forwarding"); in parse_mirred()
|
H A D | mirred_nic.c | 24 "devices are not on same switch HW, can't offload forwarding"); in tc_act_can_offload_mirred_nic() 26 "devices %s %s not on same switch HW, can't offload forwarding\n", in tc_act_can_offload_mirred_nic()
|
/openbmc/openbmc/poky/meta/recipes-core/images/build-appliance-image/ |
H A D | README_VirtualBox_Toaster.txt | 46 Port Forwarding. 54 Select "Advanced", click on "Port Forwarding" 56 This will open a new dialog box "Port Forwarding Rules".
|
/openbmc/linux/net/batman-adv/ |
H A D | send.c | 458 * batadv_forw_packet_free() - free a forwarding packet 462 * This frees a forwarding packet and releases any resources it might 481 * batadv_forw_packet_alloc() - allocate a forwarding packet 486 * @skb: The raw packet this forwarding packet shall contain 488 * Allocates a forwarding packet and tries to get a reference to the 492 * Return: An allocated forwarding packet on success, NULL otherwise. 548 * @forw_packet: the forwarding packet to check 550 * This function checks whether the given forwarding packet was claimed by 563 * @forw_packet: the forwarding packet to steal 599 * given hard_iface. If hard_iface is NULL forwarding packets on all hard [all …]
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | bridge_brouter.sh | 71 # ping netns1, expected to not work (ip forwarding is off) 78 # enable forwarding on both interfaces. 82 ip netns exec ns0 sysctl -q net.ipv4.conf.veth0.forwarding=1 83 ip netns exec ns0 sysctl -q net.ipv4.conf.veth1.forwarding=1
|
/openbmc/qemu/include/qapi/ |
H A D | forward-visitor.h | 2 * Forwarding visitor 21 * The forwarding visitor only expects a single name, @from, to be passed for
|
/openbmc/linux/include/net/ |
H A D | nsh.h | 27 * discussion of MPLS-related forwarding requirements. 39 * a configurable parameter to enable forwarding received SFC OAM 40 * packets unmodified to the next element in the chain. Forwarding OAM 44 * analyze the impact of forwarding an OAM packet for all OAM functions 53 * involved in forwarding an NSH packet MUST decrement the TTL value by 54 * 1 prior to NSH forwarding lookup. Decrementing by 1 from an incoming 128 * the identified SFP for forwarding along an SFP. If re-classification
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_lwt_seg6local.sh | 137 ip netns exec ${NS1} sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 138 ip netns exec ${NS2} sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 139 ip netns exec ${NS3} sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 140 ip netns exec ${NS4} sysctl net.ipv6.conf.all.forwarding=1 > /dev/null 141 ip netns exec ${NS5} sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | one_armed_router.sh | 45 lib_dir=$(dirname $0)/../../../net/forwarding 162 log_test "fwd mark: forwarding IPv4 packets in software" 169 log_test "fwd mark: forwarding IPv4 packets in hardware" 205 log_test "fwd mark: forwarding IPv6 packets in software" 212 log_test "fwd mark: forwarding IPv6 packets in hardware"
|
/openbmc/linux/Documentation/networking/dsa/ |
H A D | sja1105.rst | 38 VL Forwarding if VL Lookup no 42 L2 Forwarding yes partially (fully on P/Q/R/S) 46 VL Forwarding Params if VL Forwarding no 48 L2 Forwarding Params yes no 71 The driver supports the configuration of L2 forwarding rules in hardware for 72 port bridging. The forwarding, broadcast and flooding domain between ports can 73 be restricted through two methods: either at the L2 forwarding level (isolate 75 (isolate ports within the same bridge). The final forwarding decision taken by 320 filters should be installed only after the forwarding configuration of the port
|
H A D | dsa.rst | 132 DSA frame header, in order to reduce the autonomous packet forwarding overhead. 629 specific port to be in the forwarding vector. Ports that are unused by the 775 VLAN-unaware bridges). During forwarding and FDB lookup, a packet received on a 881 for incorrect forwarding decisions. In this case, all standalone ports may 895 Offloading the bridge forwarding plane is optional and handled by the methods 898 possible, but the packet forwarding will take place in software, and the ports 903 Concretely, a port starts offloading the forwarding plane of a bridge once it 907 autonomously forwarding (or flooding) received packets without CPU intervention. 910 have already been autonomously forwarded in the forwarding domain of the 912 switch ports part of the same tree ID to be part of the same bridge forwarding [all …]
|