/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | one_armed_router.sh | 136 skip_hw dst_ip 198.51.100.1 ip_proto udp dst_port 52768 \ 140 skip_hw dst_ip 198.51.100.1 ip_proto udp dst_port 52768 \ 179 skip_hw dst_ip 2001:db8:2::1 ip_proto udp dst_port 52768 \ 183 skip_hw dst_ip 2001:db8:2::1 ip_proto udp dst_port 52768 \
|
H A D | vxlan_flooding.sh | 179 matchall skip_hw action drop 182 flower skip_hw dst_mac de:ad:be:ef:13:37 action pass 184 matchall skip_hw action drop
|
H A D | blackhole_routes.sh | 124 skip_hw dst_ip 198.51.100.1 src_ip 192.0.2.1 ip_proto icmp \ 148 skip_hw dst_ip 2001:db8:2::1 src_ip 2001:db8:1::1 \
|
H A D | devlink_trap_l3_exceptions.sh | 186 flower skip_hw ip_proto icmp type 3 code 4 action pass 224 flower skip_hw ip_proto icmp type 11 code 0 action pass 334 skip_hw ip_proto $ip_proto type $type code $code action pass
|
H A D | devlink_trap_l3_drops.sh | 531 flower skip_hw dst_ip $dip ip_proto $ip_proto action drop 668 flower skip_hw dst_ip $dip ip_proto udp action drop
|
H A D | devlink_trap_tunnel_vxlan_ipv6.sh | 249 flower skip_hw src_ip 2001:db8:3::1 dst_ip 2001:db8:1::1 \
|
H A D | devlink_trap_tunnel_vxlan.sh | 241 flower skip_hw src_ip 192.0.2.3 dst_ip 192.0.2.1 action pass
|
/openbmc/linux/tools/testing/selftests/drivers/net/mlxsw/spectrum-2/ |
H A D | vxlan_flooding_ipv6.sh | 166 matchall skip_hw action drop 169 flower skip_hw dst_mac de:ad:be:ef:13:37 action pass 171 matchall skip_hw action drop
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | forwarding.config.sample | 48 TC_FLAG=skip_hw
|
H A D | pedit_dsfield.sh | 161 flower skip_hw $match_flower action pass 234 flower skip_hw ip_tos 125 action pass
|
H A D | loopback.sh | 39 skip_hw arp_op reply arp_tip 192.0.2.1 action drop
|
H A D | sch_red.sh | 374 tc filter add block 10 pref 1234 handle 102 matchall skip_hw \ 415 tc filter add block 10 pref 1234 handle 102 matchall skip_hw \
|
H A D | pedit_ip.sh | 127 flower skip_hw $match_flower action pass
|
H A D | pedit_l4port.sh | 131 flower skip_hw $match_flower action pass
|
H A D | lib.sh | 1025 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1032 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1104 "skip_hw ip_tos $((dscp << 2))"
|
H A D | router_multicast.sh | 330 skip_hw dst_ip 225.1.2.3 ip_proto udp dst_port 12345 action pass 375 skip_hw dst_ip ff0e::3 ip_proto udp dst_port 12345 action pass
|
H A D | mirror_gre_changes.sh | 78 flower skip_hw ip_ttl 50 action pass
|
H A D | tc_actions.sh | 131 skip_hw dst_ip 192.0.2.2 action drop
|
/openbmc/linux/tools/testing/selftests/bpf/ |
H A D | test_offload.py | 562 skip_sw=False, skip_hw=False, argument 573 if skip_hw: 680 def test_spurios_extack(sim, obj, skip_hw, needle): argument 681 res = sim.cls_bpf_add_filter(obj, prio=1, handle=1, skip_hw=skip_hw, 685 skip_hw=skip_hw, include_stderr=True) 823 ret, _ = sim.cls_bpf_add_filter(obj, skip_hw=True, fail=False) 889 sim.cls_bpf_add_filter(obj, prio=1, handle=1, skip_hw=True) 890 sim.cls_bpf_add_filter(obj, op="replace", prio=1, handle=1, skip_hw=True) 897 skip_sw=(j == 1), skip_hw=(j == 2),
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | ip6_gre_headroom.sh | 52 tc filter add dev swp1 ingress pref 1000 matchall skip_hw \
|
/openbmc/linux/tools/testing/selftests/drivers/net/bonding/ |
H A D | bond_options.sh | 274 flower skip_hw arp_op request arp_sip ${s_ip4} arp_tip ${s_ip4} action pass
|
H A D | net_forwarding_lib.sh | 1025 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1032 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1104 "skip_hw ip_tos $((dscp << 2))"
|
/openbmc/linux/tools/testing/selftests/drivers/net/team/ |
H A D | net_forwarding_lib.sh | 1025 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1032 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1104 "skip_hw ip_tos $((dscp << 2))"
|
/openbmc/linux/tools/testing/selftests/drivers/net/dsa/ |
H A D | lib.sh | 1025 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1032 if [ "${tcflags/skip_hw}" != "$tcflags" ]; then 1104 "skip_hw ip_tos $((dscp << 2))"
|
H A D | tc_actions.sh | 131 skip_hw dst_ip 192.0.2.2 action drop
|