/linux-6.14.4/drivers/misc/vmw_vmci/ |
D | vmci_route.c | 1 // SPDX-License-Identifier: GPL-2.0-only 38 * not touch a non-existent device. in vmci_route() 42 if (VMCI_INVALID_ID == dst->context) in vmci_route() 46 if (VMCI_HYPERVISOR_CONTEXT_ID == dst->context) { in vmci_route() 51 * from a local client. in vmci_route() 63 /* And we cannot send if the source is the host context. */ in vmci_route() 64 if (VMCI_HOST_CONTEXT_ID == src->context) in vmci_route() 75 if (VMCI_INVALID_ID == src->context && in vmci_route() 76 VMCI_INVALID_ID != src->resource) in vmci_route() 77 src->context = vmci_get_context_id(); in vmci_route() [all …]
|
/linux-6.14.4/drivers/net/ethernet/sfc/ |
D | filter.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2005-2013 Solarflare Communications Inc. 16 * enum efx_filter_match_flags - Flags for hardware filter match type 17 * @EFX_FILTER_MATCH_REM_HOST: Match by remote IP host address 18 * @EFX_FILTER_MATCH_LOC_HOST: Match by local IP host address 21 * @EFX_FILTER_MATCH_LOC_MAC: Match by local MAC address 22 * @EFX_FILTER_MATCH_LOC_PORT: Match by local TCP/UDP port 23 * @EFX_FILTER_MATCH_ETHER_TYPE: Match by Ether-type 27 * @EFX_FILTER_MATCH_LOC_MAC_IG: Match by local MAC address I/G bit. 33 * - Huntington supports filter matching controlled by firmware, potentially [all …]
|
/linux-6.14.4/drivers/net/ethernet/sfc/falcon/ |
D | filter.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2005-2013 Solarflare Communications Inc. 15 * enum ef4_filter_match_flags - Flags for hardware filter match type 16 * @EF4_FILTER_MATCH_REM_HOST: Match by remote IP host address 17 * @EF4_FILTER_MATCH_LOC_HOST: Match by local IP host address 20 * @EF4_FILTER_MATCH_LOC_MAC: Match by local MAC address 21 * @EF4_FILTER_MATCH_LOC_PORT: Match by local TCP/UDP port 22 * @EF4_FILTER_MATCH_ETHER_TYPE: Match by Ether-type 26 * @EF4_FILTER_MATCH_LOC_MAC_IG: Match by local MAC address I/G bit. 31 * - Falcon supports RX filters matching by {TCP,UDP}/IPv4 4-tuple or [all …]
|
/linux-6.14.4/drivers/net/ethernet/sfc/siena/ |
D | filter.h | 1 /* SPDX-License-Identifier: GPL-2.0-only */ 4 * Copyright 2005-2013 Solarflare Communications Inc. 15 * enum efx_filter_match_flags - Flags for hardware filter match type 16 * @EFX_FILTER_MATCH_REM_HOST: Match by remote IP host address 17 * @EFX_FILTER_MATCH_LOC_HOST: Match by local IP host address 20 * @EFX_FILTER_MATCH_LOC_MAC: Match by local MAC address 21 * @EFX_FILTER_MATCH_LOC_PORT: Match by local TCP/UDP port 22 * @EFX_FILTER_MATCH_ETHER_TYPE: Match by Ether-type 26 * @EFX_FILTER_MATCH_LOC_MAC_IG: Match by local MAC address I/G bit. 32 * - Falcon supports RX filters matching by {TCP,UDP}/IPv4 4-tuple or [all …]
|
/linux-6.14.4/tools/testing/selftests/net/ |
D | srv6_end_dt6_l3vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 17 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the IPv6 18 # L3 VPN of tenant 100 while hs-t200-3 and hs-t200-4 are connected using the 20 # is forbidden and thus, for example, hs-t100-1 cannot reach hs-t200-3 and vice 23 # Routers rt-1 and rt-2 implement IPv6 L3 VPN services leveraging the SRv6 28 # example where, within the same domain of tenant 100, the host hs-t100-1 pings 29 # the host hs-t100-2. 31 # First of all, L2 reachability of the host hs-t100-2 is taken into account by 32 # the router rt-1 which acts as a ndp proxy. 34 # When the host hs-t100-1 sends an IPv6 packet destined to hs-t100-2, the [all …]
|
D | srv6_end_dt4_l3vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 16 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the IPv4 17 # L3 VPN of tenant 100 while hs-t200-3 and hs-t200-4 are connected using the 19 # is forbidden and thus, for example, hs-t100-1 cannot reach hs-t200-3 and vice 22 # Routers rt-1 and rt-2 implement IPv4 L3 VPN services leveraging the SRv6 27 # example where, within the same domain of tenant 100, the host hs-t100-1 pings 28 # the host hs-t100-2. 30 # First of all, L2 reachability of the host hs-t100-2 is taken into account by 31 # the router rt-1 which acts as an arp proxy. 33 # When the host hs-t100-1 sends an IPv4 packet destined to hs-t100-2, the [all …]
|
D | srv6_hl2encap_red_l2vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 10 # In this example, hosts hs-1 and hs-2 are connected through an L2 VPN service. 11 # Currently, the SRv6 subsystem in Linux allows hosts hs-1 and hs-2 to exchange 14 # Routers rt-1,rt-2,rt-3 and rt-4 implement L2 VPN services 31 # sent over the interface connected with the destination host. 35 # +--------+ +--------+ 37 # | hs-1 | | hs-2 | 39 # +---+----+ +--- +---+ 42 # +---+----+ +----+---+ 44 # | rt-1 +-------------------+ rt-2 | [all …]
|
D | srv6_end_dx6_netfilter_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 15 # Routers rt-1 and rt-2 implement IPv6 L3 VPN services leveraging the SRv6 20 # example where, within the same domain of tenant 100, the host hs-1 pings 21 # the host hs-2. 23 # First of all, L2 reachability of the host hs-2 is taken into account by 24 # the router rt-1 which acts as an arp proxy. 26 # When the host hs-1 sends an IPv6 packet destined to hs-2, the router rt-1 27 # receives the packet on the internal veth-t100 interface, rt-1 contains the 30 # network up to the router rt-2 that receives it on veth0 interface. 32 # The rt-2 router uses the 'localsid' routing table to process incoming [all …]
|
D | srv6_end_dx4_netfilter_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 15 # Routers rt-1 and rt-2 implement IPv4 L3 VPN services leveraging the SRv6 20 # example where, within the same domain of tenant 100, the host hs-1 pings 21 # the host hs-2. 23 # First of all, L2 reachability of the host hs-2 is taken into account by 24 # the router rt-1 which acts as an arp proxy. 26 # When the host hs-1 sends an IPv4 packet destined to hs-2, the router rt-1 27 # receives the packet on the internal veth-t100 interface, rt-1 contains the 30 # network up to the router rt-2 that receives it on veth0 interface. 32 # The rt-2 router uses the 'localsid' routing table to process incoming [all …]
|
D | srv6_end_dt46_l3vpn_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 11 # End.DT6 Behaviors which can be used respectively to support IPv4-in-IPv6 and 12 # IPv6-in-IPv6 VPNs. With End.DT4 and End.DT6 it is not possible to create a 26 # In other words, hosts hs-t100-1 and hs-t100-2 are connected through the 27 # IPv4/IPv6 L3 VPN of tenant 100 while hs-t200-3 and hs-t200-4 are connected 29 # and tenant 200 is forbidden and thus, for example, hs-t100-1 cannot reach 30 # hs-t200-3 and vice versa. 32 # Routers rt-1 and rt-2 implement IPv4/IPv6 L3 VPN services leveraging the SRv6 37 # consider an example where, within the same domain of tenant 100, the host 38 # hs-t100-1 pings the host hs-t100-2. [all …]
|
D | traceroute.sh | 2 # SPDX-License-Identifier: GPL-2.0 15 local rc=$1 16 local expected=$2 17 local msg="$3" 19 if [ ${rc} -eq ${expected} ]; then 20 printf "TEST: %-60s [ OK ]\n" "${msg}" 25 printf "TEST: %-60s [FAIL]\n" "${msg}" 37 local ns 38 local cmd 39 local out [all …]
|
D | fib_nexthop_multiprefix.sh | 2 # SPDX-License-Identifier: GPL-2.0 5 # Validate a different # exception is generated in h0 for each remote host. 9 # h0 - r1 - h2 26 local rc=$1 27 local expected=$2 28 local msg="$3" 30 if [ ${rc} -eq ${expected} ]; then 31 printf "TEST: %-60s [ OK ]\n" "${msg}" 36 printf "TEST: %-60s [FAIL]\n" "${msg}" 50 local cmd="$*" [all …]
|
D | ndisc_unsolicited_na_test.sh | 2 # SPDX-License-Identifier: GPL-2.0 5 # enable RFC9131 behaviour. The following is the test-matrix. 7 # ---- ------ ------ ---------------------------------------------- 19 HOST_INTF="veth-host" 20 ROUTER_INTF="veth-router" 33 local rc=$1 34 local expected=$2 35 local msg="$3" 37 if [ ${rc} -eq ${expected} ]; then 38 printf " TEST: %-60s [ OK ]\n" "${msg}" [all …]
|
D | arp_ndisc_untracked_subnets.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # 2 namespaces: one host and one router. Use arping from the host to send a 12 ROUTER_INTF="veth-router" 16 HOST_INTF="veth-host" 32 set -e 33 local arp_accept=$1 39 # namespaces. veth0 is veth-router, veth1 is veth-host. 60 ip netns exec ${ROUTER_NS} sysctl -w \ 66 set -e 67 local accept_untracked_na=$1 [all …]
|
D | l2tp.sh | 2 # SPDX-License-Identifier: GPL-2.0 6 # host-1 | router | host-2 26 local rc=$1 27 local expected=$2 28 local msg="$3" 30 if [ ${rc} -eq ${expected} ]; then 31 printf "TEST: %-60s [ OK ]\n" "${msg}" 36 printf "TEST: %-60s [FAIL]\n" "${msg}" 48 local ns 49 local cmd [all …]
|
/linux-6.14.4/tools/usb/usbip/doc/ |
D | usbip.8 | 3 usbip \- manage USB/IP devices 15 \fB\-\-debug\fR 21 \fB\-\-log\fR 27 \fB\-\-tcp-port PORT\fR 29 Connect to PORT on remote host (used for attach and list --remote). 47 \fBattach\fR \-\-remote=<\fIhost\fR> \-\-busid=<\fIbus_id\fR> 53 \fBattach\fR \-\-remote=<\fIhost\fR> \-\-device=<\fIdev_id\fR> 60 \fBdetach\fR \-\-port=<\fIport\fR> 66 \fBbind\fR \-\-busid=<\fIbusid\fR> 72 \fBunbind\fR \-\-busid=<\fIbusid\fR> [all …]
|
/linux-6.14.4/tools/testing/selftests/net/forwarding/ |
D | bridge_mdb.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # +-----------------------+ +------------------------+ 15 # +----|------------------+ +----|-------------------+ 17 # +----|--------------------------------------------------|-------------------+ 19 # | +--|--------------------------------------------------|-----------------+ | 24 # | +-----------------------------------------------------------------------+ | 25 # +---------------------------------------------------------------------------+ 138 local name=$1; shift 139 local grp=$1; shift 140 local src=$1; shift [all …]
|
D | sch_tbf_core.sh | 1 # SPDX-License-Identifier: GPL-2.0 7 # In order to test per-class shaping, $swp2 actually contains TBF under PRIO or 10 # +-------------------------------------------+ 18 # +---------------------|---------------------+ 20 # +---------------------|---------------------+ 24 # | +-|--------------+ +--------------|-+ | 30 # | +-|--------------+ +--------------|-+ | 34 # +---------------------|---------------------+ 36 # +---------------------|---------------------+ 43 # +-------------------------------------------+ [all …]
|
D | router_multicast.sh | 2 # SPDX-License-Identifier: GPL-2.0 4 # +------------------+ 9 # +-------------|----+ 11 # +-------------|-------------------------------+ 20 # +--------------|--------------------------|---+ 23 # +--------------|---+ +--------------|---+ 28 # +------------------+ +------------------+ 154 SMCROUTEDIR="$(mktemp -d)" 161 $MCD -N -I $table_name -f $SMCROUTEDIR/$table_name.conf \ 162 -P $SMCROUTEDIR/$table_name.pid [all …]
|
/linux-6.14.4/drivers/scsi/libfc/ |
D | fc_lport.c | 1 // SPDX-License-Identifier: GPL-2.0-only 5 * Maintained at www.Open-FCoE.org 27 * be held while attempting to acquire a greater lock. Here is the hierarchy- 42 * single-threaded workqueue. An rport would never be free'd while in a 92 /* Fabric IDs to use for point-to-point mode, chosen on whims. */ 134 * struct fc_bsg_info - FC Passthrough managemet structure 136 * @lport: The local port to pass through a command 138 * @sg: job->reply_payload.sg_list 139 * @nents: job->reply_payload.sg_cnt 152 * fc_frame_drop() - Dummy frame handler [all …]
|
/linux-6.14.4/Documentation/driver-api/mei/ |
D | iamt.rst | 1 .. SPDX-License-Identifier: GPL-2.0 10 Intel AMT provides the ability to manage a host remotely out-of-band (OOB) 11 even when the operating system running on the host processor has crashed or 15 - Monitoring hardware state and platform components 16 - Remote power off/on (useful for green computing or overnight IT 18 - OS updates 19 - Storage of useful platform information such as software assets 20 - Built-in hardware KVM 21 - Selective network isolation of Ethernet and IP protocol flows based 23 - IDE device redirection from remote management console [all …]
|
/linux-6.14.4/tools/testing/selftests/drivers/net/mlxsw/ |
D | sch_red_core.sh | 1 # SPDX-License-Identifier: GPL-2.0 9 # is what H2 is used for--it sends the extra traffic to create backlog. 16 # The test uses the buffer build-up behavior to test the installed RED. 23 # +--------------------------+ +--------------------------+ 34 # +-------------|------------+ +-------------|------------+ 36 # +-------------|------------------------------------------------|------------+ 40 # | +-|-----------------+ | +-|-----------------+ | | 42 # | | | | .-------------+ $swp5.10 | | | 46 # | +-|-----------------+ | | | + $swp3.10 | | | 47 # | | | | +-|-----------------+ | | [all …]
|
/linux-6.14.4/drivers/scsi/cxlflash/ |
D | lunmgt.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 25 * create_local() - allocate and initialize a local LUN information structure 29 * Return: Allocated local llun_info structure on success, NULL on failure 33 struct cxlflash_cfg *cfg = shost_priv(sdev->host); in create_local() 34 struct device *dev = &cfg->dev->dev; in create_local() 43 lli->sdev = sdev; in create_local() 44 lli->host_no = sdev->host->host_no; in create_local() 45 lli->in_table = false; in create_local() 47 memcpy(lli->wwid, wwid, DK_CXLFLASH_MANAGE_LUN_WWID_LEN); in create_local() 53 * create_global() - allocate and initialize a global LUN information structure [all …]
|
/linux-6.14.4/Documentation/filesystems/nfs/ |
D | localio.rst | 10 host. Select "NFS client and server support for LOCALIO auxiliary 14 Once an NFS client and server handshake as "local", the client will 23 clients local to their servers. In a private implementation that 25 address based match against all local network interfaces was attempted. 26 But unlike the LOCALIO protocol, the sockaddr-based matching didn't 29 The robust handshake between local client and server is just the 35 (e.g. kubernetes) where it is possible to run an IO job local to the 42 - With LOCALIO: 48 - Without LOCALIO: 55 - With LOCALIO: [all …]
|
/linux-6.14.4/tools/testing/selftests/drivers/net/hw/lib/py/ |
D | linkconfig.py | 1 # SPDX-License-Identifier: GPL-2.0 15 def __init__(self, cfg: object) -> None: 19 """Get the initial link configuration of local interface""" 22 def get_partner_netif_name(self) -> Optional[str]: 28 partner_json_output = ip("addr show", json=True, host=self.cfg.remote) 31 if addr.get('local') == self.cfg.remote_addr: 41 def verify_link_up(self) -> bool: 42 """Verify whether the local interface link is up""" 52 def reset_interface(self, local: bool = True, remote: bool = True) -> bool: 53 ksft_pr("Resetting interfaces in local and remote") [all …]
|