Home
last modified time | relevance | path

Searched refs:code (Results 1 – 6 of 6) sorted by relevance

/kernel/tests/net/test/
Dbpf.py293 code = BPF_ALU64 | BPF_MOV | BPF_X
295 ret = BpfInsn((code, dst_src, 0, 0))
300 code = BPF_LDX | (size & 0x18) | BPF_MEM
302 ret = BpfInsn((code, dst_src, off, 0))
307 code = BPF_STX | (size & 0x18) | BPF_MEM
309 ret = BpfInsn((code, dst_src, off, 0))
314 code = BPF_ST | (size & 0x18) | BPF_MEM
316 ret = BpfInsn((code, dst_src, off, imm))
321 code = BPF_ALU64 | (op & 0xf0) | BPF_K
323 ret = BpfInsn((code, dst_src, 0, imm))
[all …]
Dsock_diag.py270 if op.code in [INET_DIAG_BC_NOP, INET_DIAG_BC_JMP, INET_DIAG_BC_AUTO]:
272 elif op.code in [INET_DIAG_BC_S_GE, INET_DIAG_BC_S_LE,
276 elif op.code in [INET_DIAG_BC_S_COND, INET_DIAG_BC_D_COND]:
285 elif op.code == INET_DIAG_BC_DEV_COND:
289 elif op.code == INET_DIAG_BC_MARK_COND:
292 raise ValueError("Unknown opcode %d" % op.code)
Dpackets.py149 scapy.ICMPerror(type=3, code=3) / packet)
153 scapy.ICMPv6DestUnreach(code=4) / packet)
159 scapy.ICMPerror(type=3, code=4) / str(packet)[:64])
Dping6_test.py110 scapy.ICMP(type=11, code=0) /
116 scapy.ICMPv6TimeExceeded(code=0) /
133 icmp.code != 0):
155 icmpv6.code != 0):
396 scapy.ICMP(type=3, code=0) /
DREADME4 A simple framework for blackbox testing of kernel networking code.
Dsock_diag_test.py375 def DiagDump(code): argument
379 self.sock_diag._Dump(code, req, sock_diag.InetDiagMsg, "")