Lines Matching full:packets

11 as bridging and routing must also be able to send specific packets to the
16 Without processing such packets, the bridge module could never populate its
22 error datagram. Without letting the kernel route such packets itself, utilities
25 The fundamental ability of sending certain packets to the kernel for processing
32 supported packet traps with ``devlink`` and report trapped packets to
35 Upon receiving trapped packets, ``devlink`` will perform a per-trap packets and
91 * ``drop``: Trapped packets were dropped by the underlying device. Packets
94 * ``exception``: Trapped packets were not forwarded as intended by the
96 entry) and trapped to the control plane for resolution. Packets are
100 * ``control``: Trapped packets were trapped by the device because these are
101 control packets required for the correct functioning of the control plane.
102 For example, ARP request and IGMP query packets. Packets are injected to
123 Generic packet traps are used to describe traps that trap well-defined packets
124 or packets that are trapped due to well-defined conditions (e.g., TTL error).
136 - Traps incoming packets that the device decided to drop because of a
140 - Traps incoming packets that the device decided to drop in case of VLAN
145 - Traps incoming packets that the device decided to drop in case they are
149 - Traps incoming packets that the device decided to drop in case the STP
153 - Traps packets that the device decided to drop in case they need to be
155 no ports the packets should be flooded to
158 - Traps packets that the device decided to drop in case after layer 2
163 - Traps packets that the device decided to drop in case they hit a
167 - Traps unicast packets that should be forwarded by the device whose TTL
171 - Traps packets that the device decided to drop because they could not be
175 - Traps packets that the device decided to drop because they need to
176 undergo a layer 3 lookup, but are not IP or MPLS packets
179 - Traps packets that the device decided to drop because they need to be
184 - Traps packets that the device decided to drop because they need to be
189 - Traps packets that the device decided to drop because they need to be
193 - Traps packets that the device decided to drop because they need to be
197 - Traps packets that the device decided to drop because they need to be
202 - Traps packets that the device decided to drop because they need to be
206 - Traps IPv6 packets that the device decided to drop because they need to
211 - Traps IPv6 packets that the device decided to drop because they need to
216 - Traps packets that should have been routed by the device, but were bigger
220 - Traps packets that did not have a matching IP neighbour after routing
223 - Traps multicast IP packets that failed reverse-path forwarding (RPF)
227 - Traps packets that hit reject routes (i.e., "unreachable", "prohibit")
230 - Traps unicast IPv4 packets that did not match any route
233 - Traps unicast IPv6 packets that did not match any route
236 - Traps packets that the device decided to drop because they are not
238 device in layer 2 and reach the router. Such packets should not be
242 - Traps NVE and IPinIP packets that the device decided to drop because of
247 - Traps NVE packets that the device decided to drop because their overlay
251 - Traps packets dropped during processing of ingress flow action drop
254 - Traps packets dropped during processing of egress flow action drop
257 - Traps STP packets
260 - Traps LACP packets
263 - Traps LLDP packets
266 - Traps IGMP Membership Query packets
269 - Traps IGMP Version 1 Membership Report packets
272 - Traps IGMP Version 2 Membership Report packets
275 - Traps IGMP Version 3 Membership Report packets
278 - Traps IGMP Version 2 Leave Group packets
281 - Traps MLD Multicast Listener Query packets
284 - Traps MLD Version 1 Multicast Listener Report packets
287 - Traps MLD Version 2 Multicast Listener Report packets
290 - Traps MLD Version 1 Multicast Listener Done packets
293 - Traps IPv4 DHCP packets
296 - Traps IPv6 DHCP packets
299 - Traps ARP request packets
302 - Traps ARP response packets
305 - Traps NVE-decapsulated ARP packets that reached the overlay network.
310 - Traps IPv6 Neighbour Solicitation packets
313 - Traps IPv6 Neighbour Advertisement packets
316 - Traps IPv4 BFD packets
319 - Traps IPv6 BFD packets
322 - Traps IPv4 OSPF packets
325 - Traps IPv6 OSPF packets
328 - Traps IPv4 BGP packets
331 - Traps IPv6 BGP packets
334 - Traps IPv4 VRRP packets
337 - Traps IPv6 VRRP packets
340 - Traps IPv4 PIM packets
343 - Traps IPv6 PIM packets
346 - Traps unicast packets that need to be routed through the same layer 3
347 interface from which they were received. Such packets are routed by the
348 kernel, but also cause it to potentially generate ICMP redirect packets
351 - Traps unicast packets that hit a local route and need to be locally
355 - Traps packets that should be routed through an external interface (e.g.,
360 - Traps unicast IPv6 packets that need to be routed and have a destination
363 packets for local delivery
366 - Traps IPv6 packets that their destination IP address is the "All Nodes
370 - Traps IPv6 packets that their destination IP address is the "All Routers
374 - Traps IPv6 Router Solicitation packets
377 - Traps IPv6 Router Advertisement packets
380 - Traps IPv6 Redirect Message packets
383 - Traps IPv4 packets that need to be routed and include the Router Alert
384 option. Such packets need to be locally delivered to raw sockets that
388 - Traps IPv6 packets that need to be routed and include the Router Alert
389 option in their Hop-by-Hop extension header. Such packets need to be
402 - Traps packets sampled during processing of flow action sample (e.g., via
406 - Traps packets logged during processing of flow action trap (e.g., via
410 - Traps packets dropped due to the RED (Random Early Detection) algorithm
414 - Traps packets dropped due to an error in the VXLAN header parsing which
418 - Traps packets dropped due to an error in the LLC+SNAP header parsing
421 - Traps packets dropped due to an error in the VLAN header parsing. Could
425 - Traps packets dropped due to an error in the PPPoE+PPP header parsing.
431 - Traps packets dropped due to an error in the MPLS header parsing which
435 - Traps packets dropped due to an error in the ARP header parsing
438 - Traps packets dropped due to an error in the first IP header parsing.
439 This packet trap could include packets which do not pass an IP checksum
445 - Traps packets dropped due to an error in the parsing of the last IP
450 - Traps packets dropped due to an error in the GRE header parsing
453 - Traps packets dropped due to an error in the UDP header parsing.
459 - Traps packets dropped due to an error in the TCP header parsing.
464 - Traps packets dropped due to an error in the IPSEC header parsing
467 - Traps packets dropped due to an error in the SCTP header parsing.
472 - Traps packets dropped due to an error in the DCCP header parsing
475 - Traps packets dropped due to an error in the GTP header parsing
478 - Traps packets dropped due to an error in the ESP header parsing
481 - Traps packets that the device decided to drop in case they hit a
485 - Traps incoming packets that the device decided to drop because
490 - Traps "Extensible Authentication Protocol over LAN" (EAPOL) packets
494 - Traps packets that the device decided to drop because they failed the
495 locked bridge port check. That is, packets that were received via a
520 per-group packets and bytes statistics, in case per-trap statistics are too
529 - Contains packet traps for packets that were dropped by the device during
532 - Contains packet traps for packets that were dropped by the device during
535 - Contains packet traps for packets that hit an exception (e.g., TTL
538 - Contains packet traps for packets that were dropped by the device due to
541 - Contains packet traps for packets that were dropped by the device during
544 - Contains packet traps for packets that were dropped by the device during
547 - Contains packet traps for STP packets
549 - Contains packet traps for LACP packets
551 - Contains packet traps for LLDP packets
553 - Contains packet traps for IGMP and MLD packets required for multicast
556 - Contains packet traps for DHCP packets
558 - Contains packet traps for neighbour discovery packets (e.g., ARP, IPv6
561 - Contains packet traps for BFD packets
563 - Contains packet traps for OSPF packets
565 - Contains packet traps for BGP packets
567 - Contains packet traps for VRRP packets
569 - Contains packet traps for PIM packets
571 - Contains a packet trap for unicast loopback packets (i.e.,
577 - Contains packet traps for packets that should be locally delivered after
581 - Contains packet traps for packets that should be routed through an
585 - Contains packet traps for various IPv6 control packets (e.g., Router
594 - Contains packet traps for packets that were sampled by the device during
597 - Contains packet traps for packets that were trapped (logged) by the
600 - Contains packet traps for packets that were marked by the device during
604 (EAPOL) packets specified in IEEE 802.1X
609 As previously explained, the underlying device can trap certain packets to the
616 trapped packets to rates that can be handled by the CPU.
629 to retrieve the number of packets that were dropped by the policer because its