Home
last modified time | relevance | path

Searched full:ipv4 (Results 1 – 25 of 964) sorted by relevance

12345678910>>...39

/linux/tools/testing/selftests/net/packetdrill/
H A Ddefaults.sh10 sysctl -q net.ipv4.tcp_rmem="4096 540000 $((15*1024*1024))"
11 sysctl -q net.ipv4.tcp_wmem="4096 $((256*1024)) 4194304"
14 sysctl -q net.ipv4.tcp_timestamps=1
17 sysctl -q net.ipv4.tcp_syn_retries=5
18 sysctl -q net.ipv4.tcp_synack_retries=5
21 sysctl -q net.ipv4.tcp_frto=2
24 sysctl -q net.ipv4.tcp_sack=1
27 sysctl -q net.ipv4.tcp_dsack=1
30 sysctl -q net.ipv4.tcp_fack=0
33 sysctl -q net.ipv4
[all...]
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_bpf_nf.c100 __builtin_memset(&bpf_tuple, 0, sizeof(bpf_tuple.ipv4)); in nf_ct_test()
109 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
119 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
127 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
135 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
144 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
152 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
159 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4) - 1, &opts_def, in nf_ct_test()
166 bpf_tuple.ipv4.saddr = bpf_get_prandom_u32(); /* src IP */ in nf_ct_test()
167 bpf_tuple.ipv4.daddr = bpf_get_prandom_u32(); /* dst IP */ in nf_ct_test()
[all …]
H A Dtest_tcp_custom_syncookie.c61 struct iphdr *ipv4; member
84 ctx->ipv4 = (struct iphdr *)(ctx->eth + 1); in tcp_load_headers()
86 if (ctx->ipv4 + 1 > ctx->data_end) in tcp_load_headers()
89 if (ctx->ipv4->ihl != sizeof(*ctx->ipv4) / 4) in tcp_load_headers()
92 if (ctx->ipv4->version != 4) in tcp_load_headers()
95 if (ctx->ipv4->protocol != IPPROTO_TCP) in tcp_load_headers()
98 ctx->tcp = (struct tcphdr *)(ctx->ipv4 + 1); in tcp_load_headers()
143 if (ctx->ipv4) { in tcp_reload_headers()
144 ctx->ipv4 in tcp_reload_headers()
[all...]
H A Dtest_sk_assign.c55 get_tuple(struct __sk_buff *skb, bool *ipv4, bool *tcp) in get_tuple() argument
78 *ipv4 = true; in get_tuple()
87 *ipv4 = false; in get_tuple()
102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument
110 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp()
118 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp()
133 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument
141 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp()
152 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp()
175 bool ipv4 = false; in bpf_sk_assign_test() local
[all …]
H A Dtest_cls_redirect.c92 offsetofend(struct bpf_sock_tuple, ipv4.dport) -
93 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1,
199 static INLINING bool pkt_skip_ipv4_options(buf_t *buf, const struct iphdr *ipv4) in buf_assign()
201 if (ipv4->ihl <= 5) { in pkt_skip_ipv4_options() argument
205 return buf_skip(buf, (ipv4->ihl - 5) * 4); in pkt_skip_ipv4_options()
216 struct iphdr *ipv4 = buf_assign(pkt, sizeof(*ipv4), scratch); in pkt_parse_ipv4()
217 if (ipv4 == NULL) { in pkt_parse_ipv4()
221 if (ipv4->ihl < 5) { in pkt_parse_ipv4()
225 if (!pkt_skip_ipv4_options(pkt, ipv4)) { in pkt_parse_ipv4()
218 struct iphdr *ipv4 = buf_assign(pkt, sizeof(*ipv4), scratch); pkt_parse_ipv4() local
626 struct iphdr *ipv4 = (struct iphdr *)iph; fill_tuple() local
742 const struct iphdr *ipv4 = pkt_parse_ipv4(pkt, &_ip4); process_icmpv4() local
862 struct iphdr *ipv4 = pkt_parse_ipv4(pkt, &_ip4); process_ipv4() local
[all...]
H A Dtest_cls_redirect_dynptr.c88 offsetofend(struct bpf_sock_tuple, ipv4.dport) -
89 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1,
135 /* skip ipv4 options */ in pkt_parse_ipv4()
160 /* The highest reasonable value for an IPv4 header in pkt_checksum_fold()
359 /* IPv4 also has a checksum to patch. While the TTL is only one byte, in forward_with_gre()
509 * IPv4 and IPv6.
516 struct iphdr *ipv4 = (struct iphdr *)iph; in fill_tuple() local
517 tuple->ipv4.daddr = ipv4->daddr; in fill_tuple()
518 tuple->ipv4 in fill_tuple()
609 struct iphdr ipv4; process_icmpv4() local
751 struct iphdr ipv4; process_ipv4() local
[all...]
/linux/tools/testing/selftests/net/
H A Dbareudp.sh8 # configurations of bareudp (using IPv4 or IPv6 as underlay and transporting
9 # IPv4, IPv6 or MPLS packets on the overlay).
14 # is assigned an IPv4 and an IPv6 address. A host-route allows a veth to
18 # IPv4 and IPv6 addresses on their loopback device. Routes are added in NS0
20 # For IPv4 and IPv6 reachability tests, the route simply sets the peer's
31 # | * IPv4 address: 192.0.2.100/32 |
34 # | * IPv4 route: 192.0.2.103/32 reachable via 192.0.2.11 |
40 # | ^ * IPv4 address: 192.0.2.10, peer 192.0.2.11/32 |
52 # | * IPv4 address: 192.0.2.11, peer 192.0.2.10/32 |
62 # | ^ * IPv4 address: 192.0.2.21, peer 192.0.2.22/32 |
[all …]
H A Dnat6to4.bpf.c76 // Maximum IPv6 payload length that can be translated to IPv4 in sched_cls_ingress6_nat_6_prog()
108 // Calculate the IPv4 one's complement checksum of the IPv4 header. in sched_cls_ingress6_nat_6_prog()
144 // Copy over the new ipv4 header. in sched_cls_ingress6_nat_6_prog()
158 // Must be meta-ethernet IPv4 frame in sched_cls_egress4_snat4_prog()
162 // Must have ipv4 header in sched_cls_egress4_snat4_prog()
166 // Ethertype - if present - must be IPv4 in sched_cls_egress4_snat4_prog()
174 // We cannot handle IP options, just standard 20 byte == 5 dword minimal IPv4 header in sched_cls_egress4_snat4_prog()
178 // Maximum IPv6 payload length that can be translated to IPv4 in sched_cls_egress4_snat4_prog()
182 // Calculate the IPv4 one's complement checksum of the IPv4 header. in sched_cls_egress4_snat4_prog()
195 // Minimum IPv4 total length is the size of the header in sched_cls_egress4_snat4_prog()
[all …]
/linux/drivers/infiniband/hw/irdma/
H A Dtrace_cm.h15 #define __print_ip_addr(addr, port, ipv4) print_ip_addr(p, addr, port, ipv4) argument
26 __field(bool, ipv4)
30 __entry->ipv4 = cm_info->ipv4;
37 __entry->lport, __entry->ipv4)
48 __field(bool, ipv4)
53 __entry->ipv4 = listener->ipv4;
61 __entry->lport, __entry->ipv4)
71 __field(bool, ipv4)
79 __entry->ipv4 = listener->ipv4;
88 __entry->lport, __entry->ipv4)
[all …]
/linux/net/netfilter/ipset/
H A DKconfig33 can store IPv4 addresses (or network addresses) from a range.
42 can store IPv4 address and (source) MAC address pairs from a range.
60 can store arbitrary IPv4 or IPv6 addresses (or network addresses)
70 can store IPv4/IPv6 address and mark pairs.
79 can store IPv4/IPv6 address and protocol/port pairs.
88 one can store IPv4/IPv6 address, protocol/port, and IPv4/IPv6
98 one can store IPv4/IPv6 address, protocol/port, and IPv4/IPv6
108 one can store IPv4/IPv6 address and MAC (ethernet address) pairs in a set.
126 one can store two IPv4/IPv6 subnets, and a protocol/port in a set.
135 one can store IPv4/IPv6 network address/prefix elements in a set.
[all …]
/linux/tools/testing/selftests/net/forwarding/
H A Dlocal_termination.sh249 check_rcv $rcv_if_name "Unicast IPv4 to primary MAC address" \
250 "$smac > $rcv_dmac, ethertype IPv4 (0x0800)" \
253 check_rcv $rcv_if_name "Unicast IPv4 to macvlan MAC address" \
254 "$smac > $MACVLAN_ADDR, ethertype IPv4 (0x0800)" \
258 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address" \
259 "$smac > $UNKNOWN_UC_ADDR1, ethertype IPv4 (0x0800)" \
262 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, promisc" \
263 "$smac > $UNKNOWN_UC_ADDR2, ethertype IPv4 (0x0800)" \
268 "Unicast IPv4 to unknown MAC address, allmulti" \
269 "$smac > $UNKNOWN_UC_ADDR3, ethertype IPv4 (0x0800)" \
[all …]
H A Drouter.sh197 sysctl_set net.ipv4.conf.all.rp_filter 0
198 sysctl_set net.ipv4.conf.$rp1.rp_filter 0
212 sysctl_restore net.ipv4.conf.$rp1.rp_filter
213 sysctl_restore net.ipv4.conf.all.rp_filter
266 __mc_mac_mismatch "IPv4" "ip" 192.0.2.2 225.1.2.3
275 sysctl_set net.ipv4.conf.all.rp_filter 0
276 sysctl_set net.ipv4.conf.$rp1.rp_filter 0
287 log_test "Source IP is equal to destination IP: IPv4"
290 sysctl_restore net.ipv4.conf.$rp1.rp_filter
291 sysctl_restore net.ipv4.conf.all.rp_filter
[all …]
H A Drouter_broadcast.sh146 sysctl_set net.ipv4.conf.all.bc_forwarding 0
147 sysctl_set net.ipv4.conf.$rp1.bc_forwarding 0
148 sysctl_set net.ipv4.conf.$rp2.bc_forwarding 0
153 sysctl_set net.ipv4.conf.all.bc_forwarding 1
154 sysctl_set net.ipv4.conf.$rp1.bc_forwarding 1
155 sysctl_set net.ipv4.conf.$rp2.bc_forwarding 1
160 sysctl_restore net.ipv4.conf.$rp2.bc_forwarding
161 sysctl_restore net.ipv4.conf.$rp1.bc_forwarding
162 sysctl_restore net.ipv4.conf.all.bc_forwarding
183 sysctl_set net.ipv4.icmp_echo_ignore_broadcasts 0
[all …]
H A Dgre_custom_multipath_hash.sh4 # Test traffic distribution when there are multiple paths between an IPv4 GRE
5 # tunnel. The tunnel carries IPv4 and IPv6 traffic between multiple hosts.
377 log_info "Running IPv4 overlay custom multipath hash tests"
381 sysctl_set net.ipv4.neigh.default.gc_thresh1 1024
382 sysctl_set net.ipv4.neigh.default.gc_thresh2 1024
383 sysctl_set net.ipv4.neigh.default.gc_thresh3 1024
385 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0040
389 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0080
393 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0400
397 sysctl_set net.ipv4
[all...]
/linux/net/ipv4/
H A Dtcp_plb.c30 if (!READ_ONCE(net->ipv4.sysctl_tcp_plb_enabled)) in tcp_plb_update_state()
34 if (cong_ratio < READ_ONCE(net->ipv4.sysctl_tcp_plb_cong_thresh)) in tcp_plb_update_state()
37 READ_ONCE(net->ipv4.sysctl_tcp_plb_rehash_rounds)) in tcp_plb_update_state()
52 if (!READ_ONCE(net->ipv4.sysctl_tcp_plb_enabled)) in tcp_plb_check_rehash()
56 READ_ONCE(net->ipv4.sysctl_tcp_plb_rehash_rounds); in tcp_plb_check_rehash()
58 idle_rehash = READ_ONCE(net->ipv4.sysctl_tcp_plb_idle_rehash_rounds) && in tcp_plb_check_rehash()
61 READ_ONCE(net->ipv4.sysctl_tcp_plb_idle_rehash_rounds); in tcp_plb_check_rehash()
71 max_suspend = 2 * READ_ONCE(net->ipv4.sysctl_tcp_plb_suspend_rto_sec) * HZ; in tcp_plb_check_rehash()
96 if (!READ_ONCE(net->ipv4.sysctl_tcp_plb_enabled)) in tcp_plb_update_state_upon_rto()
99 pause = READ_ONCE(net->ipv4.sysctl_tcp_plb_suspend_rto_sec) * HZ; in tcp_plb_update_state_upon_rto()
/linux/drivers/net/ethernet/mediatek/
H A Dmtk_ppe_debugfs.c36 [MTK_PPE_PKT_TYPE_IPV4_HNAPT] = "IPv4 5T", in mtk_foe_pkt_type_str()
37 [MTK_PPE_PKT_TYPE_IPV4_ROUTE] = "IPv4 3T", in mtk_foe_pkt_type_str()
110 ai.src_port = &entry->ipv4.orig.src_port; in mtk_ppe_debugfs_foe_show()
111 ai.dest_port = &entry->ipv4.orig.dest_port; in mtk_ppe_debugfs_foe_show()
114 ai.src = &entry->ipv4.orig.src_ip; in mtk_ppe_debugfs_foe_show()
115 ai.dest = &entry->ipv4.orig.dest_ip; in mtk_ppe_debugfs_foe_show()
135 ai.src_port = &entry->ipv4.new.src_port; in mtk_ppe_debugfs_foe_show()
136 ai.dest_port = &entry->ipv4.new.dest_port; in mtk_ppe_debugfs_foe_show()
139 ai.src = &entry->ipv4.new.src_ip; in mtk_ppe_debugfs_foe_show()
140 ai.dest = &entry->ipv4.new.dest_ip; in mtk_ppe_debugfs_foe_show()
[all …]
/linux/tools/testing/selftests/bpf/
H A Dtest_lwt_ip_encap.sh
/linux/samples/bpf/
H A Dtc_l2_redirect.sh10 RP_FILTER=$(< /proc/sys/net/ipv4/conf/all/rp_filter)
49 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0
50 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ipt2.rp_filter=0
54 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0
55 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ip6t2.rp_filter=0
66 sysctl -q -w net.ipv4.conf.all.rp_filter=0
80 sysctl -q -w net.ipv4.conf.all.rp_filter=$RP_FILTER
97 sysctl -q -w net.ipv4.conf.ipt.rp_filter=0
98 sysctl -q -w net.ipv4.conf.ipt.forwarding=1
103 sysctl -q -w net.ipv4.conf.ve1.forwarding=1
[all …]
/linux/Documentation/netlink/specs/
H A Dovpn.yaml50 name: remote-ipv4
52 doc: The remote IPv4 address of the peer
54 display-hint: ipv4
82 name: vpn-ipv4
84 doc: The IPv4 address assigned to the peer by the server
86 display-hint: ipv4
95 name: local-ipv4
97 doc: The local IPv4 to be used to send packets to the peer (UDP only)
99 display-hint: ipv4
170 name: remote-ipv4
[all …]
H A Dtcp_metrics.yaml27 name: addr-ipv4
30 display-hint: ipv4
68 name: saddr-ipv4
71 display-hint: ipv4
141 - addr-ipv4
143 - saddr-ipv4
147 - addr-ipv4
149 - saddr-ipv4
/linux/tools/testing/selftests/tc-testing/tc-tests/filters/
H A Dmatchall.json4 "name": "Add ingress matchall filter for protocol ipv4 and action PASS",
26 "name": "Add egress matchall filter for protocol ipv4 and action PASS",
92 …"name": "Add ingress matchall filter for protocol ipv4 and action PASS with priority at 16-bit max…
103 …"cmdUnderTest": "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 65535 protocol ipv4 matcha…
105 … "verifyCmd": "$TC filter get dev $DUMMY parent ffff: handle 1 prio 65535 protocol ipv4 matchall",
114 …"name": "Add egress matchall filter for protocol ipv4 and action PASS with priority at 16-bit maxi…
125 …"cmdUnderTest": "$TC filter add dev $DUMMY parent 1: handle 0x1 prio 65535 protocol ipv4 matchall …
127 … "verifyCmd": "$TC filter get dev $DUMMY parent 1: handle 1 prio 65535 protocol ipv4 matchall",
136 …"name": "Add ingress matchall filter for protocol ipv4 and action PASS with priority exceeding 16-…
147 …: "$TC filter add dev $DUMMY parent ffff: handle 0x1 prio 655355 protocol ipv4 matchall action pas…
[all …]
/linux/net/ipv4/netfilter/
H A DKconfig25 tristate "IPv4 socket lookup support"
27 This option enables the IPv4 socket lookup infrastructure. This is
31 tristate "IPv4 tproxy support"
36 bool "IPv4 nf_tables support"
38 This option enables the IPv4 support for nf_tables.
48 tristate "IPv4 nf_tables packet duplication support"
52 This module enables IPv4 packet duplication support for nf_tables.
58 This module enables IPv4 FIB lookups, e.g. for reverse path filtering.
73 tristate "Netfilter IPv4 packet duplication to alternate destination"
76 This option enables the nf_dup_ipv4 core, which duplicates an IPv4
[all …]
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dcommon.sh13 sysctl -q net.ipv4.tcp_rmem="4096 540000 $((15*1024*1024))"
14 sysctl -q net.ipv4.tcp_wmem="4096 $((256*1024)) 4194304"
17 sysctl -q net.ipv4.tcp_congestion_control=cubic
20 sysctl -q net.ipv4.tcp_slow_start_after_idle=0
23 sysctl -q net.ipv4.tcp_ecn=0
25 sysctl -q net.ipv4.tcp_notsent_lowat=4294967295 > /dev/null 2>&1
/linux/tools/testing/selftests/net/netfilter/
H A Dnft_nat_zones.sh34 v4gc1=$(sysctl -n net.ipv4.neigh.default.gc_thresh1 2>/dev/null)
35 v4gc2=$(sysctl -n net.ipv4.neigh.default.gc_thresh2 2>/dev/null)
36 v4gc3=$(sysctl -n net.ipv4.neigh.default.gc_thresh3 2>/dev/null)
45 sysctl -q net.ipv4.neigh.default.gc_thresh1="$v4gc1" 2>/dev/null
46 sysctl -q net.ipv4.neigh.default.gc_thresh2="$v4gc2" 2>/dev/null
47 sysctl -q net.ipv4.neigh.default.gc_thresh3="$v4gc3" 2>/dev/null
71 sysctl -q net.ipv4.neigh.default.gc_thresh1=512 2>/dev/null
72 sysctl -q net.ipv4.neigh.default.gc_thresh2=1024 2>/dev/null
73 sysctl -q net.ipv4.neigh.default.gc_thresh3=4096 2>/dev/null
88 echo netns exec "$cl" sysctl -q net.ipv4
[all...]
/linux/Documentation/security/
H A DSCTP.rst36 Passes one or more ipv4/ipv6 addresses to the security module for validation
44 @address - One or more ipv4 / ipv6 addresses.
46 ipv4 or ipv6 address using sizeof(struct sockaddr_in) or
53 | SCTP_SOCKOPT_BINDX_ADD | One or more ipv4 / ipv6 addresses |
54 | SCTP_PRIMARY_ADDR | Single ipv4 or ipv6 address |
55 | SCTP_SET_PEER_PRIMARY_ADDR | Single ipv4 or ipv6 address |
62 | SCTP_SOCKOPT_CONNECTX | One or more ipv4 / ipv6 addresses |
63 | SCTP_PARAM_ADD_IP | One or more ipv4 / ipv6 addresses |
64 | SCTP_SENDMSG_CONNECT | Single ipv4 or ipv6 address |
65 | SCTP_PARAM_SET_PRIMARY | Single ipv4 or ipv6 address |
[all …]

12345678910>>...39