Home
last modified time | relevance | path

Searched full:tcp (Results 1 – 25 of 1079) sorted by relevance

12345678910>>...44

/linux/Documentation/networking/
H A Dtcp_ao.rst4 TCP Authentication Option Linux implementation (RFC5925)
7 TCP Authentication Option (TCP-AO) provides a TCP extension aimed at verifying
8 segments between trusted peers. It adds a new TCP header option with
10 of a TCP segment using a hashing function with a password known to both peers.
11 The intent of TCP-AO is to deprecate TCP-MD5 providing better security,
17 .. table:: Short and Limited Comparison of TCP-AO and TCP-MD5
20 | | TCP-MD5 | TCP-AO |
31 | | |TCP header permitted. |
34 |TCP connection | | |
45 |traffic-crossing | |includes TCP ports. |
[all …]
H A Dsnmp_counter.rst32 The number of packets delivers to the upper layer protocols. E.g. TCP, UDP,
249 General TCP counters
257 The number of packets received by the TCP layer. As mentioned in
259 error, invalid TCP header and so on. Only one error won't be included:
263 packets would be delivered to the TCP layer, but the TCP layer will discard
274 The number of packets sent by the TCP layer. As mentioned in RFC1213,
286 It means the TCP layer sends a SYN, and come into the SYN-SENT
296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into
301 When packets are received by the TCP layer and are not be read by the
302 application, the TCP layer will try to merge them. This counter
[all …]
H A Dkcm.rst8 interface over TCP for generic application protocols. With KCM an application
9 can efficiently send and receive application protocol messages over TCP using
31 | TCP sock | | TCP sock | | TCP sock | | TCP sock | | TCP sock |
46 written on a KCM socket are sent atomically on an appropriate TCP socket.
47 Similarly, in the receive path, messages are constructed on each TCP socket
50 TCP sockets & Psocks
53 TCP sockets may be bound to a KCM multiplexor. A Psock structure is allocated
54 for each bound TCP socket, this structure holds the state for constructing
60 Each multiplexor assumes that all attached TCP connections are to the same
73 Messages are sent over a TCP stream with some application protocol message
[all …]
H A Dmptcp.rst4 Multipath TCP (MPTCP)
10 Multipath TCP or MPTCP is an extension to the standard TCP and is described in
12 device to make use of multiple interfaces at once to send and receive TCP
18 For more details about Multipath TCP in the Linux kernel, please see the
26 brings new use-cases, compared to TCP:
42 a regular TCP connection that is used to transmit data through one interface.
44 host to be able to detect the use of MPTCP, a new field is added to the TCP
45 *option* field of the underlying TCP *subflow*. This field contains, amongst
48 it, the returned ``SYN+ACK`` packet will not contain MPTCP options in the TCP
49 *option* field. In that case, the connection will be "downgraded" to plain TCP,
[all …]
/linux/tools/testing/selftests/bpf/progs/
H A Dtest_tcp_custom_syncookie.c63 struct tcphdr *tcp; member
98 ctx->tcp = (struct tcphdr *)(ctx->ipv4 + 1); in tcp_load_headers()
112 ctx->tcp = (struct tcphdr *)(ctx->ipv6 + 1); in tcp_load_headers()
118 if (ctx->tcp + 1 > ctx->data_end) in tcp_load_headers()
133 if (ctx->tcp->doff < sizeof(*ctx->tcp) / 4) in tcp_reload_headers()
136 /* Needed to calculate csum and parse TCP options. */ in tcp_reload_headers()
137 if (bpf_skb_change_tail(ctx->skb, data_len + 60 - ctx->tcp->doff * 4, 0)) in tcp_reload_headers()
146 ctx->tcp = (struct tcphdr *)(ctx->ipv4 + 1); in tcp_reload_headers()
150 ctx->tcp in tcp_reload_headers()
[all...]
H A Dtest_pkt_access.c12 #include <linux/tcp.h>
89 struct tcphdr *tcp = NULL; in test_pkt_write_access_subprog() local
94 tcp = data + off; in test_pkt_write_access_subprog()
95 if (tcp + 1 > data_end) in test_pkt_write_access_subprog()
98 tcp->check++; in test_pkt_write_access_subprog()
108 struct tcphdr *tcp = NULL; in test_pkt_access() local
122 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); in test_pkt_access()
130 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); in test_pkt_access()
139 if (tcp) { in test_pkt_access()
140 if (test_pkt_write_access_subprog(skb, (void *)tcp - data)) in test_pkt_access()
[all …]
H A Dtest_migrate_reuseport.c19 #include <linux/tcp.h>
50 struct tcphdr *tcp = NULL; in drop_ack() local
65 tcp = (struct tcphdr *)((void *)ip + ip->ihl * 4); in drop_ack()
77 tcp = (struct tcphdr *)(ipv6 + 1); in drop_ack()
84 if (tcp + 1 > data_end) in drop_ack()
87 if (tcp->dest != server_port) in drop_ack()
90 if (!tcp->syn && tcp->ack) in drop_ack()
/linux/net/netfilter/
H A Dnf_conntrack_proto_tcp.c12 #include <linux/tcp.h>
19 #include <net/tcp.h>
91 /* What TCP flags are set from RST/SYN/FIN/ACK. */
102 * The TCP state transition table needs a few words...
271 seq_printf(s, "%s ", tcp_conntrack_names[ct->proto.tcp.state]); in tcp_print_conntrack()
284 /* TCP connection tracking based on 'Real Stateful TCP Packet Filtering
515 struct ip_ct_tcp *state = &ct->proto.tcp; in tcp_in_window()
581 * RFC 793: "if a TCP is reinitialized ... then it need in tcp_in_window()
586 * syn(-ack) reply, it might differ in seq, ack or tcp options. in tcp_in_window()
605 * Broken TCP stacks, that set ACK in RST packets as well in tcp_in_window()
[all …]
/linux/tools/testing/selftests/net/packetdrill/
H A Ddefaults.sh4 # Set standard production config values that relate to TCP behavior.
9 # TCP min, default, and max receive and send buffer sizes.
13 # TCP timestamps.
16 # TCP SYN(ACK) retry thresholds
20 # TCP Forward RTO-Recovery, RFC 5682.
23 # TCP Selective Acknowledgements (SACK)
26 # TCP Duplicate Selective Acknowledgements (DSACK)
29 # TCP FACK (Forward Acknowldgement)
32 # TCP reordering degree ("dupthresh" threshold for entering Fast Recovery).
35 # TCP congestio
[all...]
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dflow_dissector.c21 struct tcphdr tcp; member
28 struct tcphdr tcp; member
36 struct tcphdr tcp; member
42 struct tcphdr tcp; member
54 struct tcphdr tcp; member
64 struct tcphdr tcp; member
77 struct tcphdr tcp; member
106 .tcp.doff = 5,
107 .tcp.source = 80,
108 .tcp.dest = 8080,
[all …]
H A Dcls_redirect.c10 #include <netinet/tcp.h>
97 TCP, in set_up_conn()
139 type = "TCP";
166 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN },
167 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, ACK },
168 { TCP, FORWARD, UNKNOWN_CONN, ONE_HOP, ACK },
169 { TCP, ACCEPT, KNOWN_CONN, ONE_HOP, ACK },
214 struct tcphdr tcp;
269 case TCP: in build_input()
270 tcp in build_input()
140 TCP, global() enumerator
251 struct tcphdr tcp; build_input() local
[all...]
/linux/tools/testing/selftests/drivers/net/
H A Dhds.py19 if 'tcp-data-split' not in rings:
20 raise KsftSkipEx('tcp-data-split not supported by device')
21 return rings['tcp-data-split']
68 if cur.get('tcp-data-split') != rings.get('tcp-data-split'):
71 arg['tcp-data-split'] = "unknown"
74 if cur['tcp-data-split'] == rings['tcp-data-split']:
75 del arg['tcp-data-split']
78 arg['tcp-data-split'] = rings['tcp-data-split']
88 if 'hds-thresh' in rings or 'tcp-data-split' in rings:
97 netnl.rings_set({'header': {'dev-index': cfg.ifindex}, 'tcp-data-split': 'enabled'})
[all …]
/linux/tools/testing/selftests/net/tcp_ao/
H A Dunsigned-md5.c139 try_accept("TCP-AO established: add TCP-MD5 key", (*port)++, NULL, 0, in server_add_fail_tests()
142 try_accept("TCP-MD5 established: add TCP-AO key", (*port)++, &addr_any, in server_add_fail_tests()
144 try_accept("non-signed established: add TCP-AO key", (*port)++, NULL, 0, in server_add_fail_tests()
230 try_accept("[server] AO+MD5 server: client with both [TCP-MD5] and TCP-AO keys", in server_fn()
233 try_accept("[server] AO+MD5 server: client with both TCP-MD5 and [TCP-AO] keys", in server_fn()
521 try_to_add("TCP-AO established: add TCP-MD5 key", in client_add_fail_tests()
525 try_to_add("TCP-MD5 established: add TCP-AO key", in client_add_fail_tests()
529 try_to_add("non-signed established: add TCP-AO key", in client_add_fail_tests()
534 try_to_add("TCP-AO key intersects with existing TCP-MD5 key", in client_add_fail_tests()
538 try_to_add("TCP-MD5 key intersects with existing TCP-AO key", in client_add_fail_tests()
[all …]
/linux/include/net/
H A Dslhc_vj.h4 * Definitions for tcp compression routines.
43 * The first octet contains the packet type (top 3 bits), TCP
44 * 'push' bit, and flags that indicate which of the 4 TCP sequence
46 * conversation number that associates a saved IP/TCP header with
47 * the compressed packet. The next two octets are the TCP checksum
54 * in the following order): TCP urgent pointer, window,
69 * three possible types: IP (not proto TCP or tcp with one of the
70 * control flags set); uncompressed TCP (a normal IP/TCP packet but
73 * TCP (described above).
75 * LSB of 4-bit field is TCP "PUSH" bit (a worthless anachronism) and
[all …]
/linux/tools/testing/selftests/net/
H A Dfcnal-test.sh8 # 1. icmp, tcp, udp and netfilter
866 # IPv4 TCP
880 wait_local_port_listen ${NSA} 12345 tcp
888 wait_local_port_listen ${NSA} 12345 tcp
896 wait_local_port_listen ${NSA} 12345 tcp
904 wait_local_port_listen ${NSA} 12345 tcp
915 wait_local_port_listen ${NSA} 12345 tcp
923 wait_local_port_listen ${NSA} 12345 tcp
931 wait_local_port_listen ${NSA} 12345 tcp
948 wait_local_port_listen ${NSA} 12345 tcp
[all …]
/linux/tools/testing/selftests/net/netfilter/
H A Dconntrack_tcp_unreplied.sh4 # Check that UNREPLIED tcp conntrack will eventually timeout.
83 ip netns exec "$ns2" socat -u -4 TCP-LISTEN:8080,reuseaddr STDOUT &
91 ct state new tcp flags syn ip daddr 10.99.99.99 tcp dport 80 counter name "connreq" accept
92 ct state new ct status dnat tcp dport 8080 counter name "redir" accept
105 socat -u STDIN TCP:10.99.99.99:80 < /dev/null
111 count=$(ip netns exec "$ns2" conntrack -L -p tcp --dport 80 2>/dev/null | wc -l)
122 echo "ERROR: $ns2 did not pick up tcp connection from peer"
130 ip daddr 10.99.99.99 tcp dport 80 redirect to :8080
141 count=$(ip netns exec "$ns2" conntrack -L -p tcp --reply-port-src 8080 2>/dev/null | wc -l)
161 echo "ERROR: no tcp connection was redirected"
H A Dnf_nat_edemux.sh37 if ! ip netns exec "$ns" conntrack --get -s 192.168.1.2 -d 192.168.1.1 -p tcp \
61 ip netns exec "$ns1" socat -u TCP-LISTEN:5201,fork OPEN:/dev/null,wronly=1 &
69 ip netns exec "$ns2" iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-dest…
75 wait_local_port_listen "$ns1" 5201 tcp
78 sleep 10 | ip netns exec "$ns2" socat -t 10 - TCP:192.168.1.1:5201 > /dev/null &
85 echo test | ip netns exec "$ns2" socat -t 3 -u STDIN TCP:10.96.0.1:443,connect-timeout=3 >/dev/null
96 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5202 -j REDIRECT --to-ports 5201
97 ip netns exec "$ns1" iptables -t nat -A PREROUTING -p tcp --dport 5203 -j REDIRECT --to-ports 5201
99 sleep 5 | ip netns exec "$ns2" socat -T 5 -u STDIN TCP:192.168.1.1:5202,connect-timeout=5 >/dev/nul…
102 sleep 5 | ip netns exec "$ns2" socat -T 5 -u STDIN TCP:192.168.1.1:5203,connect-timeout=5 >/dev/nul…
/linux/net/ipv4/
H A Dtcp_lp.c3 * TCP Low Priority (TCP-LP)
5 * TCP Low Priority is a distributed algorithm whose goal is to utilize only
7 * bandwidth as targeted by TCP.
11 * the original TCP-LP implementation:
26 * https://users.cs.northwestern.edu/~akuzma/doc/TCP-LP-ToN.pdf
28 * https://users.cs.northwestern.edu/~akuzma/rice/TCP-LP/linux/tcp-lp-linux.htm
34 * http://tcp-lp-mod.sourceforge.net/
38 #include <net/tcp
[all...]
H A Dtcp_westwood.c3 * TCP Westwood+: end-to-end bandwidth estimation for TCP
5 * Angelo Dell'Aera: author of the first version of TCP Westwood+ in Linux 2.4
11 * "TCP Westwood: bandwidth estimation for TCP" Proc. ACM Mobicom 2001
14 * "Performance evaluation of New Reno, Vegas, Westwood+ TCP" ACM Computer
18 * "Linux 2.4 Implementation of Westwood+ TCP with Rate-Halving :
29 #include <net/tcp.h>
31 /* TCP Westwood structure */
46 /* TCP Westwood functions and constants */
52 * This function initializes fields used in TCP Westwood+,
212 * TCP Westwood
[all …]
/linux/include/linux/
H A Dnvme-tcp.h3 * NVMe over Fabrics TCP protocol header.
64 * struct nvme_tcp_hdr - nvme tcp pdu common header
81 * struct nvme_tcp_icreq_pdu - nvme tcp initialize connection request pdu
99 * struct nvme_tcp_icresp_pdu - nvme tcp initialize connection response pdu
117 * struct nvme_tcp_term_pdu - nvme tcp terminate connection pdu
132 * struct nvme_tcp_cmd_pdu - nvme tcp command capsule pdu
143 * struct nvme_tcp_rsp_pdu - nvme tcp response capsule pdu
146 * @hdr: nvme-tcp generic header
155 * struct nvme_tcp_r2t_pdu - nvme tcp ready-to-transfer pdu
173 * struct nvme_tcp_data_pdu - nvme tcp data pdu
/linux/Documentation/netlink/specs/
H A Dtcp_metrics.yaml8 Management interface for TCP metrics.
10 c-family-name: tcp-metrics-genl-name
11 c-version-name: tcp-metrics-genl-version
17 name: tcp-fastopen-cookie-max
23 name: tcp-metrics
24 name-prefix: tcp-metrics-attr-
66 min-len: tcp-fastopen-cookie-max
134 attribute-set: tcp-metrics
163 attribute-set: tcp-metrics
/linux/net/rds/
H A Dtcp_send.c35 #include <net/tcp.h>
39 #include "tcp.h"
96 rdsdebug("rm %p tcp nxt %u ack_seq %llu\n", in rds_tcp_xmit()
126 rdsdebug("tcp sendpage %p:%u:%u ret %d\n", (void *)sg_page(&rm->data.op_sg[sg]), in rds_tcp_xmit()
152 pr_warn("RDS/tcp: send to %pI6c on cp [%d]" in rds_tcp_xmit()
166 * rm->m_ack_seq is set to the tcp sequence number that corresponds to the
169 * unacked byte of the TCP sequence space. We have to do very careful
197 rdsdebug("tcp una %u\n", rds_tcp_snd_una(tc)); in rds_tcp_write_space()
211 * write_space is only called when data leaves tcp's send queue if in rds_tcp_write_space()
213 * data in tcp' in rds_tcp_write_space()
[all...]
/linux/tools/testing/selftests/net/netfilter/packetdrill/
H A Dconntrack_rst_invalid.pkt6 +0 `$xtables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
7 +0 `$xtables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
31 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
35 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
39 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
44 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
49 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q ESTABLISHED`
59 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q CLOSE\ `
H A Dconntrack_inexact_rst.pkt9 // 5.772212 client_ip > server_ip TCP 66 45020 > 443 [ACK] Seq=1905874048 Ack=781810658 Win=36352 …
12 // 5.788207 server_ip > client_ip TCP 66 443 > 45020 [FIN, ACK] Seq=781811916 Ack=1905874048 Win=3…
14 // 5.788479 client_ip > server_ip TCP 66 45020 > 443 [RST, ACK] Seq=1905874072 Ack=781811917 Win=3…
15 // 5.788581 server_ip > client_ip TCP 54 8443 > 45020 [RST] Seq=781811892 Win=0 Len=0
17 +0 `iptables -A INPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
18 +0 `iptables -A OUTPUT -p tcp -m conntrack --ctstate INVALID -j DROP`
48 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q CLOSE_WAIT`
54 +0 `conntrack -f $NFCT_IP_VERSION -L -p tcp --dport 8080 2>/dev/null |grep -q CLOSE\ `
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/
H A Dct_fs_hmfs.c18 /* We need {ipv4, ipv6} x {tcp, udp, gre} matchers. */
40 static u32 get_matcher_idx(bool ipv4, bool tcp, bool gre) in get_matcher_idx() argument
42 return ipv4 * 3 + tcp * 2 + gre; in get_matcher_idx()
94 struct mlx5_flow_spec *spec, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_hmfs_matcher_create() argument
101 u32 priority = get_matcher_idx(ipv4, tcp, gre); /* Static priority based on params. */ in mlx5_ct_fs_hmfs_matcher_create()
113 bool nat, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_hmfs_matcher_get() argument
116 u32 matcher_idx = get_matcher_idx(ipv4, tcp, gre); in mlx5_ct_fs_hmfs_matcher_get()
136 hws_bwc_matcher = mlx5_ct_fs_hmfs_matcher_create(fs, tbl, spec, ipv4, tcp, gre); in mlx5_ct_fs_hmfs_matcher_get()
139 "ct_fs_hmfs: failed to create bwc matcher (nat %d, ipv4 %d, tcp %d, gre %d), err: %pe\n", in mlx5_ct_fs_hmfs_matcher_get()
140 nat, ipv4, tcp, gre, hws_bwc_matcher); in mlx5_ct_fs_hmfs_matcher_get()
[all …]

12345678910>>...44