/linux/net/netfilter/ |
H A D | xt_hl.c | 3 * IP tables module for matching the value of the TTL 20 MODULE_DESCRIPTION("Xtables: Hoplimit/TTL field match"); 28 const u8 ttl = ip_hdr(skb)->ttl; in ttl_mt() local 32 return ttl == info->ttl; in ttl_mt() 34 return ttl != info->ttl; in ttl_mt() 36 return ttl < info->ttl; in ttl_mt() 38 return ttl > info->ttl; in ttl_mt() 65 .name = "ttl",
|
H A D | xt_HL.c | 3 * TTL modification target for IP tables 22 MODULE_DESCRIPTION("Xtables: Hoplimit/TTL Limit field modification target"); 39 new_ttl = info->ttl; in ttl_tg() 42 new_ttl = iph->ttl + info->ttl; in ttl_tg() 47 new_ttl = iph->ttl - info->ttl; in ttl_tg() 52 new_ttl = iph->ttl; in ttl_tg() 56 if (new_ttl != iph->ttl) { in ttl_tg() 57 csum_replace2(&iph->check, htons(iph->ttl << 8), in ttl_tg() 59 iph->ttl = new_ttl; in ttl_tg() 107 if (info->mode != IPT_TTL_SET && info->ttl == 0) in ttl_tg_check() [all …]
|
H A D | nft_osf.c | 10 u8 ttl; member 47 if (!nf_osf_find(skb, nf_osf_fingers, priv->ttl, &data)) { in nft_osf_eval() 66 u8 ttl; in nft_osf_init() local 72 ttl = nla_get_u8(tb[NFTA_OSF_TTL]); in nft_osf_init() 73 if (ttl > 2) in nft_osf_init() 75 priv->ttl = ttl; in nft_osf_init() 95 if (nla_put_u8(skb, NFTA_OSF_TTL, priv->ttl)) in nft_osf_dump() 143 priv->ttl != osf->ttl) { in nft_osf_reduce()
|
H A D | xt_recent.c | 71 u_int8_t ttl; member 126 u_int8_t ttl) in recent_entry_lookup() argument 139 (ttl == e->ttl || ttl == 0 || e->ttl == 0)) in recent_entry_lookup() 180 u_int16_t family, u_int8_t ttl) in recent_entry_init() argument 195 e->ttl = ttl; in recent_entry_init() 248 u_int8_t ttl; in recent_mt() local 259 ttl = iph->ttl; in recent_mt() 268 ttl = iph->hop_limit; in recent_mt() 271 /* use TTL as seen before forwarding */ in recent_mt() 274 ttl++; in recent_mt() [all …]
|
/linux/net/mpls/ |
H A D | mpls_iptunnel.c | 52 unsigned int ttl; in mpls_xmit() local 66 /* Obtain the ttl using the following set of rules. in mpls_xmit() 68 * LWT ttl propagation setting: in mpls_xmit() 69 * - disabled => use default TTL value from LWT in mpls_xmit() 70 * - enabled => use TTL value from IPv4/IPv6 header in mpls_xmit() 72 * Global ttl propagation setting: in mpls_xmit() 73 * - disabled => use default TTL value from global setting in mpls_xmit() 74 * - enabled => use TTL value from IPv4/IPv6 header in mpls_xmit() 78 ttl = tun_encap_info->default_ttl; in mpls_xmit() 81 ttl = net->mpls.default_ttl; in mpls_xmit() [all …]
|
/linux/tools/testing/selftests/drivers/net/mlxsw/ |
H A D | vxlan.sh | 92 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 109 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 126 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 144 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 \ 163 ttl 20 tos inherit dstport 4789 180 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 198 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 dev dummy1 216 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 \ 234 ttl 20 tos 20 local $LOCAL_IP_1 dstport 4789 251 ttl inherit tos inherit local $LOCAL_IP_1 dstport 4789 [all …]
|
H A D | extack.sh | 43 dstport 4789 nolearning noudpcsum tos inherit ttl 100 56 dstport 4789 nolearning noudpcsum tos inherit ttl 100 65 # devices have the same TTL. 67 ip link set dev vx2 type vxlan ttl 200 95 dstport 4789 tos inherit ttl 100 123 dstport 4789 tos inherit ttl 100
|
H A D | mirror_gre.sh | 28 ttl 100 tos inherit allow-localremote \ 55 ttl 100 tos inherit allow-localremote 127 ip link set dev $tundev type $type ttl inherit 131 ip link set dev $tundev type $type ttl 100 136 log_test "$what: no offload on TTL of inherit"
|
H A D | vxlan_ipv6.sh | 28 ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 45 noudp6zerocsumrx udp6zerocsumtx ttl 20 tos inherit \ 54 udp6zerocsumrx noudp6zerocsumtx ttl 20 tos inherit \
|
/linux/tools/testing/selftests/tc-testing/tc-tests/actions/ |
H A D | mpls.json | 322 "name": "Add mpls dec_ttl action with ttl (invalid)", 338 "cmdUnderTest": "$TC actions add action mpls dec_ttl ttl 20", 341 "matchPattern": "action order [0-9]+: mpls.*dec_ttl.*ttl.*20.*pipe", 528 "name": "Add mpls pop action with ttl (invalid)", 544 "cmdUnderTest": "$TC actions add action mpls pop protocol ipv4 ttl 20", 547 "matchPattern": "action order [0-9]+: mpls.*pop.*ttl.*20.*pipe", 597 …"matchPattern": "action order [0-9]+: mpls.*push.*protocol.*mpls_uc.*label.*20.*ttl.*[0-9]+.*pipe", 624 …"matchPattern": "action order [0-9]+: mpls.*push.*protocol.*mpls_mc.*label.*20.*ttl.*[0-9]+.*pipe", 632 "name": "Add mpls push action with label, tc and ttl", 648 "cmdUnderTest": "$TC actions add action mpls push label 20 tc 3 ttl 128", [all …]
|
/linux/Documentation/devicetree/bindings/display/bridge/ |
H A D | thine,thc63lvd1024.yaml | 16 modes, handling up to two LVDS input streams and up to two digital CMOS/TTL 38 CMOS/TTL port and port@3 shall not contain any endpoint. In dual output 39 mode pixels are output from both CMOS/TTL ports and both port@2 and 53 description: First digital CMOS/TTL parallel output 57 description: Second digital CMOS/TTL parallel output 73 Power supply for the TTL output, TTL CLOCKOUT signal, LVDS input, PLL and
|
/linux/arch/um/drivers/ |
H A D | umcast_kern.c | 23 int ttl; member 39 dpri->ttl = init->ttl; in umcast_init() 47 "TTL:%u\n", dpri->addr, dpri->lport, dpri->ttl); in umcast_init() 79 .ttl = 1 }); in mcast_setup() 99 init->ttl = simple_strtoul(ttl_str, &last, 10); in mcast_setup() 101 printk(KERN_ERR "mcast_setup - Bad ttl : '%s'\n", in mcast_setup() 111 init->lport, init->ttl); in mcast_setup()
|
/linux/net/xfrm/ |
H A D | xfrm_inout.h | 17 XFRM_MODE_SKB_CB(skb)->ttl = iph->ttl; in xfrm4_extract_header() 32 XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; in xfrm6_extract_header() 52 iph->hop_limit = XFRM_MODE_SKB_CB(skb)->ttl; in xfrm6_beet_make_header() 67 iph->ttl = XFRM_MODE_SKB_CB(skb)->ttl; in xfrm4_beet_make_header()
|
/linux/tools/testing/selftests/net/ |
H A D | l2_tos_ttl_inherit.sh | 9 # Checked inheritable fields are: TOS and TTL. 87 # We don't want a test-ttl of 64 or 0, 88 # because 64 is when no ttl is set and 0 is not a valid ttl. 96 ttl="fixed $test_ttl" 99 ttl="inherit $expected_ttl" 102 "$type" "$outer" "$inner" "$tos" "$ttl" "$vlan" 141 remote 198.18.0.2 tos $test_tos ttl $test_ttl \ 144 remote 198.18.0.1 tos $test_tos ttl $test_ttl \ 156 ttl $test_ttl $vxlan $geneve 159 ttl $test_ttl $vxlan $geneve [all …]
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | tc_tun.c | 25 u8 ttl; member 154 if (!attr->ttl) in mlx5e_route_lookup_ipv4_get() 155 attr->ttl = ip4_dst_hoplimit(&rt->dst); in mlx5e_route_lookup_ipv4_get() 242 attr.ttl = tun_key->ttl; in mlx5e_tc_tun_create_header_ipv4() 293 ip->ttl = attr.ttl; in mlx5e_tc_tun_create_header_ipv4() 358 attr.ttl = tun_key->ttl; in mlx5e_tc_tun_update_header_ipv4() 398 ip->ttl = attr.ttl; in mlx5e_tc_tun_update_header_ipv4() 463 if (!attr->ttl) in mlx5e_route_lookup_ipv6_get() 464 attr->ttl = ip6_dst_hoplimit(dst); in mlx5e_route_lookup_ipv6_get() 510 attr.ttl = tun_key->ttl; in mlx5e_tc_tun_create_header_ipv6() [all …]
|
/linux/include/uapi/linux/netfilter/ |
H A D | nfnetlink_osf.h | 19 #define NF_OSF_TTL_TRUE 0 /* True ip and fingerprint TTL comparison */ 21 /* Check if ip TTL is less than fingerprint one */ 24 /* Do not compare ip and fingerprint TTL at all */ 51 __u32 ttl; member 57 __u8 ttl, df; member
|
/linux/include/net/ |
H A D | nsh.h | 11 * |Ver|O|U| TTL | Length |U|U|U|U|MD Type| Next Protocol | 48 * TTL: Indicates the maximum SFF hops for an SFP. This field is used 49 * for service plane loop detection. The initial TTL value SHOULD be 52 * provided, the default initial TTL value of 63 MUST be used. Each SFF 53 * involved in forwarding an NSH packet MUST decrement the TTL value by 55 * value of 0 shall result in a TTL value of 63. The packet MUST NOT be 56 * forwarded if TTL is, after decrement, 0. 136 * reporting service paths. Additionally, while the TTL field is the 290 static inline void nsh_set_flags_and_ttl(struct nshhdr *nsh, u8 flags, u8 ttl) in nsh_set_flags_and_ttl() argument 293 ((ttl << NSH_TTL_SHIFT) & NSH_TTL_MASK), in nsh_set_flags_and_ttl() [all …]
|
H A D | dst_metadata.h | 202 __u8 tos, __u8 ttl, in __ip_tun_set_dst() argument 215 saddr, daddr, tos, ttl, in __ip_tun_set_dst() 227 return __ip_tun_set_dst(iph->saddr, iph->daddr, iph->tos, iph->ttl, in ip_tun_rx_dst() 233 __u8 tos, __u8 ttl, in __ipv6_tun_set_dst() argument 258 info->key.ttl = ttl; in __ipv6_tun_set_dst()
|
/linux/tools/testing/selftests/net/forwarding/ |
H A D | mirror_gre_topo_lib.sh | 22 # | | : ttl=100 : ttl=100 | 31 # | ttl=100 ttl=100 | 64 ttl 100 tos inherit 67 ttl 100 tos inherit allow-localremote
|
H A D | tc_flower.sh | 326 -t ip "ttl=63" -q 329 -t ip "ttl=63,mf,frag=256" -q 332 check_fail $? "Matched on the wrong filter (no check on ttl)" 335 check_err $? "Did not match on correct filter (ttl=63)" 338 -t ip "ttl=255" -q 341 check_fail $? "Matched on a wrong filter (ttl=63)" 344 check_err $? "Did not match on correct filter (no check on ttl)" 383 local ttl=$4 389 $ttl 562 flower $tcflags mpls lse depth 1 ttl 0 action continue [all …]
|
/linux/fs/nfs/ |
H A D | dns_resolve.c | 180 long ttl; in nfs_dns_show() local 183 seq_puts(m, "# ip address hostname ttl\n"); in nfs_dns_show() 187 ttl = item->h.expiry_time - seconds_since_boot(); in nfs_dns_show() 188 if (ttl < 0) in nfs_dns_show() 189 ttl = 0; in nfs_dns_show() 198 seq_printf(m, "%15s %ld\n", item->hostname, ttl); in nfs_dns_show() 233 unsigned int ttl; in nfs_dns_parse() local 256 if (get_uint(&buf, &ttl) < 0) in nfs_dns_parse() 258 if (ttl == 0) in nfs_dns_parse() 260 key.h.expiry_time = ttl + seconds_since_boot(); in nfs_dns_parse()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_cls_redirect_dynptr.c | 310 /* Loop protection: the inner packet's TTL is decremented as a safeguard in forward_with_gre() 311 * against any forwarding loop. As the only interesting field is the TTL in forward_with_gre() 318 uint8_t ttl; in forward_with_gre() local 323 &ttl, 1); in forward_with_gre() 329 if (ttl == 0) { in forward_with_gre() 334 ttl--; in forward_with_gre() 337 &ttl, 1, 0); in forward_with_gre() 343 uint8_t ttl; in forward_with_gre() local 347 skb, payload_off + offsetof(struct iphdr, ttl), &ttl, in forward_with_gre() 354 if (ttl == 0) { in forward_with_gre() [all …]
|
H A D | test_cls_redirect.c | 416 /* Loop protection: the inner packet's TTL is decremented as a safeguard in forward_with_gre() 417 * against any forwarding loop. As the only interesting field is the TTL in forward_with_gre() 424 uint8_t ttl; in forward_with_gre() local 429 &ttl, 1); in forward_with_gre() 435 if (ttl == 0) { in forward_with_gre() 440 ttl--; in forward_with_gre() 443 &ttl, 1, 0); in forward_with_gre() 449 uint8_t ttl; in forward_with_gre() local 453 skb, payload_off + offsetof(struct iphdr, ttl), &ttl, in forward_with_gre() 460 if (ttl == 0) { in forward_with_gre() [all …]
|
/linux/fs/smb/client/ |
H A D | dfs_cache.c | 42 int ttl; /* DFS_REREFERRAL_V3.TimeToLive */ member 173 …"cache entry: path=%s,type=%s,ttl=%d,etime=%ld,hdr_flags=0x%x,ref_flags=0x%x,interlink=%s,path_con… in dfscache_proc_show() 175 ce->ttl, ce->etime.tv_nsec, ce->hdr_flags, ce->ref_flags, in dfscache_proc_show() 240 …cifs_dbg(FYI, "cache entry: path=%s,type=%s,ttl=%d,etime=%ld,hdr_flags=0x%x,ref_flags=0x%x,interli… in dump_ce() 242 ce->srvtype == DFS_TYPE_ROOT ? "root" : "link", ce->ttl, in dump_ce() 267 "ttl: %d (%dm)\n", in dump_refs() 270 ref->ttl, ref->ttl / 60); in dump_refs() 348 /* Return expire time out of a new entry's TTL */ 349 static inline struct timespec64 get_expire_time(int ttl) in get_expire_time() argument 352 .tv_sec = ttl, in get_expire_time() [all …]
|
/linux/net/ipv4/ |
H A D | ip_tunnel.c | 595 u8 tos, ttl; in ip_md_tunnel_xmit() local 651 ttl = key->ttl; in ip_md_tunnel_xmit() 652 if (ttl == 0) { in ip_md_tunnel_xmit() 654 ttl = inner_iph->ttl; in ip_md_tunnel_xmit() 656 ttl = ((const struct ipv6hdr *)inner_iph)->hop_limit; in ip_md_tunnel_xmit() 658 ttl = ip4_dst_hoplimit(&rt->dst); in ip_md_tunnel_xmit() 669 iptunnel_xmit(NULL, rt, skb, fl4.saddr, fl4.daddr, proto, tos, ttl, in ip_md_tunnel_xmit() 695 u8 tos, ttl; in ip_tunnel_xmit() local 834 ttl = tnl_params->ttl; in ip_tunnel_xmit() 835 if (ttl == 0) { in ip_tunnel_xmit() [all …]
|