| /Linux-v5.15/drivers/net/ethernet/intel/iavf/ |
| D | iavf_common.c | 571 /* Non Tunneled IPv4 */ 572 IAVF_PTT(22, IP, IPV4, FRG, NONE, NONE, NOF, NONE, PAY3), 573 IAVF_PTT(23, IP, IPV4, NOF, NONE, NONE, NOF, NONE, PAY3), 574 IAVF_PTT(24, IP, IPV4, NOF, NONE, NONE, NOF, UDP, PAY4), 576 IAVF_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 577 IAVF_PTT(27, IP, IPV4, NOF, NONE, NONE, NOF, SCTP, PAY4), 578 IAVF_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4), 580 /* IPv4 --> IPv4 */ 581 IAVF_PTT(29, IP, IPV4, NOF, IP_IP, IPV4, FRG, NONE, PAY3), 582 IAVF_PTT(30, IP, IPV4, NOF, IP_IP, IPV4, NOF, NONE, PAY3), [all …]
|
| /Linux-v5.15/drivers/net/ethernet/intel/ice/ |
| D | ice_lan_tx_rx.h | 676 /* Non Tunneled IPv4 */ 677 ICE_PTT(22, IP, IPV4, FRG, NONE, NONE, NOF, NONE, PAY3), 678 ICE_PTT(23, IP, IPV4, NOF, NONE, NONE, NOF, NONE, PAY3), 679 ICE_PTT(24, IP, IPV4, NOF, NONE, NONE, NOF, UDP, PAY4), 681 ICE_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 682 ICE_PTT(27, IP, IPV4, NOF, NONE, NONE, NOF, SCTP, PAY4), 683 ICE_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4), 685 /* IPv4 --> IPv4 */ 686 ICE_PTT(29, IP, IPV4, NOF, IP_IP, IPV4, FRG, NONE, PAY3), 687 ICE_PTT(30, IP, IPV4, NOF, IP_IP, IPV4, NOF, NONE, PAY3), [all …]
|
| /Linux-v5.15/net/ipv4/ |
| D | sysctl_net_ipv4.c | 3 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem. 6 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS] 64 write_seqlock_bh(&net->ipv4.ip_local_ports.lock); in set_local_port_range() 65 if (same_parity && !net->ipv4.ip_local_ports.warned) { in set_local_port_range() 66 net->ipv4.ip_local_ports.warned = true; in set_local_port_range() 69 net->ipv4.ip_local_ports.range[0] = range[0]; in set_local_port_range() 70 net->ipv4.ip_local_ports.range[1] = range[1]; in set_local_port_range() 71 write_sequnlock_bh(&net->ipv4.ip_local_ports.lock); in set_local_port_range() 79 container_of(table->data, struct net, ipv4.ip_local_ports.range); in ipv4_local_port_range() 100 (range[0] < net->ipv4.sysctl_ip_prot_sock)) in ipv4_local_port_range() [all …]
|
| D | fib_notifier.c | 9 #include <net/netns/ipv4.h> 26 net->ipv4.fib_seq++; in call_fib4_notifiers() 34 return net->ipv4.fib_seq + fib4_rules_seq_read(net); in fib4_seq_read() 60 net->ipv4.fib_seq = 0; in fib4_notifier_init() 65 net->ipv4.notifier_ops = ops; in fib4_notifier_init() 72 fib_notifier_ops_unregister(net->ipv4.notifier_ops); in fib4_notifier_exit()
|
| /Linux-v5.15/tools/testing/selftests/bpf/ |
| D | test_flow_dissector.sh | 102 echo 0 > /proc/sys/net/ipv4/conf/default/rp_filter 103 echo 0 > /proc/sys/net/ipv4/conf/all/rp_filter 104 echo 0 > /proc/sys/net/ipv4/conf/lo/rp_filter 106 echo "Testing IPv4..." 111 # Send 10 IPv4/UDP packets from port 8. Filter should not drop any. 113 # Send 10 IPv4/UDP packets from port 9. Filter should drop all. 115 # Send 10 IPv4/UDP packets from port 10. Filter should not drop any. 119 # Send 10 IPv4/IPv4/UDP packets from port 8. Filter should not drop any. 122 # Send 10 IPv4/IPv4/UDP packets from port 9. Filter should drop all. 125 # Send 10 IPv4/IPv4/UDP packets from port 10. Filter should not drop any. [all …]
|
| D | test_lwt_ip_encap.sh | 116 ip netns exec ${NS1} sysctl -wq net.ipv4.conf.all.rp_filter=0 117 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0 118 ip netns exec ${NS3} sysctl -wq net.ipv4.conf.all.rp_filter=0 119 ip netns exec ${NS1} sysctl -wq net.ipv4.conf.default.rp_filter=0 120 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0 121 ip netns exec ${NS3} sysctl -wq net.ipv4.conf.default.rp_filter=0 128 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1 232 # configure IPv4 GRE device in NS3, and a route to it via the "bottom" route 288 if [ "${PROTO}" == "IPv4" ] ; then 321 if [ "${PROTO}" == "IPv4" ] ; then [all …]
|
| /Linux-v5.15/tools/testing/selftests/net/ |
| D | bareudp.sh | 8 # configurations of bareudp (using IPv4 or IPv6 as underlay and transporting 9 # IPv4, IPv6 or MPLS packets on the overlay). 14 # is assigned an IPv4 and an IPv6 address. A host-route allows a veth to 18 # IPv4 and IPv6 addresses on their loopback device. Routes are added in NS0 20 # For IPv4 and IPv6 reachability tests, the route simply sets the peer's 31 # | * IPv4 address: 192.0.2.100/32 | 34 # | * IPv4 route: 192.0.2.103/32 reachable via 192.0.2.11 | 40 # | ^ * IPv4 address: 192.0.2.10, peer 192.0.2.11/32 | 52 # | * IPv4 address: 192.0.2.11, peer 192.0.2.10/32 | 62 # | ^ * IPv4 address: 192.0.2.21, peer 192.0.2.22/32 | [all …]
|
| D | route_localnet.sh | 16 sysctl -w net.ipv4.conf.veth0.route_localnet=1 17 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.route_localnet=1 40 sysctl -w net.ipv4.conf.veth0.arp_announce=2 41 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.arp_announce=2 57 sysctl -w net.ipv4.conf.veth0.arp_ignore=3 58 ip netns exec "${PEER_NS}" sysctl -w net.ipv4.conf.veth1.arp_ignore=3
|
| /Linux-v5.15/tools/testing/selftests/bpf/progs/ |
| D | test_sk_assign.c | 44 get_tuple(struct __sk_buff *skb, bool *ipv4, bool *tcp) in get_tuple() argument 68 *ipv4 = true; in get_tuple() 77 *ipv4 = false; in get_tuple() 91 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument 100 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp() 108 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp() 123 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument 132 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp() 143 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp() 166 bool ipv4 = false; in bpf_sk_assign_test() local [all …]
|
| D | test_cls_redirect.c | 91 offsetofend(struct bpf_sock_tuple, ipv4.dport) - 92 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1, 198 static INLINING bool pkt_skip_ipv4_options(buf_t *buf, const struct iphdr *ipv4) in pkt_skip_ipv4_options() argument 200 if (ipv4->ihl <= 5) { in pkt_skip_ipv4_options() 204 return buf_skip(buf, (ipv4->ihl - 5) * 4); in pkt_skip_ipv4_options() 215 struct iphdr *ipv4 = buf_assign(pkt, sizeof(*ipv4), scratch); in pkt_parse_ipv4() local 216 if (ipv4 == NULL) { in pkt_parse_ipv4() 220 if (ipv4->ihl < 5) { in pkt_parse_ipv4() 224 if (!pkt_skip_ipv4_options(pkt, ipv4)) { in pkt_parse_ipv4() 228 return ipv4; in pkt_parse_ipv4() [all …]
|
| D | connect4_prog.c | 154 memset(&tuple.ipv4.saddr, 0, sizeof(tuple.ipv4.saddr)); in connect_v4_prog() 155 memset(&tuple.ipv4.sport, 0, sizeof(tuple.ipv4.sport)); in connect_v4_prog() 157 tuple.ipv4.daddr = bpf_htonl(DST_REWRITE_IP4); in connect_v4_prog() 158 tuple.ipv4.dport = bpf_htons(DST_REWRITE_PORT4); in connect_v4_prog() 173 sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof(tuple.ipv4), in connect_v4_prog() 176 sk = bpf_sk_lookup_udp(ctx, &tuple, sizeof(tuple.ipv4), in connect_v4_prog() 182 if (sk->src_ip4 != tuple.ipv4.daddr || in connect_v4_prog()
|
| /Linux-v5.15/drivers/infiniband/hw/irdma/ |
| D | trace_cm.h | 15 #define __print_ip_addr(addr, port, ipv4) print_ip_addr(p, addr, port, ipv4) argument 26 __field(bool, ipv4) 30 __entry->ipv4 = cm_info->ipv4; 37 __entry->lport, __entry->ipv4) 48 __field(bool, ipv4) 53 __entry->ipv4 = listener->ipv4; 61 __entry->lport, __entry->ipv4) 71 __field(bool, ipv4) 79 __entry->ipv4 = listener->ipv4; 88 __entry->lport, __entry->ipv4) [all …]
|
| /Linux-v5.15/net/netfilter/ipset/ |
| D | Kconfig | 33 can store IPv4 addresses (or network addresse) from a range. 42 can store IPv4 address and (source) MAC address pairs from a range. 60 can store arbitrary IPv4 or IPv6 addresses (or network addresses) 70 can store IPv4/IPv6 address and mark pairs. 79 can store IPv4/IPv6 address and protocol/port pairs. 88 one can store IPv4/IPv6 address, protocol/port, and IPv4/IPv6 98 one can store IPv4/IPv6 address, protocol/port, and IPv4/IPv6 108 one can store IPv4/IPv6 address and MAC (ethernet address) pairs in a set. 126 one can store two IPv4/IPv6 subnets, and a protocol/port in a set. 135 one can store IPv4/IPv6 network address/prefix elements in a set. [all …]
|
| /Linux-v5.15/net/ipv4/netfilter/ |
| D | Kconfig | 14 tristate "IPv4 socket lookup support" 16 This option enables the IPv4 socket lookup infrastructure. This is 20 tristate "IPv4 tproxy support" 25 bool "IPv4 nf_tables support" 27 This option enables the IPv4 support for nf_tables. 37 tristate "IPv4 nf_tables packet duplication support" 41 This module enables IPv4 packet duplication support for nf_tables. 47 This module enables IPv4 FIB lookups, e.g. for reverse path filtering. 62 tristate "Netfilter flow table IPv4 module" 65 This option adds the flow table IPv4 support. [all …]
|
| /Linux-v5.15/drivers/net/ethernet/mediatek/ |
| D | mtk_ppe_debugfs.c | 33 [MTK_PPE_PKT_TYPE_IPV4_HNAPT] = "IPv4 5T", in mtk_foe_pkt_type_str() 34 [MTK_PPE_PKT_TYPE_IPV4_ROUTE] = "IPv4 3T", in mtk_foe_pkt_type_str() 107 ai.src_port = &entry->ipv4.orig.src_port; in mtk_ppe_debugfs_foe_show() 108 ai.dest_port = &entry->ipv4.orig.dest_port; in mtk_ppe_debugfs_foe_show() 111 ai.src = &entry->ipv4.orig.src_ip; in mtk_ppe_debugfs_foe_show() 112 ai.dest = &entry->ipv4.orig.dest_ip; in mtk_ppe_debugfs_foe_show() 132 ai.src_port = &entry->ipv4.new.src_port; in mtk_ppe_debugfs_foe_show() 133 ai.dest_port = &entry->ipv4.new.dest_port; in mtk_ppe_debugfs_foe_show() 136 ai.src = &entry->ipv4.new.src_ip; in mtk_ppe_debugfs_foe_show() 137 ai.dest = &entry->ipv4.new.dest_ip; in mtk_ppe_debugfs_foe_show() [all …]
|
| /Linux-v5.15/samples/bpf/ |
| D | tc_l2_redirect.sh | 10 RP_FILTER=$(< /proc/sys/net/ipv4/conf/all/rp_filter) 48 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0 49 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ipt2.rp_filter=0 53 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0 54 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ip6t2.rp_filter=0 65 sysctl -q -w net.ipv4.conf.all.rp_filter=0 78 sysctl -q -w net.ipv4.conf.all.rp_filter=$RP_FILTER 94 sysctl -q -w net.ipv4.conf.ipt.rp_filter=0 95 sysctl -q -w net.ipv4.conf.ipt.forwarding=1 100 sysctl -q -w net.ipv4.conf.ve1.forwarding=1 [all …]
|
| /Linux-v5.15/tools/testing/selftests/netfilter/ |
| D | ipvs.sh | 47 sysipvsnet="/proc/sys/net/ipv4/vs/" 141 ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=1 147 ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_ignore=1 148 ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_announce=2 150 ip netns exec ns2 sysctl -qw net.ipv4.conf.all.rp_filter=0 151 ip netns exec ns2 sysctl -qw net.ipv4.conf.veth21.rp_filter=0 160 ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=1 176 ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=0 177 ip netns exec ns1 sysctl -qw net.ipv4.conf.all.send_redirects=0 178 ip netns exec ns1 sysctl -qw net.ipv4.conf.default.send_redirects=0 [all …]
|
| D | nft_nat_zones.sh | 40 v4gc1=$(sysctl -n net.ipv4.neigh.default.gc_thresh1 2>/dev/null) 41 v4gc2=$(sysctl -n net.ipv4.neigh.default.gc_thresh2 2>/dev/null) 42 v4gc3=$(sysctl -n net.ipv4.neigh.default.gc_thresh3 2>/dev/null) 55 sysctl -q net.ipv4.neigh.default.gc_thresh1=$v4gc1 2>/dev/null 56 sysctl -q net.ipv4.neigh.default.gc_thresh2=$v4gc2 2>/dev/null 57 sysctl -q net.ipv4.neigh.default.gc_thresh3=$v4gc3 2>/dev/null 109 sysctl -q net.ipv4.neigh.default.gc_thresh1=512 2>/dev/null 110 sysctl -q net.ipv4.neigh.default.gc_thresh2=1024 2>/dev/null 111 sysctl -q net.ipv4.neigh.default.gc_thresh3=4096 2>/dev/null 132 echo netns exec "$cl" sysctl -q net.ipv4.tcp_syn_retries=2 [all …]
|
| /Linux-v5.15/tools/testing/selftests/net/forwarding/ |
| D | router_broadcast.sh | 146 sysctl_set net.ipv4.conf.all.bc_forwarding 0 147 sysctl_set net.ipv4.conf.$rp1.bc_forwarding 0 148 sysctl_set net.ipv4.conf.$rp2.bc_forwarding 0 153 sysctl_set net.ipv4.conf.all.bc_forwarding 1 154 sysctl_set net.ipv4.conf.$rp1.bc_forwarding 1 155 sysctl_set net.ipv4.conf.$rp2.bc_forwarding 1 160 sysctl_restore net.ipv4.conf.$rp2.bc_forwarding 161 sysctl_restore net.ipv4.conf.$rp1.bc_forwarding 162 sysctl_restore net.ipv4.conf.all.bc_forwarding 183 sysctl_set net.ipv4.icmp_echo_ignore_broadcasts 0 [all …]
|
| D | gre_custom_multipath_hash.sh | 4 # Test traffic distribution when there are multiple paths between an IPv4 GRE 5 # tunnel. The tunnel carries IPv4 and IPv6 traffic between multiple hosts. 369 log_info "Running IPv4 overlay custom multipath hash tests" 373 sysctl_set net.ipv4.neigh.default.gc_thresh1 1024 374 sysctl_set net.ipv4.neigh.default.gc_thresh2 1024 375 sysctl_set net.ipv4.neigh.default.gc_thresh3 1024 377 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0040 381 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0080 385 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0400 389 sysctl_set net.ipv4.fib_multipath_hash_fields 0x0800 [all …]
|
| D | mirror_gre_nh.sh | 32 sysctl_set net.ipv4.conf.all.rp_filter 0 33 sysctl_set net.ipv4.conf.$h3.rp_filter 0 38 sysctl_set net.ipv4.conf.v$h3.rp_filter 0 66 sysctl_restore net.ipv4.conf.v$h3.rp_filter 0 71 sysctl_restore net.ipv4.conf.$h3.rp_filter 72 sysctl_restore net.ipv4.conf.all.rp_filter 80 # For IPv4, test that there's no mirroring without the route directing
|
| D | router.sh | 176 sysctl_set net.ipv4.conf.all.rp_filter 0 177 sysctl_set net.ipv4.conf.$rp1.rp_filter 0 191 sysctl_restore net.ipv4.conf.$rp1.rp_filter 192 sysctl_restore net.ipv4.conf.all.rp_filter 245 __mc_mac_mismatch "IPv4" "ip" 192.0.2.2 225.1.2.3 254 sysctl_set net.ipv4.conf.all.rp_filter 0 255 sysctl_set net.ipv4.conf.$rp1.rp_filter 0 266 log_test "Source IP is equal to destination IP: IPv4" 269 sysctl_restore net.ipv4.conf.$rp1.rp_filter 270 sysctl_restore net.ipv4.conf.all.rp_filter [all …]
|
| /Linux-v5.15/include/net/sctp/ |
| D | constants.h | 338 /* These are the address scopes defined mainly for IPv4 addresses 339 * based on draft of SCTP IPv4 scoping <draft-stewart-tsvwg-sctp-ipv4-00.txt>. 341 * IPv4 and IPv6 addresses in SCTP. 346 SCTP_SCOPE_GLOBAL, /* IPv4 global addresses */ 347 SCTP_SCOPE_PRIVATE, /* IPv4 private addresses */ 348 SCTP_SCOPE_LINK, /* IPv4 link local address */ 349 SCTP_SCOPE_LOOPBACK, /* IPv4 loopback address */ 350 SCTP_SCOPE_UNUSABLE, /* IPv4 unusable addresses */ 354 SCTP_SCOPE_POLICY_DISABLE, /* Disable IPv4 address scoping */ 355 SCTP_SCOPE_POLICY_ENABLE, /* Enable IPv4 address scoping */ [all …]
|
| /Linux-v5.15/Documentation/security/ |
| D | SCTP.rst | 39 Passes one or more ipv4/ipv6 addresses to the security module for validation 47 @address - One or more ipv4 / ipv6 addresses. 49 ipv4 or ipv6 address using sizeof(struct sockaddr_in) or 56 | SCTP_SOCKOPT_BINDX_ADD | One or more ipv4 / ipv6 addresses | 57 | SCTP_PRIMARY_ADDR | Single ipv4 or ipv6 address | 58 | SCTP_SET_PEER_PRIMARY_ADDR | Single ipv4 or ipv6 address | 65 | SCTP_SOCKOPT_CONNECTX | One or more ipv4 / ipv6 addresses | 66 | SCTP_PARAM_ADD_IP | One or more ipv4 / ipv6 addresses | 67 | SCTP_SENDMSG_CONNECT | Single ipv4 or ipv6 address | 68 | SCTP_PARAM_SET_PRIMARY | Single ipv4 or ipv6 address | [all …]
|
| /Linux-v5.15/Documentation/networking/devlink/ |
| D | prestera.rst | 36 - Traps IPv4 packets with broadcast DA Mac address 63 - Traps (exception) IPv4 packets whose TTL exceeded 66 - Traps (exception) packets due to the malformed IPV4 header options 75 - Traps (exception) IPV4 ICMP redirect packets 105 - Traps IPv4 BGP packets 132 - Drops packets with illegal IPV4 header. 138 - Drops packets with zero (0) IPV4 source address.
|