Home
last modified time | relevance | path

Searched refs:IPv4 (Results 1 – 25 of 92) sorted by relevance

1234

/f-stack/dpdk/doc/guides/prog_guide/
H A Dgeneric_receive_offload_lib.rst21 example, TCP/IPv4 GRO processes TCP/IPv4 packets.
31 6864 to process the IPv4 ID field.
33 Currently, the GRO library provides GRO supports for TCP/IPv4 and UDP/IPv4
35 inner TCP/IPv4 or UDP/IPv4 packet.
141 TCP/IPv4 GRO
161 - IPv4 ID. The IPv4 ID fields of the packets, whose DF bit is 0, should
168 VxLAN packets with an outer IPv4 header and inner TCP/IPv4 packet, is
180 - outer IPv4 ID. The IPv4 ID fields of the packets, whose DF bit in the
181 outer IPv4 header is 0, should be increased by 1.
185 - inner IPv4 ID. The IPv4 ID fields of the packets, whose DF bit in the
[all …]
H A Dgeneric_segmentation_offload_lib.rst44 #. Currently, the GSO library supports the following IPv4 packet types:
146 TCP/IPv4 GSO
148 TCP/IPv4 GSO supports segmentation of suitably large TCP/IPv4 packets, which
151 UDP/IPv4 GSO
153 UDP/IPv4 GSO supports segmentation of suitably large UDP/IPv4 packets, which
163 which contain an outer IPv4 header, inner TCP/IPv4 headers, and optional
169 an outer IPv4 header, inner TCP/IPv4 headers, and an optional VLAN tag.
198 wants to segment TCP/IPv4 packets, it should set gso_types to
204 - a flag, that indicates whether the IPv4 headers of output segments should
213 - For example, in order to segment TCP/IPv4 packets, the application should
[all …]
H A Dflow_classify_lib.rst10 The initial implementation supports counting of IPv4 5-tuple packets which match
276 The library currently supports three IPv4 5-tuple flow patterns, for UDP, TCP
281 /* Pattern for IPv4 5-tuple UDP filter */
289 /* Pattern for IPv4 5-tuple TCP filter */
297 /* Pattern for IPv4 5-tuple SCTP filter */
306 IPv4 5-tuple pattern, attributes and actions and returns the 5-tuple data in the
383 /** IPv4 5-tuple data */
411 /** count of packets that match IPv4 5tuple pattern */
413 /** IPv4 5tuple data */
H A Dpacket_classif_access_ctrl.rst78 For example, to define classification for the following IPv4 5-tuple structure:
104 /* next input field (IPv4 source address) - 4 consecutive bytes. */
113 /* next input field (IPv4 destination address) - 4 consecutive bytes. */
143 A typical example of such an IPv4 5-tuple rule is a follows:
249 /* next input field (IPv4 source address) - 4 consecutive bytes. */
258 /* next input field (IPv4 destination address) - 4 consecutive bytes. */
280 A typical example of such an IPv4 4-tuple rule is as follows:
409 The following example demonstrates IPv4, 5-tuple classification for rules defined above
443 /* destination IPv4 */
457 /* destination IPv4 */
[all …]
H A Dip_fragment_reassembly_lib.rst7 The IP Fragmentation and Reassembly Library implements IPv4 and IPv6 packet fragmentation and reass…
24 Note that for IPv4, header checksum is not recalculated and is set to zero.
78 #. Search the Fragment Table for entry with packet's <IPv4 Source Address, IPv4 Destination Addres…
H A Dipsec_lib.rst176 required and IP protocol type (IPv4/IPv6).
211 As an example, to add new entry into the SAD for IPv4 addresses:
262 where v4 is a tuple for IPv4:
310 * ESP protocol tunnel mode both IPv4/IPv6.
312 * ESP protocol transport mode both IPv4/IPv6.
H A Dtraffic_management.rst25 * Packet marking: IEEE 802.1q (VLAN DEI), IETF RFC 3168 (IPv4/IPv6 ECN for TCP
26 and SCTP), IETF RFC 2597 (IPv4 / IPv6 DSCP)
135 as VLAN DEI packet marking (IEEE 802.1Q), IPv4/IPv6 ECN marking of TCP and SCTP
136 packets (IETF RFC 3168) and IPv4/IPv6 DSCP packet marking (IETF RFC 2597).
141 All IPv4/IPv6 packets of a given color with ECN set to 2’b01 or 2’b10 carrying
145 All IPv4/IPv6 packets have their color marked into DSCP bits 3 and 4 as
/f-stack/dpdk/examples/pipeline/examples/
H A Dvxlan.spec86 // Ethernet (14) | IPv4 (total_len)
89 // Ethernet (14) | IPv4 (20) | UDP (8) | VXLAN (8) | Input frame | Ethernet FCS (4)
94 // Assumption: When read from the table, the outer IPv4 and UDP headers contain
97 // - The outer IPv4 header (20 bytes);
108 // Once the total length of the inner IPv4 packet (h.ipv4.total_len) is known,
109 // the outer IPv4 and UDP headers are updated as follows:
/f-stack/dpdk/doc/guides/sample_app_ug/
H A Dipv4_multicast.rst4 IPv4 Multicast Sample Application
7 The IPv4 Multicast application is a simple example of packet processing
19 * The IPv4 Multicast sample application makes use of indirect buffers.
21 * The forwarding decision is taken based on information read from the input packet's IPv4 header.
24 The lookup table is composed of pairs of destination IPv4 address (the FBK)
25 and a port mask associated with that IPv4 address.
31 If using non-consecutive ports, use the destination IPv4 address accordingly.
37 it looks only at the IPv4 destination address for any given packet.
64 NUMA support is not provided in the IPv4 Multicast sample application.
96 The IPv4 Multicast sample application uses three memory pools.
[all …]
H A Dtest_pipeline.rst108 …| | [destination IPv4 address, 4 bytes of…
131 …| | [destination IPv4 address, 12 bytes o…
154 …| | [destination IPv4 address, 28 bytes o…
161 …| 9 | lpm | Longest Prefix Match (LPM) IPv4 table. | In t…
182 … | At run time, core A is storing the IPv4 destination |
192 … | | IPv4 source = ANY, …
194 … | | IPv4 destination = 0.0.0…
207 … | | IPv4 source = ANY, …
209 … | | IPv4 destination = 0.128…
231 The profile for input traffic is TCP/IPv4 packets with:
H A Dip_reassembly.rst8 The application performs L3 forwarding with reassembly for fragmented IPv4 and IPv6 packets.
14 with reassembly for IPv4 and IPv6 fragmented packets.
17 it reassembles fragmented IPv4 and IPv6 packets before forwarding.
26 The Longest Prefix Match (LPM for IPv4, LPM6 for IPv6) table is used to store/lookup an outgoing po…
27 associated with that IPv4 address. Any unmatched packets are forwarded to the originating port.
135 For example, for the fragmented input IPv4 packet with destination address: 100.10.1.1,
136 a reassembled IPv4 packet be sent out from port #0 to the destination address 100.10.1.1
146 IPv4 Fragment Table Initialization
196 If the packet is an IPv4 or IPv6 fragment, then it calls rte_ipv4_reassemble_packet() for IPv4 pack…
H A Dip_frag.rst7 The IPv4 Fragmentation application is a simple example of packet processing
9 The application does L3 forwarding with IPv4 and IPv6 packet fragmentation.
28 The Longest Prefix Match (LPM for IPv4, LPM6 for IPv6) table is used to store/lookup an outgoing po…
132 For example, for the input IPv4 packet with destination address: 100.10.1.1 and packet length 9198 …
133 seven IPv4 packets will be sent out from port #0 to the destination address 100.10.1.1:
H A Dl3_forward_access_ctrl.rst34 Classification for both IPv4 and IPv6 packets is supported in this application.
41 The application implements packet classification for the IPv4/IPv6 5-tuple syntax specifically.
47 …: Each is either a 32-bit field (for IPv4), or a set of 4 32-bit fields (for IPv6) represented by …
115 * A typical IPv4 ACL rule line should have a format as shown below:
122 A typical IPv4 ACL rule
125 IPv4 addresses are specified in CIDR format as specified in RFC 4632.
206 Note that application maintains a separate AC contexts for IPv4 and IPv6 rules.
251 * --rule_ipv4 FILENAME: Specifies the IPv4 ACL and route rules file
296 * The --rule_ipv4 option specifies the reading of IPv4 rules sets from the rule_ipv4.db file.
327 For each supported AC rule format (IPv4 5-tuple, IPv6 6-tuple) application creates a separate conte…
[all …]
/f-stack/dpdk/drivers/net/tap/
H A Dtap_bpf_program.c22 #define IPv4(a, b, c, d) ((__u32)(((a) & 0xff) << 24) | \ macro
160 .src_addr = IPv4(*(src_dst_addr + 0), in rss_l3_l4()
164 .dst_addr = IPv4(*(src_dst_addr + 4), in rss_l3_l4()
/f-stack/dpdk/examples/ip_pipeline/examples/
H A Dflow_crypto.cli12 ; Input packet: Ethernet/IPv4
19 ; 3 IPv4 header 280 20
H A Dfirewall.cli16 ; Input packet: Ethernet/IPv4
23 ; 3 IPv4 header 270 20
H A Dflow.cli16 ; Input packet: Ethernet/IPv4
23 ; 3 IPv4 header 270 20
H A Droute.cli16 ; Input packet: Ethernet/IPv4
23 ; 3 IPv4 header 270 20
H A Droute_ecmp.cli6 ; Input packet: Ethernet/IPv4
13 ; 3 IPv4 header 270 20
/f-stack/dpdk/doc/api/
H A Ddoxy-api-index.md129 [LPM IPv4 route] (@ref rte_lpm.h),
131 [RIB IPv4] (@ref rte_rib.h),
133 [FIB IPv4] (@ref rte_fib.h),
170 [lpm IPv4] (@ref rte_table_lpm.h),
/f-stack/dpdk/devtools/
H A Dwords-case.txt25 IPv4
/f-stack/dpdk/drivers/net/ixgbe/
H A Dixgbe_ipsec.c161 } else if (ic_session->dst_ip.type == IPv4) in ixgbe_crypto_add_sa()
162 priv->rx_ip_tbl[ip_index].ip.type = IPv4; in ixgbe_crypto_add_sa()
169 if (priv->rx_ip_tbl[ip_index].ip.type == IPv4) { in ixgbe_crypto_add_sa()
702 ic_session->src_ip.type = IPv4; in ixgbe_crypto_add_ingress_sa_from_flow()
703 ic_session->dst_ip.type = IPv4; in ixgbe_crypto_add_ingress_sa_from_flow()
H A Dixgbe_ipsec.h51 IPv4, enumerator
/f-stack/dpdk/doc/guides/howto/
H A Drte_flow.rst16 Simple IPv4 drop
22 In this example we will create a simple rule that drops packets whose IPv4
108 Range IPv4 drop
114 In this example we will create a simple rule that drops packets whose IPv4
/f-stack/dpdk/doc/guides/nics/
H A Dsfc_efx.rst30 - IPv4/IPv6 TCP/UDP transmit checksum offload
32 - Inner IPv4/IPv6 TCP/UDP transmit checksum offload
53 - IPv4/IPv6 TCP/UDP receive checksum offload
55 - Inner IPv4/IPv6 TCP/UDP receive checksum offload
266 - Filtering by IPv4 or IPv6 EtherType without pattern items of internet
394 mbufs, VLAN insertion, inner/outer IPv4 and TCP/UDP checksum and TCP
395 segmentation offloads including VXLAN and GENEVE IPv4/IPv6 tunnels.

1234