Home
last modified time | relevance | path

Searched full:ipv4 (Results 1 – 25 of 1402) sorted by relevance

12345678910>>...57

/openbmc/linux/drivers/net/ethernet/intel/ice/
H A Dice_lan_tx_rx.h722 /* Non Tunneled IPv4 */
723 ICE_PTT(22, IP, IPV4, FRG, NONE, NONE, NOF, NONE, PAY3),
724 ICE_PTT(23, IP, IPV4, NOF, NONE, NONE, NOF, NONE, PAY3),
725 ICE_PTT(24, IP, IPV4, NOF, NONE, NONE, NOF, UDP, PAY4),
727 ICE_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
728 ICE_PTT(27, IP, IPV4, NOF, NONE, NONE, NOF, SCTP, PAY4),
729 ICE_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4),
731 /* IPv4 --> IPv4 */
732 ICE_PTT(29, IP, IPV4, NOF, IP_IP, IPV4, FRG, NONE, PAY3),
733 ICE_PTT(30, IP, IPV4, NOF, IP_IP, IPV4, NOF, NONE, PAY3),
[all …]
/openbmc/linux/drivers/net/ethernet/intel/iavf/
H A Diavf_common.c541 /* Non Tunneled IPv4 */
542 IAVF_PTT(22, IP, IPV4, FRG, NONE, NONE, NOF, NONE, PAY3),
543 IAVF_PTT(23, IP, IPV4, NOF, NONE, NONE, NOF, NONE, PAY3),
544 IAVF_PTT(24, IP, IPV4, NOF, NONE, NONE, NOF, UDP, PAY4),
546 IAVF_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
547 IAVF_PTT(27, IP, IPV4, NOF, NONE, NONE, NOF, SCTP, PAY4),
548 IAVF_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4),
550 /* IPv4 --> IPv4 */
551 IAVF_PTT(29, IP, IPV4, NOF, IP_IP, IPV4, FRG, NONE, PAY3),
552 IAVF_PTT(30, IP, IPV4, NOF, IP_IP, IPV4, NOF, NONE, PAY3),
[all …]
/openbmc/linux/net/ipv4/
H A Dsysctl_net_ipv4.c3 * sysctl_net_ipv4.c: sysctl interface to net IPV4 subsystem.
6 * Added /proc/sys/net/ipv4 directory entry (empty =) ). [MS]
57 write_seqlock_bh(&net->ipv4.ip_local_ports.lock); in set_local_port_range()
58 if (same_parity && !net->ipv4.ip_local_ports.warned) { in set_local_port_range()
59 net->ipv4.ip_local_ports.warned = true; in set_local_port_range()
62 net->ipv4.ip_local_ports.range[0] = range[0]; in set_local_port_range()
63 net->ipv4.ip_local_ports.range[1] = range[1]; in set_local_port_range()
64 write_sequnlock_bh(&net->ipv4.ip_local_ports.lock); in set_local_port_range()
72 container_of(table->data, struct net, ipv4.ip_local_ports.range); in ipv4_local_port_range()
93 (range[0] < READ_ONCE(net->ipv4.sysctl_ip_prot_sock))) in ipv4_local_port_range()
[all …]
H A Dtcp_plb.c30 if (!READ_ONCE(net->ipv4.sysctl_tcp_plb_enabled)) in tcp_plb_update_state()
34 if (cong_ratio < READ_ONCE(net->ipv4.sysctl_tcp_plb_cong_thresh)) in tcp_plb_update_state()
37 READ_ONCE(net->ipv4.sysctl_tcp_plb_rehash_rounds)) in tcp_plb_update_state()
52 if (!READ_ONCE(net->ipv4.sysctl_tcp_plb_enabled)) in tcp_plb_check_rehash()
56 READ_ONCE(net->ipv4.sysctl_tcp_plb_rehash_rounds); in tcp_plb_check_rehash()
58 idle_rehash = READ_ONCE(net->ipv4.sysctl_tcp_plb_idle_rehash_rounds) && in tcp_plb_check_rehash()
61 READ_ONCE(net->ipv4.sysctl_tcp_plb_idle_rehash_rounds); in tcp_plb_check_rehash()
71 max_suspend = 2 * READ_ONCE(net->ipv4.sysctl_tcp_plb_suspend_rto_sec) * HZ; in tcp_plb_check_rehash()
96 if (!READ_ONCE(net->ipv4.sysctl_tcp_plb_enabled)) in tcp_plb_update_state_upon_rto()
99 pause = READ_ONCE(net->ipv4.sysctl_tcp_plb_suspend_rto_sec) * HZ; in tcp_plb_update_state_upon_rto()
/openbmc/phosphor-webui/app/configuration/controllers/
H A Dnetwork-controller.js49 $scope.interface.ipv4.values.push(
54 // Check if the IPV4 being removed has an id. This indicates that it is
56 if ($scope.interface.ipv4.values[index].id) {
57 $scope.ipv4sToDelete.push($scope.interface.ipv4.values[index]);
59 $scope.interface.ipv4.values.splice(index, 1);
94 // Set IPV4 IP Addresses, Netmask Prefix Lengths, and Gateways
96 // Delete existing IPV4 addresses that were removed
98 // Update any changed IPV4 addresses and add new
99 for (var i in $scope.interface.ipv4.values) {
101 $scope.interface.ipv4.values[i].Address)) {
[all …]
H A Dnetwork-controller.html40 IPV4 settings
58 …ass="net-config__fieldset net-config__static-ip-wrap" ng-repeat="ipv4 in interface.ipv4.values tra…
60 <label for="ipv4-address-{{$index+1}}">IPV4 address</label>
61 … <input id="ipv4-address-{{$index+1}}" ng-change="ipv4.updateAddress = true" type="text"
62 ng-disabled="interface.DHCPEnabled" ng-model="ipv4.Address" />
65 <label for="ipv4-gateway-{{$index+1}}">Gateway</label>
66 … <input id="ipv4-gateway-{{$index+1}}" ng-change="ipv4.updateGateway = true" type="text"
67 ng-disabled="interface.DHCPEnabled" value="" ng-model="ipv4.Gateway" />
69 <!-- This netmask prefix length max only works with IPV4 -->
71 <label for="ipv4-prefix-{{$index+1}}">Netmask Prefix Length</label>
[all …]
/openbmc/linux/tools/testing/selftests/bpf/
H A Dtest_flow_dissector.sh104 echo 0 > /proc/sys/net/ipv4/conf/default/rp_filter
105 echo 0 > /proc/sys/net/ipv4/conf/all/rp_filter
106 echo 0 > /proc/sys/net/ipv4/conf/lo/rp_filter
108 echo "Testing IPv4..."
113 # Send 10 IPv4/UDP packets from port 8. Filter should not drop any.
115 # Send 10 IPv4/UDP packets from port 9. Filter should drop all.
117 # Send 10 IPv4/UDP packets from port 10. Filter should not drop any.
120 echo "Testing IPv4 from 127.0.0.127 (fallback to generic dissector)..."
121 # Send 10 IPv4/UDP packets from port 8. Filter should not drop any.
123 # Send 10 IPv4/UDP packets from port 9. Filter should drop all.
[all …]
H A Dtest_lwt_ip_encap.sh117 ip netns exec ${NS1} sysctl -wq net.ipv4.conf.all.rp_filter=0
118 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.all.rp_filter=0
119 ip netns exec ${NS3} sysctl -wq net.ipv4.conf.all.rp_filter=0
120 ip netns exec ${NS1} sysctl -wq net.ipv4.conf.default.rp_filter=0
121 ip netns exec ${NS2} sysctl -wq net.ipv4.conf.default.rp_filter=0
122 ip netns exec ${NS3} sysctl -wq net.ipv4.conf.default.rp_filter=0
137 ip netns exec ${NS2} sysctl -wq net.ipv4.ip_forward=1
241 # configure IPv4 GRE device in NS3, and a route to it via the "bottom" route
297 if [ "${PROTO}" == "IPv4" ] ; then
330 if [ "${PROTO}" == "IPv4" ] ; then
[all …]
/openbmc/openbmc-test-automation/openpower/ext_interfaces/
H A Dtest_vmi.robot68 Run Keyword If ${curr_origin} == ${True} Set VMI IPv4 Origin ${False} ${HTTP_ACCEPTED}
70 Delete VMI IPv4 Address
78 Run Keyword If ${curr_origin} == ${True} Set VMI IPv4 Origin ${False} ${HTTP_ACCEPTED}
79 Set Static IPv4 Address To VMI And Verify ${test_ipv4} ${test_gateway} ${test_netmask}
80 Delete VMI IPv4 Address IPv4Addresses valid_status_code=${HTTP_FORBIDDEN}
83 Assign Valid And Invalid Static IPv4 Address To VMI
84 [Documentation] Assign static IPv4 address to VMI.
86 [Template] Set Static IPv4 Address To VMI And Verify
87 [Teardown] Run keywords Delete VMI IPv4 Address AND Test Teardown Execution
99 [Teardown] Run keywords Delete VMI IPv4 Addres
[all...]
H A Dtest_vmi_multiple_interfaces.robot33 Set Static IPv4 Address To VMI And Verify ${test_ipv4_1} ${test_gateway_1}
35 Set Static IPv4 Address To VMI And Verify ${test_ipv4_3} ${test_gateway_1}
43 Set Static IPv4 Address To VMI And Verify ${test_ipv4_1} ${test_gateway_1}
45 Set Static IPv4 Address To VMI And Verify ${test_ipv4_2} ${test_gateway_2}
51 [Teardown] Run keywords Set VMI IPv4 Origin ${False}
52 ... AND Set VMI IPv4 Origin ${False} ${HTTP_ACCEPTED} ${interface_list}[1]
55 Set VMI IPv4 Origin ${True}
57 Set VMI IPv4 Origin ${True} ${HTTP_ACCEPTED} ${interface_list}[1]
65 [Teardown] Run keywords Delete VMI IPv4 Address AND
66 ... Set VMI IPv4 Origin ${False} ${HTTP_ACCEPTED} ${interface_list}[1]
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/tayga/files/
H A Dtayga.conf8 # TUN device that TAYGA will use to exchange IPv4 and IPv6 packets with the
20 # TAYGA's IPv4 address. This is NOT your router's IPv4 address! TAYGA
21 # requires its own address because it acts as an IPv4 and IPv6 router, and
29 ipv4-addr 192.168.254.1
33 # requires its own address because it acts as an IPv4 and IPv6 router, and
38 # address using ipv4-addr and the NAT64 prefix.
41 # mandatory if the NAT64 prefix is 64:ff9b::/96 and ipv4-addr is a private
48 # The NAT64 prefix. The IPv4 address space is mapped into the IPv6 address
49 # space by prepending this prefix to the IPv4 address. Using a /96 prefix is
55 # Prefix will prohibit IPv6 hosts from contacting IPv4 hosts that have private
[all …]
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dxdp_synproxy_kern.c367 struct iphdr *ipv4; member
384 hdr->ipv4 = (void *)hdr->eth + sizeof(*hdr->eth); in tcp_dissect()
385 if (hdr->ipv4 + 1 > data_end) in tcp_dissect()
387 if (hdr->ipv4->ihl * 4 < sizeof(*hdr->ipv4)) in tcp_dissect()
389 if (hdr->ipv4->version != 4) in tcp_dissect()
392 if (hdr->ipv4->protocol != IPPROTO_TCP) in tcp_dissect()
395 hdr->tcp = (void *)hdr->ipv4 + hdr->ipv4->ihl * 4; in tcp_dissect()
398 hdr->ipv4 = NULL; in tcp_dissect()
438 if (hdr->ipv4) { in tcp_lookup()
442 if ((hdr->ipv4->frag_off & bpf_htons(IP_DF | IP_MF | IP_OFFSET)) != bpf_htons(IP_DF)) in tcp_lookup()
[all …]
H A Dtest_sk_assign.c55 get_tuple(struct __sk_buff *skb, bool *ipv4, bool *tcp) in get_tuple() argument
78 *ipv4 = true; in get_tuple()
87 *ipv4 = false; in get_tuple()
102 handle_udp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_udp() argument
110 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_udp()
118 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_udp()
133 handle_tcp(struct __sk_buff *skb, struct bpf_sock_tuple *tuple, bool ipv4) in handle_tcp() argument
141 tuple_len = ipv4 ? sizeof(tuple->ipv4) : sizeof(tuple->ipv6); in handle_tcp()
152 dport = ipv4 ? tuple->ipv4.dport : tuple->ipv6.dport; in handle_tcp()
175 bool ipv4 = false; in bpf_sk_assign_test() local
[all …]
H A Dtest_bpf_nf.c79 __builtin_memset(&bpf_tuple, 0, sizeof(bpf_tuple.ipv4)); in nf_ct_test()
88 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
98 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
106 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
114 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
123 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
131 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4), &opts_def, in nf_ct_test()
138 ct = lookup_fn(ctx, &bpf_tuple, sizeof(bpf_tuple.ipv4) - 1, &opts_def, in nf_ct_test()
145 bpf_tuple.ipv4.saddr = bpf_get_prandom_u32(); /* src IP */ in nf_ct_test()
146 bpf_tuple.ipv4.daddr = bpf_get_prandom_u32(); /* dst IP */ in nf_ct_test()
[all …]
H A Dtest_cls_redirect.c91 offsetofend(struct bpf_sock_tuple, ipv4.dport) -
92 offsetof(struct bpf_sock_tuple, ipv4.sport) - 1,
198 static INLINING bool pkt_skip_ipv4_options(buf_t *buf, const struct iphdr *ipv4) in pkt_skip_ipv4_options() argument
200 if (ipv4->ihl <= 5) { in pkt_skip_ipv4_options()
204 return buf_skip(buf, (ipv4->ihl - 5) * 4); in pkt_skip_ipv4_options()
215 struct iphdr *ipv4 = buf_assign(pkt, sizeof(*ipv4), scratch); in pkt_parse_ipv4() local
216 if (ipv4 == NULL) { in pkt_parse_ipv4()
220 if (ipv4->ihl < 5) { in pkt_parse_ipv4()
224 if (!pkt_skip_ipv4_options(pkt, ipv4)) { in pkt_parse_ipv4()
228 return ipv4; in pkt_parse_ipv4()
[all …]
/openbmc/linux/tools/testing/selftests/net/
H A Dbareudp.sh8 # configurations of bareudp (using IPv4 or IPv6 as underlay and transporting
9 # IPv4, IPv6 or MPLS packets on the overlay).
14 # is assigned an IPv4 and an IPv6 address. A host-route allows a veth to
18 # IPv4 and IPv6 addresses on their loopback device. Routes are added in NS0
20 # For IPv4 and IPv6 reachability tests, the route simply sets the peer's
31 # | * IPv4 address: 192.0.2.100/32 |
34 # | * IPv4 route: 192.0.2.103/32 reachable via 192.0.2.11 |
40 # | ^ * IPv4 address: 192.0.2.10, peer 192.0.2.11/32 |
52 # | * IPv4 address: 192.0.2.11, peer 192.0.2.10/32 |
62 # | ^ * IPv4 address: 192.0.2.21, peer 192.0.2.22/32 |
[all …]
/openbmc/linux/drivers/infiniband/hw/irdma/
H A Dtrace_cm.h15 #define __print_ip_addr(addr, port, ipv4) print_ip_addr(p, addr, port, ipv4) argument
26 __field(bool, ipv4)
30 __entry->ipv4 = cm_info->ipv4;
37 __entry->lport, __entry->ipv4)
48 __field(bool, ipv4)
53 __entry->ipv4 = listener->ipv4;
61 __entry->lport, __entry->ipv4)
71 __field(bool, ipv4)
79 __entry->ipv4 = listener->ipv4;
88 __entry->lport, __entry->ipv4)
[all …]
/openbmc/linux/tools/testing/selftests/drivers/net/dsa/
H A Dlocal_termination.sh150 check_rcv $rcv_if_name "Unicast IPv4 to primary MAC address" \
151 "$smac > $rcv_dmac, ethertype IPv4 (0x0800)" \
154 check_rcv $rcv_if_name "Unicast IPv4 to macvlan MAC address" \
155 "$smac > $MACVLAN_ADDR, ethertype IPv4 (0x0800)" \
158 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address" \
159 "$smac > $UNKNOWN_UC_ADDR1, ethertype IPv4 (0x0800)" \
162 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, promisc" \
163 "$smac > $UNKNOWN_UC_ADDR2, ethertype IPv4 (0x0800)" \
166 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, allmulti" \
167 "$smac > $UNKNOWN_UC_ADDR3, ethertype IPv4 (0x0800)" \
[all …]
/openbmc/linux/tools/testing/selftests/net/forwarding/
H A Dlocal_termination.sh150 check_rcv $rcv_if_name "Unicast IPv4 to primary MAC address" \
151 "$smac > $rcv_dmac, ethertype IPv4 (0x0800)" \
154 check_rcv $rcv_if_name "Unicast IPv4 to macvlan MAC address" \
155 "$smac > $MACVLAN_ADDR, ethertype IPv4 (0x0800)" \
158 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address" \
159 "$smac > $UNKNOWN_UC_ADDR1, ethertype IPv4 (0x0800)" \
162 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, promisc" \
163 "$smac > $UNKNOWN_UC_ADDR2, ethertype IPv4 (0x0800)" \
166 check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, allmulti" \
167 "$smac > $UNKNOWN_UC_ADDR3, ethertype IPv4 (0x0800)" \
[all …]
/openbmc/linux/net/netfilter/ipset/
H A DKconfig33 can store IPv4 addresses (or network addresses) from a range.
42 can store IPv4 address and (source) MAC address pairs from a range.
60 can store arbitrary IPv4 or IPv6 addresses (or network addresses)
70 can store IPv4/IPv6 address and mark pairs.
79 can store IPv4/IPv6 address and protocol/port pairs.
88 one can store IPv4/IPv6 address, protocol/port, and IPv4/IPv6
98 one can store IPv4/IPv6 address, protocol/port, and IPv4/IPv6
108 one can store IPv4/IPv6 address and MAC (ethernet address) pairs in a set.
126 one can store two IPv4/IPv6 subnets, and a protocol/port in a set.
135 one can store IPv4/IPv6 network address/prefix elements in a set.
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/procps/procps/
H A Dsysctl.conf13 net/ipv4/tcp_syncookies=1
16 net/ipv4/conf/all/log_martians=1
19 net/ipv4/conf/all/accept_redirects=0
20 net/ipv4/conf/all/accept_source_route=0
21 net/ipv4/icmp_echo_ignore_broadcasts =1
24 #net/ipv4/ip_forward=1
27 #net.ipv4.ip_local_port_range = 32768 61000
34 #net.ipv4.tcp_ecn = 0
/openbmc/linux/drivers/net/ethernet/mediatek/
H A Dmtk_ppe_debugfs.c33 [MTK_PPE_PKT_TYPE_IPV4_HNAPT] = "IPv4 5T", in mtk_foe_pkt_type_str()
34 [MTK_PPE_PKT_TYPE_IPV4_ROUTE] = "IPv4 3T", in mtk_foe_pkt_type_str()
109 ai.src_port = &entry->ipv4.orig.src_port; in mtk_ppe_debugfs_foe_show()
110 ai.dest_port = &entry->ipv4.orig.dest_port; in mtk_ppe_debugfs_foe_show()
113 ai.src = &entry->ipv4.orig.src_ip; in mtk_ppe_debugfs_foe_show()
114 ai.dest = &entry->ipv4.orig.dest_ip; in mtk_ppe_debugfs_foe_show()
134 ai.src_port = &entry->ipv4.new.src_port; in mtk_ppe_debugfs_foe_show()
135 ai.dest_port = &entry->ipv4.new.dest_port; in mtk_ppe_debugfs_foe_show()
138 ai.src = &entry->ipv4.new.src_ip; in mtk_ppe_debugfs_foe_show()
139 ai.dest = &entry->ipv4.new.dest_ip; in mtk_ppe_debugfs_foe_show()
[all …]
/openbmc/linux/drivers/net/ethernet/wangxun/libwx/
H A Dwx_lib.c34 [0x22] = WX_PTT(IP, IPV4, NONE, NONE, NONE, PAY3),
35 [0x23] = WX_PTT(IP, IPV4, NONE, NONE, UDP, PAY4),
36 [0x24] = WX_PTT(IP, IPV4, NONE, NONE, TCP, PAY4),
37 [0x25] = WX_PTT(IP, IPV4, NONE, NONE, SCTP, PAY4),
48 /* IPv4 --> IPv4/IPv6 */
49 [0x81] = WX_PTT(IP, IPV4, IPIP, FGV4, NONE, PAY3),
50 [0x82] = WX_PTT(IP, IPV4, IPIP, IPV4, NONE, PAY3),
51 [0x83] = WX_PTT(IP, IPV4, IPIP, IPV4, UDP, PAY4),
52 [0x84] = WX_PTT(IP, IPV4, IPIP, IPV4, TCP, PAY4),
53 [0x85] = WX_PTT(IP, IPV4, IPIP, IPV4, SCTP, PAY4),
[all …]
/openbmc/linux/samples/bpf/
H A Dtc_l2_redirect.sh10 RP_FILTER=$(< /proc/sys/net/ipv4/conf/all/rp_filter)
49 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0
50 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ipt2.rp_filter=0
54 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.all.rp_filter=0
55 $IP netns exec ns2 sysctl -q -w net.ipv4.conf.ip6t2.rp_filter=0
66 sysctl -q -w net.ipv4.conf.all.rp_filter=0
80 sysctl -q -w net.ipv4.conf.all.rp_filter=$RP_FILTER
97 sysctl -q -w net.ipv4.conf.ipt.rp_filter=0
98 sysctl -q -w net.ipv4.conf.ipt.forwarding=1
103 sysctl -q -w net.ipv4.conf.ve1.forwarding=1
[all …]
/openbmc/linux/tools/testing/selftests/netfilter/
H A Dipvs.sh47 sysipvsnet="/proc/sys/net/ipv4/vs/"
141 ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=1
147 ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_ignore=1
148 ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_announce=2
150 ip netns exec ns2 sysctl -qw net.ipv4.conf.all.rp_filter=0
151 ip netns exec ns2 sysctl -qw net.ipv4.conf.veth21.rp_filter=0
160 ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=1
176 ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=0
177 ip netns exec ns1 sysctl -qw net.ipv4.conf.all.send_redirects=0
178 ip netns exec ns1 sysctl -qw net.ipv4.conf.default.send_redirects=0
[all …]

12345678910>>...57