/linux/net/batman-adv/ |
H A D | tp_meter.c | 582 struct batadv_icmp_tp_packet *icmp; in batadv_tp_send_msg() local 593 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_msg() 596 ether_addr_copy(icmp->dst, orig_node->orig); in batadv_tp_send_msg() 597 ether_addr_copy(icmp->orig, src); in batadv_tp_send_msg() 598 icmp->version = BATADV_COMPAT_VERSION; in batadv_tp_send_msg() 599 icmp->packet_type = BATADV_ICMP; in batadv_tp_send_msg() 600 icmp->ttl = BATADV_TTL; in batadv_tp_send_msg() 601 icmp->msg_type = BATADV_TP; in batadv_tp_send_msg() 602 icmp->uid = uid; in batadv_tp_send_msg() 604 icmp->subtype = BATADV_TP_MSG; in batadv_tp_send_msg() [all …]
|
/linux/net/netfilter/ |
H A D | nf_conntrack_proto_icmp.c | 37 tuple->dst.u.icmp.type = hp->type; in icmp_pkt_to_tuple() 38 tuple->src.u.icmp.id = hp->un.echo.id; in icmp_pkt_to_tuple() 39 tuple->dst.u.icmp.code = hp->code; in icmp_pkt_to_tuple() 59 if (orig->dst.u.icmp.type >= sizeof(invmap) || in nf_conntrack_invert_icmp_tuple() 60 !invmap[orig->dst.u.icmp.type]) in nf_conntrack_invert_icmp_tuple() 63 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmp_tuple() 64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp.type] - 1; in nf_conntrack_invert_icmp_tuple() 65 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmp_tuple() 89 if (ct->tuplehash[0].tuple.dst.u.icmp.type >= sizeof(valid_new) || in nf_conntrack_icmp_packet() 90 !valid_new[ct->tuplehash[0].tuple.dst.u.icmp.type]) { in nf_conntrack_icmp_packet() [all …]
|
H A D | nf_conntrack_proto_icmpv6.c | 42 tuple->dst.u.icmp.type = hp->icmp6_type; in icmpv6_pkt_to_tuple() 43 tuple->src.u.icmp.id = hp->icmp6_identifier; in icmpv6_pkt_to_tuple() 44 tuple->dst.u.icmp.code = hp->icmp6_code; in icmpv6_pkt_to_tuple() 73 int type = orig->dst.u.icmp.type - 128; in nf_conntrack_invert_icmpv6_tuple() 77 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmpv6_tuple() 78 tuple->dst.u.icmp.type = invmap[type] - 1; in nf_conntrack_invert_icmpv6_tuple() 79 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmpv6_tuple() 104 int type = ct->tuplehash[0].tuple.dst.u.icmp.type - 128; in nf_conntrack_icmpv6_packet() 235 if (nla_put_be16(skb, CTA_PROTO_ICMPV6_ID, t->src.u.icmp.id) || in icmpv6_tuple_to_nlattr() 236 nla_put_u8(skb, CTA_PROTO_ICMPV6_TYPE, t->dst.u.icmp.type) || in icmpv6_tuple_to_nlattr() [all …]
|
H A D | nf_nat_proto.c | 248 hdr->un.echo.id, tuple->src.u.icmp.id, false); in icmp_manip_pkt() 249 hdr->un.echo.id = tuple->src.u.icmp.id; in icmp_manip_pkt() 270 tuple->src.u.icmp.id, false); in icmpv6_manip_pkt() 271 hdr->icmp6_identifier = tuple->src.u.icmp.id; in icmpv6_manip_pkt() 565 struct icmphdr icmp; in nf_nat_icmp_reply_translation() member 582 if (inside->icmp.type == ICMP_REDIRECT) { in nf_nat_icmp_reply_translation() 601 if (!nf_nat_ipv4_manip_pkt(skb, hdrlen + sizeof(inside->icmp), in nf_nat_icmp_reply_translation() 608 inside->icmp.checksum = 0; in nf_nat_icmp_reply_translation() 609 inside->icmp.checksum = in nf_nat_icmp_reply_translation()
|
H A D | nf_nat_core.c | 423 return ntohs(tuple->src.u.icmp.id) >= ntohs(min->icmp.id) && in l4proto_in_range() 424 ntohs(tuple->src.u.icmp.id) <= ntohs(max->icmp.id); in l4proto_in_range() 594 keyptr = &tuple->src.u.icmp.id; in nf_nat_l4proto_unique_tuple() 599 min = ntohs(range->min_proto.icmp.id); in nf_nat_l4proto_unique_tuple() 600 range_size = ntohs(range->max_proto.icmp.id) - in nf_nat_l4proto_unique_tuple() 601 ntohs(range->min_proto.icmp.id) + 1; in nf_nat_l4proto_unique_tuple()
|
/linux/tools/testing/selftests/net/netfilter/ |
H A D | conntrack_icmp_related.sh | 121 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac… 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 138 icmp type "redirect" ct state "related" counter name "redir4" accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 157 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 159 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept 160 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" accept 165 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 167 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" [all …]
|
H A D | bridge_brouter.sh | 56 …if ! ip netns exec "$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect -… 90 ip netns exec "$nsbr" ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 99 …ip netns exec "$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redi…
|
H A D | conntrack_vrf.sh | 106 ip protocol icmp counter 122 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 1 2>/dev/null | wc -l) 127 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 2 2> /dev/null | wc -l)
|
H A D | nft_queue.sh | 91 ip protocol icmp queue bypass 366 meta oifname "tvrf" icmp type echo-request counter queue num 1 367 meta oifname "eth0" icmp type echo-request counter queue num 1 371 meta oifname "tvrf" icmp type echo-request counter queue num 1 372 meta oifname "eth0" icmp type echo-request counter queue num 1 573 ip protocol icmp queue num 0
|
H A D | nft_meta.sh | 59 meta l4proto icmp counter name "il4protocounter" 73 meta l4proto icmp counter name "ol4protocounter"
|
H A D | br_netfilter_queue.sh | 65 ip protocol icmp counter queue num 0 bypass
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | lwt_helpers.h | 74 struct icmphdr *icmp = (struct icmphdr *)(ip + 1); in __expect_icmp_ipv4() local 75 ssize_t min_header_len = sizeof(*ip) + sizeof(*icmp); in __expect_icmp_ipv4() 83 if (icmp->type != ICMP_ECHO) in __expect_icmp_ipv4()
|
/linux/drivers/net/wireless/intel/iwlwifi/mei/ |
H A D | net.c | 224 struct icmphdr *icmp; in iwl_mei_rx_filter_ipv4() local 226 if (!pskb_may_pull(skb, skb_transport_offset(skb) + sizeof(*icmp))) in iwl_mei_rx_filter_ipv4() 229 icmp = icmp_hdr(skb); in iwl_mei_rx_filter_ipv4() 236 match && (icmp->type != ICMP_ECHO || icmp->code != 0)) { in iwl_mei_rx_filter_ipv4()
|
/linux/tools/testing/selftests/net/forwarding/ |
H A D | tc_actions.sh | 167 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 174 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 176 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 179 -t icmp "ping,id=42,seq=10" -q 220 $tcflags ip_proto icmp \ 223 ip_proto icmp \ 234 -t icmp "ping,id=42,seq=5" -q
|
H A D | vxlan_bridge_1d.sh | 398 $MZ $h1 -c 10 -d 100msec -p 64 -b $mac -B $dst -t icmp -q 701 -t icmp -q 733 -t icmp -q 761 -t icmp -q 770 -t icmp -q
|
H A D | vxlan_bridge_1q.sh | 503 $MZ $h1 -Q $vid -c 10 -d 100msec -p 64 -b $mac -B $dst -t icmp -q 706 -B $dst -t icmp -q 741 -B $dst -t icmp -q 773 -B $dst -t icmp -q 783 -B $dst -t icmp -q
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_cls_redirect_dynptr.c | 608 struct icmphdr icmp; in process_icmpv4() local 611 if (bpf_dynptr_read(&icmp, sizeof(icmp), dynptr, *offset, 0)) { in process_icmpv4() 616 *offset += sizeof(icmp); in process_icmpv4() 619 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 624 if (icmp.type == ICMP_ECHO) in process_icmpv4() 627 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
H A D | test_cls_redirect.c | 720 struct icmphdr icmp; in process_icmpv4() local 721 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4() 727 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 732 if (icmp.type == ICMP_ECHO) { in process_icmpv4() 736 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
H A D | bpf_flow.c | 169 struct icmphdr *icmp, _icmp; in parse_ip_proto() local 177 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto() 178 if (!icmp) in parse_ip_proto()
|
/linux/net/openvswitch/ |
H A D | flow.c | 557 struct icmp6hdr *icmp = icmp6_hdr(skb); in parse_icmpv6() local 562 key->tp.src = htons(icmp->icmp6_type); in parse_icmpv6() 563 key->tp.dst = htons(icmp->icmp6_code); in parse_icmpv6() 565 if (icmp->icmp6_code == 0 && in parse_icmpv6() 566 (icmp->icmp6_type == NDISC_NEIGHBOUR_SOLICITATION || in parse_icmpv6() 567 icmp->icmp6_type == NDISC_NEIGHBOUR_ADVERTISEMENT)) { in parse_icmpv6() 752 struct icmphdr *icmp = icmp_hdr(skb); in key_extract_l3l4() local 756 key->tp.src = htons(icmp->type); in key_extract_l3l4() 757 key->tp.dst = htons(icmp->code); in key_extract_l3l4()
|
/linux/net/sched/ |
H A D | cls_flower.c | 67 struct flow_dissector_key_icmp icmp; member 1979 fl_set_key_val(tb, &key->icmp.type, TCA_FLOWER_KEY_ICMPV4_TYPE, in fl_set_key() 1980 &mask->icmp.type, in fl_set_key() 1982 sizeof(key->icmp.type)); in fl_set_key() 1983 fl_set_key_val(tb, &key->icmp.code, TCA_FLOWER_KEY_ICMPV4_CODE, in fl_set_key() 1984 &mask->icmp.code, in fl_set_key() 1986 sizeof(key->icmp.code)); in fl_set_key() 1989 fl_set_key_val(tb, &key->icmp.type, TCA_FLOWER_KEY_ICMPV6_TYPE, in fl_set_key() 1990 &mask->icmp.type, in fl_set_key() 1992 sizeof(key->icmp.type)); in fl_set_key() [all …]
|
/linux/include/uapi/linux/netfilter/ |
H A D | nf_conntrack_tuple_common.h | 32 } icmp; member
|
/linux/tools/testing/selftests/net/ |
H A D | fcnal-test.sh | 1923 run_cmd nettest -s -R -P icmp -l ${a} -b 1927 run_cmd nettest -s -R -P icmp -l ${a} -I ${NSA_DEV} -b 1944 run_cmd nettest -s -D -P icmp -f -l ${a} -b 1952 run_cmd nettest -s -D -P icmp -l ${a} -b 1957 run_cmd nettest -s -D -P icmp -l ${a} -b 1992 run_cmd nettest -s -R -P icmp -l ${a} -b 1996 run_cmd nettest -s -R -P icmp -l ${a} -I ${NSA_DEV} -b 1999 run_cmd nettest -s -R -P icmp -l ${a} -I ${VRF} -b 2006 run_cmd nettest -s -R -P icmp -l ${a} -I ${VRF} -b 2022 run_cmd nettest -s -D -P icmp -f -l ${a} -I ${VRF} -b [all …]
|
/linux/include/net/netns/ |
H A D | conntrack.h | 83 struct nf_icmp_net icmp; member
|
/linux/include/trace/events/ |
H A D | icmp.h | 3 #define TRACE_SYSTEM icmp
|