/kernel/linux/linux-5.10/net/netfilter/ |
H A D | nf_conntrack_proto_icmp.c | 11 #include <linux/icmp.h> 37 tuple->dst.u.icmp.type = hp->type; in icmp_pkt_to_tuple() 38 tuple->src.u.icmp.id = hp->un.echo.id; in icmp_pkt_to_tuple() 39 tuple->dst.u.icmp.code = hp->code; in icmp_pkt_to_tuple() 59 if (orig->dst.u.icmp.type >= sizeof(invmap) || in nf_conntrack_invert_icmp_tuple() 60 !invmap[orig->dst.u.icmp.type]) in nf_conntrack_invert_icmp_tuple() 63 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmp_tuple() 64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp in nf_conntrack_invert_icmp_tuple() [all...] |
H A D | nf_conntrack_proto_icmpv6.c | 42 tuple->dst.u.icmp.type = hp->icmp6_type; in icmpv6_pkt_to_tuple() 43 tuple->src.u.icmp.id = hp->icmp6_identifier; in icmpv6_pkt_to_tuple() 44 tuple->dst.u.icmp.code = hp->icmp6_code; in icmpv6_pkt_to_tuple() 71 int type = orig->dst.u.icmp.type - 128; in nf_conntrack_invert_icmpv6_tuple() 75 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmpv6_tuple() 76 tuple->dst.u.icmp.type = invmap[type] - 1; in nf_conntrack_invert_icmpv6_tuple() 77 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmpv6_tuple() 102 int type = ct->tuplehash[0].tuple.dst.u.icmp in nf_conntrack_icmpv6_packet() [all...] |
H A D | nf_nat_proto.c | 11 #include <linux/icmp.h> 150 /* this could be a inner header returned in icmp packet; in such in tcp_manip_pkt() 248 hdr->un.echo.id, tuple->src.u.icmp.id, false); in icmp_manip_pkt() 249 hdr->un.echo.id = tuple->src.u.icmp.id; in icmp_manip_pkt() 270 tuple->src.u.icmp.id, false); in icmpv6_manip_pkt() 271 hdr->icmp6_identifier = tuple->src.u.icmp.id; in icmpv6_manip_pkt() 565 struct icmphdr icmp; in nf_nat_icmp_reply_translation() member 582 if (inside->icmp.type == ICMP_REDIRECT) { in nf_nat_icmp_reply_translation() 601 if (!nf_nat_ipv4_manip_pkt(skb, hdrlen + sizeof(inside->icmp), in nf_nat_icmp_reply_translation() 608 inside->icmp in nf_nat_icmp_reply_translation() [all...] |
/kernel/linux/linux-6.6/net/netfilter/ |
H A D | nf_conntrack_proto_icmp.c | 11 #include <linux/icmp.h> 37 tuple->dst.u.icmp.type = hp->type; in icmp_pkt_to_tuple() 38 tuple->src.u.icmp.id = hp->un.echo.id; in icmp_pkt_to_tuple() 39 tuple->dst.u.icmp.code = hp->code; in icmp_pkt_to_tuple() 59 if (orig->dst.u.icmp.type >= sizeof(invmap) || in nf_conntrack_invert_icmp_tuple() 60 !invmap[orig->dst.u.icmp.type]) in nf_conntrack_invert_icmp_tuple() 63 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmp_tuple() 64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp in nf_conntrack_invert_icmp_tuple() [all...] |
H A D | nf_conntrack_proto_icmpv6.c | 42 tuple->dst.u.icmp.type = hp->icmp6_type; in icmpv6_pkt_to_tuple() 43 tuple->src.u.icmp.id = hp->icmp6_identifier; in icmpv6_pkt_to_tuple() 44 tuple->dst.u.icmp.code = hp->icmp6_code; in icmpv6_pkt_to_tuple() 71 int type = orig->dst.u.icmp.type - 128; in nf_conntrack_invert_icmpv6_tuple() 75 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmpv6_tuple() 76 tuple->dst.u.icmp.type = invmap[type] - 1; in nf_conntrack_invert_icmpv6_tuple() 77 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmpv6_tuple() 102 int type = ct->tuplehash[0].tuple.dst.u.icmp in nf_conntrack_icmpv6_packet() [all...] |
H A D | nf_nat_proto.c | 11 #include <linux/icmp.h> 150 /* this could be a inner header returned in icmp packet; in such in tcp_manip_pkt() 248 hdr->un.echo.id, tuple->src.u.icmp.id, false); in icmp_manip_pkt() 249 hdr->un.echo.id = tuple->src.u.icmp.id; in icmp_manip_pkt() 270 tuple->src.u.icmp.id, false); in icmpv6_manip_pkt() 271 hdr->icmp6_identifier = tuple->src.u.icmp.id; in icmpv6_manip_pkt() 565 struct icmphdr icmp; in nf_nat_icmp_reply_translation() member 582 if (inside->icmp.type == ICMP_REDIRECT) { in nf_nat_icmp_reply_translation() 601 if (!nf_nat_ipv4_manip_pkt(skb, hdrlen + sizeof(inside->icmp), in nf_nat_icmp_reply_translation() 608 inside->icmp in nf_nat_icmp_reply_translation() [all...] |
/kernel/linux/linux-5.10/net/batman-adv/ |
H A D | tp_meter.c | 92 * @icmp_uid: icmp pseudo uid of the tp session 581 struct batadv_icmp_tp_packet *icmp; in batadv_tp_send_msg() local 592 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_msg() 594 /* fill the icmp header */ in batadv_tp_send_msg() 595 ether_addr_copy(icmp->dst, orig_node->orig); in batadv_tp_send_msg() 596 ether_addr_copy(icmp->orig, src); in batadv_tp_send_msg() 597 icmp->version = BATADV_COMPAT_VERSION; in batadv_tp_send_msg() 598 icmp->packet_type = BATADV_ICMP; in batadv_tp_send_msg() 599 icmp in batadv_tp_send_msg() 631 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_ack() local 1164 struct batadv_icmp_tp_packet *icmp; batadv_tp_send_ack() local 1232 const struct batadv_icmp_tp_packet *icmp; batadv_tp_handle_out_of_order() local 1335 batadv_tp_init_recv(struct batadv_priv *bat_priv, const struct batadv_icmp_tp_packet *icmp) batadv_tp_init_recv() argument 1390 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_msg() local 1472 struct batadv_icmp_tp_packet *icmp; batadv_tp_meter_recv() local [all...] |
/kernel/linux/linux-6.6/net/batman-adv/ |
H A D | tp_meter.c | 93 * @icmp_uid: icmp pseudo uid of the tp session 582 struct batadv_icmp_tp_packet *icmp; in batadv_tp_send_msg() local 593 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_msg() 595 /* fill the icmp header */ in batadv_tp_send_msg() 596 ether_addr_copy(icmp->dst, orig_node->orig); in batadv_tp_send_msg() 597 ether_addr_copy(icmp->orig, src); in batadv_tp_send_msg() 598 icmp->version = BATADV_COMPAT_VERSION; in batadv_tp_send_msg() 599 icmp->packet_type = BATADV_ICMP; in batadv_tp_send_msg() 600 icmp in batadv_tp_send_msg() 632 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_ack() local 1160 struct batadv_icmp_tp_packet *icmp; batadv_tp_send_ack() local 1226 const struct batadv_icmp_tp_packet *icmp; batadv_tp_handle_out_of_order() local 1329 batadv_tp_init_recv(struct batadv_priv *bat_priv, const struct batadv_icmp_tp_packet *icmp) batadv_tp_init_recv() argument 1384 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_msg() local 1465 struct batadv_icmp_tp_packet *icmp; batadv_tp_meter_recv() local [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 3 # check that ICMP df-needed/pkttoobig icmp are set are set as related 11 # 'fragmentation needed' icmp packet. 14 # check the icmp errors are propagated to the correct host as per 15 # nat of "established" icmp-echo "connection". 139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 156 icmp type "redirect" ct state "related" counter name "redir4" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv [all...] |
H A D | bridge_brouter.sh | 65 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP 103 ip netns exec ns0 ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 108 echo "ERROR: ping works, should have failed (icmp forward drop)" 1>&2 113 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
|
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 3 # check that ICMP df-needed/pkttoobig icmp are set are set as related 11 # 'fragmentation needed' icmp packet. 14 # check the icmp errors are propagated to the correct host as per 15 # nat of "established" icmp-echo "connection". 139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 156 icmp type "redirect" ct state "related" counter name "redir4" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv [all...] |
H A D | bridge_brouter.sh | 65 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP 103 ip netns exec ns0 ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 108 echo "ERROR: ping works, should have failed (icmp forward drop)" 1>&2 113 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
|
H A D | nft_queue.sh | 97 ip protocol icmp queue bypass 373 meta oifname "tvrf" icmp type echo-request counter queue num 1 374 meta oifname "eth0" icmp type echo-request counter queue num 1 378 meta oifname "tvrf" icmp type echo-request counter queue num 1 379 meta oifname "eth0" icmp type echo-request counter queue num 1 391 ip netns exec ${ns1} nft list chain inet filter $n | grep -q "oifname \"$d\" icmp type echo-request counter packets 1" 393 echo "FAIL: chain $n: icmp packet counter mismatch for device $d" 1>&2 402 [ $? -eq 0 ] && echo "PASS: icmp+nfqueue via vrf" 434 # 1x icmp prerouting,forward,postrouting -> 3 queue events (6 incl. reply). 435 # 1x icmp preroutin [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | lwt_helpers.h | 9 #include <linux/icmp.h> 75 struct icmphdr *icmp = (struct icmphdr *)(ip + 1); in __expect_icmp_ipv4() local 76 ssize_t min_header_len = sizeof(*ip) + sizeof(*icmp); in __expect_icmp_ipv4() 84 if (icmp->type != ICMP_ECHO) in __expect_icmp_ipv4()
|
/kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/mei/ |
H A D | net.c | 8 #include <uapi/linux/icmp.h> 19 #include <linux/icmp.h> 224 struct icmphdr *icmp; in iwl_mei_rx_filter_ipv4() local 226 if (!pskb_may_pull(skb, skb_transport_offset(skb) + sizeof(*icmp))) in iwl_mei_rx_filter_ipv4() 229 icmp = icmp_hdr(skb); in iwl_mei_rx_filter_ipv4() 236 match && (icmp->type != ICMP_ECHO || icmp->code != 0)) { in iwl_mei_rx_filter_ipv4()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/forwarding/ |
H A D | tc_actions.sh | 166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 178 -t icmp "ping,id=42,seq=10" -q 219 $tcflags ip_proto icmp \ 222 ip_proto icmp \ 233 -t icmp "ping,id=42,seq=5" -q
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/dsa/ |
H A D | tc_actions.sh | 166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 178 -t icmp "ping,id=42,seq=10" -q 219 $tcflags ip_proto icmp \ 222 ip_proto icmp \ 233 -t icmp "ping,id=42,seq=5" -q
|
/kernel/linux/linux-5.10/net/openvswitch/ |
H A D | flow.c | 28 #include <linux/icmp.h> 408 struct icmp6hdr *icmp = icmp6_hdr(skb); in parse_icmpv6() local 413 key->tp.src = htons(icmp->icmp6_type); in parse_icmpv6() 414 key->tp.dst = htons(icmp->icmp6_code); in parse_icmpv6() 417 if (icmp->icmp6_code == 0 && in parse_icmpv6() 418 (icmp->icmp6_type == NDISC_NEIGHBOUR_SOLICITATION || in parse_icmpv6() 419 icmp->icmp6_type == NDISC_NEIGHBOUR_ADVERTISEMENT)) { in parse_icmpv6() 601 struct icmphdr *icmp = icmp_hdr(skb); in key_extract_l3l4() local 605 key->tp.src = htons(icmp->type); in key_extract_l3l4() 606 key->tp.dst = htons(icmp in key_extract_l3l4() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | test_cls_redirect_dynptr.c | 10 #include <linux/icmp.h> 606 struct icmphdr icmp; in process_icmpv4() local 609 if (bpf_dynptr_read(&icmp, sizeof(icmp), dynptr, *offset, 0)) { in process_icmpv4() 614 *offset += sizeof(icmp); in process_icmpv4() 617 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 622 if (icmp.type == ICMP_ECHO) in process_icmpv4() 625 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
H A D | bpf_flow.c | 10 #include <linux/icmp.h> 169 struct icmphdr *icmp, _icmp; in parse_ip_proto() local 177 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto() 178 if (!icmp) in parse_ip_proto()
|
H A D | test_cls_redirect.c | 10 #include <linux/icmp.h> 717 struct icmphdr icmp; in process_icmpv4() local 718 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4() 724 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 729 if (icmp.type == ICMP_ECHO) { in process_icmpv4() 733 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 10 #include <linux/icmp.h> 155 struct icmphdr *icmp, _icmp; in parse_ip_proto() local 163 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto() 164 if (!icmp) in parse_ip_proto()
|
H A D | test_cls_redirect.c | 10 #include <linux/icmp.h> 710 struct icmphdr icmp; in process_icmpv4() local 711 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4() 717 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 722 if (icmp.type == ICMP_ECHO) { in process_icmpv4() 726 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
/kernel/linux/linux-5.10/net/ipv4/netfilter/ |
H A D | ipt_REJECT.c | 15 #include <linux/icmp.h> 16 #include <net/icmp.h>
|
/kernel/linux/linux-6.6/net/ipv4/netfilter/ |
H A D | ipt_REJECT.c | 15 #include <linux/icmp.h> 16 #include <net/icmp.h>
|