Home
last modified time | relevance | path

Searched refs:icmp (Results 1 - 25 of 306) sorted by relevance

12345678910>>...13

/kernel/linux/linux-5.10/net/netfilter/
H A Dnf_conntrack_proto_icmp.c11 #include <linux/icmp.h>
37 tuple->dst.u.icmp.type = hp->type; in icmp_pkt_to_tuple()
38 tuple->src.u.icmp.id = hp->un.echo.id; in icmp_pkt_to_tuple()
39 tuple->dst.u.icmp.code = hp->code; in icmp_pkt_to_tuple()
59 if (orig->dst.u.icmp.type >= sizeof(invmap) || in nf_conntrack_invert_icmp_tuple()
60 !invmap[orig->dst.u.icmp.type]) in nf_conntrack_invert_icmp_tuple()
63 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmp_tuple()
64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp in nf_conntrack_invert_icmp_tuple()
[all...]
H A Dnf_conntrack_proto_icmpv6.c42 tuple->dst.u.icmp.type = hp->icmp6_type; in icmpv6_pkt_to_tuple()
43 tuple->src.u.icmp.id = hp->icmp6_identifier; in icmpv6_pkt_to_tuple()
44 tuple->dst.u.icmp.code = hp->icmp6_code; in icmpv6_pkt_to_tuple()
71 int type = orig->dst.u.icmp.type - 128; in nf_conntrack_invert_icmpv6_tuple()
75 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmpv6_tuple()
76 tuple->dst.u.icmp.type = invmap[type] - 1; in nf_conntrack_invert_icmpv6_tuple()
77 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmpv6_tuple()
102 int type = ct->tuplehash[0].tuple.dst.u.icmp in nf_conntrack_icmpv6_packet()
[all...]
H A Dnf_nat_proto.c11 #include <linux/icmp.h>
150 /* this could be a inner header returned in icmp packet; in such in tcp_manip_pkt()
248 hdr->un.echo.id, tuple->src.u.icmp.id, false); in icmp_manip_pkt()
249 hdr->un.echo.id = tuple->src.u.icmp.id; in icmp_manip_pkt()
270 tuple->src.u.icmp.id, false); in icmpv6_manip_pkt()
271 hdr->icmp6_identifier = tuple->src.u.icmp.id; in icmpv6_manip_pkt()
565 struct icmphdr icmp; in nf_nat_icmp_reply_translation() member
582 if (inside->icmp.type == ICMP_REDIRECT) { in nf_nat_icmp_reply_translation()
601 if (!nf_nat_ipv4_manip_pkt(skb, hdrlen + sizeof(inside->icmp), in nf_nat_icmp_reply_translation()
608 inside->icmp in nf_nat_icmp_reply_translation()
[all...]
/kernel/linux/linux-6.6/net/netfilter/
H A Dnf_conntrack_proto_icmp.c11 #include <linux/icmp.h>
37 tuple->dst.u.icmp.type = hp->type; in icmp_pkt_to_tuple()
38 tuple->src.u.icmp.id = hp->un.echo.id; in icmp_pkt_to_tuple()
39 tuple->dst.u.icmp.code = hp->code; in icmp_pkt_to_tuple()
59 if (orig->dst.u.icmp.type >= sizeof(invmap) || in nf_conntrack_invert_icmp_tuple()
60 !invmap[orig->dst.u.icmp.type]) in nf_conntrack_invert_icmp_tuple()
63 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmp_tuple()
64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp in nf_conntrack_invert_icmp_tuple()
[all...]
H A Dnf_conntrack_proto_icmpv6.c42 tuple->dst.u.icmp.type = hp->icmp6_type; in icmpv6_pkt_to_tuple()
43 tuple->src.u.icmp.id = hp->icmp6_identifier; in icmpv6_pkt_to_tuple()
44 tuple->dst.u.icmp.code = hp->icmp6_code; in icmpv6_pkt_to_tuple()
71 int type = orig->dst.u.icmp.type - 128; in nf_conntrack_invert_icmpv6_tuple()
75 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmpv6_tuple()
76 tuple->dst.u.icmp.type = invmap[type] - 1; in nf_conntrack_invert_icmpv6_tuple()
77 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmpv6_tuple()
102 int type = ct->tuplehash[0].tuple.dst.u.icmp in nf_conntrack_icmpv6_packet()
[all...]
H A Dnf_nat_proto.c11 #include <linux/icmp.h>
150 /* this could be a inner header returned in icmp packet; in such in tcp_manip_pkt()
248 hdr->un.echo.id, tuple->src.u.icmp.id, false); in icmp_manip_pkt()
249 hdr->un.echo.id = tuple->src.u.icmp.id; in icmp_manip_pkt()
270 tuple->src.u.icmp.id, false); in icmpv6_manip_pkt()
271 hdr->icmp6_identifier = tuple->src.u.icmp.id; in icmpv6_manip_pkt()
565 struct icmphdr icmp; in nf_nat_icmp_reply_translation() member
582 if (inside->icmp.type == ICMP_REDIRECT) { in nf_nat_icmp_reply_translation()
601 if (!nf_nat_ipv4_manip_pkt(skb, hdrlen + sizeof(inside->icmp), in nf_nat_icmp_reply_translation()
608 inside->icmp in nf_nat_icmp_reply_translation()
[all...]
/kernel/linux/linux-5.10/net/batman-adv/
H A Dtp_meter.c92 * @icmp_uid: icmp pseudo uid of the tp session
581 struct batadv_icmp_tp_packet *icmp; in batadv_tp_send_msg() local
592 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_msg()
594 /* fill the icmp header */ in batadv_tp_send_msg()
595 ether_addr_copy(icmp->dst, orig_node->orig); in batadv_tp_send_msg()
596 ether_addr_copy(icmp->orig, src); in batadv_tp_send_msg()
597 icmp->version = BATADV_COMPAT_VERSION; in batadv_tp_send_msg()
598 icmp->packet_type = BATADV_ICMP; in batadv_tp_send_msg()
599 icmp in batadv_tp_send_msg()
631 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_ack() local
1164 struct batadv_icmp_tp_packet *icmp; batadv_tp_send_ack() local
1232 const struct batadv_icmp_tp_packet *icmp; batadv_tp_handle_out_of_order() local
1335 batadv_tp_init_recv(struct batadv_priv *bat_priv, const struct batadv_icmp_tp_packet *icmp) batadv_tp_init_recv() argument
1390 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_msg() local
1472 struct batadv_icmp_tp_packet *icmp; batadv_tp_meter_recv() local
[all...]
/kernel/linux/linux-6.6/net/batman-adv/
H A Dtp_meter.c93 * @icmp_uid: icmp pseudo uid of the tp session
582 struct batadv_icmp_tp_packet *icmp; in batadv_tp_send_msg() local
593 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_msg()
595 /* fill the icmp header */ in batadv_tp_send_msg()
596 ether_addr_copy(icmp->dst, orig_node->orig); in batadv_tp_send_msg()
597 ether_addr_copy(icmp->orig, src); in batadv_tp_send_msg()
598 icmp->version = BATADV_COMPAT_VERSION; in batadv_tp_send_msg()
599 icmp->packet_type = BATADV_ICMP; in batadv_tp_send_msg()
600 icmp in batadv_tp_send_msg()
632 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_ack() local
1160 struct batadv_icmp_tp_packet *icmp; batadv_tp_send_ack() local
1226 const struct batadv_icmp_tp_packet *icmp; batadv_tp_handle_out_of_order() local
1329 batadv_tp_init_recv(struct batadv_priv *bat_priv, const struct batadv_icmp_tp_packet *icmp) batadv_tp_init_recv() argument
1384 const struct batadv_icmp_tp_packet *icmp; batadv_tp_recv_msg() local
1465 struct batadv_icmp_tp_packet *icmp; batadv_tp_meter_recv() local
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/netfilter/
H A Dconntrack_icmp_related.sh3 # check that ICMP df-needed/pkttoobig icmp are set are set as related
11 # 'fragmentation needed' icmp packet.
14 # check the icmp errors are propagated to the correct host as per
15 # nat of "established" icmp-echo "connection".
139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
140 meta l4proto { icmp, icmpv6 } ct state new,established accept
156 icmp type "redirect" ct state "related" counter name "redir4" accept
159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
160 meta l4proto { icmp, icmpv
[all...]
H A Dbridge_brouter.sh65 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
103 ip netns exec ns0 ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP
108 echo "ERROR: ping works, should have failed (icmp forward drop)" 1>&2
113 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
/kernel/linux/linux-6.6/tools/testing/selftests/netfilter/
H A Dconntrack_icmp_related.sh3 # check that ICMP df-needed/pkttoobig icmp are set are set as related
11 # 'fragmentation needed' icmp packet.
14 # check the icmp errors are propagated to the correct host as per
15 # nat of "established" icmp-echo "connection".
139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept
140 meta l4proto { icmp, icmpv6 } ct state new,established accept
156 icmp type "redirect" ct state "related" counter name "redir4" accept
159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept
160 meta l4proto { icmp, icmpv
[all...]
H A Dbridge_brouter.sh65 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
103 ip netns exec ns0 ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP
108 echo "ERROR: ping works, should have failed (icmp forward drop)" 1>&2
113 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
H A Dnft_queue.sh97 ip protocol icmp queue bypass
373 meta oifname "tvrf" icmp type echo-request counter queue num 1
374 meta oifname "eth0" icmp type echo-request counter queue num 1
378 meta oifname "tvrf" icmp type echo-request counter queue num 1
379 meta oifname "eth0" icmp type echo-request counter queue num 1
391 ip netns exec ${ns1} nft list chain inet filter $n | grep -q "oifname \"$d\" icmp type echo-request counter packets 1"
393 echo "FAIL: chain $n: icmp packet counter mismatch for device $d" 1>&2
402 [ $? -eq 0 ] && echo "PASS: icmp+nfqueue via vrf"
434 # 1x icmp prerouting,forward,postrouting -> 3 queue events (6 incl. reply).
435 # 1x icmp preroutin
[all...]
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/
H A Dlwt_helpers.h9 #include <linux/icmp.h>
75 struct icmphdr *icmp = (struct icmphdr *)(ip + 1); in __expect_icmp_ipv4() local
76 ssize_t min_header_len = sizeof(*ip) + sizeof(*icmp); in __expect_icmp_ipv4()
84 if (icmp->type != ICMP_ECHO) in __expect_icmp_ipv4()
/kernel/linux/linux-6.6/drivers/net/wireless/intel/iwlwifi/mei/
H A Dnet.c8 #include <uapi/linux/icmp.h>
19 #include <linux/icmp.h>
224 struct icmphdr *icmp; in iwl_mei_rx_filter_ipv4() local
226 if (!pskb_may_pull(skb, skb_transport_offset(skb) + sizeof(*icmp))) in iwl_mei_rx_filter_ipv4()
229 icmp = icmp_hdr(skb); in iwl_mei_rx_filter_ipv4()
236 match && (icmp->type != ICMP_ECHO || icmp->code != 0)) { in iwl_mei_rx_filter_ipv4()
/kernel/linux/linux-6.6/tools/testing/selftests/net/forwarding/
H A Dtc_actions.sh166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \
173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop
175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass
178 -t icmp "ping,id=42,seq=10" -q
219 $tcflags ip_proto icmp \
222 ip_proto icmp \
233 -t icmp "ping,id=42,seq=5" -q
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/net/dsa/
H A Dtc_actions.sh166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \
173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop
175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass
178 -t icmp "ping,id=42,seq=10" -q
219 $tcflags ip_proto icmp \
222 ip_proto icmp \
233 -t icmp "ping,id=42,seq=5" -q
/kernel/linux/linux-5.10/net/openvswitch/
H A Dflow.c28 #include <linux/icmp.h>
408 struct icmp6hdr *icmp = icmp6_hdr(skb); in parse_icmpv6() local
413 key->tp.src = htons(icmp->icmp6_type); in parse_icmpv6()
414 key->tp.dst = htons(icmp->icmp6_code); in parse_icmpv6()
417 if (icmp->icmp6_code == 0 && in parse_icmpv6()
418 (icmp->icmp6_type == NDISC_NEIGHBOUR_SOLICITATION || in parse_icmpv6()
419 icmp->icmp6_type == NDISC_NEIGHBOUR_ADVERTISEMENT)) { in parse_icmpv6()
601 struct icmphdr *icmp = icmp_hdr(skb); in key_extract_l3l4() local
605 key->tp.src = htons(icmp->type); in key_extract_l3l4()
606 key->tp.dst = htons(icmp in key_extract_l3l4()
[all...]
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/
H A Dtest_cls_redirect_dynptr.c10 #include <linux/icmp.h>
606 struct icmphdr icmp; in process_icmpv4() local
609 if (bpf_dynptr_read(&icmp, sizeof(icmp), dynptr, *offset, 0)) { in process_icmpv4()
614 *offset += sizeof(icmp); in process_icmpv4()
617 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4()
622 if (icmp.type == ICMP_ECHO) in process_icmpv4()
625 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
H A Dbpf_flow.c10 #include <linux/icmp.h>
169 struct icmphdr *icmp, _icmp; in parse_ip_proto() local
177 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto()
178 if (!icmp) in parse_ip_proto()
H A Dtest_cls_redirect.c10 #include <linux/icmp.h>
717 struct icmphdr icmp; in process_icmpv4() local
718 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4()
724 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4()
729 if (icmp.type == ICMP_ECHO) { in process_icmpv4()
733 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/
H A Dbpf_flow.c10 #include <linux/icmp.h>
155 struct icmphdr *icmp, _icmp; in parse_ip_proto() local
163 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto()
164 if (!icmp) in parse_ip_proto()
H A Dtest_cls_redirect.c10 #include <linux/icmp.h>
710 struct icmphdr icmp; in process_icmpv4() local
711 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4()
717 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4()
722 if (icmp.type == ICMP_ECHO) { in process_icmpv4()
726 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
/kernel/linux/linux-5.10/net/ipv4/netfilter/
H A Dipt_REJECT.c15 #include <linux/icmp.h>
16 #include <net/icmp.h>
/kernel/linux/linux-6.6/net/ipv4/netfilter/
H A Dipt_REJECT.c15 #include <linux/icmp.h>
16 #include <net/icmp.h>

Completed in 17 milliseconds

12345678910>>...13