/openbmc/linux/net/batman-adv/ |
H A D | tp_meter.c | 593 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_msg() 600 icmp->ttl = BATADV_TTL; in batadv_tp_send_msg() 602 icmp->uid = uid; in batadv_tp_send_msg() 605 memcpy(icmp->session, session, sizeof(icmp->session)); in batadv_tp_send_msg() 688 icmp->session, icmp->uid, in batadv_tp_recv_ack() 728 icmp->uid, in batadv_tp_recv_ack() 1183 icmp = skb_put(skb, sizeof(*icmp)); in batadv_tp_send_ack() 1193 memcpy(icmp->session, session, sizeof(icmp->session)); in batadv_tp_send_ack() 1408 icmp->orig); in batadv_tp_recv_msg() 1453 icmp->timestamp, icmp->session, icmp->uid); in batadv_tp_recv_msg() [all …]
|
/openbmc/linux/net/netfilter/ |
H A D | nf_conntrack_proto_icmp.c | 37 tuple->dst.u.icmp.type = hp->type; in icmp_pkt_to_tuple() 38 tuple->src.u.icmp.id = hp->un.echo.id; in icmp_pkt_to_tuple() 39 tuple->dst.u.icmp.code = hp->code; in icmp_pkt_to_tuple() 59 if (orig->dst.u.icmp.type >= sizeof(invmap) || in nf_conntrack_invert_icmp_tuple() 60 !invmap[orig->dst.u.icmp.type]) in nf_conntrack_invert_icmp_tuple() 63 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmp_tuple() 64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp.type] - 1; in nf_conntrack_invert_icmp_tuple() 65 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmp_tuple() 93 ct->tuplehash[0].tuple.dst.u.icmp.type); in nf_conntrack_icmp_packet() 283 if (tuple->dst.u.icmp.type >= sizeof(invmap) || in icmp_nlattr_to_tuple() [all …]
|
H A D | nf_conntrack_proto_icmpv6.c | 42 tuple->dst.u.icmp.type = hp->icmp6_type; in icmpv6_pkt_to_tuple() 43 tuple->src.u.icmp.id = hp->icmp6_identifier; in icmpv6_pkt_to_tuple() 44 tuple->dst.u.icmp.code = hp->icmp6_code; in icmpv6_pkt_to_tuple() 71 int type = orig->dst.u.icmp.type - 128; in nf_conntrack_invert_icmpv6_tuple() 75 tuple->src.u.icmp.id = orig->src.u.icmp.id; in nf_conntrack_invert_icmpv6_tuple() 76 tuple->dst.u.icmp.type = invmap[type] - 1; in nf_conntrack_invert_icmpv6_tuple() 77 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; in nf_conntrack_invert_icmpv6_tuple() 102 int type = ct->tuplehash[0].tuple.dst.u.icmp.type - 128; in nf_conntrack_icmpv6_packet() 258 if (tuple->dst.u.icmp.type < 128 || in icmpv6_nlattr_to_tuple() 259 tuple->dst.u.icmp.type - 128 >= sizeof(invmap) || in icmpv6_nlattr_to_tuple() [all …]
|
H A D | nf_nat_proto.c | 248 hdr->un.echo.id, tuple->src.u.icmp.id, false); in icmp_manip_pkt() 249 hdr->un.echo.id = tuple->src.u.icmp.id; in icmp_manip_pkt() 270 tuple->src.u.icmp.id, false); in icmpv6_manip_pkt() 271 hdr->icmp6_identifier = tuple->src.u.icmp.id; in icmpv6_manip_pkt() 565 struct icmphdr icmp; in nf_nat_icmp_reply_translation() member 582 if (inside->icmp.type == ICMP_REDIRECT) { in nf_nat_icmp_reply_translation() 601 if (!nf_nat_ipv4_manip_pkt(skb, hdrlen + sizeof(inside->icmp), in nf_nat_icmp_reply_translation() 608 inside->icmp.checksum = 0; in nf_nat_icmp_reply_translation() 609 inside->icmp.checksum = in nf_nat_icmp_reply_translation()
|
H A D | nf_nat_core.c | 307 return ntohs(tuple->src.u.icmp.id) >= ntohs(min->icmp.id) && in l4proto_in_range() 308 ntohs(tuple->src.u.icmp.id) <= ntohs(max->icmp.id); in l4proto_in_range() 478 keyptr = &tuple->src.u.icmp.id; in nf_nat_l4proto_unique_tuple() 483 min = ntohs(range->min_proto.icmp.id); in nf_nat_l4proto_unique_tuple() 484 range_size = ntohs(range->max_proto.icmp.id) - in nf_nat_l4proto_unique_tuple() 485 ntohs(range->min_proto.icmp.id) + 1; in nf_nat_l4proto_unique_tuple()
|
/openbmc/u-boot/net/ |
H A D | ping.c | 25 struct icmp_hdr *icmp = (struct icmp_hdr *)(pkt + IP_HDR_SIZE); in set_icmp_header() local 29 icmp->type = ICMP_ECHO_REQUEST; in set_icmp_header() 30 icmp->code = 0; in set_icmp_header() 31 icmp->checksum = 0; in set_icmp_header() 32 icmp->un.echo.id = 0; in set_icmp_header() 33 icmp->un.echo.sequence = htons(ping_seq_number++); in set_icmp_header() 34 icmp->checksum = compute_ip_checksum(icmp, ICMP_HDR_SIZE); in set_icmp_header()
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 139 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac… 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 156 icmp type "redirect" ct state "related" counter name "redir4" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 175 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 177 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept 183 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 185 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" 186 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" [all …]
|
H A D | bridge_brouter.sh | 65 …ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect… 103 ip netns exec ns0 ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 113 …ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect…
|
H A D | conntrack_vrf.sh | 116 ip protocol icmp counter 132 count=$(ip netns exec $ns0 conntrack -L -s $IP1 -d $IP0 -p icmp --zone 1 2>/dev/null | wc -l) 137 count=$(ip netns exec $ns0 conntrack -L -s $IP1 -d $IP0 -p icmp --zone 2 2> /dev/null | wc -l)
|
H A D | nft_queue.sh | 97 ip protocol icmp queue bypass 373 meta oifname "tvrf" icmp type echo-request counter queue num 1 374 meta oifname "eth0" icmp type echo-request counter queue num 1 378 meta oifname "tvrf" icmp type echo-request counter queue num 1 379 meta oifname "eth0" icmp type echo-request counter queue num 1
|
H A D | nft_meta.sh | 59 meta l4proto icmp counter name "il4protocounter" 73 meta l4proto icmp counter name "ol4protocounter"
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | lwt_helpers.h | 75 struct icmphdr *icmp = (struct icmphdr *)(ip + 1); in __expect_icmp_ipv4() local 76 ssize_t min_header_len = sizeof(*ip) + sizeof(*icmp); in __expect_icmp_ipv4() 84 if (icmp->type != ICMP_ECHO) in __expect_icmp_ipv4()
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_network_security_utils.robot | 16 # packet_type The type of packets to be sent ("tcp, "udp", "icmp"). 25 ${cmd_suffix}= Set Variable If '${packet_type}' == 'icmp' 26 ... --icmp-type ${icmp_type} 42 # packet_type The type of packets to be sent ("tcp, "udp", "icmp").
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | tc_actions.sh | 166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 178 -t icmp "ping,id=42,seq=10" -q 219 $tcflags ip_proto icmp \ 222 ip_proto icmp \ 233 -t icmp "ping,id=42,seq=5" -q
|
H A D | vxlan_bridge_1d.sh | 398 $MZ $h1 -c 10 -d 100msec -p 64 -b $mac -B $dst -t icmp -q 701 -t icmp -q 733 -t icmp -q 761 -t icmp -q 770 -t icmp -q
|
/openbmc/linux/tools/testing/selftests/drivers/net/dsa/ |
H A D | tc_actions.sh | 166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 178 -t icmp "ping,id=42,seq=10" -q 219 $tcflags ip_proto icmp \ 222 ip_proto icmp \ 233 -t icmp "ping,id=42,seq=5" -q
|
/openbmc/linux/drivers/net/wireless/intel/iwlwifi/mei/ |
H A D | net.c | 224 struct icmphdr *icmp; in iwl_mei_rx_filter_ipv4() local 226 if (!pskb_may_pull(skb, skb_transport_offset(skb) + sizeof(*icmp))) in iwl_mei_rx_filter_ipv4() 229 icmp = icmp_hdr(skb); in iwl_mei_rx_filter_ipv4() 236 match && (icmp->type != ICMP_ECHO || icmp->code != 0)) { in iwl_mei_rx_filter_ipv4()
|
/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_cls_redirect_dynptr.c | 606 struct icmphdr icmp; in process_icmpv4() local 609 if (bpf_dynptr_read(&icmp, sizeof(icmp), dynptr, *offset, 0)) { in process_icmpv4() 614 *offset += sizeof(icmp); in process_icmpv4() 617 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 622 if (icmp.type == ICMP_ECHO) in process_icmpv4() 625 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
H A D | bpf_flow.c | 169 struct icmphdr *icmp, _icmp; in parse_ip_proto() local 177 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto() 178 if (!icmp) in parse_ip_proto()
|
H A D | test_cls_redirect.c | 717 struct icmphdr icmp; in process_icmpv4() local 718 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4() 724 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 729 if (icmp.type == ICMP_ECHO) { in process_icmpv4() 733 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
/openbmc/linux/net/openvswitch/ |
H A D | flow.c | 557 struct icmp6hdr *icmp = icmp6_hdr(skb); in parse_icmpv6() local 562 key->tp.src = htons(icmp->icmp6_type); in parse_icmpv6() 563 key->tp.dst = htons(icmp->icmp6_code); in parse_icmpv6() 565 if (icmp->icmp6_code == 0 && in parse_icmpv6() 566 (icmp->icmp6_type == NDISC_NEIGHBOUR_SOLICITATION || in parse_icmpv6() 567 icmp->icmp6_type == NDISC_NEIGHBOUR_ADVERTISEMENT)) { in parse_icmpv6() 752 struct icmphdr *icmp = icmp_hdr(skb); in key_extract_l3l4() local 756 key->tp.src = htons(icmp->type); in key_extract_l3l4() 757 key->tp.dst = htons(icmp->code); in key_extract_l3l4()
|
/openbmc/linux/include/uapi/linux/netfilter/ |
H A D | nf_conntrack_tuple_common.h | 32 } icmp; member
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-filter/libnetfilter/files/ |
H A D | 0001-conntrack-fix-build-with-kernel-5.15-and-musl.patch | 22 Fixes: bc1cb4b11403 ("conntrack: Move icmp request>reply type mapping to common file") 56 #include <linux/icmp.h>
|
/openbmc/u-boot/test/dm/ |
H A D | eth.c | 353 struct icmp_hdr *icmp; in sb_check_ping_reply() local 365 icmp = (struct icmp_hdr *)&ip->udp_src; in sb_check_ping_reply() 367 if (icmp->type != ICMP_ECHO_REPLY) in sb_check_ping_reply()
|
/openbmc/openbmc-test-automation/network/ |
H A D | test_network_nping.robot | 46 # ${packet_type}- type of packets to be sent viz tcp, udp or icmp. 53 ${cmd_buff}= Run Keyword If '${packet_type}' == 'icmp'
|