/openbmc/linux/drivers/net/ethernet/intel/ice/ |
H A D | ice_lan_tx_rx.h | 729 ICE_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4), 738 ICE_PTT(35, IP, IPV4, NOF, IP_IP, IPV4, NOF, ICMP, PAY4), 747 ICE_PTT(42, IP, IPV4, NOF, IP_IP, IPV6, NOF, ICMP, PAY4), 759 ICE_PTT(50, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, ICMP, PAY4), 768 ICE_PTT(57, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, ICMP, PAY4), 780 ICE_PTT(65, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, ICMP, PAY4), 789 ICE_PTT(72, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, ICMP, PAY4), 801 ICE_PTT(80, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, ICMP, PAY4), 810 ICE_PTT(87, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, ICMP, PAY4), 819 ICE_PTT(94, IP, IPV6, NOF, NONE, NONE, NOF, ICMP, PAY4), [all …]
|
/openbmc/linux/drivers/net/ethernet/intel/iavf/ |
H A D | iavf_common.c | 548 IAVF_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4), 557 IAVF_PTT(35, IP, IPV4, NOF, IP_IP, IPV4, NOF, ICMP, PAY4), 566 IAVF_PTT(42, IP, IPV4, NOF, IP_IP, IPV6, NOF, ICMP, PAY4), 578 IAVF_PTT(50, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, ICMP, PAY4), 587 IAVF_PTT(57, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, ICMP, PAY4), 599 IAVF_PTT(65, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, ICMP, PAY4), 608 IAVF_PTT(72, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, ICMP, PAY4), 620 IAVF_PTT(80, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, ICMP, PAY4), 629 IAVF_PTT(87, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, ICMP, PAY4), 638 IAVF_PTT(94, IP, IPV6, NOF, NONE, NONE, NOF, ICMP, PAY4), [all …]
|
/openbmc/openbmc-test-automation/security/ |
H A D | test_bmc_network_security.robot | 4 # This Suite has few testcases which uses nping with ICMP. 5 # ICMP creates a raw socket, which requires root privilege/sudo to run tests. 32 Send ICMP Timestamp Request 33 [Documentation] Send ICMP packet type 13 and check BMC drops such packets 36 # Send ICMP packet type 13 to BMC and check packet loss. 42 Send ICMP Netmask Request 43 [Documentation] Send ICMP packet type 17 and check BMC drops such packets 46 # Send ICMP packet type 17 to BMC and check packet loss. 52 Send Continuous ICMP Echo Request To BMC And Verify No Packet Loss 53 [Documentation] Send ICMP packet type 8 continuously and check no packets are dropped from BMC [all …]
|
/openbmc/openbmc-test-automation/lib/ |
H A D | bmc_network_security_utils.robot | 10 [Documentation] Send TCP, UDP or ICMP packets to any network device and return packet loss. 18 # icmp_type Type of ICMP packets (e.g. 8, 13, 17, etc.). 23 # By default it sends 4 ICMP echo request packets at 1 packets/second. 49 # By default it sends 4 ICMP echo request packets at 1 packets/second.
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | cmsg_ipv6.sh | 54 [ $p == "i" ] && prot=ICMP 78 [ $p == "i" ] && prot=ICMP 115 [ $p == "i" ] && prot=ICMP
|
H A D | cmsg_so_mark.sh | 52 [ $p == "i" ] && prot=ICMP
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/fping/ |
H A D | fping_5.2.bb | 1 SUMMARY = "sends ICMP ECHO_REQUEST packets to network hosts" 3 Message Protocol (ICMP) echo request to determine if a target host is \
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | vxlan_bridge_1d.sh | 582 )"08:"$( : ICMP type 583 )"00:"$( : ICMP code 584 )"8b:f2:"$( : ICMP csum 585 )"1f:6a:"$( : ICMP request identifier 586 )"00:01:"$( : ICMP request sequence number 587 )"4f:ff:c5:5b:00:00:00:00:"$( : ICMP payload
|
/openbmc/linux/Documentation/netlabel/ |
H A D | draft-ietf-cipso-ipsecurity-01.txt | 577 recognized the IP datagram is discarded and an ICMP "parameter problem" 578 (type 12) is generated and returned. The ICMP code field is set to "bad 584 discarded and an ICMP "destination unreachable" (type 3) is generated 585 and returned. The code field of the ICMP is set to "communication with 600 the originator of the ICMP message is acting as a CIPSO host or a CIPSO 601 gateway. The recipient of the ICMP message MUST be able to handle either 605 If the error is triggered by receipt of an ICMP message, the message 606 is discarded and no response is permitted (consistent with general ICMP 630 discarded and an ICMP "parameter problem" (type 12) is generated and 631 returned to the originator of the datagram. The code field of the ICMP [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/iptraf/ |
H A D | iptraf-ng_1.2.1.bb | 9 which shows TCP flag information, packet and byte counts, ICMP \ 11 interface statistics showing IP, TCP, UDP, ICMP, non-IP and other IP \
|
/openbmc/qemu/docs/system/devices/ |
H A D | net.rst | 65 Note that ICMP traffic in general does not work with user mode 66 networking. ``ping``, aka. ICMP echo, to the local router (10.0.2.2) 68 unprivileged ICMP ping sockets to allow ``ping`` to the Internet. The
|
/openbmc/openbmc/meta-security/dynamic-layers/meta-perl/recipes-security/bastille/files/ |
H A D | config | 39 # Q: ICMP allowed types: [destination-unreachable echo-reply time-exceeded] 41 # Q: ICMP services to audit: [ ] 43 # Q: ICMP types to disallow outbound: [destination-unreachable time-exceeded]
|
/openbmc/linux/net/atm/ |
H A D | Kconfig | 32 bool "Do NOT send ICMP if no neighbour" 35 Normally, an "ICMP host unreachable" message is sent if a neighbour
|
/openbmc/linux/Documentation/networking/devlink/ |
H A D | prestera.rst | 75 - Traps (exception) IPV4 ICMP redirect packets 114 - Traps ICMP packets
|
/openbmc/linux/Documentation/networking/ |
H A D | snmp_counter.rst | 9 All layer 4 packets and ICMP packets will change these counters, but 33 ICMP and so on. If no one listens on a raw socket, only kernel 127 ICMP counters 137 would be increased even if the ICMP packet has an invalid type. The 138 ICMP output path will check the header of a raw socket, so the 142 * ICMP named types 144 | These counters include most of common ICMP types, they are: 192 Every ICMP type has two counters: 'In' and 'Out'. E.g., for the ICMP 197 * ICMP numeric types 200 ICMP type number. These counters track all kinds of ICMP packets. The [all …]
|
H A D | nf_conntrack-sysctl.rst | 76 Default for ICMP timeout. 85 - 1 - log ICMP packets
|
H A D | ip-sysctl.rst | 27 fragmentation-required ICMP is received, the PMTU to this 74 associated with a socket for example, TCP RSTs or ICMP echo replies). 592 - 1 - Disabled by default, enabled when an ICMP black hole detected 1397 If set non-zero, then the kernel will ignore all ICMP ECHO 1409 If set non-zero, then the kernel will ignore all ICMP ECHO and 1415 Limit the maximal rates for sending ICMP packets whose type matches 1420 of ICMP packets sent on all targets. 1425 Limit maximal number of ICMP packets sent per second from this host. 1433 icmp_msgs_per_sec controls number of ICMP packets sent per second, 1440 Mask made of ICMP types for which rates are being limited. [all …]
|
/openbmc/openbmc/meta-security/recipes-security/isic/ |
H A D | isic_0.07.bb | 2 …ilities to exercise the stability of an IP Stack and its component stacks (TCP, UDP, ICMP et. al.)"
|
/openbmc/linux/Documentation/translations/zh_CN/infiniband/ |
H A D | ipoib.rst | 59 在这种情况下,ICMP PMTU数据包的RX仿真被用来使网络堆栈对这些邻居使用较
|
/openbmc/docs/security/ |
H A D | network-security-considerations.md | 45 ## Kernel and ICMP messages 55 Per [CVE 1999-0524][], responding to certain ICMP packets can give an attacker 57 attacks. OpenBMC responds to all ICMP requests. 61 General considerations for ICMP messages apply. For example, packet
|
/openbmc/linux/drivers/net/ethernet/intel/i40e/ |
H A D | i40e_common.c | 466 I40E_PTT(28, IP, IPV4, NOF, NONE, NONE, NOF, ICMP, PAY4), 475 I40E_PTT(35, IP, IPV4, NOF, IP_IP, IPV4, NOF, ICMP, PAY4), 484 I40E_PTT(42, IP, IPV4, NOF, IP_IP, IPV6, NOF, ICMP, PAY4), 496 I40E_PTT(50, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, ICMP, PAY4), 505 I40E_PTT(57, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, ICMP, PAY4), 517 I40E_PTT(65, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, ICMP, PAY4), 526 I40E_PTT(72, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, ICMP, PAY4), 538 I40E_PTT(80, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, ICMP, PAY4), 547 I40E_PTT(87, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, ICMP, PAY4), 556 I40E_PTT(94, IP, IPV6, NOF, NONE, NONE, NOF, ICMP, PAY4), [all …]
|
/openbmc/openbmc-test-automation/network/ |
H A D | test_network_nping.robot | 41 [Documentation] Send TCP, UDP or ICMP packets to the target.
|
/openbmc/linux/Documentation/security/ |
H A D | SCTP.rst | 338 a) CIPSO will send an ICMP packet if an SCTP packet cannot be 340 b) CALIPSO does not send an ICMP packet, just silently discards it.
|
/openbmc/linux/Documentation/infiniband/ |
H A D | ipoib.rst | 54 this case, RX emulation of ICMP PMTU packets is used to cause the
|
/openbmc/openbmc/poky/meta/conf/distro/include/ |
H A D | cve-extra-exclusions.inc | 63 CVE_STATUS[CVE-1999-0524] = "ignored: cpe:*:linux_kernel:issue is that ICMP exists, can be filewall…
|