/linux-master/net/netfilter/ |
H A D | nf_conntrack_proto_icmp.c | 11 #include <linux/icmp.h> 37 tuple->dst.u.icmp.type = hp->type; 38 tuple->src.u.icmp.id = hp->un.echo.id; 39 tuple->dst.u.icmp.code = hp->code; 59 if (orig->dst.u.icmp.type >= sizeof(invmap) || 60 !invmap[orig->dst.u.icmp.type]) 63 tuple->src.u.icmp.id = orig->src.u.icmp.id; 64 tuple->dst.u.icmp.type = invmap[orig->dst.u.icmp [all...] |
H A D | nf_conntrack_proto_icmpv6.c | 42 tuple->dst.u.icmp.type = hp->icmp6_type; 43 tuple->src.u.icmp.id = hp->icmp6_identifier; 44 tuple->dst.u.icmp.code = hp->icmp6_code; 71 int type = orig->dst.u.icmp.type - 128; 75 tuple->src.u.icmp.id = orig->src.u.icmp.id; 76 tuple->dst.u.icmp.type = invmap[type] - 1; 77 tuple->dst.u.icmp.code = orig->dst.u.icmp.code; 102 int type = ct->tuplehash[0].tuple.dst.u.icmp [all...] |
H A D | xt_LOG.c | 17 #include <net/icmp.h>
|
/linux-master/net/batman-adv/ |
H A D | tp_meter.c | 93 * @icmp_uid: icmp pseudo uid of the tp session 582 struct batadv_icmp_tp_packet *icmp; local 593 icmp = skb_put(skb, sizeof(*icmp)); 595 /* fill the icmp header */ 596 ether_addr_copy(icmp->dst, orig_node->orig); 597 ether_addr_copy(icmp->orig, src); 598 icmp->version = BATADV_COMPAT_VERSION; 599 icmp->packet_type = BATADV_ICMP; 600 icmp 632 const struct batadv_icmp_tp_packet *icmp; local 1160 struct batadv_icmp_tp_packet *icmp; local 1226 const struct batadv_icmp_tp_packet *icmp; local 1329 batadv_tp_init_recv(struct batadv_priv *bat_priv, const struct batadv_icmp_tp_packet *icmp) argument 1384 const struct batadv_icmp_tp_packet *icmp; local 1465 struct batadv_icmp_tp_packet *icmp; local [all...] |
/linux-master/include/linux/ |
H A D | icmp.h | 9 * Version: @(#)icmp.h 1.0.3 04/28/93 17 #include <uapi/linux/icmp.h>
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | lwt_helpers.h | 9 #include <linux/icmp.h> 74 struct icmphdr *icmp = (struct icmphdr *)(ip + 1); local 75 ssize_t min_header_len = sizeof(*ip) + sizeof(*icmp); 83 if (icmp->type != ICMP_ECHO)
|
/linux-master/include/uapi/linux/netfilter/ |
H A D | nf_conntrack_tuple_common.h | 32 } icmp; member in union:nf_conntrack_man_proto
|
/linux-master/tools/testing/selftests/netfilter/ |
H A D | conntrack_icmp_related.sh | 3 # check that ICMP df-needed/pkttoobig icmp are set are set as related 11 # 'fragmentation needed' icmp packet. 14 # check the icmp errors are propagated to the correct host as per 15 # nat of "established" icmp-echo "connection". 139 meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" accept 140 meta l4proto { icmp, icmpv6 } ct state new,established accept 156 icmp type "redirect" ct state "related" counter name "redir4" accept 159 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 160 meta l4proto { icmp, icmpv [all...] |
H A D | bridge_brouter.sh | 65 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP 103 ip netns exec ns0 ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 108 echo "ERROR: ping works, should have failed (icmp forward drop)" 1>&2 113 ip netns exec ns0 ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redirect-target=DROP
|
H A D | nft_meta.sh | 59 meta l4proto icmp counter name "il4protocounter" 73 meta l4proto icmp counter name "ol4protocounter"
|
H A D | conntrack_vrf.sh | 116 ip protocol icmp counter 132 count=$(ip netns exec $ns0 conntrack -L -s $IP1 -d $IP0 -p icmp --zone 1 2>/dev/null | wc -l) 137 count=$(ip netns exec $ns0 conntrack -L -s $IP1 -d $IP0 -p icmp --zone 2 2> /dev/null | wc -l)
|
/linux-master/include/net/netfilter/ipv4/ |
H A D | nf_reject.h | 7 #include <net/icmp.h>
|
/linux-master/drivers/net/wireless/intel/iwlwifi/mei/ |
H A D | net.c | 8 #include <uapi/linux/icmp.h> 19 #include <linux/icmp.h> 224 struct icmphdr *icmp; local 226 if (!pskb_may_pull(skb, skb_transport_offset(skb) + sizeof(*icmp))) 229 icmp = icmp_hdr(skb); 236 match && (icmp->type != ICMP_ECHO || icmp->code != 0)) {
|
/linux-master/net/ipv4/netfilter/ |
H A D | ipt_REJECT.c | 15 #include <linux/icmp.h> 16 #include <net/icmp.h>
|
H A D | nf_dup_ipv4.c | 15 #include <net/icmp.h>
|
/linux-master/net/ipv4/ |
H A D | xfrm4_output.c | 15 #include <net/icmp.h>
|
H A D | ip_forward.c | 27 #include <linux/icmp.h> 34 #include <net/icmp.h>
|
/linux-master/include/net/ |
H A D | icmp.h | 9 * Version: @(#)icmp.h 1.0.4 05/13/93 17 #include <linux/icmp.h>
|
H A D | raw.h | 20 #include <linux/icmp.h>
|
/linux-master/include/net/netns/ |
H A D | conntrack.h | 83 struct nf_icmp_net icmp; member in struct:nf_ip_net
|
/linux-master/tools/testing/selftests/net/forwarding/ |
H A D | tc_actions.sh | 166 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 173 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 175 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 178 -t icmp "ping,id=42,seq=10" -q 219 $tcflags ip_proto icmp \ 222 ip_proto icmp \ 233 -t icmp "ping,id=42,seq=5" -q
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | bpf_flow.c | 10 #include <linux/icmp.h> 169 struct icmphdr *icmp, _icmp; local 177 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); 178 if (!icmp)
|
/linux-master/net/openvswitch/ |
H A D | flow.c | 28 #include <linux/icmp.h> 557 struct icmp6hdr *icmp = icmp6_hdr(skb); local 562 key->tp.src = htons(icmp->icmp6_type); 563 key->tp.dst = htons(icmp->icmp6_code); 566 if (icmp->icmp6_code == 0 && 567 (icmp->icmp6_type == NDISC_NEIGHBOUR_SOLICITATION || 568 icmp->icmp6_type == NDISC_NEIGHBOUR_ADVERTISEMENT)) { 751 struct icmphdr *icmp = icmp_hdr(skb); local 755 key->tp.src = htons(icmp->type); 756 key->tp.dst = htons(icmp [all...] |
/linux-master/net/netfilter/ipset/ |
H A D | ip_set_getport.c | 13 #include <linux/icmp.h>
|
/linux-master/net/ipv6/netfilter/ |
H A D | ip6t_REJECT.c | 22 #include <net/icmp.h>
|