| /tools/testing/selftests/net/netfilter/ |
| A D | conntrack_icmp_related.sh | 121 …meta l4proto icmp icmp type "destination-unreachable" ct state "related" counter name "related" ac… 122 meta l4proto { icmp, icmpv6 } ct state new,established accept 138 icmp type "redirect" ct state "related" counter name "redir4" accept 141 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 142 meta l4proto { icmp, icmpv6 } ct state "related" counter name "related" accept 157 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 159 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" accept 165 meta l4proto { icmp, icmpv6 } ct state established,untracked accept 167 meta l4proto { icmp, icmpv6 } ct state "new" counter name "new" 168 meta l4proto { icmp, icmpv6 } ct state "established" counter name "established" [all …]
|
| A D | bridge_brouter.sh | 54 …if ! ip netns exec "$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect -… 88 ip netns exec "$nsbr" ebtables -t filter -A FORWARD -p ipv4 --ip-protocol icmp -j DROP 97 …ip netns exec "$nsbr" ebtables -t broute -A BROUTING -p ipv4 --ip-protocol icmp -j redirect --redi…
|
| A D | conntrack_vrf.sh | 95 ip protocol icmp counter 111 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 1 2>/dev/null | wc -l) 116 count=$(ip netns exec "$ns0" conntrack -L -s $IP1 -d $IP0 -p icmp --zone 2 2> /dev/null | wc -l)
|
| A D | nft_meta.sh | 59 meta l4proto icmp counter name "il4protocounter" 73 meta l4proto icmp counter name "ol4protocounter"
|
| A D | nft_queue.sh | 93 ip protocol icmp queue bypass 371 meta oifname "tvrf" icmp type echo-request counter queue num 1 372 meta oifname "eth0" icmp type echo-request counter queue num 1 376 meta oifname "tvrf" icmp type echo-request counter queue num 1 377 meta oifname "eth0" icmp type echo-request counter queue num 1 597 ip protocol icmp queue num 0
|
| A D | br_netfilter_queue.sh | 65 ip protocol icmp counter queue num 0 bypass
|
| A D | nft_fib.sh | 101 icmp type echo-request counter jump type_match_in 107 icmp type echo-request counter jump type_match_in 113 icmp type echo-request counter jump type_match_in 119 icmp type echo-request counter jump type_match_out 125 icmp type echo-request counter jump type_match_out 418 icmp type echo-request counter jump fib_test
|
| A D | br_netfilter.sh | 130 meta pkttype broadcast ip protocol icmp counter drop
|
| A D | rpath.sh | 89 ip saddr 192.168.0.0/16 icmp type echo-request \
|
| A D | nft_nat_zones.sh | 147 ip protocol icmp add @inicmp { ip saddr . meta iifname . ip daddr counter }
|
| /tools/testing/selftests/bpf/prog_tests/ |
| A D | lwt_helpers.h | 45 struct icmphdr *icmp = (struct icmphdr *)(ip + 1); in __expect_icmp_ipv4() local 46 ssize_t min_header_len = sizeof(*ip) + sizeof(*icmp); in __expect_icmp_ipv4() 54 if (icmp->type != ICMP_ECHO) in __expect_icmp_ipv4()
|
| A D | tc_netkit.c | 137 struct icmphdr icmp; in __send_icmp() local 165 memset(&icmp, 0, sizeof(icmp)); in __send_icmp() 166 icmp.type = ICMP_ECHO; in __send_icmp() 167 icmp.echo.id = 1234; in __send_icmp() 168 icmp.echo.sequence = 1; in __send_icmp() 170 ret = sendto(sock, &icmp, sizeof(icmp), 0, in __send_icmp()
|
| /tools/testing/selftests/net/forwarding/ |
| A D | tc_actions.sh | 167 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action \ 174 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 8 action drop 176 ip_proto icmp src_ip 192.0.2.1 dst_ip 192.0.2.2 type 0 action pass 179 -t icmp "ping,id=42,seq=10" -q 220 $tcflags ip_proto icmp \ 223 ip_proto icmp \ 234 -t icmp "ping,id=42,seq=5" -q
|
| A D | vxlan_bridge_1d.sh | 398 $MZ $h1 -c 10 -d 100msec -p 64 -b $mac -B $dst -t icmp -q 709 -t icmp -q 741 -t icmp -q 752 $MZ $h1 -c 50 -d 1sec -p 64 -b $mac -B $dst -t icmp -q & 771 -t icmp -q 780 -t icmp -q
|
| A D | vxlan_bridge_1q.sh | 503 $MZ $h1 -Q $vid -c 10 -d 100msec -p 64 -b $mac -B $dst -t icmp -q 721 -B $dst -t icmp -q 756 -B $dst -t icmp -q 788 -B $dst -t icmp -q 798 -B $dst -t icmp -q
|
| A D | vxlan_reserved.sh | 57 prot ip flower skip_hw ip_proto icmp action drop
|
| /tools/testing/selftests/bpf/progs/ |
| A D | test_cls_redirect_dynptr.c | 608 struct icmphdr icmp; in process_icmpv4() local 611 if (bpf_dynptr_read(&icmp, sizeof(icmp), dynptr, *offset, 0)) { in process_icmpv4() 616 *offset += sizeof(icmp); in process_icmpv4() 619 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 624 if (icmp.type == ICMP_ECHO) in process_icmpv4() 627 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
| A D | bpf_flow.c | 169 struct icmphdr *icmp, _icmp; in parse_ip_proto() local 177 icmp = bpf_flow_dissect_get_header(skb, sizeof(*icmp), &_icmp); in parse_ip_proto() 178 if (!icmp) in parse_ip_proto()
|
| A D | test_cls_redirect.c | 720 struct icmphdr icmp; in process_icmpv4() local 721 if (!buf_copy(pkt, &icmp, sizeof(icmp))) { in process_icmpv4() 727 if (icmp.type == ICMP_ECHOREPLY) { in process_icmpv4() 732 if (icmp.type == ICMP_ECHO) { in process_icmpv4() 736 if (icmp.type != ICMP_DEST_UNREACH || icmp.code != ICMP_FRAG_NEEDED) { in process_icmpv4()
|
| /tools/testing/selftests/net/ |
| A D | fcnal-test.sh | 1923 run_cmd nettest -s -R -P icmp -l ${a} -b 1944 run_cmd nettest -s -D -P icmp -f -l ${a} -b 1952 run_cmd nettest -s -D -P icmp -l ${a} -b 1957 run_cmd nettest -s -D -P icmp -l ${a} -b 1992 run_cmd nettest -s -R -P icmp -l ${a} -b 1999 run_cmd nettest -s -R -P icmp -l ${a} -I ${VRF} -b 2006 run_cmd nettest -s -R -P icmp -l ${a} -I ${VRF} -b 2022 run_cmd nettest -s -D -P icmp -f -l ${a} -I ${VRF} -b 2030 run_cmd nettest -s -D -P icmp -l ${a} -I ${VRF} -b 2035 run_cmd nettest -s -D -P icmp -l ${a} -I ${VRF} -b [all …]
|
| A D | Makefile | 17 TEST_PROGS += altnames.sh icmp.sh icmp_redirect.sh ip6_gre_headroom.sh
|
| A D | xfrm_policy.sh | 402 ip netns exec ${ns[3]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec 403 ip netns exec ${ns[4]} iptables -p icmp -A FORWARD -m policy --dir out --pol ipsec
|
| /tools/testing/selftests/drivers/net/mlxsw/ |
| A D | blackhole_routes.sh | 124 skip_hw dst_ip 198.51.100.1 src_ip 192.0.2.1 ip_proto icmp \
|
| A D | devlink_trap_l3_exceptions.sh | 186 flower skip_hw ip_proto icmp type 3 code 4 action pass 224 flower skip_hw ip_proto icmp type 11 code 0 action pass
|
| /tools/testing/selftests/drivers/net/ocelot/ |
| A D | basic_qos.sh | 93 flower ip_proto icmp action skbedit priority 3
|