/net/ipv4/ |
D | arp.c | 528 struct arphdr *arp; in arp_create() local 543 arp = skb_put(skb, arp_hdr_len(dev)); in arp_create() 569 arp->ar_hrd = htons(dev->type); in arp_create() 570 arp->ar_pro = htons(ETH_P_IP); in arp_create() 575 arp->ar_hrd = htons(ARPHRD_AX25); in arp_create() 576 arp->ar_pro = htons(AX25_P_IP); in arp_create() 581 arp->ar_hrd = htons(ARPHRD_NETROM); in arp_create() 582 arp->ar_pro = htons(AX25_P_IP); in arp_create() 589 arp->ar_hrd = htons(ARPHRD_ETHER); in arp_create() 590 arp->ar_pro = htons(ETH_P_IP); in arp_create() [all …]
|
D | Makefile | 14 udp_offload.o arp.o icmp.o devinet.o af_inet.o igmp.o \
|
/net/ipv4/netfilter/ |
D | arpt_mangle.c | 16 const struct arphdr *arp; in target() local 23 arp = arp_hdr(skb); in target() 24 arpptr = skb_network_header(skb) + sizeof(*arp); in target() 25 pln = arp->ar_pln; in target() 26 hln = arp->ar_hln; in target()
|
D | ipt_CLUSTERIP.c | 612 struct arphdr *arp = arp_hdr(skb); in arp_mangle() local 618 if (arp->ar_hrd != htons(ARPHRD_ETHER) || in arp_mangle() 619 arp->ar_pro != htons(ETH_P_IP) || in arp_mangle() 620 arp->ar_pln != 4 || arp->ar_hln != ETH_ALEN) in arp_mangle() 624 if (arp->ar_op != htons(ARPOP_REPLY) && in arp_mangle() 625 arp->ar_op != htons(ARPOP_REQUEST)) in arp_mangle() 628 payload = (void *)(arp+1); in arp_mangle() 648 memcpy(payload->src_hw, c->clustermac, arp->ar_hln); in arp_mangle()
|
D | arp_tables.c | 145 static inline int arp_checkentry(const struct arpt_arp *arp) in arp_checkentry() argument 147 if (arp->flags & ~ARPT_F_MASK) in arp_checkentry() 149 if (arp->invflags & ~ARPT_INV_MASK) in arp_checkentry() 189 const struct arphdr *arp; in arpt_do_table() local 219 arp = arp_hdr(skb); in arpt_do_table() 224 if (!arp_packet_match(arp, skb->dev, indev, outdev, &e->arp)) { in arpt_do_table() 273 arp = arp_hdr(skb); in arpt_do_table() 295 memcmp(&e->arp, &uncond, sizeof(uncond)) == 0; in unconditional() 471 if (!arp_checkentry(&e->arp)) in check_entry_size_and_hooks() 1092 if (!arp_checkentry(&e->arp)) in check_compat_entry_size_and_hooks()
|
/net/openvswitch/ |
D | flow.c | 614 struct arp_eth_header *arp; in key_extract_l3l4() local 617 arp = (struct arp_eth_header *)skb_network_header(skb); in key_extract_l3l4() 620 arp->ar_hrd == htons(ARPHRD_ETHER) && in key_extract_l3l4() 621 arp->ar_pro == htons(ETH_P_IP) && in key_extract_l3l4() 622 arp->ar_hln == ETH_ALEN && in key_extract_l3l4() 623 arp->ar_pln == 4) { in key_extract_l3l4() 626 if (ntohs(arp->ar_op) <= 0xff) in key_extract_l3l4() 627 key->ip.proto = ntohs(arp->ar_op); in key_extract_l3l4() 631 memcpy(&key->ipv4.addr.src, arp->ar_sip, sizeof(key->ipv4.addr.src)); in key_extract_l3l4() 632 memcpy(&key->ipv4.addr.dst, arp->ar_tip, sizeof(key->ipv4.addr.dst)); in key_extract_l3l4() [all …]
|
D | flow.h | 117 } arp; member
|
D | flow_netlink.c | 1614 SW_FLOW_KEY_MEMCPY(match, ipv4.arp.sha, in ovs_key_from_nlattrs() 1616 SW_FLOW_KEY_MEMCPY(match, ipv4.arp.tha, in ovs_key_from_nlattrs() 2114 ether_addr_copy(arp_key->arp_sha, output->ipv4.arp.sha); in __ovs_nla_put_key() 2115 ether_addr_copy(arp_key->arp_tha, output->ipv4.arp.tha); in __ovs_nla_put_key()
|
/net/sched/ |
D | cls_flower.c | 45 struct flow_dissector_key_arp arp; member 1214 fl_set_key_val(tb, &key->arp.sip, TCA_FLOWER_KEY_ARP_SIP, in fl_set_key() 1215 &mask->arp.sip, TCA_FLOWER_KEY_ARP_SIP_MASK, in fl_set_key() 1216 sizeof(key->arp.sip)); in fl_set_key() 1217 fl_set_key_val(tb, &key->arp.tip, TCA_FLOWER_KEY_ARP_TIP, in fl_set_key() 1218 &mask->arp.tip, TCA_FLOWER_KEY_ARP_TIP_MASK, in fl_set_key() 1219 sizeof(key->arp.tip)); in fl_set_key() 1220 fl_set_key_val(tb, &key->arp.op, TCA_FLOWER_KEY_ARP_OP, in fl_set_key() 1221 &mask->arp.op, TCA_FLOWER_KEY_ARP_OP_MASK, in fl_set_key() 1222 sizeof(key->arp.op)); in fl_set_key() [all …]
|
/net/core/ |
D | flow_dissector.c | 462 const struct arphdr *arp; in __skb_flow_dissect_arp() local 468 arp = __skb_header_pointer(skb, nhoff, sizeof(_arp), data, in __skb_flow_dissect_arp() 470 if (!arp) in __skb_flow_dissect_arp() 473 if (arp->ar_hrd != htons(ARPHRD_ETHER) || in __skb_flow_dissect_arp() 474 arp->ar_pro != htons(ETH_P_IP) || in __skb_flow_dissect_arp() 475 arp->ar_hln != ETH_ALEN || in __skb_flow_dissect_arp() 476 arp->ar_pln != 4 || in __skb_flow_dissect_arp() 477 (arp->ar_op != htons(ARPOP_REPLY) && in __skb_flow_dissect_arp() 478 arp->ar_op != htons(ARPOP_REQUEST))) in __skb_flow_dissect_arp() 497 key_arp->op = ntohs(arp->ar_op) & 0xff; in __skb_flow_dissect_arp()
|
/net/bridge/netfilter/ |
D | Kconfig | 178 tristate "ebt: arp reply target support" 181 This option adds the arp reply target, which allows 182 automatically sending arp replies to arp requests.
|
/net/batman-adv/ |
D | Makefile | 15 batman-adv-$(CONFIG_BATMAN_ADV_DAT) += distributed-arp-table.o
|
/net/netfilter/ |
D | nft_compat.c | 56 struct arpt_entry arp; member
|
D | Kconfig | 447 replace the existing {ip,ip6,arp,eb}_tables infrastructure. It
|
/net/rose/ |
D | af_rose.c | 1201 skbn->arp = 1; in rose_sendmsg()
|