/net/sctp/ |
D | output.c | 67 static sctp_xmit_t __sctp_packet_append_chunk(struct sctp_packet *packet, 69 static sctp_xmit_t sctp_packet_can_append_data(struct sctp_packet *packet, 71 static void sctp_packet_append_data(struct sctp_packet *packet, 73 static sctp_xmit_t sctp_packet_will_fit(struct sctp_packet *packet, 77 static void sctp_packet_reset(struct sctp_packet *packet) in sctp_packet_reset() argument 79 packet->size = packet->overhead; in sctp_packet_reset() 80 packet->has_cookie_echo = 0; in sctp_packet_reset() 81 packet->has_sack = 0; in sctp_packet_reset() 82 packet->has_data = 0; in sctp_packet_reset() 83 packet->has_auth = 0; in sctp_packet_reset() [all …]
|
D | outqueue.c | 720 struct sctp_packet *packet; in sctp_outq_flush() local 739 packet = NULL; in sctp_outq_flush() 822 packet = &transport->packet; in sctp_outq_flush() 823 sctp_packet_config(packet, vtag, in sctp_outq_flush() 847 packet->vtag = asoc->c.my_vtag; in sctp_outq_flush() 870 status = sctp_packet_transmit_chunk(packet, chunk, in sctp_outq_flush() 901 if (!packet || !packet->has_cookie_echo) in sctp_outq_flush() 932 packet = &transport->packet; in sctp_outq_flush() 933 sctp_packet_config(packet, vtag, in sctp_outq_flush() 936 error = sctp_outq_flush_rtx(q, packet, in sctp_outq_flush() [all …]
|
D | sm_statefuns.c | 318 struct sctp_packet *packet; in sctp_sf_do_5_1B_init() local 374 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1B_init() 382 if (packet) { in sctp_sf_do_5_1B_init() 384 SCTP_PACKET(packet)); in sctp_sf_do_5_1B_init() 513 struct sctp_packet *packet; in sctp_sf_do_5_1C_ack() local 546 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1C_ack() 554 if (packet) { in sctp_sf_do_5_1C_ack() 556 SCTP_PACKET(packet)); in sctp_sf_do_5_1C_ack() 1401 struct sctp_packet *packet; in sctp_sf_do_unexpected_init() local 1445 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_unexpected_init() [all …]
|
D | Kconfig | 19 connectionless packet network such as IP. It offers the following 28 packet, and
|
/net/batman-adv/ |
D | vis.c | 75 const struct batadv_vis_packet *packet; in batadv_vis_info_choose() local 80 packet = (struct batadv_vis_packet *)vis_info->skb_packet->data; in batadv_vis_info_choose() 81 key = packet->vis_orig; in batadv_vis_info_choose() 175 struct batadv_vis_packet *packet, in batadv_vis_data_insert_interfaces() argument 180 for (i = 0; i < packet->entries; i++) { in batadv_vis_data_insert_interfaces() 184 if (batadv_compare_eth(entries[i].src, packet->vis_orig)) in batadv_vis_data_insert_interfaces() 193 struct batadv_vis_packet *packet, in batadv_vis_data_read_entries() argument 202 for (i = 0; i < packet->entries; i++) in batadv_vis_data_read_entries() 207 if (batadv_compare_eth(entry->addr, packet->vis_orig)) in batadv_vis_data_read_entries() 218 struct batadv_vis_packet *packet; in batadv_vis_seq_print_text_bucket() local [all …]
|
D | network-coding.c | 1372 struct batadv_unicast_packet *packet; in batadv_nc_skb_forward() local 1383 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_forward() 1384 if (packet->header.packet_type != BATADV_UNICAST) in batadv_nc_skb_forward() 1401 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_forward() 1424 struct batadv_unicast_packet *packet; in batadv_nc_skb_store_for_decoding() local 1436 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_store_for_decoding() 1437 if (packet->header.packet_type != BATADV_UNICAST) in batadv_nc_skb_store_for_decoding() 1461 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_store_for_decoding()
|
/net/nfc/hci/ |
D | hcp.c | 62 struct hcp_packet *packet; in nfc_hci_hcp_message_tx() local 85 packet = (struct hcp_packet *)skb->data; in nfc_hci_hcp_message_tx() 86 packet->header = pipe; in nfc_hci_hcp_message_tx() 89 packet->message.header = HCP_HEADER(type, instruction); in nfc_hci_hcp_message_tx() 91 memcpy(packet->message.data, ptr, in nfc_hci_hcp_message_tx() 96 memcpy(&packet->message, ptr, data_link_len); in nfc_hci_hcp_message_tx() 102 packet->header |= ~NFC_HCI_FRAGMENT; in nfc_hci_hcp_message_tx()
|
D | core.c | 717 struct hcp_packet *packet; in nfc_hci_recv_from_llc() local 725 packet = (struct hcp_packet *)skb->data; in nfc_hci_recv_from_llc() 726 if ((packet->header & ~NFC_HCI_FRAGMENT) == 0) { in nfc_hci_recv_from_llc() 733 pipe = packet->header & NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc() 760 packet->header &= NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc() 768 packet = (struct hcp_packet *)hcp_skb->data; in nfc_hci_recv_from_llc() 769 type = HCP_MSG_GET_TYPE(packet->message.header); in nfc_hci_recv_from_llc() 771 pipe = packet->header; in nfc_hci_recv_from_llc() 772 instruction = HCP_MSG_GET_CMD(packet->message.header); in nfc_hci_recv_from_llc()
|
/net/ipv4/netfilter/ |
D | Kconfig | 44 iptables is a general, extensible packet identification framework. 45 The packet filtering and full NAT (masquerading, port forwarding, 78 go out via the interface the packet came in. 98 rules for simple packet filtering at local input, forwarding and 109 error should be issued in response to an incoming packet, rather 124 any iptables table. The packet is passed to a userspace logging 226 iptables(8). This table is used for various packet alterations 227 which can effect how the packet is routed. 253 an IP packet. This is particularly useful, if you need to work around 298 arptables is a general, extensible packet identification framework. [all …]
|
/net/ipv6/netfilter/ |
D | Kconfig | 34 ip6tables is a general, extensible packet identification framework. 35 Currently only the packet filtering and packet mangling subsystem 67 header of the packet. 76 and destination options headers of a packet. 112 go out via the interface the packet came in. 122 header of the packet. 141 rules for simple packet filtering at local input, forwarding and 152 error should be issued in response to an incoming packet, rather 162 iptables(8). This table is used for various packet alterations 163 which can effect how the packet is routed.
|
/net/sched/ |
D | Kconfig | 15 If you say N here, you will get the standard packet scheduler, which 36 to read status information about packet schedulers from the file 49 Say Y here if you want to use the Class-Based Queueing (CBQ) packet 67 packet scheduling algorithm. See 81 (HFSC) packet scheduling algorithm. 103 Say Y here if you want to use an n-band priority queue packet 112 Say Y here if you want to use an n-band queue packet scheduler 122 packet scheduling algorithm. 133 packet scheduling algorithm. 144 packet scheduling algorithm. [all …]
|
/net/ |
D | Kconfig | 48 source "net/packet/Kconfig" 115 bool "Network packet filtering framework (Netfilter)" 120 The most common use of packet filtering is to run your Linux box as 122 firewall provided by this kernel support is called a "packet 128 protocols, which a packet filter lacks. Moreover, proxy-based 131 they are often combined with a packet filter, which only works if 156 a bridge with Network packet filtering enabled makes iptables "see" 162 masquerading (ipmasqadm), packet filtering (ipchains), transparent 170 bool "Network packet filtering debugging" 273 packet sniffing (libpcap/tcpdump). Note : Admin should enable [all …]
|
D | Makefile | 23 obj-$(CONFIG_PACKET) += packet/
|
/net/decnet/ |
D | Kconfig | 9 packet communications over which run a variety of services similar 35 network link driver", "Routing messages" and "Network packet 38 from <ftp://ftp.tux.org/pub/net/ip-routing/>). The "Network packet
|
/net/openvswitch/ |
D | Kconfig | 17 The Open vSwitch datapath provides an in-kernel fast path for packet 20 translate it into packet processing rules.
|
D | datapath.c | 699 struct sk_buff *packet; in ovs_packet_cmd_execute() local 713 packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL); in ovs_packet_cmd_execute() 715 if (!packet) in ovs_packet_cmd_execute() 717 skb_reserve(packet, NET_IP_ALIGN); in ovs_packet_cmd_execute() 719 nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len); in ovs_packet_cmd_execute() 721 skb_reset_mac_header(packet); in ovs_packet_cmd_execute() 722 eth = eth_hdr(packet); in ovs_packet_cmd_execute() 728 packet->protocol = eth->h_proto; in ovs_packet_cmd_execute() 730 packet->protocol = htons(ETH_P_802_2); in ovs_packet_cmd_execute() 738 err = ovs_flow_extract(packet, -1, &flow->key, &key_len); in ovs_packet_cmd_execute() [all …]
|
/net/bridge/netfilter/ |
D | Kconfig | 10 ebtables is a general, extensible frame/packet identification 111 tristate "ebt: packet type filter support" 113 This option adds the packet type match, which allows matching on the 114 type of packet based on its Ethernet "class" (as determined by 200 in any ebtables table. The packet is passed to a userspace 202 from the log watcher in the sense that the complete packet is
|
/net/netfilter/ |
D | Kconfig | 44 Address Translation. It can also be used to enhance packet 360 information together with the packet is the enqueued via NFNETLINK. 445 "nfmark" value in the packet. 447 the netfilter mark (nfmark) field associated with the packet. 462 ctmark), similarly to the packet mark (nfmark). Using this 500 a packet that lacks a checksum. This is particularly useful, 512 the priority of a packet. Some qdiscs can use this value for 565 or the Priority field of an IPv6 packet, prior to routing. 604 This option adds the `IDLETIMER' target. Each matching packet 640 any iptables table which records the packet header to the syslog. [all …]
|
D | nf_conntrack_proto_udp.c | 314 .packet = udp_packet, 346 .packet = udp_packet,
|
D | nf_conntrack_proto_udplite.c | 279 .packet = udplite_packet, 311 .packet = udplite_packet,
|
/net/packet/ |
D | diag.c | 194 mutex_lock(&net->packet.sklist_lock); in packet_diag_dump() 195 sk_for_each(sk, &net->packet.sklist) { in packet_diag_dump() 211 mutex_unlock(&net->packet.sklist_lock); in packet_diag_dump()
|
/net/xfrm/ |
D | Kconfig | 28 one, two policies can be applied to the same packet at once. 50 at packet processing for developer.
|
/net/ipv4/ |
D | Kconfig | 70 Normally, a router decides what to do with a received packet based 71 solely on the packet's final destination address. If you say Y here, 72 the Linux router will also be able to take the packet's source 74 of the packet can be used for routing decisions as well. 89 a deterministic manner for a given packet. If you say Y here 90 however, it becomes possible to attach several actions to a packet 94 if a matching packet arrives. 237 what to do with a multicast packet based on the source and 239 will also be able to take interfaces and packet marks into 535 window. TCP Vegas should provide less packet loss, but it is [all …]
|
/net/netlabel/ |
D | Kconfig | 10 NetLabel provides support for explicit network packet labeling
|
/net/phonet/ |
D | Kconfig | 8 The Phone Network protocol (PhoNet) is a packet-oriented
|