/net/openvswitch/ |
D | datapath.c | 808 struct sk_buff *reply; in ovs_flow_cmd_new() local 852 reply = ovs_flow_cmd_alloc_info(acts, info, false); in ovs_flow_cmd_new() 853 if (IS_ERR(reply)) { in ovs_flow_cmd_new() 854 error = PTR_ERR(reply); in ovs_flow_cmd_new() 876 if (unlikely(reply)) { in ovs_flow_cmd_new() 879 reply, info->snd_portid, in ovs_flow_cmd_new() 911 if (unlikely(reply)) { in ovs_flow_cmd_new() 914 reply, info->snd_portid, in ovs_flow_cmd_new() 925 if (reply) in ovs_flow_cmd_new() 926 ovs_notify(&dp_flow_genl_family, reply, info); in ovs_flow_cmd_new() [all …]
|
/net/atm/ |
D | signaling.c | 66 msg->reply = -EOPNOTSUPP; in modify_qos() 69 msg->reply = vcc->dev->ops->change_qos(vcc, &msg->qos, in modify_qos() 70 msg->reply); in modify_qos() 71 if (!msg->reply) in modify_qos() 98 sk->sk_err = -msg->reply; in sigd_send() 119 sk->sk_err = -msg->reply; in sigd_send() 141 vcc_release_async(vcc, msg->reply); in sigd_send() 148 sk->sk_err_soft = msg->reply; in sigd_send() 165 int reply) in sigd_enq2() argument 179 msg->reply = reply; in sigd_enq2()
|
D | signaling.h | 24 const struct sockaddr_atmsvc *svc,const struct atm_qos *qos,int reply);
|
D | common.c | 217 void vcc_release_async(struct atm_vcc *vcc, int reply) in vcc_release_async() argument 223 sk->sk_err = -reply; in vcc_release_async()
|
/net/netfilter/ |
D | nf_conntrack_sane.c | 76 struct sane_reply_net_start *reply; in help() local 127 reply = sb_ptr; in help() 128 if (reply->status != htonl(SANE_STATUS_SUCCESS)) { in help() 131 ntohl(reply->status)); in help() 136 if (reply->zero != 0) in help() 149 IPPROTO_TCP, NULL, &reply->port); in help()
|
D | nf_nat_core.c | 144 struct nf_conntrack_tuple reply; in nf_nat_used_tuple() local 146 nf_ct_invert_tuplepr(&reply, tuple); in nf_nat_used_tuple() 147 return nf_conntrack_tuple_taken(&reply, ignored_conntrack); in nf_nat_used_tuple() 404 struct nf_conntrack_tuple reply; in nf_nat_setup_info() local 407 nf_ct_invert_tuplepr(&reply, &new_tuple); in nf_nat_setup_info() 408 nf_conntrack_alter_reply(ct, &reply); in nf_nat_setup_info()
|
/net/ceph/ |
D | mon_client.c | 460 if (req->reply) in release_generic_request() 461 ceph_msg_put(req->reply); in release_generic_request() 494 dout("get_generic_reply %lld got %p\n", tid, req->reply); in get_generic_reply() 496 m = ceph_msg_get(req->reply); in get_generic_reply() 550 struct ceph_mon_statfs_reply *reply = msg->front.iov_base; in handle_statfs_reply() local 553 if (msg->front.iov_len != sizeof(*reply)) in handle_statfs_reply() 560 *(struct ceph_statfs *)req->buf = reply->st; in handle_statfs_reply() 599 req->reply = ceph_msg_new(CEPH_MSG_STATFS_REPLY, 1024, GFP_NOFS, in ceph_monc_do_statfs() 601 if (!req->reply) in ceph_monc_do_statfs() 684 req->reply = ceph_msg_new(CEPH_MSG_MON_GET_VERSION_REPLY, 1024, in ceph_monc_do_get_version() [all …]
|
D | auth_x.c | 593 struct ceph_x_authorize_reply reply; in ceph_x_verify_authorizer_reply() local 594 void *preply = &reply; in ceph_x_verify_authorizer_reply() 601 ret = ceph_x_decrypt(&th->session_key, &p, end, &preply, sizeof(reply)); in ceph_x_verify_authorizer_reply() 604 if (ret != sizeof(reply)) in ceph_x_verify_authorizer_reply() 607 if (au->nonce + 1 != le64_to_cpu(reply.nonce_plus_one)) in ceph_x_verify_authorizer_reply() 612 au->nonce, le64_to_cpu(reply.nonce_plus_one), ret); in ceph_x_verify_authorizer_reply()
|
/net/sctp/ |
D | sm_statefuns.c | 960 struct sctp_chunk *reply; in sctp_sf_heartbeat() local 963 reply = sctp_make_heartbeat(asoc, transport); in sctp_sf_heartbeat() 964 if (!reply) in sctp_sf_heartbeat() 973 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(reply)); in sctp_sf_heartbeat() 1058 struct sctp_chunk *reply; in sctp_sf_beat_8_3() local 1084 reply = sctp_make_heartbeat_ack(asoc, chunk, param_hdr, paylen); in sctp_sf_beat_8_3() 1085 if (!reply) in sctp_sf_beat_8_3() 1088 sctp_add_cmd_sf(commands, SCTP_CMD_REPLY, SCTP_CHUNK(reply)); in sctp_sf_beat_8_3() 2312 struct sctp_chunk *reply; in sctp_sf_do_5_2_6_stale() local 2349 reply = sctp_make_init(asoc, bp, GFP_ATOMIC, sizeof(bht)); in sctp_sf_do_5_2_6_stale() [all …]
|
/net/mac80211/ |
D | mesh_hwmp.c | 521 bool reply = false; in hwmp_preq_frame_process() local 541 reply = true; in hwmp_preq_frame_process() 556 reply = true; in hwmp_preq_frame_process() 576 reply = true; in hwmp_preq_frame_process() 588 if (reply) { in hwmp_preq_frame_process()
|
/net/ipv4/ |
D | tcp_metrics.c | 975 void *reply; in tcp_metrics_nl_cmd_get() local 991 reply = genlmsg_put_reply(msg, info, &tcp_metrics_nl_family, 0, in tcp_metrics_nl_cmd_get() 993 if (!reply) in tcp_metrics_nl_cmd_get() 1011 genlmsg_end(msg, reply); in tcp_metrics_nl_cmd_get()
|
/net/bridge/netfilter/ |
D | Kconfig | 161 tristate "ebt: arp reply target support" 164 This option adds the arp reply target, which allows
|
/net/iucv/ |
D | iucv.c | 1287 u8 flags, void *reply, size_t size) in iucv_message_reply() argument 1304 memcpy(parm->dpl.iprmmsg, reply, min_t(size_t, size, 8)); in iucv_message_reply() 1306 parm->db.ipbfadr1 = (u32)(addr_t) reply; in iucv_message_reply()
|
/net/netfilter/ipvs/ |
D | ip_vs_ctl.c | 3483 void *reply; in ip_vs_genl_get_cmd() local 3507 reply = genlmsg_put_reply(msg, info, &ip_vs_genl_family, 0, reply_cmd); in ip_vs_genl_get_cmd() 3508 if (reply == NULL) in ip_vs_genl_get_cmd() 3562 genlmsg_end(msg, reply); in ip_vs_genl_get_cmd()
|
/net/vmw_vsock/ |
D | vmci_transport.c | 238 struct vmci_transport_packet reply; in vmci_transport_reply_control_pkt_fast() local 245 return __vmci_transport_send_control_pkt(&reply, &src, &dst, in vmci_transport_reply_control_pkt_fast()
|
/net/bluetooth/ |
D | mgmt.c | 2948 struct hci_cp_pin_code_reply reply; in pin_code_reply() local 2990 bacpy(&reply.bdaddr, &cp->addr.bdaddr); in pin_code_reply() 2991 reply.pin_len = cp->pin_len; in pin_code_reply() 2992 memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code)); in pin_code_reply() 2994 err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply); in pin_code_reply()
|