Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 25 of 45) sorted by relevance

12

/net/sctp/
Doutput.c45 static enum sctp_xmit __sctp_packet_append_chunk(struct sctp_packet *packet,
47 static enum sctp_xmit sctp_packet_can_append_data(struct sctp_packet *packet,
49 static void sctp_packet_append_data(struct sctp_packet *packet,
51 static enum sctp_xmit sctp_packet_will_fit(struct sctp_packet *packet,
55 static void sctp_packet_reset(struct sctp_packet *packet) in sctp_packet_reset() argument
60 packet->size = packet->overhead; in sctp_packet_reset()
62 packet->has_cookie_echo = 0; in sctp_packet_reset()
63 packet->has_sack = 0; in sctp_packet_reset()
64 packet->has_data = 0; in sctp_packet_reset()
65 packet->has_auth = 0; in sctp_packet_reset()
[all …]
Doutqueue.c784 struct sctp_packet *packet; member
852 ctx->packet = &ctx->transport->packet; in sctp_outq_select_transport()
858 sctp_packet_config(ctx->packet, in sctp_outq_select_transport()
913 ctx->packet->vtag = ctx->asoc->c.my_vtag; in sctp_outq_flush_ctrl()
939 status = sctp_packet_transmit_chunk(ctx->packet, chunk, in sctp_outq_flush_ctrl()
982 ctx->packet = &ctx->transport->packet; in sctp_outq_flush_rtx()
988 sctp_packet_config(ctx->packet, ctx->asoc->peer.i.init_tag, in sctp_outq_flush_rtx()
992 error = __sctp_outq_flush_rtx(ctx->q, ctx->packet, rtx_timeout, in sctp_outq_flush_rtx()
1005 if (ctx->packet->has_cookie_echo) in sctp_outq_flush_rtx()
1029 if (!ctx->packet || !ctx->packet->has_cookie_echo) in sctp_outq_flush_data()
[all …]
Dsm_statefuns.c303 struct sctp_packet *packet; in sctp_sf_do_5_1B_init() local
363 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1B_init()
371 if (packet) { in sctp_sf_do_5_1B_init()
373 SCTP_PACKET(packet)); in sctp_sf_do_5_1B_init()
502 struct sctp_packet *packet; in sctp_sf_do_5_1C_ack() local
535 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1C_ack()
543 if (packet) { in sctp_sf_do_5_1C_ack()
545 SCTP_PACKET(packet)); in sctp_sf_do_5_1C_ack()
1453 struct sctp_packet *packet; in sctp_sf_do_unexpected_init() local
1501 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_unexpected_init()
[all …]
DKconfig20 connectionless packet network such as IP. It offers the following
29 packet, and
/net/nfc/hci/
Dhcp.c48 struct hcp_packet *packet; in nfc_hci_hcp_message_tx() local
71 packet = (struct hcp_packet *)skb->data; in nfc_hci_hcp_message_tx()
72 packet->header = pipe; in nfc_hci_hcp_message_tx()
75 packet->message.header = HCP_HEADER(type, instruction); in nfc_hci_hcp_message_tx()
77 memcpy(packet->message.data, ptr, in nfc_hci_hcp_message_tx()
82 memcpy(&packet->message, ptr, data_link_len); in nfc_hci_hcp_message_tx()
88 packet->header |= ~NFC_HCI_FRAGMENT; in nfc_hci_hcp_message_tx()
Dcore.c843 struct hcp_packet *packet; in nfc_hci_recv_from_llc() local
851 packet = (struct hcp_packet *)skb->data; in nfc_hci_recv_from_llc()
852 if ((packet->header & ~NFC_HCI_FRAGMENT) == 0) { in nfc_hci_recv_from_llc()
859 pipe = packet->header & NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc()
886 packet->header &= NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc()
894 packet = (struct hcp_packet *)hcp_skb->data; in nfc_hci_recv_from_llc()
895 type = HCP_MSG_GET_TYPE(packet->message.header); in nfc_hci_recv_from_llc()
897 pipe = packet->header; in nfc_hci_recv_from_llc()
898 instruction = HCP_MSG_GET_CMD(packet->message.header); in nfc_hci_recv_from_llc()
/net/ipv4/netfilter/
DKconfig37 tristate "IPv4 nf_tables packet duplication support"
41 This module enables IPv4 packet duplication support for nf_tables.
70 tristate "Netfilter IPv4 packet duplication to alternate destination"
74 packet to be rerouted to another destination.
77 tristate "ARP packet logging"
82 tristate "IPv4 packet logging"
87 tristate "IPv4 packet rejection"
126 iptables is a general, extensible packet identification framework.
127 The packet filtering and full NAT (masquerading, port forwarding,
160 go out via the interface the packet came in.
[all …]
/net/ipv6/netfilter/
DKconfig33 tristate "IPv6 nf_tables packet duplication support"
37 This module enables IPv6 packet duplication support for nf_tables.
59 tristate "Netfilter IPv6 packet duplication to alternate destination"
63 packet to be rerouted to another destination.
66 tristate "IPv6 packet rejection"
70 tristate "IPv6 packet logging"
80 ip6tables is a general, extensible packet identification framework.
81 Currently only the packet filtering and packet mangling subsystem
113 header of the packet.
122 and destination options headers of a packet.
[all …]
/net/sched/
DKconfig16 If you say N here, you will get the standard packet scheduler, which
38 to read status information about packet schedulers from the file
51 Say Y here if you want to use the Class-Based Queueing (CBQ) packet
69 packet scheduling algorithm. See
83 (HFSC) packet scheduling algorithm.
105 Say Y here if you want to use an n-band priority queue packet
114 Say Y here if you want to use an n-band queue packet scheduler
124 packet scheduling algorithm.
135 packet scheduling algorithm.
146 packet scheduling algorithm.
[all …]
/net/batman-adv/
Dfragmentation.c251 struct batadv_frag_packet *packet; in batadv_frag_merge_packets() local
265 packet = (struct batadv_frag_packet *)skb_out->data; in batadv_frag_merge_packets()
266 size = ntohs(packet->total_size) + hdr_size; in batadv_frag_merge_packets()
357 struct batadv_frag_packet *packet; in batadv_frag_skb_fwd() local
361 packet = (struct batadv_frag_packet *)skb->data; in batadv_frag_skb_fwd()
362 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest); in batadv_frag_skb_fwd()
373 total_size = ntohs(packet->total_size); in batadv_frag_skb_fwd()
379 packet->ttl--; in batadv_frag_skb_fwd()
Dicmp_socket.c105 struct batadv_socket_packet *packet, *tmp; in batadv_socket_release() local
110 list_for_each_entry_safe(packet, tmp, &client->queue_list, list) { in batadv_socket_release()
111 list_del(&packet->list); in batadv_socket_release()
112 kfree(packet); in batadv_socket_release()
Dnetwork-coding.c1512 struct batadv_unicast_packet *packet; in batadv_nc_skb_forward() local
1524 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_forward()
1525 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_forward()
1542 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_forward()
1565 struct batadv_unicast_packet *packet; in batadv_nc_skb_store_for_decoding() local
1577 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_store_for_decoding()
1578 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_store_for_decoding()
1602 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_store_for_decoding()
/net/rxrpc/
DKconfig31 bool "Inject packet loss into RxRPC packet stream"
34 Say Y here to inject packet loss by discarding some received and some
/net/netfilter/
DKconfig69 Address Translation. It can also be used to enhance packet
78 tristate "Netdev packet logging"
394 Connection Tracking information together with the packet is
446 nftables is the new packet classification framework that intends to
503 include packet and byte counters in a rule.
551 typical Network Address Translation (NAT) packet transformations.
617 on the protocol of the packet.
666 tristate "Netfilter packet duplication support"
668 This option enables the generic packet duplication infrastructure
672 tristate "Netfilter nf_tables netdev packet duplication support"
[all …]
/net/decnet/
DKconfig10 packet communications over which run a variety of services similar
36 network link driver", "Routing messages" and "Network packet
39 from <ftp://ftp.tux.org/pub/net/ip-routing/>). The "Network packet
/net/psample/
DKconfig3 # psample packet sampling configuration
11 Say Y here to add support for packet-sampling netlink channel
/net/nfc/nci/
Dhci.c434 struct nci_hcp_packet *packet; in nci_hci_data_received_cb() local
447 packet = (struct nci_hcp_packet *)skb->data; in nci_hci_data_received_cb()
448 if ((packet->header & ~NCI_HCI_FRAGMENT) == 0) { in nci_hci_data_received_cb()
455 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb()
482 packet->header &= NCI_HCI_FRAGMENT; in nci_hci_data_received_cb()
490 packet = (struct nci_hcp_packet *)hcp_skb->data; in nci_hci_data_received_cb()
491 type = NCI_HCP_MSG_GET_TYPE(packet->message.header); in nci_hci_data_received_cb()
493 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb()
/net/
DKconfig60 source "net/packet/Kconfig"
118 bool "Network packet filtering framework (Netfilter)"
123 The most common use of packet filtering is to run your Linux box as
125 firewall provided by this kernel support is called a "packet
131 protocols, which a packet filter lacks. Moreover, proxy-based
134 they are often combined with a packet filter, which only works if
159 a bridge with Network packet filtering enabled makes iptables "see"
165 masquerading (ipmasqadm), packet filtering (ipchains), transparent
297 packet sniffing (libpcap/tcpdump).
342 Documentation on how to use the packet generator can be found
[all …]
/net/bridge/netfilter/
DKconfig25 tristate "Bridge packet logging"
37 into connections. This is used to enhance packet filtering via
49 ebtables is a general, extensible frame/packet identification
150 tristate "ebt: packet type filter support"
152 This option adds the packet type match, which allows matching on the
153 type of packet based on its Ethernet "class" (as determined by
/net/ipv4/
DKconfig68 Normally, a router decides what to do with a received packet based
69 solely on the packet's final destination address. If you say Y here,
70 the Linux router will also be able to take the packet's source
72 of the packet can be used for routing decisions as well.
85 a deterministic manner for a given packet. If you say Y here
86 however, it becomes possible to attach several actions to a packet
90 if a matching packet arrives.
238 what to do with a multicast packet based on the source and
240 will also be able to take interfaces and packet marks into
531 window. TCP Vegas should provide less packet loss, but it is
[all …]
/net/packet/
Ddiag.c200 mutex_lock(&net->packet.sklist_lock); in packet_diag_dump()
201 sk_for_each(sk, &net->packet.sklist) { in packet_diag_dump()
218 mutex_unlock(&net->packet.sklist_lock); in packet_diag_dump()
/net/openvswitch/
Ddatapath.c539 struct sk_buff *packet; in ovs_packet_cmd_execute() local
555 packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL); in ovs_packet_cmd_execute()
557 if (!packet) in ovs_packet_cmd_execute()
559 skb_reserve(packet, NET_IP_ALIGN); in ovs_packet_cmd_execute()
561 nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len); in ovs_packet_cmd_execute()
566 packet->ignore_df = 1; in ovs_packet_cmd_execute()
568 OVS_CB(packet)->mru = mru; in ovs_packet_cmd_execute()
577 packet, &flow->key, log); in ovs_packet_cmd_execute()
587 packet->priority = flow->key.phy.priority; in ovs_packet_cmd_execute()
588 packet->mark = flow->key.phy.skb_mark; in ovs_packet_cmd_execute()
[all …]
DKconfig28 The Open vSwitch datapath provides an in-kernel fast path for packet
31 translate it into packet processing rules.
/net/xfrm/
DKconfig44 one, two policies can be applied to the same packet at once.
66 at packet processing for developer.
/net/bpfilter/
DKconfig3 bool "BPF based packet filtering framework (BPFILTER)"

12