/net/sctp/ |
D | output.c | 45 static enum sctp_xmit __sctp_packet_append_chunk(struct sctp_packet *packet, 47 static enum sctp_xmit sctp_packet_can_append_data(struct sctp_packet *packet, 49 static void sctp_packet_append_data(struct sctp_packet *packet, 51 static enum sctp_xmit sctp_packet_will_fit(struct sctp_packet *packet, 55 static void sctp_packet_reset(struct sctp_packet *packet) in sctp_packet_reset() argument 60 packet->size = packet->overhead; in sctp_packet_reset() 62 packet->has_cookie_echo = 0; in sctp_packet_reset() 63 packet->has_sack = 0; in sctp_packet_reset() 64 packet->has_data = 0; in sctp_packet_reset() 65 packet->has_auth = 0; in sctp_packet_reset() [all …]
|
D | outqueue.c | 785 struct sctp_packet *packet; member 853 ctx->packet = &ctx->transport->packet; in sctp_outq_select_transport() 859 sctp_packet_config(ctx->packet, in sctp_outq_select_transport() 914 ctx->packet->vtag = ctx->asoc->c.my_vtag; in sctp_outq_flush_ctrl() 940 status = sctp_packet_transmit_chunk(ctx->packet, chunk, in sctp_outq_flush_ctrl() 983 ctx->packet = &ctx->transport->packet; in sctp_outq_flush_rtx() 989 sctp_packet_config(ctx->packet, ctx->asoc->peer.i.init_tag, in sctp_outq_flush_rtx() 993 error = __sctp_outq_flush_rtx(ctx->q, ctx->packet, rtx_timeout, in sctp_outq_flush_rtx() 1006 if (ctx->packet->has_cookie_echo) in sctp_outq_flush_rtx() 1030 if (!ctx->packet || !ctx->packet->has_cookie_echo) in sctp_outq_flush_data() [all …]
|
D | sm_statefuns.c | 319 struct sctp_packet *packet; in sctp_sf_do_5_1B_init() local 379 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1B_init() 387 if (packet) { in sctp_sf_do_5_1B_init() 389 SCTP_PACKET(packet)); in sctp_sf_do_5_1B_init() 518 struct sctp_packet *packet; in sctp_sf_do_5_1C_ack() local 551 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1C_ack() 559 if (packet) { in sctp_sf_do_5_1C_ack() 561 SCTP_PACKET(packet)); in sctp_sf_do_5_1C_ack() 1473 struct sctp_packet *packet; in sctp_sf_do_unexpected_init() local 1518 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_unexpected_init() [all …]
|
D | Kconfig | 20 connectionless packet network such as IP. It offers the following 29 packet, and
|
/net/nfc/hci/ |
D | hcp.c | 48 struct hcp_packet *packet; in nfc_hci_hcp_message_tx() local 71 packet = (struct hcp_packet *)skb->data; in nfc_hci_hcp_message_tx() 72 packet->header = pipe; in nfc_hci_hcp_message_tx() 75 packet->message.header = HCP_HEADER(type, instruction); in nfc_hci_hcp_message_tx() 77 memcpy(packet->message.data, ptr, in nfc_hci_hcp_message_tx() 82 memcpy(&packet->message, ptr, data_link_len); in nfc_hci_hcp_message_tx() 88 packet->header |= ~NFC_HCI_FRAGMENT; in nfc_hci_hcp_message_tx()
|
D | core.c | 856 struct hcp_packet *packet; in nfc_hci_recv_from_llc() local 864 packet = (struct hcp_packet *)skb->data; in nfc_hci_recv_from_llc() 865 if ((packet->header & ~NFC_HCI_FRAGMENT) == 0) { in nfc_hci_recv_from_llc() 872 pipe = packet->header & NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc() 899 packet->header &= NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc() 907 packet = (struct hcp_packet *)hcp_skb->data; in nfc_hci_recv_from_llc() 908 type = HCP_MSG_GET_TYPE(packet->message.header); in nfc_hci_recv_from_llc() 910 pipe = packet->header; in nfc_hci_recv_from_llc() 911 instruction = HCP_MSG_GET_CMD(packet->message.header); in nfc_hci_recv_from_llc()
|
/net/ipv4/netfilter/ |
D | Kconfig | 37 tristate "IPv4 nf_tables packet duplication support" 41 This module enables IPv4 packet duplication support for nf_tables. 70 tristate "Netfilter IPv4 packet duplication to alternate destination" 74 packet to be rerouted to another destination. 77 tristate "ARP packet logging" 82 tristate "IPv4 packet logging" 87 tristate "IPv4 packet rejection" 126 iptables is a general, extensible packet identification framework. 127 The packet filtering and full NAT (masquerading, port forwarding, 160 go out via the interface the packet came in. [all …]
|
/net/ipv6/netfilter/ |
D | Kconfig | 33 tristate "IPv6 nf_tables packet duplication support" 37 This module enables IPv6 packet duplication support for nf_tables. 59 tristate "Netfilter IPv6 packet duplication to alternate destination" 63 packet to be rerouted to another destination. 66 tristate "IPv6 packet rejection" 70 tristate "IPv6 packet logging" 80 ip6tables is a general, extensible packet identification framework. 81 Currently only the packet filtering and packet mangling subsystem 113 header of the packet. 122 and destination options headers of a packet. [all …]
|
/net/sched/ |
D | Kconfig | 16 If you say N here, you will get the standard packet scheduler, which 38 to read status information about packet schedulers from the file 52 packet scheduling algorithm. See 66 (HFSC) packet scheduling algorithm. 74 Say Y here if you want to use an n-band priority queue packet 83 Say Y here if you want to use an n-band queue packet scheduler 93 packet scheduling algorithm. 104 packet scheduling algorithm. 115 packet scheduling algorithm. 125 Say Y here if you want to use the True Link Equalizer (TLE) packet [all …]
|
/net/batman-adv/ |
D | fragmentation.c | 251 struct batadv_frag_packet *packet; in batadv_frag_merge_packets() local 265 packet = (struct batadv_frag_packet *)skb_out->data; in batadv_frag_merge_packets() 266 size = ntohs(packet->total_size) + hdr_size; in batadv_frag_merge_packets() 357 struct batadv_frag_packet *packet; in batadv_frag_skb_fwd() local 361 packet = (struct batadv_frag_packet *)skb->data; in batadv_frag_skb_fwd() 362 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest); in batadv_frag_skb_fwd() 373 total_size = ntohs(packet->total_size); in batadv_frag_skb_fwd() 379 packet->ttl--; in batadv_frag_skb_fwd()
|
D | icmp_socket.c | 105 struct batadv_socket_packet *packet, *tmp; in batadv_socket_release() local 110 list_for_each_entry_safe(packet, tmp, &client->queue_list, list) { in batadv_socket_release() 111 list_del(&packet->list); in batadv_socket_release() 112 kfree(packet); in batadv_socket_release()
|
D | network-coding.c | 1507 struct batadv_unicast_packet *packet; in batadv_nc_skb_forward() local 1519 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_forward() 1520 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_forward() 1537 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_forward() 1560 struct batadv_unicast_packet *packet; in batadv_nc_skb_store_for_decoding() local 1572 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_store_for_decoding() 1573 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_store_for_decoding() 1597 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_store_for_decoding()
|
/net/rxrpc/ |
D | Kconfig | 31 bool "Inject packet loss into RxRPC packet stream" 34 Say Y here to inject packet loss by discarding some received and some
|
/net/netfilter/ |
D | Kconfig | 69 Address Translation. It can also be used to enhance packet 78 tristate "Netdev packet logging" 394 Connection Tracking information together with the packet is 446 nftables is the new packet classification framework that intends to 503 include packet and byte counters in a rule. 551 typical Network Address Translation (NAT) packet transformations. 617 on the protocol of the packet. 666 tristate "Netfilter packet duplication support" 668 This option enables the generic packet duplication infrastructure 672 tristate "Netfilter nf_tables netdev packet duplication support" [all …]
|
/net/psample/ |
D | Kconfig | 3 # psample packet sampling configuration 11 Say Y here to add support for packet-sampling netlink channel
|
/net/nfc/nci/ |
D | hci.c | 434 struct nci_hcp_packet *packet; in nci_hci_data_received_cb() local 447 packet = (struct nci_hcp_packet *)skb->data; in nci_hci_data_received_cb() 448 if ((packet->header & ~NCI_HCI_FRAGMENT) == 0) { in nci_hci_data_received_cb() 455 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb() 482 packet->header &= NCI_HCI_FRAGMENT; in nci_hci_data_received_cb() 490 packet = (struct nci_hcp_packet *)hcp_skb->data; in nci_hci_data_received_cb() 491 type = NCI_HCP_MSG_GET_TYPE(packet->message.header); in nci_hci_data_received_cb() 493 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb()
|
/net/ |
D | Kconfig | 63 source "net/packet/Kconfig" 121 bool "Network packet filtering framework (Netfilter)" 126 The most common use of packet filtering is to run your Linux box as 128 firewall provided by this kernel support is called a "packet 134 protocols, which a packet filter lacks. Moreover, proxy-based 137 they are often combined with a packet filter, which only works if 162 a bridge with Network packet filtering enabled makes iptables "see" 168 masquerading (ipmasqadm), packet filtering (ipchains), transparent 297 packet sniffing (libpcap/tcpdump). 342 Documentation on how to use the packet generator can be found [all …]
|
/net/bridge/netfilter/ |
D | Kconfig | 25 tristate "Bridge packet logging" 37 into connections. This is used to enhance packet filtering via 49 ebtables is a general, extensible frame/packet identification 150 tristate "ebt: packet type filter support" 152 This option adds the packet type match, which allows matching on the 153 type of packet based on its Ethernet "class" (as determined by
|
/net/packet/ |
D | diag.c | 200 mutex_lock(&net->packet.sklist_lock); in packet_diag_dump() 201 sk_for_each(sk, &net->packet.sklist) { in packet_diag_dump() 218 mutex_unlock(&net->packet.sklist_lock); in packet_diag_dump()
|
/net/ipv4/ |
D | Kconfig | 68 Normally, a router decides what to do with a received packet based 69 solely on the packet's final destination address. If you say Y here, 70 the Linux router will also be able to take the packet's source 72 of the packet can be used for routing decisions as well. 85 a deterministic manner for a given packet. If you say Y here 86 however, it becomes possible to attach several actions to a packet 90 if a matching packet arrives. 238 what to do with a multicast packet based on the source and 240 will also be able to take interfaces and packet marks into 542 window. TCP Vegas should provide less packet loss, but it is [all …]
|
/net/openvswitch/ |
D | datapath.c | 547 struct sk_buff *packet; in ovs_packet_cmd_execute() local 563 packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL); in ovs_packet_cmd_execute() 565 if (!packet) in ovs_packet_cmd_execute() 567 skb_reserve(packet, NET_IP_ALIGN); in ovs_packet_cmd_execute() 569 nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len); in ovs_packet_cmd_execute() 574 packet->ignore_df = 1; in ovs_packet_cmd_execute() 576 OVS_CB(packet)->mru = mru; in ovs_packet_cmd_execute() 585 packet, &flow->key, log); in ovs_packet_cmd_execute() 595 packet->priority = flow->key.phy.priority; in ovs_packet_cmd_execute() 596 packet->mark = flow->key.phy.skb_mark; in ovs_packet_cmd_execute() [all …]
|
D | Kconfig | 28 The Open vSwitch datapath provides an in-kernel fast path for packet 31 translate it into packet processing rules.
|
/net/xfrm/ |
D | Kconfig | 55 one, two policies can be applied to the same packet at once. 77 at packet processing for developer.
|
/net/netlabel/ |
D | Kconfig | 12 NetLabel provides support for explicit network packet labeling
|
/net/bpfilter/ |
D | Kconfig | 3 bool "BPF based packet filtering framework (BPFILTER)"
|