/net/sctp/ |
D | output.c | 45 static enum sctp_xmit __sctp_packet_append_chunk(struct sctp_packet *packet, 47 static enum sctp_xmit sctp_packet_can_append_data(struct sctp_packet *packet, 49 static void sctp_packet_append_data(struct sctp_packet *packet, 51 static enum sctp_xmit sctp_packet_will_fit(struct sctp_packet *packet, 55 static void sctp_packet_reset(struct sctp_packet *packet) in sctp_packet_reset() argument 60 packet->size = packet->overhead; in sctp_packet_reset() 62 packet->has_cookie_echo = 0; in sctp_packet_reset() 63 packet->has_sack = 0; in sctp_packet_reset() 64 packet->has_data = 0; in sctp_packet_reset() 65 packet->has_auth = 0; in sctp_packet_reset() [all …]
|
D | outqueue.c | 792 struct sctp_packet *packet; member 860 ctx->packet = &ctx->transport->packet; in sctp_outq_select_transport() 866 sctp_packet_config(ctx->packet, in sctp_outq_select_transport() 922 ctx->packet->vtag = ctx->asoc->c.my_vtag; in sctp_outq_flush_ctrl() 956 status = sctp_packet_transmit_chunk(ctx->packet, chunk, in sctp_outq_flush_ctrl() 999 ctx->packet = &ctx->transport->packet; in sctp_outq_flush_rtx() 1005 sctp_packet_config(ctx->packet, ctx->asoc->peer.i.init_tag, in sctp_outq_flush_rtx() 1009 error = __sctp_outq_flush_rtx(ctx->q, ctx->packet, rtx_timeout, in sctp_outq_flush_rtx() 1022 if (ctx->packet->has_cookie_echo) in sctp_outq_flush_rtx() 1046 if (!ctx->packet || !ctx->packet->has_cookie_echo) in sctp_outq_flush_data() [all …]
|
D | sm_statefuns.c | 326 struct sctp_packet *packet; in sctp_sf_do_5_1B_init() local 386 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1B_init() 394 if (packet) { in sctp_sf_do_5_1B_init() 396 SCTP_PACKET(packet)); in sctp_sf_do_5_1B_init() 525 struct sctp_packet *packet; in sctp_sf_do_5_1C_ack() local 558 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1C_ack() 566 if (packet) { in sctp_sf_do_5_1C_ack() 568 SCTP_PACKET(packet)); in sctp_sf_do_5_1C_ack() 1517 struct sctp_packet *packet; in sctp_sf_do_unexpected_init() local 1565 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_unexpected_init() [all …]
|
D | Kconfig | 21 connectionless packet network such as IP. It offers the following 30 packet, and
|
/net/nfc/hci/ |
D | hcp.c | 48 struct hcp_packet *packet; in nfc_hci_hcp_message_tx() local 71 packet = (struct hcp_packet *)skb->data; in nfc_hci_hcp_message_tx() 72 packet->header = pipe; in nfc_hci_hcp_message_tx() 75 packet->message.header = HCP_HEADER(type, instruction); in nfc_hci_hcp_message_tx() 77 memcpy(packet->message.data, ptr, in nfc_hci_hcp_message_tx() 82 memcpy(&packet->message, ptr, data_link_len); in nfc_hci_hcp_message_tx() 88 packet->header |= ~NFC_HCI_FRAGMENT; in nfc_hci_hcp_message_tx()
|
D | core.c | 856 struct hcp_packet *packet; in nfc_hci_recv_from_llc() local 864 packet = (struct hcp_packet *)skb->data; in nfc_hci_recv_from_llc() 865 if ((packet->header & ~NFC_HCI_FRAGMENT) == 0) { in nfc_hci_recv_from_llc() 872 pipe = packet->header & NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc() 899 packet->header &= NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc() 907 packet = (struct hcp_packet *)hcp_skb->data; in nfc_hci_recv_from_llc() 908 type = HCP_MSG_GET_TYPE(packet->message.header); in nfc_hci_recv_from_llc() 910 pipe = packet->header; in nfc_hci_recv_from_llc() 911 instruction = HCP_MSG_GET_CMD(packet->message.header); in nfc_hci_recv_from_llc()
|
/net/ipv6/netfilter/ |
D | Kconfig | 33 tristate "IPv6 nf_tables packet duplication support" 37 This module enables IPv6 packet duplication support for nf_tables. 59 tristate "Netfilter IPv6 packet duplication to alternate destination" 63 packet to be rerouted to another destination. 66 tristate "IPv6 packet rejection" 70 tristate "IPv6 packet logging" 83 ip6tables is a general, extensible packet identification framework. 84 Currently only the packet filtering and packet mangling subsystem 116 header of the packet. 125 and destination options headers of a packet. [all …]
|
/net/ipv4/netfilter/ |
D | Kconfig | 37 tristate "IPv4 nf_tables packet duplication support" 41 This module enables IPv4 packet duplication support for nf_tables. 70 tristate "Netfilter IPv4 packet duplication to alternate destination" 74 packet to be rerouted to another destination. 77 tristate "ARP packet logging" 85 tristate "IPv4 packet logging" 93 tristate "IPv4 packet rejection" 132 iptables is a general, extensible packet identification framework. 133 The packet filtering and full NAT (masquerading, port forwarding, 166 go out via the interface the packet came in. [all …]
|
/net/sched/ |
D | Kconfig | 16 If you say N here, you will get the standard packet scheduler, which 38 to read status information about packet schedulers from the file 52 packet scheduling algorithm. See 66 (HFSC) packet scheduling algorithm. 74 Say Y here if you want to use an n-band priority queue packet 83 Say Y here if you want to use an n-band queue packet scheduler 93 packet scheduling algorithm. 104 packet scheduling algorithm. 115 packet scheduling algorithm. 125 Say Y here if you want to use the True Link Equalizer (TLE) packet [all …]
|
/net/batman-adv/ |
D | fragmentation.c | 250 struct batadv_frag_packet *packet; in batadv_frag_merge_packets() local 264 packet = (struct batadv_frag_packet *)skb_out->data; in batadv_frag_merge_packets() 265 size = ntohs(packet->total_size) + hdr_size; in batadv_frag_merge_packets() 356 struct batadv_frag_packet *packet; in batadv_frag_skb_fwd() local 360 packet = (struct batadv_frag_packet *)skb->data; in batadv_frag_skb_fwd() 361 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest); in batadv_frag_skb_fwd() 372 total_size = ntohs(packet->total_size); in batadv_frag_skb_fwd() 378 packet->ttl--; in batadv_frag_skb_fwd()
|
D | network-coding.c | 1504 struct batadv_unicast_packet *packet; in batadv_nc_skb_forward() local 1516 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_forward() 1517 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_forward() 1534 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_forward() 1557 struct batadv_unicast_packet *packet; in batadv_nc_skb_store_for_decoding() local 1569 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_store_for_decoding() 1570 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_store_for_decoding() 1594 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_store_for_decoding()
|
/net/core/ |
D | selftests.c | 33 struct net_packet_attrs *packet; member 176 unsigned char *src = tpriv->packet->src; in net_test_loopback_validate() 177 unsigned char *dst = tpriv->packet->dst; in net_test_loopback_validate() 208 if (tpriv->packet->tcp) { in net_test_loopback_validate() 213 if (thdr->dest != htons(tpriv->packet->dport)) in net_test_loopback_validate() 222 if (uhdr->dest != htons(tpriv->packet->dport)) in net_test_loopback_validate() 230 if (tpriv->packet->id != shdr->id) in net_test_loopback_validate() 258 tpriv->packet = attr; in __net_test_loopback()
|
/net/netfilter/ |
D | Kconfig | 79 Address Translation. It can also be used to enhance packet 85 tristate "Syslog packet logging" 88 This option enable support for packet logging via syslog. 408 Connection Tracking information together with the packet is 461 nftables is the new packet classification framework that intends to 510 include packet and byte counters in a rule. 558 typical Network Address Translation (NAT) packet transformations. 624 on the protocol of the packet. 673 tristate "Netfilter packet duplication support" 675 This option enables the generic packet duplication infrastructure [all …]
|
/net/rxrpc/ |
D | Kconfig | 34 bool "Inject packet loss into RxRPC packet stream" 36 Say Y here to inject packet loss by discarding some received and some
|
/net/psample/ |
D | Kconfig | 3 # psample packet sampling configuration 10 Say Y here to add support for packet-sampling netlink channel
|
/net/nfc/nci/ |
D | hci.c | 429 struct nci_hcp_packet *packet; in nci_hci_data_received_cb() local 442 packet = (struct nci_hcp_packet *)skb->data; in nci_hci_data_received_cb() 443 if ((packet->header & ~NCI_HCI_FRAGMENT) == 0) { in nci_hci_data_received_cb() 450 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb() 477 packet->header &= NCI_HCI_FRAGMENT; in nci_hci_data_received_cb() 485 packet = (struct nci_hcp_packet *)hcp_skb->data; in nci_hci_data_received_cb() 486 type = NCI_HCP_MSG_GET_TYPE(packet->message.header); in nci_hci_data_received_cb() 488 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb()
|
/net/ |
D | Kconfig | 63 source "net/packet/Kconfig" 123 bool "Network packet filtering framework (Netfilter)" 128 The most common use of packet filtering is to run your Linux box as 130 firewall provided by this kernel support is called a "packet 136 protocols, which a packet filter lacks. Moreover, proxy-based 139 they are often combined with a packet filter, which only works if 164 a bridge with Network packet filtering enabled makes iptables "see" 170 masquerading (ipmasqadm), packet filtering (ipchains), transparent 337 Documentation on how to use the packet generator can be found 344 tristate "Network packet drop alerting service"
|
/net/packet/ |
D | diag.c | 200 mutex_lock(&net->packet.sklist_lock); in packet_diag_dump() 201 sk_for_each(sk, &net->packet.sklist) { in packet_diag_dump() 218 mutex_unlock(&net->packet.sklist_lock); in packet_diag_dump()
|
/net/bridge/netfilter/ |
D | Kconfig | 35 into connections. This is used to enhance packet filtering via 47 ebtables is a general, extensible frame/packet identification 148 tristate "ebt: packet type filter support" 150 This option adds the packet type match, which allows matching on the 151 type of packet based on its Ethernet "class" (as determined by
|
/net/ipv4/ |
D | Kconfig | 68 Normally, a router decides what to do with a received packet based 69 solely on the packet's final destination address. If you say Y here, 70 the Linux router will also be able to take the packet's source 72 of the packet can be used for routing decisions as well. 85 a deterministic manner for a given packet. If you say Y here 86 however, it becomes possible to attach several actions to a packet 90 if a matching packet arrives. 238 what to do with a multicast packet based on the source and 240 will also be able to take interfaces and packet marks into 556 window. TCP Vegas should provide less packet loss, but it is [all …]
|
/net/openvswitch/ |
D | datapath.c | 572 struct sk_buff *packet; in ovs_packet_cmd_execute() local 589 packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL); in ovs_packet_cmd_execute() 591 if (!packet) in ovs_packet_cmd_execute() 593 skb_reserve(packet, NET_IP_ALIGN); in ovs_packet_cmd_execute() 595 nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len); in ovs_packet_cmd_execute() 600 packet->ignore_df = 1; in ovs_packet_cmd_execute() 602 OVS_CB(packet)->mru = mru; in ovs_packet_cmd_execute() 607 __skb_set_hash(packet, hash & 0xFFFFFFFFULL, in ovs_packet_cmd_execute() 619 packet, &flow->key, log); in ovs_packet_cmd_execute() 629 packet->priority = flow->key.phy.priority; in ovs_packet_cmd_execute() [all …]
|
D | Kconfig | 28 The Open vSwitch datapath provides an in-kernel fast path for packet 31 translate it into packet processing rules.
|
/net/xfrm/ |
D | Kconfig | 55 one, two policies can be applied to the same packet at once. 77 at packet processing for developer.
|
/net/netlabel/ |
D | Kconfig | 12 NetLabel provides support for explicit network packet labeling
|
/net/phonet/ |
D | Kconfig | 9 The Phone Network protocol (PhoNet) is a packet-oriented
|