Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 25 of 44) sorted by relevance

12

/net/sctp/
Doutput.c45 static enum sctp_xmit __sctp_packet_append_chunk(struct sctp_packet *packet,
47 static enum sctp_xmit sctp_packet_can_append_data(struct sctp_packet *packet,
49 static void sctp_packet_append_data(struct sctp_packet *packet,
51 static enum sctp_xmit sctp_packet_will_fit(struct sctp_packet *packet,
55 static void sctp_packet_reset(struct sctp_packet *packet) in sctp_packet_reset() argument
60 packet->size = packet->overhead; in sctp_packet_reset()
62 packet->has_cookie_echo = 0; in sctp_packet_reset()
63 packet->has_sack = 0; in sctp_packet_reset()
64 packet->has_data = 0; in sctp_packet_reset()
65 packet->has_auth = 0; in sctp_packet_reset()
[all …]
Doutqueue.c795 struct sctp_packet *packet; member
863 ctx->packet = &ctx->transport->packet; in sctp_outq_select_transport()
869 sctp_packet_config(ctx->packet, in sctp_outq_select_transport()
925 ctx->packet->vtag = ctx->asoc->c.my_vtag; in sctp_outq_flush_ctrl()
959 status = sctp_packet_transmit_chunk(ctx->packet, chunk, in sctp_outq_flush_ctrl()
1002 ctx->packet = &ctx->transport->packet; in sctp_outq_flush_rtx()
1008 sctp_packet_config(ctx->packet, ctx->asoc->peer.i.init_tag, in sctp_outq_flush_rtx()
1012 error = __sctp_outq_flush_rtx(ctx->q, ctx->packet, rtx_timeout, in sctp_outq_flush_rtx()
1025 if (ctx->packet->has_cookie_echo) in sctp_outq_flush_rtx()
1049 if (!ctx->packet || !ctx->packet->has_cookie_echo) in sctp_outq_flush_data()
[all …]
Dsm_statefuns.c326 struct sctp_packet *packet; in sctp_sf_do_5_1B_init() local
381 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1B_init()
389 if (packet) { in sctp_sf_do_5_1B_init()
391 SCTP_PACKET(packet)); in sctp_sf_do_5_1B_init()
526 struct sctp_packet *packet; in sctp_sf_do_5_1C_ack() local
559 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_5_1C_ack()
567 if (packet) { in sctp_sf_do_5_1C_ack()
569 SCTP_PACKET(packet)); in sctp_sf_do_5_1C_ack()
1522 struct sctp_packet *packet; in sctp_sf_do_unexpected_init() local
1565 packet = sctp_abort_pkt_new(net, ep, asoc, arg, in sctp_sf_do_unexpected_init()
[all …]
DKconfig21 connectionless packet network such as IP. It offers the following
30 packet, and
/net/nfc/hci/
Dhcp.c48 struct hcp_packet *packet; in nfc_hci_hcp_message_tx() local
71 packet = (struct hcp_packet *)skb->data; in nfc_hci_hcp_message_tx()
72 packet->header = pipe; in nfc_hci_hcp_message_tx()
75 packet->message.header = HCP_HEADER(type, instruction); in nfc_hci_hcp_message_tx()
77 packet->message.header = *ptr++; in nfc_hci_hcp_message_tx()
80 memcpy(packet->message.data, ptr, data_link_len - 1); in nfc_hci_hcp_message_tx()
86 packet->header |= ~NFC_HCI_FRAGMENT; in nfc_hci_hcp_message_tx()
Dcore.c856 struct hcp_packet *packet; in nfc_hci_recv_from_llc() local
864 packet = (struct hcp_packet *)skb->data; in nfc_hci_recv_from_llc()
865 if ((packet->header & ~NFC_HCI_FRAGMENT) == 0) { in nfc_hci_recv_from_llc()
872 pipe = packet->header & NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc()
899 packet->header &= NFC_HCI_FRAGMENT; in nfc_hci_recv_from_llc()
907 packet = (struct hcp_packet *)hcp_skb->data; in nfc_hci_recv_from_llc()
908 type = HCP_MSG_GET_TYPE(packet->message.header); in nfc_hci_recv_from_llc()
910 pipe = packet->header; in nfc_hci_recv_from_llc()
911 instruction = HCP_MSG_GET_CMD(packet->message.header); in nfc_hci_recv_from_llc()
/net/ipv4/netfilter/
DKconfig37 tristate "IPv4 nf_tables packet duplication support"
41 This module enables IPv4 packet duplication support for nf_tables.
62 tristate "Netfilter IPv4 packet duplication to alternate destination"
66 packet to be rerouted to another destination.
69 tristate "ARP packet logging"
77 tristate "IPv4 packet logging"
85 tristate "IPv4 packet rejection"
124 iptables is a general, extensible packet identification framework.
125 The packet filtering and full NAT (masquerading, port forwarding,
158 go out via the interface the packet came in.
[all …]
/net/ipv6/netfilter/
DKconfig33 tristate "IPv6 nf_tables packet duplication support"
37 This module enables IPv6 packet duplication support for nf_tables.
51 tristate "Netfilter IPv6 packet duplication to alternate destination"
55 packet to be rerouted to another destination.
58 tristate "IPv6 packet rejection"
62 tristate "IPv6 packet logging"
75 ip6tables is a general, extensible packet identification framework.
76 Currently only the packet filtering and packet mangling subsystem
108 header of the packet.
117 and destination options headers of a packet.
[all …]
/net/sched/
DKconfig16 If you say N here, you will get the standard packet scheduler, which
38 to read status information about packet schedulers from the file
52 packet scheduling algorithm. See
66 (HFSC) packet scheduling algorithm.
74 Say Y here if you want to use an n-band priority queue packet
83 Say Y here if you want to use an n-band queue packet scheduler
93 packet scheduling algorithm.
104 packet scheduling algorithm.
115 packet scheduling algorithm.
125 Say Y here if you want to use the True Link Equalizer (TLE) packet
[all …]
/net/rxrpc/
DKconfig34 bool "Inject packet loss into RxRPC packet stream"
36 Say Y here to inject packet loss by discarding some received and some
40 bool "Inject delay into packet reception"
43 Say Y here to inject a delay into packet reception, allowing an
/net/core/
Dselftests.c33 struct net_packet_attrs *packet; member
176 const unsigned char *src = tpriv->packet->src; in net_test_loopback_validate()
177 const unsigned char *dst = tpriv->packet->dst; in net_test_loopback_validate()
208 if (tpriv->packet->tcp) { in net_test_loopback_validate()
213 if (thdr->dest != htons(tpriv->packet->dport)) in net_test_loopback_validate()
222 if (uhdr->dest != htons(tpriv->packet->dport)) in net_test_loopback_validate()
230 if (tpriv->packet->id != shdr->id) in net_test_loopback_validate()
258 tpriv->packet = attr; in __net_test_loopback()
/net/batman-adv/
Dfragmentation.c250 struct batadv_frag_packet *packet; in batadv_frag_merge_packets() local
264 packet = (struct batadv_frag_packet *)skb_out->data; in batadv_frag_merge_packets()
265 size = ntohs(packet->total_size) + hdr_size; in batadv_frag_merge_packets()
356 struct batadv_frag_packet *packet; in batadv_frag_skb_fwd() local
360 packet = (struct batadv_frag_packet *)skb->data; in batadv_frag_skb_fwd()
361 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest); in batadv_frag_skb_fwd()
372 total_size = ntohs(packet->total_size); in batadv_frag_skb_fwd()
378 packet->ttl--; in batadv_frag_skb_fwd()
Dnetwork-coding.c1500 struct batadv_unicast_packet *packet; in batadv_nc_skb_forward() local
1512 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_forward()
1513 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_forward()
1530 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_forward()
1553 struct batadv_unicast_packet *packet; in batadv_nc_skb_store_for_decoding() local
1565 packet = (struct batadv_unicast_packet *)payload; in batadv_nc_skb_store_for_decoding()
1566 if (packet->packet_type != BATADV_UNICAST) in batadv_nc_skb_store_for_decoding()
1590 packet_id = batadv_skb_crc32(skb, payload + sizeof(*packet)); in batadv_nc_skb_store_for_decoding()
/net/netfilter/
DKconfig93 Address Translation. It can also be used to enhance packet
99 tristate "Syslog packet logging"
102 This option enable support for packet logging via syslog.
425 Connection Tracking information together with the packet is
481 nftables is the new packet classification framework that intends to
572 typical Network Address Translation (NAT) packet transformations.
632 on the protocol of the packet.
681 tristate "Netfilter packet duplication support"
683 This option enables the generic packet duplication infrastructure
687 tristate "Netfilter nf_tables netdev packet duplication support"
[all …]
/net/psample/
DKconfig3 # psample packet sampling configuration
10 Say Y here to add support for packet-sampling netlink channel
/net/nfc/nci/
Dhci.c431 struct nci_hcp_packet *packet; in nci_hci_data_received_cb() local
442 packet = (struct nci_hcp_packet *)skb->data; in nci_hci_data_received_cb()
443 if ((packet->header & ~NCI_HCI_FRAGMENT) == 0) { in nci_hci_data_received_cb()
450 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb()
477 packet->header &= NCI_HCI_FRAGMENT; in nci_hci_data_received_cb()
485 packet = (struct nci_hcp_packet *)hcp_skb->data; in nci_hci_data_received_cb()
486 type = NCI_HCP_MSG_GET_TYPE(packet->message.header); in nci_hci_data_received_cb()
488 pipe = NCI_HCP_MSG_GET_PIPE(packet->header); in nci_hci_data_received_cb()
/net/
DKconfig68 source "net/packet/Kconfig"
148 bool "Network packet filtering framework (Netfilter)"
153 The most common use of packet filtering is to run your Linux box as
155 firewall provided by this kernel support is called a "packet
161 protocols, which a packet filter lacks. Moreover, proxy-based
164 they are often combined with a packet filter, which only works if
189 a bridge with Network packet filtering enabled makes iptables "see"
195 masquerading (ipmasqadm), packet filtering (ipchains), transparent
374 Documentation on how to use the packet generator can be found
381 tristate "Network packet drop alerting service"
/net/bridge/netfilter/
DKconfig35 into connections. This is used to enhance packet filtering via
47 ebtables is a general, extensible frame/packet identification
148 tristate "ebt: packet type filter support"
150 This option adds the packet type match, which allows matching on the
151 type of packet based on its Ethernet "class" (as determined by
/net/ipv4/
DKconfig68 Normally, a router decides what to do with a received packet based
69 solely on the packet's final destination address. If you say Y here,
70 the Linux router will also be able to take the packet's source
72 of the packet can be used for routing decisions as well.
85 a deterministic manner for a given packet. If you say Y here
86 however, it becomes possible to attach several actions to a packet
90 if a matching packet arrives.
238 what to do with a multicast packet based on the source and
240 will also be able to take interfaces and packet marks into
555 window. TCP Vegas should provide less packet loss, but it is
[all …]
/net/packet/
Ddiag.c200 mutex_lock(&net->packet.sklist_lock); in packet_diag_dump()
201 sk_for_each(sk, &net->packet.sklist) { in packet_diag_dump()
218 mutex_unlock(&net->packet.sklist_lock); in packet_diag_dump()
/net/openvswitch/
Ddatapath.c597 struct sk_buff *packet; in ovs_packet_cmd_execute() local
614 packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL); in ovs_packet_cmd_execute()
616 if (!packet) in ovs_packet_cmd_execute()
618 skb_reserve(packet, NET_IP_ALIGN); in ovs_packet_cmd_execute()
620 nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len); in ovs_packet_cmd_execute()
625 packet->ignore_df = 1; in ovs_packet_cmd_execute()
627 OVS_CB(packet)->mru = mru; in ovs_packet_cmd_execute()
632 __skb_set_hash(packet, hash & 0xFFFFFFFFULL, in ovs_packet_cmd_execute()
644 packet, &flow->key, log); in ovs_packet_cmd_execute()
654 packet->priority = flow->key.phy.priority; in ovs_packet_cmd_execute()
[all …]
DKconfig30 The Open vSwitch datapath provides an in-kernel fast path for packet
33 translate it into packet processing rules.
/net/xfrm/
DKconfig55 one, two policies can be applied to the same packet at once.
77 at packet processing for developer.
/net/netlabel/
DKconfig12 NetLabel provides support for explicit network packet labeling
/net/phonet/
DKconfig9 The Phone Network protocol (PhoNet) is a packet-oriented

12