/net/ipv4/ |
H A D | tcp_lp.c | 50 * We create this set of state flag mainly for debugging. 61 * @flag: TCP-LP state flag 77 u32 flag; member in struct:lp 99 lp->flag = 0; 122 if (!(lp->flag & LP_WITHIN_INF)) 165 lp->flag |= LP_VALID_RHZ; 167 lp->flag &= ~LP_VALID_RHZ; 194 if (lp->flag & LP_VALID_RHZ) { 203 lp->flag | [all...] |
H A D | tcp_input.c | 1062 int flag; member in struct:tcp_sacktag_state 1162 state->flag |= FLAG_ORIG_SACK_ACKED; 1172 state->flag |= FLAG_DATA_SACKED; 1569 state.flag = 0; 1581 state.flag |= FLAG_DSACKING_ACK; 1754 return state.flag; 1907 static bool tcp_check_sack_reneging(struct sock *sk, int flag) argument 1909 if (flag & FLAG_SACK_RENEGING) { 1948 static bool tcp_pause_early_retransmit(struct sock *sk, int flag) argument 1958 (flag 2077 tcp_time_to_recover(struct sock *sk, int flag) argument 2560 tcp_try_to_open(struct sock *sk, int flag, int newly_acked_sacked) argument 2686 tcp_process_loss(struct sock *sk, int flag, bool is_dupack) argument 2746 tcp_fastretrans_alert(struct sock *sk, int pkts_acked, int prior_sacked, int prior_packets, bool is_dupack, int flag) argument 2867 tcp_ack_saw_tstamp(struct sock *sk, int flag) argument 2889 tcp_ack_no_tstamp(struct sock *sk, u32 seq_rtt, int flag) argument 2906 tcp_ack_update_rtt(struct sock *sk, const int flag, const s32 seq_rtt) argument 3010 int flag = 0; local 3189 tcp_ack_is_dubious(const struct sock *sk, const int flag) argument 3195 tcp_may_raise_cwnd(const struct sock *sk, const int flag) argument 3223 int flag = 0; local 3296 tcp_process_tlp_ack(struct sock *sk, u32 ack, int flag) argument 3326 tcp_ack(struct sock *sk, const struct sk_buff *skb, int flag) argument [all...] |
H A D | arp.c | 419 int flag = 0; local 428 flag = 1; 431 return flag;
|
/net/mac80211/ |
H A D | sta_info.h | 37 * IEEE80211_TX_CTL_CLEAR_PS_FILT control flag) when the next 127 * only if, the state has the flag %HT_AGG_STATE_OPERATIONAL 240 * @last_rx_rate_flag: rx status flag of the last data packet 418 enum ieee80211_sta_info_flags flag) 420 WARN_ON(flag == WLAN_STA_AUTH || 421 flag == WLAN_STA_ASSOC || 422 flag == WLAN_STA_AUTHORIZED); 423 set_bit(flag, &sta->_flags); 427 enum ieee80211_sta_info_flags flag) 429 WARN_ON(flag 417 set_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 426 clear_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 435 test_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 441 test_and_clear_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 450 test_and_set_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument [all...] |
H A D | wpa.c | 105 if (status->flag & (RX_FLAG_MMIC_STRIPPED | RX_FLAG_IV_STRIPPED)) { 106 if (status->flag & RX_FLAG_MMIC_ERROR) 109 if (!(status->flag & RX_FLAG_IV_STRIPPED) && rx->key && 119 * MIC. Ignore the flag them to avoid triggering countermeasures. 122 !(status->flag & RX_FLAG_DECRYPTED)) 135 if (status->flag & RX_FLAG_MMIC_ERROR) 280 if (status->flag & RX_FLAG_DECRYPTED) 507 if (status->flag & RX_FLAG_DECRYPTED) { 524 if (!(status->flag & RX_FLAG_DECRYPTED)) { 664 if (!(status->flag [all...] |
H A D | rx.c | 69 if (status->flag & (RX_FLAG_FAILED_FCS_CRC | 106 if (status->flag & RX_FLAG_HT) /* HT info */ 109 if (status->flag & RX_FLAG_AMPDU_DETAILS) { 114 if (status->flag & RX_FLAG_VHT) { 194 if (status->flag & (RX_FLAG_FAILED_FCS_CRC | RX_FLAG_FAILED_PLCP_CRC)) 196 if (status->flag & RX_FLAG_SHORTPRE) 201 if (!rate || status->flag & (RX_FLAG_HT | RX_FLAG_VHT)) { 221 else if (status->flag & (RX_FLAG_HT | RX_FLAG_VHT)) 236 !(status->flag & RX_FLAG_NO_SIGNAL_VAL)) { 255 if (status->flag [all...] |
H A D | ht.c | 24 u16 flag) 26 __le16 le_flag = cpu_to_le16(flag); 29 ht_cap->cap &= ~flag; 263 * When this flag is set, new sessions should be 265 * down by the code that set the flag, so this 22 __check_htcap_disable(struct ieee80211_sub_if_data *sdata, struct ieee80211_sta_ht_cap *ht_cap, u16 flag) argument
|
H A D | vht.c | 18 u32 flag) 20 __le32 le_flag = cpu_to_le32(flag); 24 vht_cap->cap &= ~flag; 16 __check_vhtcap_disable(struct ieee80211_sub_if_data *sdata, struct ieee80211_sta_vht_cap *vht_cap, u32 flag) argument
|
H A D | wep.c | 300 if (!(status->flag & RX_FLAG_DECRYPTED)) { 307 } else if (!(status->flag & RX_FLAG_IV_STRIPPED)) {
|
H A D | util.c | 1703 * Clear the WLAN_STA_BLOCK_BA flag so new aggregation 2148 if (status->flag & RX_FLAG_HT) { 2151 if (status->flag & RX_FLAG_40MHZ) 2153 if (status->flag & RX_FLAG_SHORT_GI) 2155 } else if (status->flag & RX_FLAG_VHT) { 2159 if (status->flag & RX_FLAG_40MHZ) 2161 if (status->flag & RX_FLAG_80MHZ) 2163 if (status->flag & RX_FLAG_80P80MHZ) 2165 if (status->flag & RX_FLAG_160MHZ) 2167 if (status->flag [all...] |
H A D | ieee80211_i.h | 131 * @IEEE80211_BSS_VALID_ERP: ERP flag was gathered from non-corrupt IE 1229 WARN_ON_ONCE(status->flag & RX_FLAG_MACTIME_START && 1230 status->flag & RX_FLAG_MACTIME_END); 1231 return status->flag & (RX_FLAG_MACTIME_START | RX_FLAG_MACTIME_END);
|
/net/netfilter/ |
H A D | xt_HMARK.c | 170 int flag = IP6_FH_F_AUTH; local 176 nexthdr = ipv6_find_hdr(skb, &nhoff, -1, &fragoff, &flag); 180 if ((flag & IP6_FH_F_FRAG) || (nexthdr != IPPROTO_ICMPV6)) 188 flag = IP6_FH_F_AUTH; 189 nexthdr = ipv6_find_hdr(skb, &nhoff, -1, &fragoff, &flag); 204 if (flag & IP6_FH_F_FRAG)
|
H A D | xt_dccp.c | 30 #define DCCHECK(cond, option, flag, invflag) (!((flag) & (option)) \
|
H A D | xt_sctp.c | 20 #define SCCHECK(cond, option, flag, invflag) (!((flag) & (option)) \ 33 return (chunkflags & flag_info[i].flag_mask) == flag_info[i].flag;
|
H A D | nf_conntrack_proto_sctp.c | 203 int flag; local 205 flag = 0; 213 flag = 1; 222 flag) &&
|
/net/ax25/ |
H A D | ax25_addr.c | 219 const ax25_address *dest, const ax25_digi *d, int flag, int modulus) 228 if (flag == AX25_COMMAND) buf[6] |= AX25_CBIT; 242 if (flag == AX25_RESPONSE) buf[6] |= AX25_CBIT; 218 ax25_addr_build(unsigned char *buf, const ax25_address *src, const ax25_address *dest, const ax25_digi *d, int flag, int modulus) argument
|
/net/rds/ |
H A D | ib_rdma.c | 267 unsigned long *flag; local 270 flag = &__get_cpu_var(clean_list_grace); 271 set_bit(CLEAN_LIST_BUSY_BIT, flag); 276 clear_bit(CLEAN_LIST_BUSY_BIT, flag); 284 unsigned long *flag; local 287 flag = &per_cpu(clean_list_grace, cpu); 288 while (test_bit(CLEAN_LIST_BUSY_BIT, flag))
|
/net/netfilter/ipvs/ |
H A D | ip_vs_app.c | 352 unsigned int flag, __u32 seq, int diff) 356 if (!(cp->flags & flag) || after(seq, vseq->init_seq)) { 360 cp->flags |= flag; 351 vs_seq_update(struct ip_vs_conn *cp, struct ip_vs_seq *vseq, unsigned int flag, __u32 seq, int diff) argument
|
H A D | ip_vs_sync.c | 1012 __u32 *opt_flags, __u32 flag) 1018 if (*opt_flags & flag) { 1019 IP_VS_DBG(2, "BACKUP, Par.data found twice 0x%x\n", flag); 1024 *opt_flags |= flag; 1010 ip_vs_proc_str(__u8 *p, unsigned int plen, unsigned int *data_len, __u8 **data, unsigned int maxlen, __u32 *opt_flags, __u32 flag) argument
|
/net/8021q/ |
H A D | vlan.h | 181 int vlan_dev_change_flags(const struct net_device *dev, u32 flag, u32 mask);
|
H A D | vlan.c | 539 args.vlan_qos ? args.u.flag : 0, 540 args.u.flag);
|
/net/bridge/ |
H A D | br_netlink.c | 314 u8 flag = nla_get_u8(tb[attrtype]); local 315 if (flag)
|
/net/wireless/ |
H A D | ibss.c | 105 u32 flag = params->chandef.chan->band == IEEE80211_BAND_5GHZ ? local 110 if (sband->bitrates[j].flags & flag)
|
/net/atm/ |
H A D | lec.c | 148 mesg->content.normal.flag = *buff & 0x01; 364 mesg->content.normal.flag); 367 priv->topology_change = mesg->content.normal.flag; 370 lec_flush_complete(priv, mesg->content.normal.flag); 384 mesg->content.normal.flag, 420 mesg->content.normal.flag); 424 (unsigned short)(0xffff & mesg->content.normal.flag);
|
/net/ceph/ |
H A D | osd_client.c | 576 u64 cookie, u64 version, int flag) 584 if (opcode == CEPH_OSD_OP_WATCH && flag) 585 op->watch.flag = (u8)1; 674 dst->watch.flag = src->watch.flag; 574 osd_req_op_watch_init(struct ceph_osd_request *osd_req, unsigned int which, u16 opcode, u64 cookie, u64 version, int flag) argument
|