/net/sctp/ |
H A D | ssnmap.c | 47 /* Storage size needed for map includes 2 headers and then the 63 int size; local 65 size = sctp_ssnmap_size(in, out); 66 if (size <= KMALLOC_MAX_SIZE) 67 retval = kmalloc(size, gfp); 70 __get_free_pages(gfp, get_order(size)); 82 if (size <= KMALLOC_MAX_SIZE) 85 free_pages((unsigned long)retval, get_order(size)); 111 size_t size; local 113 size 120 int size; local [all...] |
/net/wireless/ |
H A D | radiotap.c | 26 [IEEE80211_RADIOTAP_TSFT] = { .align = 8, .size = 8, }, 27 [IEEE80211_RADIOTAP_FLAGS] = { .align = 1, .size = 1, }, 28 [IEEE80211_RADIOTAP_RATE] = { .align = 1, .size = 1, }, 29 [IEEE80211_RADIOTAP_CHANNEL] = { .align = 2, .size = 4, }, 30 [IEEE80211_RADIOTAP_FHSS] = { .align = 2, .size = 2, }, 31 [IEEE80211_RADIOTAP_DBM_ANTSIGNAL] = { .align = 1, .size = 1, }, 32 [IEEE80211_RADIOTAP_DBM_ANTNOISE] = { .align = 1, .size = 1, }, 33 [IEEE80211_RADIOTAP_LOCK_QUALITY] = { .align = 2, .size = 2, }, 34 [IEEE80211_RADIOTAP_TX_ATTENUATION] = { .align = 2, .size = 2, }, 35 [IEEE80211_RADIOTAP_DB_TX_ATTENUATION] = { .align = 2, .size 207 int pad, align, size, subns; local [all...] |
/net/batman-adv/ |
H A D | hash.c | 28 for (i = 0; i < hash->size; i++) { 43 struct batadv_hashtable *batadv_hash_new(uint32_t size) argument 51 hash->table = kmalloc(sizeof(*hash->table) * size, GFP_ATOMIC); 55 hash->list_locks = kmalloc(sizeof(*hash->list_locks) * size, 60 hash->size = size; 76 for (i = 0; i < hash->size; i++)
|
H A D | hash.h | 33 * argument and the size the second 41 uint32_t size; /* size of hashtable */ member in struct:batadv_hashtable 45 struct batadv_hashtable *batadv_hash_new(uint32_t size); 67 for (i = 0; i < hash->size; i++) { 88 * @size: number of bytes to be hashed 93 uint32_t size) 98 for (i = 0; i < size; i++) { 132 index = choose(data, hash->size); 172 index = choose(data, hash->size); 92 batadv_hash_bytes(uint32_t hash, const void *data, uint32_t size) argument [all...] |
H A D | originator.h | 45 /* hashfunction to choose an entry in a hash table of given size 48 static inline uint32_t batadv_choose_orig(const void *data, uint32_t size) argument 64 return hash % size; 78 index = batadv_choose_orig(data, hash->size);
|
/net/ceph/ |
H A D | snapshot.c | 46 size_t size; local 48 size = sizeof (struct ceph_snap_context); 49 size += snap_count * sizeof (snapc->snaps[0]); 50 snapc = kzalloc(size, gfp_flags);
|
/net/atm/ |
H A D | resources.c | 198 int error, len, number, size = 0; local 230 size += sizeof(int); 231 if (size > len) { 235 tmp_buf = kmalloc(size, GFP_ATOMIC); 246 error = ((copy_to_user(buf, tmp_buf, size)) || 247 put_user(size, iobuf_len)) 289 size = strlen(dev->type) + 1; 290 if (copy_to_user(buf, dev->type, size)) { 296 size = ESI_LEN; 297 if (copy_to_user(buf, dev->esi, size)) { [all...] |
H A D | addr.h | 18 size_t size, enum atm_addr_type_t type);
|
/net/netfilter/ |
H A D | nf_conntrack_labels.c | 71 unsigned int size, i; local 78 size = labels->words * sizeof(long); 79 if (size < (words32 * sizeof(u32))) 80 words32 = size / sizeof(u32); 88 size /= sizeof(u32); 89 for (i = words32; i < size; i++) /* pad */
|
H A D | xt_quota2.c | 71 size_t size; local 77 size = NLMSG_SPACE(sizeof(*pm)); 78 size = max(size, (size_t)NLMSG_GOODSIZE); 79 log_skb = alloc_skb(size, GFP_ATOMIC); 126 size_t size, loff_t *ppos) 135 return simple_read_from_buffer(buf, size, ppos, tmp, tmp_size); 139 size_t size, loff_t *ppos) 144 if (size > sizeof(buf)) 145 size 125 quota_proc_read(struct file *file, char __user *buf, size_t size, loff_t *ppos) argument 138 quota_proc_write(struct file *file, const char __user *input, size_t size, loff_t *ppos) argument 166 unsigned int size; local [all...] |
/net/9p/ |
H A D | protocol.h | 34 size_t pdu_read(struct p9_fcall *pdu, void *data, size_t size);
|
H A D | protocol.c | 55 size_t pdu_read(struct p9_fcall *pdu, void *data, size_t size) argument 57 size_t len = min(pdu->size - pdu->offset, size); 60 return size - len; 63 static size_t pdu_write(struct p9_fcall *pdu, const void *data, size_t size) argument 65 size_t len = min(pdu->capacity - pdu->size, size); 66 memcpy(&pdu->sdata[pdu->size], data, len); 67 pdu->size += len; 68 return size 72 pdu_write_u(struct p9_fcall *pdu, const char __user *udata, size_t size) argument 590 int size = pdu->size; local [all...] |
/net/sunrpc/ |
H A D | auth_null.c | 86 u32 size; local 94 size = ntohl(*p++); 95 if (size != 0) { 96 printk("RPC: bad verf size: %u\n", size);
|
/net/ipv4/netfilter/ |
H A D | arp_tables.c | 401 unsigned int oldpos, size; local 430 size = e->next_offset; 432 (entry0 + pos + size); 434 pos += size; 441 if (newpos > newinfo->size - 510 find_check_entry(struct arpt_entry *e, const char *name, unsigned int size) argument 573 duprintf("checking: element %p size %u\n", 625 newinfo->size = repl->size; 634 duprintf("translate_table: size 1114 int size; local 1204 check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1277 compat_copy_entry_from_user(struct compat_arpt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1325 unsigned int size; local 1471 u32 size; member in struct:compat_arpt_replace 1557 compat_copy_entry_to_user(struct arpt_entry *e, void __user **dstptr, compat_uint_t *size, struct xt_counters *counters, unsigned int i) argument 1598 unsigned int size; local 1624 compat_uint_t size; member in struct:compat_arpt_get_entries [all...] |
H A D | ip_tables.c | 270 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 475 unsigned int oldpos, size; local 512 size = e->next_offset; 514 (entry0 + pos + size); 516 pos += size; 523 if (newpos > newinfo->size - 651 unsigned int size) 736 duprintf("checking: element %p size %u\n", 795 newinfo->size = repl->size; 650 find_check_entry(struct ipt_entry *e, struct net *net, const char *name, unsigned int size) argument 1302 int size; local 1387 u32 size; member in struct:compat_ipt_replace 1396 compat_copy_entry_to_user(struct ipt_entry *e, void __user **dstptr, unsigned int *size, struct xt_counters *counters, unsigned int i) argument 1435 compat_find_calc_match(struct xt_entry_match *m, const char *name, const struct ipt_ip *ip, unsigned int hookmask, int *size) argument 1468 check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1556 compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1647 unsigned int size; local 1871 compat_uint_t size; member in struct:compat_ipt_get_entries 1882 unsigned int size; local [all...] |
/net/core/ |
H A D | sysctl_net_core.c | 29 unsigned int orig_size, size; local 32 .data = &size, 33 .maxlen = sizeof(size), 43 size = orig_size = orig_sock_table ? orig_sock_table->mask + 1 : 0; 48 if (size) { 49 if (size > 1<<30) { 54 size = roundup_pow_of_two(size); 55 if (size != orig_size) { 57 vmalloc(RPS_SOCK_FLOW_TABLE_SIZE(size)); [all...] |
/net/tipc/ |
H A D | core.c | 57 * @size: message size (including TIPC header) 59 * Returns a new buffer with data pointers set to the specified size. 64 struct sk_buff *tipc_buf_acquire(u32 size) argument 67 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u; 72 skb_put(skb, size);
|
H A D | name_distr.c | 76 u32 size; member in struct:publ_list 81 .size = 0, 86 .size = 0, 91 .size = 0, 117 static struct sk_buff *named_prepare_buf(u32 type, u32 size, u32 dest) argument 119 struct sk_buff *buf = tipc_buf_acquire(INT_H_SIZE + size); 125 msg_set_size(msg, INT_H_SIZE + size); 157 publ_lists[publ->scope]->size++; 182 publ_lists[publ->scope]->size--; 208 u32 rest = pls->size * ITEM_SIZ [all...] |
/net/wimax/ |
H A D | op-msg.c | 94 * @size: size of the message to send (in bytes), including the header. 122 const void *msg, size_t size, 131 msg_size = nla_total_size(size) 158 result = nla_put(skb, WIMAX_GNL_MSG_DATA, size, msg); 160 dev_err(dev, "no memory to add payload (msg %p size %zu) in " 161 "attribute: %d\n", msg, size, result); 177 * wimax_msg_data_len - Return a pointer and size of a message's payload 180 * @size: Pointer to where to store the message's size 120 wimax_msg_alloc(struct wimax_dev *wimax_dev, const char *pipe_name, const void *msg, size_t size, gfp_t gfp_flags) argument 184 wimax_msg_data_len(struct sk_buff *msg, size_t *size) argument 277 size_t size = skb->len; local 309 wimax_msg(struct wimax_dev *wimax_dev, const char *pipe_name, const void *buf, size_t size, gfp_t gfp_flags) argument [all...] |
/net/bridge/netfilter/ |
H A D | ebt_ulog.c | 21 * reliable. Please also keep in mind that this buffer size is allocated for 50 MODULE_PARM_DESC(nlbufsiz, "netlink buffer size (number of bytes) " 113 static struct sk_buff *ulog_alloc_skb(unsigned int size) argument 118 n = max(size, nlbufsiz); 121 if (n > size) { 124 skb = alloc_skb(size, GFP_ATOMIC); 126 pr_debug("cannot even allocate buffer of size %ub\n", 127 size); 142 size_t size, copy_len; local 156 size [all...] |
/net/ceph/crush/ |
H A D | mapper.c | 30 * crush_find_rule - find a crush_rule id for a given ruleset, type, and size. 34 * @size: output set size 36 int crush_find_rule(const struct crush_map *map, int ruleset, int type, int size) argument 44 map->rules[i]->mask.min_size <= size && 45 map->rules[i]->mask.max_size >= size) 72 unsigned int pr = r % bucket->size; 83 bucket->size; 89 for (i = 0; i < bucket->size; i++) 94 for (i = 1; i < bucket->size; [all...] |
/net/nfc/ |
H A D | llcp_commands.c | 322 u8 cmd, u16 size) 331 size + LLCP_HEADER_SIZE, &err); 371 u16 size = 0; local 379 size += LLCP_HEADER_SIZE; 380 size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE; 382 skb = alloc_skb(size, GFP_KERNEL); 406 u16 size = 0, miux; local 419 size += service_name_tlv_length; 429 size += miux_tlv_length; 432 size 321 llcp_allocate_pdu(struct nfc_llcp_sock *sock, u8 cmd, u16 size) argument 470 u16 size = 0, miux; local 517 u16 size = 0; local 604 u16 size = 1; /* Reason code */ local [all...] |
/net/netfilter/ipset/ |
H A D | ip_set_list_set.c | 61 size_t dsize; /* element size */ 63 u32 size; /* size of set list array */ member in struct:list_set 94 for (i = 0; i < map->size; i++) { 123 for (i = 0; i < map->size; i++) { 147 for (i = 0; i < map->size; i++) { 188 if (i >= map->size) 205 if (i == map->size - 1) 209 struct set_elem *x = list_set_elem(map, map->size - 1); 215 map->dsize * (map->size 616 init_list_set(struct ip_set *set, u32 size, size_t dsize, unsigned long timeout) argument 644 u32 size = IP_SET_LIST_DEFAULT_SIZE, cadt_flags = 0; local [all...] |
/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 296 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 485 unsigned int oldpos, size; local 522 size = e->next_offset; 524 (entry0 + pos + size); 526 pos += size; 533 if (newpos > newinfo->size - 662 unsigned int size) 747 duprintf("checking: element %p size %u\n", 805 newinfo->size = repl->size; 661 find_check_entry(struct ip6t_entry *e, struct net *net, const char *name, unsigned int size) argument 1312 int size; local 1399 u32 size; member in struct:compat_ip6t_replace 1408 compat_copy_entry_to_user(struct ip6t_entry *e, void __user **dstptr, unsigned int *size, struct xt_counters *counters, unsigned int i) argument 1447 compat_find_calc_match(struct xt_entry_match *m, const char *name, const struct ip6t_ip6 *ipv6, unsigned int hookmask, int *size) argument 1480 check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1568 compat_copy_entry_from_user(struct compat_ip6t_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1657 unsigned int size; local 1881 compat_uint_t size; member in struct:compat_ip6t_get_entries 1892 unsigned int size; local [all...] |
/net/bluetooth/cmtp/ |
H A D | core.c | 109 int size; local 113 size = (skb) ? skb->len + count : count; 115 nskb = alloc_skb(size, GFP_ATOMIC); 161 BT_ERR("Wrong size or header information in CMTP frame"); 213 unsigned int size, tail; local 233 size = min_t(uint, ((tail < 258) ? (tail - 2) : (tail - 3)), skb->len); 243 if (size < 256) { 247 | ((skb->len == size) ? 0x00 : 0x01); 248 hdr[1] = size; 253 | ((skb->len == size) [all...] |