/net/batman-adv/ |
H A D | unicast.h | 71 static inline int batadv_frag_can_reassemble(const struct sk_buff *skb, int mtu) argument 89 return merged_size <= mtu;
|
/net/ipv4/ |
H A D | xfrm4_output.c | 23 int mtu, ret = 0; local 33 mtu = dst_mtu(dst); 34 if (skb->len > mtu) { 37 inet_sk(skb->sk)->inet_dport, mtu); 40 ICMP_FRAG_NEEDED, htonl(mtu));
|
H A D | xfrm4_policy.c | 193 struct sk_buff *skb, u32 mtu) 198 path->ops->update_pmtu(path, sk, skb, mtu); 192 xfrm4_update_pmtu(struct dst_entry *dst, struct sock *sk, struct sk_buff *skb, u32 mtu) argument
|
H A D | esp4.c | 28 static u32 esp4_get_mtu(struct xfrm_state *x, int mtu); 460 static u32 esp4_get_mtu(struct xfrm_state *x, int mtu) argument 479 return ((mtu - x->props.header_len - crypto_aead_authsize(esp->aead) -
|
H A D | ip_vti.c | 414 dev->mtu = tdev->mtu; 417 return dev->mtu; 551 dev->mtu = new_mtu; 577 dev->mtu = ETH_DATA_LEN; 741 int mtu; local 750 mtu = vti_tunnel_bind_dev(dev); 752 dev->mtu = mtu; 772 int mtu; local [all...] |
/net/rxrpc/ |
H A D | ar-error.c | 74 u32 mtu = serr->ee.ee_info; local 76 _net("Rx Received ICMP Fragmentation Needed (%d)", mtu); 79 if (mtu > 0 && peer->if_mtu == 65535 && mtu < peer->if_mtu) { 80 peer->if_mtu = mtu; 81 _net("I/F MTU %u", mtu); 84 if (mtu == 0) { 86 if (mtu > 1500) { 87 mtu >>= 1; 88 if (mtu < 150 [all...] |
H A D | ar-ack.c | 555 unsigned int mtu; local 567 mtu = min(ntohl(ackinfo.rxMTU), ntohl(ackinfo.maxMTU)); 570 if (mtu < peer->maxdata) { 572 peer->maxdata = mtu; 573 peer->mtu = mtu + peer->hdrsize; 575 _net("Net MTU %u (maxdata %u)", peer->mtu, peer->maxdata); 841 int genbit, loop, nbit, ioc, ret, mtu; local 1167 mtu = call->conn->trans->peer->if_mtu; 1168 mtu [all...] |
/net/ipv6/ |
H A D | xfrm6_output.c | 46 static void xfrm6_local_rxpmtu(struct sk_buff *skb, u32 mtu) argument 54 ipv6_local_rxpmtu(sk, &fl6, mtu); 57 static void xfrm6_local_error(struct sk_buff *skb, u32 mtu) argument 65 ipv6_local_error(sk, EMSGSIZE, &fl6, mtu); 70 int mtu, ret = 0; local 73 mtu = dst_mtu(dst); 74 if (mtu < IPV6_MIN_MTU) 75 mtu = IPV6_MIN_MTU; 77 if (!skb->local_df && skb->len > mtu) { 81 xfrm6_local_rxpmtu(skb, mtu); 139 int mtu = ip6_skb_dst_mtu(skb); local [all...] |
H A D | datagram.c | 284 void ipv6_local_rxpmtu(struct sock *sk, struct flowi6 *fl6, u32 mtu) argument 305 mtu_info->ip6m_mtu = mtu;
|
H A D | inet6_connection_sock.c | 258 struct dst_entry *inet6_csk_update_pmtu(struct sock *sk, u32 mtu) argument 265 dst->ops->update_pmtu(dst, sk, NULL, mtu);
|
H A D | xfrm6_policy.c | 219 struct sk_buff *skb, u32 mtu) 224 path->ops->update_pmtu(path, sk, skb, mtu); 218 xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk, struct sk_buff *skb, u32 mtu) argument
|
H A D | esp6.c | 55 static u32 esp6_get_mtu(struct xfrm_state *x, int mtu); 415 static u32 esp6_get_mtu(struct xfrm_state *x, int mtu) argument 427 return ((mtu - x->props.header_len - crypto_aead_authsize(esp->aead) -
|
/net/openvswitch/ |
H A D | vport-netdev.c | 166 int mtu = netdev_vport->dev->mtu; local 169 if (unlikely(packet_length(skb) > mtu && !skb_is_gso(skb))) { 170 net_warn_ratelimited("%s: dropped over-mtu packet: %d > %d\n", 172 packet_length(skb), mtu);
|
/net/bridge/ |
H A D | br_if.c | 284 int mtu = 0; local 289 mtu = ETH_DATA_LEN; 292 if (!mtu || p->dev->mtu < mtu) 293 mtu = p->dev->mtu; 296 return mtu;
|
/net/ieee802154/ |
H A D | raw.c | 109 unsigned int mtu; local 132 mtu = dev->mtu; 133 pr_debug("name = %s, mtu = %u\n", dev->name, mtu); 135 if (size > mtu) { 136 pr_debug("size = %Zu, mtu = %u\n", size, mtu);
|
H A D | dgram.c | 209 unsigned int mtu; local 230 mtu = dev->mtu; 231 pr_debug("name = %s, mtu = %u\n", dev->name, mtu); 233 if (size > mtu) { 234 pr_debug("size = %Zu, mtu = %u\n", size, mtu);
|
/net/bluetooth/cmtp/ |
H A D | cmtp.h | 80 uint mtu; member in struct:cmtp_session
|
/net/netfilter/ |
H A D | xt_TCPMSS.c | 170 u_int32_t mtu = ~0U; local 189 mtu = dst_mtu(&rt->dst); 192 return mtu;
|
/net/sched/ |
H A D | sch_tbf.c | 105 s64 mtu; member in struct:tbf_sched_data 168 if (ptoks > q->mtu) 169 ptoks = q->mtu; 218 q->ptokens = q->mtu; 267 if (ptab->data[n] > qopt->mtu) 295 q->mtu = PSCHED_TICKS2NS(qopt->mtu); 299 q->ptokens = q->mtu; 358 opt.mtu = PSCHED_NS2TICKS(q->mtu); [all...] |
H A D | act_police.c | 60 u32 mtu; member in struct:tc_police_compat 226 police->tcfp_mtu = parm->mtu; 372 .mtu = police->tcfp_mtu,
|
/net/tipc/ |
H A D | bearer.h | 110 * @mtu: max packet size bearer can support 132 u32 mtu; /* initalized by media */ member in struct:tipc_bearer
|
/net/bluetooth/ |
H A D | l2cap_sock.c | 466 static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu) argument 470 if (mtu < L2CAP_LE_MIN_MTU) 475 if (mtu < L2CAP_DEFAULT_MIN_MTU)
|
/net/caif/ |
H A D | chnl_net.c | 226 if (skb->len > priv->netdev->mtu) { 266 int llifindex, headroom, tailroom, mtu; local 304 * MTU is minimum of current mtu, link layer mtu pluss 307 mtu = min_t(int, dev->mtu, lldev->mtu - (headroom + tailroom)); 308 mtu = min_t(int, GPRS_PDP_MTU, mtu); 309 dev_set_mtu(dev, mtu); [all...] |
/net/dccp/ |
H A D | ipv4.c | 147 * This routine does path mtu discovery as defined in RFC1191. 151 u32 mtu) 164 dst = inet_csk_update_pmtu(sk, mtu); 171 if (mtu < dst_mtu(dst) && ip_dont_fragment(sk, dst)) 174 mtu = dst_mtu(dst); 177 inet_csk(sk)->icsk_pmtu_cookie > mtu) { 178 dccp_sync_mss(sk, mtu); 149 dccp_do_pmtu_discovery(struct sock *sk, const struct iphdr *iph, u32 mtu) argument
|
/net/netfilter/ipvs/ |
H A D | ip_vs_xmit.c | 107 __mtu_check_toobig_v6(const struct sk_buff *skb, u32 mtu) argument 113 if (IP6CB(skb)->frag_max_size > mtu) 116 else if (skb->len > mtu && !skb_is_gso(skb)) { 171 int mtu; local 251 mtu = dst_mtu(&rt->dst); 256 mtu = dst_mtu(&rt->dst) - sizeof(struct iphdr); 257 if (mtu < 68) { 258 IP_VS_DBG_RL("%s(): mtu less than 68\n", __func__); 263 ort->dst.ops->update_pmtu(&ort->dst, sk, NULL, mtu); 269 if (unlikely(df && skb->len > mtu 350 int mtu; local [all...] |