/net/sched/ |
H A D | sch_tbf.c | 105 s64 buffer; /* Token bucket depth/rate: MUST BE >= MTU/B */ member in struct:tbf_sched_data 243 toks = min_t(s64, now - q->t_c, q->buffer); 252 if (toks > q->buffer) 253 toks = q->buffer; 297 q->tokens = q->buffer; 322 s64 buffer, mtu; local 342 buffer = min_t(u64, PSCHED_TICKS2NS(qopt->buffer), ~0U); 351 buffer = psched_l2t_ns(&rate, max_size); 353 max_size = min_t(u64, psched_ns_t2l(&rate, buffer), ~ [all...] |
H A D | sch_htb.c | 101 s64 buffer, cbuffer;/* token bucket depth/rate */ member in struct:htb_class 477 return cl->cmode == HTB_CAN_SEND ? -cl->buffer : 0; 491 * 0 .. -cl->{c,}buffer range. It is meant to limit number of 611 if (toks > cl->buffer) 612 toks = cl->buffer; 1115 opt.buffer = PSCHED_NS2TICKS(cl->buffer); 1227 parent->tokens = parent->buffer; 1457 cl->tokens = PSCHED_TICKS2NS(hopt->buffer); 1513 cl->buffer [all...] |
/net/bridge/ |
H A D | br_netfilter.c | 918 void __user *buffer, size_t *lenp, loff_t *ppos) 922 ret = proc_dointvec(ctl, write, buffer, lenp, ppos); 917 brnf_sysctl_call_tables(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
|
/net/ipv4/netfilter/ |
H A D | ipt_CLUSTERIP.c | 190 char buffer[16]; local 193 sprintf(buffer, "%pI4", &ip); 194 c->pde = proc_create_data(buffer, S_IWUSR|S_IRUSR, 675 char buffer[PROC_WRITELEN+1]; local 681 if (copy_from_user(buffer, input, size)) 683 buffer[size] = 0; 685 if (*buffer == '+') { 686 rc = kstrtoul(buffer+1, 10, &nodenum); 691 } else if (*buffer == '-') { 692 rc = kstrtoul(buffer [all...] |
/net/rxrpc/ |
H A D | ar-key.c | 1047 char __user *buffer, size_t buflen) 1126 if (!buffer || buflen < size) 1129 xdr = (__be32 __user *) buffer; 1240 ASSERTCMP((char __user *) xdr - buffer, ==, size); 1046 rxrpc_read(const struct key *key, char __user *buffer, size_t buflen) argument
|
/net/sunrpc/ |
H A D | auth.c | 65 static int param_get_hashtbl_sz(char *buffer, const struct kernel_param *kp) argument 70 return sprintf(buffer, "%u", 1U << nbits);
|
H A D | sched.c | 693 /* Always release the RPC slot and buffer memory */ 828 * rpc_malloc - allocate an RPC buffer 829 * @task: RPC task that will use this buffer 862 dprintk("RPC: %5u allocated buffer of size %zu at %p\n", 869 * rpc_free - free buffer allocated via rpc_malloc 870 * @buffer: buffer to free 873 void rpc_free(void *buffer) argument 878 if (!buffer) 881 buf = container_of(buffer, struc [all...] |
H A D | svcsock.c | 242 } buffer; local 243 struct cmsghdr *cmh = &buffer.hdr; 254 .msg_controllen = sizeof(buffer), 371 * Set socket snd and rcv buffer lengths 546 } buffer; local 547 struct cmsghdr *cmh = &buffer.hdr; 551 .msg_controllen = sizeof(buffer), 559 * requests are still in that buffer. sndbuf must 1441 * @name_return: pointer to buffer to fill in with name of listener 1442 * @len: size of the buffer [all...] |
H A D | xprtsock.c | 12 * Fix behaviour when socket buffer is full. 249 * UDP socket buffer size parameters 443 * @xdr: buffer containing this request 444 * @base: starting position in the buffer 534 /* ...and wait for more buffer space */ 1189 * We don't yet have the XDR buffer, so we will write the calldir 1190 * out after we get the buffer from the 'struct rpc_rqst' 1224 * Save the RPC direction in the XDR buffer 1253 /* Error when copying to the receive buffer, 1255 * additional buffer page 2467 bc_free(void *buffer) argument [all...] |
/net/decnet/ |
H A D | dn_dev.c | 247 void __user *buffer, 262 err = proc_dointvec(table, write, buffer, lenp, ppos); 414 char buffer[DN_IFREQ_SIZE]; local 415 struct ifreq *ifr = (struct ifreq *)buffer; 246 dn_forwarding_proc(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
|
/net/ipv6/ |
H A D | ndisc.c | 391 * sock_alloc_send_pskb() to bypass wmem buffer limits 1685 int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 1696 ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos); 1700 buffer, lenp, ppos); 1705 buffer, lenp, ppos);
|
H A D | route.c | 2871 void __user *buffer, size_t *lenp, loff_t *ppos) 2880 proc_dointvec(ctl, write, buffer, lenp, ppos); 2870 ipv6_sysctl_rtcache_flush(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
|
/net/core/ |
H A D | neighbour.c | 2825 void __user *buffer, size_t *lenp, loff_t *ppos) 2835 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos); 2887 void __user *buffer, 2896 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos); 2902 void __user *buffer, size_t *lenp, loff_t *ppos) 2904 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos); 2912 void __user *buffer, 2915 int ret = proc_dointvec_jiffies(ctl, write, buffer, lenp, ppos); 2923 void __user *buffer, 2926 int ret = proc_dointvec_userhz_jiffies(ctl, write, buffer, len 2824 proc_unres_qlen(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2886 neigh_proc_dointvec_zero_intmax(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2901 neigh_proc_dointvec(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2911 neigh_proc_dointvec_jiffies(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2922 neigh_proc_dointvec_userhz_jiffies(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2932 neigh_proc_dointvec_ms_jiffies(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2943 neigh_proc_dointvec_unres_qlen(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument [all...] |
H A D | pktgen.c | 823 static ssize_t get_labels(const char __user *buffer, struct pktgen_dev *pkt_dev) argument 833 len = hex32_arg(&buffer[i], 8, &tmp); 840 if (get_user(c, &buffer[i])) 904 pr_debug("%s,%lu buffer -:%s:-\n",
|
/net/ipv4/ |
H A D | cipso_ipv4.c | 296 * @key: the buffer to check 297 * @key_len: buffer length in bytes 1236 * @buf: the CIPSO option buffer 1239 * Write a CIPSO header into the beginning of @buffer. 1255 * @buffer: the option buffer 1256 * @buffer_len: length of buffer in bytes 1260 * actual buffer length may be larger than the indicated size due to 1267 unsigned char *buffer, 1286 &buffer[ 1265 cipso_v4_gentag_rbm(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument 1362 cipso_v4_gentag_enum(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument 1453 cipso_v4_gentag_rng(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument 1543 cipso_v4_gentag_loc(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument [all...] |
H A D | devinet.c | 1990 void __user *buffer, 1994 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos); 2030 void __user *buffer, 2036 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos); 2073 void __user *buffer, 2078 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos); 1989 devinet_conf_proc(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2029 devinet_sysctl_forward(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 2072 ipv4_doint_and_flush(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
|
H A D | route.c | 2509 void __user *buffer, 2508 ipv4_sysctl_rtcache_flush(struct ctl_table *__ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
|
/net/iucv/ |
H A D | iucv.c | 255 * Data in buffer iucv structure. Used by iucv_message_receive, 461 * Declare a interrupt buffer on this cpu. 472 /* Declare interrupt buffer. */ 496 pr_warn("Defining an interrupt buffer on CPU %i failed with 0x%02x (%s)\n", 501 /* Set indication that an iucv buffer exists for this cpu. */ 516 * Retrieve interrupt buffer on this cpu. 529 /* Retrieve interrupt buffer. */ 533 /* Clear indication that an iucv buffer exists for this cpu. */ 548 /* Enable all cpus with a declared buffer. */ 577 * table, declares an iucv interrupt buffer an 1122 iucv_message_receive_iprmdata(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument 1172 __iucv_message_receive(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument 1222 iucv_message_receive(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument 1337 __iucv_message_send(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size) argument 1391 iucv_message_send(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size) argument 1422 iucv_message_send2way(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size, void *answer, size_t asize, size_t *residual) argument [all...] |
/net/netfilter/ipvs/ |
H A D | ip_vs_sync.c | 320 * Create a new sync buffer for Version 1 proto. 375 * Get the current sync buffer if it has been created for more 402 * Create a new sync buffer for Version 0 proto. 558 /* Send buffer if it is for v1 */ 687 /* Send buffer if it is for v0 */ 935 static void ip_vs_process_message_v0(struct net *net, const char *buffer, argument 938 struct ip_vs_sync_mesg_v0 *m = (struct ip_vs_sync_mesg_v0 *)buffer; 946 p = (char *)buffer + sizeof(struct ip_vs_sync_mesg_v0); 950 if (p + SIMPLE_CONN_SIZE > buffer+buflen) { 960 if (p > buffer 1185 ip_vs_process_message(struct net *net, __u8 *buffer, const size_t buflen) argument 1542 ip_vs_send_async(struct socket *sock, const char *buffer, const size_t length) argument 1574 ip_vs_receive(struct socket *sock, char *buffer, const size_t buflen) argument [all...] |
H A D | ip_vs_ctl.c | 1587 void __user *buffer, size_t *lenp, loff_t *ppos) 1594 rc = proc_dointvec(table, write, buffer, lenp, ppos); 1608 void __user *buffer, size_t *lenp, loff_t *ppos) 1617 rc = proc_dointvec(table, write, buffer, lenp, ppos); 1628 void __user *buffer, size_t *lenp, loff_t *ppos) 1634 rc = proc_dointvec(table, write, buffer, lenp, ppos); 1646 void __user *buffer, size_t *lenp, loff_t *ppos) 1652 rc = proc_dointvec(table, write, buffer, lenp, ppos); 1586 proc_do_defense_mode(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 1607 proc_do_sync_threshold(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 1627 proc_do_sync_mode(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument 1645 proc_do_sync_ports(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
|
/net/sctp/ |
H A D | sm_statefuns.c | 1209 char buffer[sizeof(struct sctp_errhdr)+sizeof(union sctp_addr_param)]; local 1215 errhdr = (struct sctp_errhdr *)buffer; 3177 /* Pull the SACK chunk from the data buffer */ 4661 * Format: SEND(association id, buffer address, byte count [,context] 4672 * o buffer address - the location where the user message to be 6184 * malicious sender can still eat up all our buffer
|
/net/mac80211/ |
H A D | util.c | 1250 u8 *buffer, size_t buffer_len, 1258 u8 *pos = buffer, *end = buffer + buffer_len; 1401 return pos - buffer; 1404 return pos - buffer; 1407 int ieee80211_build_preq_ies(struct ieee80211_local *local, u8 *buffer, argument 1422 buffer + pos, 1428 ie_desc->ies[i] = buffer + old_pos; 1439 memcpy(buffer + pos, ie + custom_ie_offset, 1441 ie_desc->common_ies = buffer 1249 ieee80211_build_preq_ies_band(struct ieee80211_local *local, u8 *buffer, size_t buffer_len, const u8 *ie, size_t ie_len, enum ieee80211_band band, u32 rate_mask, struct cfg80211_chan_def *chandef, size_t *offset) argument [all...] |
/net/netfilter/ |
H A D | xt_qtaguid.c | 2501 static ssize_t qtaguid_ctrl_proc_write(struct file *file, const char __user *buffer, argument 2512 if (copy_from_user(input_buf, buffer, count))
|
/net/netlink/ |
H A D | af_netlink.c | 330 void *buffer; local 334 buffer = (void *)__get_free_pages(gfp_flags, order); 335 if (buffer != NULL) 336 return buffer; 338 buffer = vzalloc((1 << order) * PAGE_SIZE); 339 if (buffer != NULL) 340 return buffer; 1318 * @nsp: NETLINK_CB of the socket buffer holding a netlink command from userspace. 1337 * @skb: socket buffer holding a netlink command from userspace 1354 * @skb: socket buffer holdin [all...] |
/net/packet/ |
H A D | af_packet.c | 230 ((struct tpacket_block_desc *)((x)->pkbdq[(bid)].buffer)) 232 ((struct tpacket_block_desc *)((x)->pkbdq[(x)->kactive_blk_num].buffer)) 493 h.raw = rb->pg_vec[pg_vec_pos].buffer + 613 pbd = (struct tpacket_block_desc *)pg_vec[0].buffer; 614 p1->pkblk_start = pg_vec[0].buffer; 2946 /* You lose any data beyond the buffer you gave. If it worries 3000 * Free or return the buffer as appropriate. Again this 3678 if (likely(pg_vec[i].buffer)) { 3679 if (is_vmalloc_addr(pg_vec[i].buffer)) 3680 vfree(pg_vec[i].buffer); 3692 char *buffer; local [all...] |