Searched defs:buffer (Results 26 - 50 of 52) sorted by relevance

123

/net/sched/
H A Dsch_tbf.c105 s64 buffer; /* Token bucket depth/rate: MUST BE >= MTU/B */ member in struct:tbf_sched_data
243 toks = min_t(s64, now - q->t_c, q->buffer);
252 if (toks > q->buffer)
253 toks = q->buffer;
297 q->tokens = q->buffer;
322 s64 buffer, mtu; local
342 buffer = min_t(u64, PSCHED_TICKS2NS(qopt->buffer), ~0U);
351 buffer = psched_l2t_ns(&rate, max_size);
353 max_size = min_t(u64, psched_ns_t2l(&rate, buffer), ~
[all...]
H A Dsch_htb.c101 s64 buffer, cbuffer;/* token bucket depth/rate */ member in struct:htb_class
477 return cl->cmode == HTB_CAN_SEND ? -cl->buffer : 0;
491 * 0 .. -cl->{c,}buffer range. It is meant to limit number of
611 if (toks > cl->buffer)
612 toks = cl->buffer;
1115 opt.buffer = PSCHED_NS2TICKS(cl->buffer);
1227 parent->tokens = parent->buffer;
1457 cl->tokens = PSCHED_TICKS2NS(hopt->buffer);
1513 cl->buffer
[all...]
/net/bridge/
H A Dbr_netfilter.c918 void __user *buffer, size_t *lenp, loff_t *ppos)
922 ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
917 brnf_sysctl_call_tables(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
/net/ipv4/netfilter/
H A Dipt_CLUSTERIP.c190 char buffer[16]; local
193 sprintf(buffer, "%pI4", &ip);
194 c->pde = proc_create_data(buffer, S_IWUSR|S_IRUSR,
675 char buffer[PROC_WRITELEN+1]; local
681 if (copy_from_user(buffer, input, size))
683 buffer[size] = 0;
685 if (*buffer == '+') {
686 rc = kstrtoul(buffer+1, 10, &nodenum);
691 } else if (*buffer == '-') {
692 rc = kstrtoul(buffer
[all...]
/net/rxrpc/
H A Dar-key.c1047 char __user *buffer, size_t buflen)
1126 if (!buffer || buflen < size)
1129 xdr = (__be32 __user *) buffer;
1240 ASSERTCMP((char __user *) xdr - buffer, ==, size);
1046 rxrpc_read(const struct key *key, char __user *buffer, size_t buflen) argument
/net/sunrpc/
H A Dauth.c65 static int param_get_hashtbl_sz(char *buffer, const struct kernel_param *kp) argument
70 return sprintf(buffer, "%u", 1U << nbits);
H A Dsched.c693 /* Always release the RPC slot and buffer memory */
828 * rpc_malloc - allocate an RPC buffer
829 * @task: RPC task that will use this buffer
862 dprintk("RPC: %5u allocated buffer of size %zu at %p\n",
869 * rpc_free - free buffer allocated via rpc_malloc
870 * @buffer: buffer to free
873 void rpc_free(void *buffer) argument
878 if (!buffer)
881 buf = container_of(buffer, struc
[all...]
H A Dsvcsock.c242 } buffer; local
243 struct cmsghdr *cmh = &buffer.hdr;
254 .msg_controllen = sizeof(buffer),
371 * Set socket snd and rcv buffer lengths
546 } buffer; local
547 struct cmsghdr *cmh = &buffer.hdr;
551 .msg_controllen = sizeof(buffer),
559 * requests are still in that buffer. sndbuf must
1441 * @name_return: pointer to buffer to fill in with name of listener
1442 * @len: size of the buffer
[all...]
H A Dxprtsock.c12 * Fix behaviour when socket buffer is full.
249 * UDP socket buffer size parameters
443 * @xdr: buffer containing this request
444 * @base: starting position in the buffer
534 /* ...and wait for more buffer space */
1189 * We don't yet have the XDR buffer, so we will write the calldir
1190 * out after we get the buffer from the 'struct rpc_rqst'
1224 * Save the RPC direction in the XDR buffer
1253 /* Error when copying to the receive buffer,
1255 * additional buffer page
2467 bc_free(void *buffer) argument
[all...]
/net/decnet/
H A Ddn_dev.c247 void __user *buffer,
262 err = proc_dointvec(table, write, buffer, lenp, ppos);
414 char buffer[DN_IFREQ_SIZE]; local
415 struct ifreq *ifr = (struct ifreq *)buffer;
246 dn_forwarding_proc(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
/net/ipv6/
H A Dndisc.c391 * sock_alloc_send_pskb() to bypass wmem buffer limits
1685 int ndisc_ifinfo_sysctl_change(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
1696 ret = neigh_proc_dointvec(ctl, write, buffer, lenp, ppos);
1700 buffer, lenp, ppos);
1705 buffer, lenp, ppos);
H A Droute.c2871 void __user *buffer, size_t *lenp, loff_t *ppos)
2880 proc_dointvec(ctl, write, buffer, lenp, ppos);
2870 ipv6_sysctl_rtcache_flush(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
/net/core/
H A Dneighbour.c2825 void __user *buffer, size_t *lenp, loff_t *ppos)
2835 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
2887 void __user *buffer,
2896 ret = proc_dointvec_minmax(&tmp, write, buffer, lenp, ppos);
2902 void __user *buffer, size_t *lenp, loff_t *ppos)
2904 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
2912 void __user *buffer,
2915 int ret = proc_dointvec_jiffies(ctl, write, buffer, lenp, ppos);
2923 void __user *buffer,
2926 int ret = proc_dointvec_userhz_jiffies(ctl, write, buffer, len
2824 proc_unres_qlen(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2886 neigh_proc_dointvec_zero_intmax(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2901 neigh_proc_dointvec(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2911 neigh_proc_dointvec_jiffies(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2922 neigh_proc_dointvec_userhz_jiffies(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2932 neigh_proc_dointvec_ms_jiffies(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2943 neigh_proc_dointvec_unres_qlen(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
[all...]
H A Dpktgen.c823 static ssize_t get_labels(const char __user *buffer, struct pktgen_dev *pkt_dev) argument
833 len = hex32_arg(&buffer[i], 8, &tmp);
840 if (get_user(c, &buffer[i]))
904 pr_debug("%s,%lu buffer -:%s:-\n",
/net/ipv4/
H A Dcipso_ipv4.c296 * @key: the buffer to check
297 * @key_len: buffer length in bytes
1236 * @buf: the CIPSO option buffer
1239 * Write a CIPSO header into the beginning of @buffer.
1255 * @buffer: the option buffer
1256 * @buffer_len: length of buffer in bytes
1260 * actual buffer length may be larger than the indicated size due to
1267 unsigned char *buffer,
1286 &buffer[
1265 cipso_v4_gentag_rbm(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1362 cipso_v4_gentag_enum(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1453 cipso_v4_gentag_rng(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
1543 cipso_v4_gentag_loc(const struct cipso_v4_doi *doi_def, const struct netlbl_lsm_secattr *secattr, unsigned char *buffer, u32 buffer_len) argument
[all...]
H A Ddevinet.c1990 void __user *buffer,
1994 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
2030 void __user *buffer,
2036 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
2073 void __user *buffer,
2078 int ret = proc_dointvec(ctl, write, buffer, lenp, ppos);
1989 devinet_conf_proc(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2029 devinet_sysctl_forward(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
2072 ipv4_doint_and_flush(struct ctl_table *ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
H A Droute.c2509 void __user *buffer,
2508 ipv4_sysctl_rtcache_flush(struct ctl_table *__ctl, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
/net/iucv/
H A Diucv.c255 * Data in buffer iucv structure. Used by iucv_message_receive,
461 * Declare a interrupt buffer on this cpu.
472 /* Declare interrupt buffer. */
496 pr_warn("Defining an interrupt buffer on CPU %i failed with 0x%02x (%s)\n",
501 /* Set indication that an iucv buffer exists for this cpu. */
516 * Retrieve interrupt buffer on this cpu.
529 /* Retrieve interrupt buffer. */
533 /* Clear indication that an iucv buffer exists for this cpu. */
548 /* Enable all cpus with a declared buffer. */
577 * table, declares an iucv interrupt buffer an
1122 iucv_message_receive_iprmdata(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument
1172 __iucv_message_receive(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument
1222 iucv_message_receive(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument
1337 __iucv_message_send(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size) argument
1391 iucv_message_send(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size) argument
1422 iucv_message_send2way(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size, void *answer, size_t asize, size_t *residual) argument
[all...]
/net/netfilter/ipvs/
H A Dip_vs_sync.c320 * Create a new sync buffer for Version 1 proto.
375 * Get the current sync buffer if it has been created for more
402 * Create a new sync buffer for Version 0 proto.
558 /* Send buffer if it is for v1 */
687 /* Send buffer if it is for v0 */
935 static void ip_vs_process_message_v0(struct net *net, const char *buffer, argument
938 struct ip_vs_sync_mesg_v0 *m = (struct ip_vs_sync_mesg_v0 *)buffer;
946 p = (char *)buffer + sizeof(struct ip_vs_sync_mesg_v0);
950 if (p + SIMPLE_CONN_SIZE > buffer+buflen) {
960 if (p > buffer
1185 ip_vs_process_message(struct net *net, __u8 *buffer, const size_t buflen) argument
1542 ip_vs_send_async(struct socket *sock, const char *buffer, const size_t length) argument
1574 ip_vs_receive(struct socket *sock, char *buffer, const size_t buflen) argument
[all...]
H A Dip_vs_ctl.c1587 void __user *buffer, size_t *lenp, loff_t *ppos)
1594 rc = proc_dointvec(table, write, buffer, lenp, ppos);
1608 void __user *buffer, size_t *lenp, loff_t *ppos)
1617 rc = proc_dointvec(table, write, buffer, lenp, ppos);
1628 void __user *buffer, size_t *lenp, loff_t *ppos)
1634 rc = proc_dointvec(table, write, buffer, lenp, ppos);
1646 void __user *buffer, size_t *lenp, loff_t *ppos)
1652 rc = proc_dointvec(table, write, buffer, lenp, ppos);
1586 proc_do_defense_mode(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
1607 proc_do_sync_threshold(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
1627 proc_do_sync_mode(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
1645 proc_do_sync_ports(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) argument
/net/sctp/
H A Dsm_statefuns.c1209 char buffer[sizeof(struct sctp_errhdr)+sizeof(union sctp_addr_param)]; local
1215 errhdr = (struct sctp_errhdr *)buffer;
3177 /* Pull the SACK chunk from the data buffer */
4661 * Format: SEND(association id, buffer address, byte count [,context]
4672 * o buffer address - the location where the user message to be
6184 * malicious sender can still eat up all our buffer
/net/mac80211/
H A Dutil.c1250 u8 *buffer, size_t buffer_len,
1258 u8 *pos = buffer, *end = buffer + buffer_len;
1401 return pos - buffer;
1404 return pos - buffer;
1407 int ieee80211_build_preq_ies(struct ieee80211_local *local, u8 *buffer, argument
1422 buffer + pos,
1428 ie_desc->ies[i] = buffer + old_pos;
1439 memcpy(buffer + pos, ie + custom_ie_offset,
1441 ie_desc->common_ies = buffer
1249 ieee80211_build_preq_ies_band(struct ieee80211_local *local, u8 *buffer, size_t buffer_len, const u8 *ie, size_t ie_len, enum ieee80211_band band, u32 rate_mask, struct cfg80211_chan_def *chandef, size_t *offset) argument
[all...]
/net/netfilter/
H A Dxt_qtaguid.c2501 static ssize_t qtaguid_ctrl_proc_write(struct file *file, const char __user *buffer, argument
2512 if (copy_from_user(input_buf, buffer, count))
/net/netlink/
H A Daf_netlink.c330 void *buffer; local
334 buffer = (void *)__get_free_pages(gfp_flags, order);
335 if (buffer != NULL)
336 return buffer;
338 buffer = vzalloc((1 << order) * PAGE_SIZE);
339 if (buffer != NULL)
340 return buffer;
1318 * @nsp: NETLINK_CB of the socket buffer holding a netlink command from userspace.
1337 * @skb: socket buffer holding a netlink command from userspace
1354 * @skb: socket buffer holdin
[all...]
/net/packet/
H A Daf_packet.c230 ((struct tpacket_block_desc *)((x)->pkbdq[(bid)].buffer))
232 ((struct tpacket_block_desc *)((x)->pkbdq[(x)->kactive_blk_num].buffer))
493 h.raw = rb->pg_vec[pg_vec_pos].buffer +
613 pbd = (struct tpacket_block_desc *)pg_vec[0].buffer;
614 p1->pkblk_start = pg_vec[0].buffer;
2946 /* You lose any data beyond the buffer you gave. If it worries
3000 * Free or return the buffer as appropriate. Again this
3678 if (likely(pg_vec[i].buffer)) {
3679 if (is_vmalloc_addr(pg_vec[i].buffer))
3680 vfree(pg_vec[i].buffer);
3692 char *buffer; local
[all...]

Completed in 3117 milliseconds

123