/net/iucv/ |
H A D | iucv.c | 62 * All flags are defined in the field IPFLAGS1 of each function 896 parm->ctrl.ipflags1 = path->flags; 902 path->flags = parm->ctrl.ipflags1; 941 parm->ctrl.ipflags1 = path->flags; 961 path->flags = parm->ctrl.ipflags1; 1114 * @flags: how the message is received (IUCV_IPBUFLST) 1124 u8 flags, void *buffer, 1138 if (flags & IUCV_IPBUFLST) { 1159 * @flags: how the message is received (IUCV_IPBUFLST) 1173 u8 flags, voi 1122 iucv_message_receive_iprmdata(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument 1172 __iucv_message_receive(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument 1222 iucv_message_receive(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *buffer, size_t size, size_t *residual) argument 1286 iucv_message_reply(struct iucv_path *path, struct iucv_message *msg, u8 flags, void *reply, size_t size) argument 1337 __iucv_message_send(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size) argument 1391 iucv_message_send(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size) argument 1422 iucv_message_send2way(struct iucv_path *path, struct iucv_message *msg, u8 flags, u32 srccls, void *buffer, size_t size, void *answer, size_t asize, size_t *residual) argument [all...] |
/net/mac80211/ |
H A D | cfg.c | 27 u32 *flags, 39 if (type == NL80211_IFTYPE_MONITOR && flags) { 41 sdata->u.mntr_flags = *flags; 56 enum nl80211_iftype type, u32 *flags, 73 if (sdata->vif.type == NL80211_IFTYPE_MONITOR && flags) { 89 if ((*flags & mask) != (sdata->u.mntr_flags & mask)) 93 sdata->u.mntr_flags = *flags; 103 sdata->u.mntr_flags = *flags; 179 key->conf.flags |= IEEE80211_KEY_FLAG_PAIRWISE; 208 key->conf.flags | 24 ieee80211_add_iface(struct wiphy *wiphy, const char *name, enum nl80211_iftype type, u32 *flags, struct vif_params *params) argument 54 ieee80211_change_iface(struct wiphy *wiphy, struct net_device *dev, enum nl80211_iftype type, u32 *flags, struct vif_params *params) argument 3155 u32 flags; local [all...] |
H A D | rx.c | 44 if (local->hw.flags & IEEE80211_HW_RX_INCLUDES_FCS) { 96 if (local->hw.flags & IEEE80211_HW_SIGNAL_DBM) 149 if (!(has_fcs && (local->hw.flags & IEEE80211_HW_RX_INCLUDES_FCS))) 156 /* radiotap header, set always present flags */ 195 if (has_fcs && (local->hw.flags & IEEE80211_HW_RX_INCLUDES_FCS)) 235 else if (rate && rate->flags & IEEE80211_RATE_ERP_G) 245 if (local->hw.flags & IEEE80211_HW_SIGNAL_DBM && 293 u16 flags = 0; local 303 flags |= IEEE80211_RADIOTAP_AMPDU_REPORT_ZEROLEN; 305 flags | [all...] |
H A D | tx.c | 63 if (tx->rate.flags & IEEE80211_TX_RC_MCS) 73 erp = txrate->flags & IEEE80211_RATE_ERP_G; 137 if ((rate_flags & r->flags) != rate_flags) 146 if (tx->sdata->flags & IEEE80211_SDATA_OPERATING_GMODE) 150 if (r->flags & flag) 155 if (r->flags & IEEE80211_RATE_MANDATORY_A) 205 if (!(local->hw.flags & IEEE80211_HW_SUPPORTS_PS)) 209 if (local->hw.flags & IEEE80211_HW_SUPPORTS_DYNAMIC_PS) 246 if ((ifmgd->flags & IEEE80211_STA_UAPSD_ENABLED) && 251 if (local->hw.conf.flags 1206 unsigned long flags; local 2078 unsigned long flags; local 2283 unsigned long flags; local [all...] |
/net/netfilter/ipset/ |
H A D | ip_set_core.c | 357 add_extension(enum ip_set_ext_id id, u32 flags, struct nlattr *tb[]) argument 360 (flags & ip_set_extensions[id].flag) : 374 set->flags |= IPSET_CREATE_FLAG_FORCEADD; 720 start_msg(struct sk_buff *skb, u32 portid, u32 seq, unsigned int flags, argument 727 sizeof(*nfmsg), flags); 822 u32 flags = flag_exist(nlh); local 875 ret = set->type->create(net, set, tb, flags); 889 if ((flags & IPSET_FLAG_EXIST) && 1251 unsigned int flags = NETLINK_CB(cb->skb).portid ? NLM_F_MULTI : 0; local 1302 cb->nlh->nlmsg_seq, flags, 1401 call_ad(struct sock *ctnl, struct sk_buff *skb, struct ip_set *set, struct nlattr *tb[], enum ipset_adt adt, u32 flags, bool use_lineno) argument 1467 u32 flags = flag_exist(nlh); local 1522 u32 flags = flag_exist(nlh); local [all...] |
/net/netfilter/ipvs/ |
H A D | ip_vs_sync.c | 82 __be16 flags; /* status flags */ member in struct:ip_vs_sync_conn_v0 136 __be32 flags; /* status flags */ member in struct:ip_vs_sync_v4 158 __be32 flags; /* status flags */ member in struct:ip_vs_sync_v6 432 if (cp->flags & IP_VS_CONN_F_TEMPLATE) 458 if (unlikely(cp->flags & IP_VS_CONN_F_TEMPLATE)) 510 if (!(cp->flags & IP_VS_CONN_F_TEMPLATE) && 541 if (cp->flags 838 ip_vs_proc_conn(struct net *net, struct ip_vs_conn_param *param, unsigned int flags, unsigned int state, unsigned int protocol, unsigned int type, const union nf_inet_addr *daddr, __be16 dport, unsigned long timeout, __u32 fwmark, struct ip_vs_sync_conn_options *opt) argument 948 unsigned int flags, state; local 1055 __u32 flags; local [all...] |
/net/netfilter/ |
H A D | nf_conntrack_netlink.c | 464 unsigned int flags = portid ? NLM_F_MULTI : 0, event; local 467 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*nfmsg), flags); 619 unsigned int flags = 0, group; local 631 flags = NLM_F_CREATE|NLM_F_EXCL; 648 nlh = nlmsg_put(skb, item->portid, 0, type, sizeof(*nfmsg), flags); 1859 unsigned int flags = portid ? NLM_F_MULTI : 0, event; local 1862 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*nfmsg), flags); 1945 unsigned int flags = portid ? NLM_F_MULTI : 0, event; local 1949 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*nfmsg), flags); 2356 nla_put_be32(skb, CTA_EXPECT_FLAGS, htonl(exp->flags)) || 2385 unsigned int flags = portid ? NLM_F_MULTI : 0; local 2419 int flags = 0; local 3025 unsigned int flags = portid ? NLM_F_MULTI : 0, event; local [all...] |
H A D | nf_tables_api.c | 134 if (!(table->flags & NFT_TABLE_F_DORMANT) && 135 chain->flags & NFT_BASE_CHAIN) 139 /* Internal table flags */ 151 ctx->table->flags |= NFT_TABLE_INACTIVE; 178 ctx->chain->flags |= NFT_CHAIN_INACTIVE; 306 set->flags |= NFT_SET_INACTIVE; 409 u32 portid, u32 seq, int event, u32 flags, 416 nlh = nlmsg_put(skb, portid, seq, event, sizeof(struct nfgenmsg), flags); 426 nla_put_be32(skb, NFTA_TABLE_FLAGS, htonl(table->flags)) || 536 if (table->flags 408 nf_tables_fill_table_info(struct sk_buff *skb, struct net *net, u32 portid, u32 seq, int event, u32 flags, int family, const struct nft_table *table) argument 601 u32 flags; local 651 u32 flags = 0; local 917 nf_tables_fill_chain_info(struct sk_buff *skb, struct net *net, u32 portid, u32 seq, int event, u32 flags, int family, const struct nft_table *table, const struct nft_chain *chain) argument 1651 nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net, u32 portid, u32 seq, int event, u32 flags, int family, const struct nft_table *table, const struct nft_chain *chain, const struct nft_rule *rule) argument 2308 nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx, const struct nft_set *set, u16 event, u16 flags) argument 2558 u32 ktype, dtype, flags, policy; local 2997 nf_tables_fill_setelem_info(struct sk_buff *skb, const struct nft_ctx *ctx, u32 seq, u32 portid, int event, u16 flags, const struct nft_set *set, const struct nft_set_elem *elem) argument 3041 nf_tables_setelem_notify(const struct nft_ctx *ctx, const struct nft_set *set, const struct nft_set_elem *elem, int event, u16 flags) argument [all...] |
/net/sched/ |
H A D | sch_api.c | 263 if (!(root->flags & TCQ_F_BUILTIN) && 276 if ((q->parent != TC_H_ROOT) && !(q->flags & TCQ_F_INGRESS)) { 287 if ((q->parent != TC_H_ROOT) && !(q->flags & TCQ_F_INGRESS)) 568 if (!(qdisc->flags & TCQ_F_WARN_NONWC)) { 571 qdisc->flags |= TCQ_F_WARN_NONWC; 807 if ((q && q->flags & TCQ_F_INGRESS) || 808 (new && new->flags & TCQ_F_INGRESS)) { 815 if (dev->flags & IFF_UP) 847 if (dev->flags & IFF_UP) 930 sch->flags | 1320 tc_fill_qdisc(struct sk_buff *skb, struct Qdisc *q, u32 clid, u32 portid, u32 seq, u16 flags, int event) argument 1641 tc_fill_tclass(struct sk_buff *skb, struct Qdisc *q, unsigned long cl, u32 portid, u32 seq, u16 flags, int event) argument [all...] |
/net/sctp/ |
H A D | sm_make_chunk.c | 65 __u8 type, __u8 flags, int paylen); 67 __u8 flags, int paylen); 69 __u8 type, __u8 flags, int paylen); 716 int data_len, __u8 flags, __u16 ssn) 729 /* Set the flags for an unordered send. */ 731 flags |= SCTP_DATA_UNORDERED; 737 retval = sctp_make_data(asoc, flags, chunk_len); 904 __u8 flags = 0; local 909 flags |= asoc ? 0 : SCTP_CHUNK_FLAG_T; 911 retval = sctp_make_control(asoc, SCTP_CID_SHUTDOWN_COMPLETE, flags, 714 sctp_make_datafrag_empty(struct sctp_association *asoc, const struct sctp_sndrcvinfo *sinfo, int data_len, __u8 flags, __u16 ssn) argument 937 __u8 flags = 0; local 1363 _sctp_make_chunk(const struct sctp_association *asoc, __u8 type, __u8 flags, int paylen) argument 1402 sctp_make_data(const struct sctp_association *asoc, __u8 flags, int paylen) argument 1408 sctp_make_control(const struct sctp_association *asoc, __u8 type, __u8 flags, int paylen) argument 2797 sctp_make_asconf_update_ip(struct sctp_association *asoc, union sctp_addr *laddr, struct sockaddr *addrs, int addrcnt, __be16 flags) argument [all...] |
/net/sunrpc/auth_gss/ |
H A D | auth_gss.c | 1300 gss_lookup_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument 1302 return rpcauth_lookup_credcache(auth, acred, flags); 1306 gss_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags) argument 1428 gss_match(struct auth_cred *acred, struct rpc_cred *rc, int flags) argument
|
/net/sunrpc/ |
H A D | clnt.c | 450 if (!(args->flags & RPC_CLNT_CREATE_NOPING)) { 459 if (args->flags & RPC_CLNT_CREATE_HARDRTRY) 462 if (args->flags & RPC_CLNT_CREATE_AUTOBIND) 464 if (args->flags & RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT) 466 if (args->flags & RPC_CLNT_CREATE_DISCRTRY) 468 if (!(args->flags & RPC_CLNT_CREATE_QUIET)) 499 if (args->flags & RPC_CLNT_CREATE_INFINITE_SLOTS) 500 xprtargs.flags |= XPRT_CREATE_INFINITE_SLOTS; 501 if (args->flags & RPC_CLNT_CREATE_NO_IDLE_TIMEOUT) 502 xprtargs.flags | 966 rpc_call_sync(struct rpc_clnt *clnt, const struct rpc_message *msg, int flags) argument 1002 rpc_call_async(struct rpc_clnt *clnt, const struct rpc_message *msg, int flags, const struct rpc_call_ops *tk_ops, void *data) argument 2408 rpc_call_null(struct rpc_clnt *clnt, struct rpc_cred *cred, int flags) argument [all...] |
H A D | rpc_pipe.c | 143 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) { 568 struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags) argument 577 pipe->flags = flags; 1449 int flags, const char *dev_name, void *data) 1451 return mount_ns(fs_type, flags, current->nsproxy->net_ns, rpc_fill_super); 1448 rpc_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) argument
|
H A D | xprtsock.c | 264 * TCP receive state flags 274 * TCP RPC flags 405 int offset, size_t size, int flags); 419 int flags = XS_SENDMSG_FLAGS; local 423 flags |= MSG_MORE; 424 err = do_sendpage(sock, *ppage, base, len, flags); 458 clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags); 502 clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 527 if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) { 532 set_bit(SOCK_NOSPACE, &transport->sock->flags); [all...] |
/net/tipc/ |
H A D | socket.c | 104 static int tipc_accept(struct socket *sock, struct socket *new_sock, int flags); 414 * @flags: socket flags 418 int flags) 428 ret = tipc_accept(sock, *newsock, flags); 635 * socket state flags set 637 * unconnected no read flags 641 * no write flags 647 * no write flags 650 * no write flags 417 tipc_sock_accept_local(struct socket *sock, struct socket **newsock, int flags) argument 1318 tipc_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *m, size_t buf_len, int flags) argument 1414 tipc_recv_stream(struct kiocb *iocb, struct socket *sock, struct msghdr *m, size_t buf_len, int flags) argument 1833 tipc_connect(struct socket *sock, struct sockaddr *dest, int destlen, int flags) argument 1974 tipc_accept(struct socket *sock, struct socket *new_sock, int flags) argument [all...] |
/net/unix/ |
H A D | af_unix.c | 510 int addr_len, int flags); 968 int alen, int flags) 983 if (test_bit(SOCK_PASSCRED, &sock->flags) && 1063 int addr_len, int flags) 1082 if (test_bit(SOCK_PASSCRED, &sock->flags) && !u->addr && 1086 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK); 1261 if (test_bit(SOCK_PASSCRED, &old->flags)) 1262 set_bit(SOCK_PASSCRED, &new->flags); 1263 if (test_bit(SOCK_PASSSEC, &old->flags)) 1264 set_bit(SOCK_PASSSEC, &new->flags); 967 unix_dgram_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags) argument 1062 unix_stream_connect(struct socket *sock, struct sockaddr *uaddr, int addr_len, int flags) argument 1267 unix_accept(struct socket *sock, struct socket *newsock, int flags) argument 1756 unix_seqpacket_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) argument 1778 unix_dgram_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) argument 1919 unix_stream_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) argument [all...] |
/net/vmw_vsock/ |
H A D | vmci_transport.c | 541 u32 peer, u32 flags, bool trusted) 552 peer, flags, 560 peer, flags, VMCI_NO_PRIVILEGE_FLAGS); 573 u32 flags, 584 err = vmci_datagram_create_handle_priv(resource_id, flags, 590 err = vmci_datagram_create_handle(resource_id, flags, 807 * pass 0 as flags to vmci_event_subscribe()). VMCI makes no 1146 u32 flags; local 1202 flags = VMCI_QPFLAG_ATTACH_ONLY; 1203 flags | 537 vmci_transport_queue_pair_alloc(struct vmci_qp **qpair, struct vmci_handle *handle, u64 produce_size, u64 consume_size, u32 peer, u32 flags, bool trusted) argument 572 vmci_transport_datagram_create_hnd(u32 resource_id, u32 flags, vmci_datagram_recv_cb recv_cb, void *client_data, struct vmci_handle *out_handle) argument 1395 u32 flags; local 1670 u32 flags; local 1733 vmci_transport_dgram_dequeue(struct kiocb *kiocb, struct vsock_sock *vsk, struct msghdr *msg, size_t len, int flags) argument 1837 vmci_transport_stream_dequeue( struct vsock_sock *vsk, struct iovec *iov, size_t len, int flags) argument [all...] |
/net/wireless/ |
H A D | reg.c | 761 if (rule1->flags & NL80211_RRF_AUTO_BW) 763 if (rule2->flags & NL80211_RRF_AUTO_BW) 768 intersected_rule->flags = rule1->flags | rule2->flags; 778 if ((rule1->flags & NL80211_RRF_AUTO_BW) && 779 (rule2->flags & NL80211_RRF_AUTO_BW)) 780 intersected_rule->flags |= NL80211_RRF_AUTO_BW; 782 intersected_rule->flags &= ~NL80211_RRF_AUTO_BW; 806 /* for simplicity, currently consider only same flags */ 1071 u32 flags, bw_flags = 0; local [all...] |
/net/xfrm/ |
H A D | xfrm_user.c | 123 if (p->flags & XFRM_STATE_ESN) { 450 x->props.flags = p->flags; 452 if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC)) 715 p->flags = x->props.flags; 972 u32 portid, u32 seq, u32 flags) 988 *f = flags; 1073 u32 *flags = nlmsg_data(nlh); local 1081 if (build_spdinfo(r_skb, net, sportid, seq, *flags) < 971 build_spdinfo(struct sk_buff *skb, struct net *net, u32 portid, u32 seq, u32 flags) argument 1094 build_sadinfo(struct sk_buff *skb, struct net *net, u32 portid, u32 seq, u32 flags) argument 1130 u32 *flags = nlmsg_data(nlh); local [all...] |
/net/batman-adv/ |
H A D | types.h | 50 * BATADV_TT_REMOTE_MASK - bitmask selecting the flags that are sent over the 56 * BATADV_TT_SYNC_MASK - bitmask of the flags that need to be kept in sync 57 * among the nodes. These flags are used to compute the global/local CRC 208 * @mcast_flags: multicast flags announced by the orig node 634 * @flags: the flags we have last sent in our mcast tvlv 648 uint8_t flags; member in struct:batadv_priv_mcast 915 * @flags: various state handling flags (see batadv_tt_client_flags) 924 uint16_t flags; member in struct:batadv_tt_common_entry 1241 uint8_t flags; member in struct:batadv_tvlv_handler [all...] |
/net/core/ |
H A D | pktgen.c | 106 * Removed unused flags F_SET_SRCMAC & F_SET_SRCIP 041230 233 __u32 flags; member in struct:flow_state 253 __u32 flags; member in struct:pktgen_dev 557 if (pkt_dev->flags & F_IPV6) { 625 if (pkt_dev->flags & F_IPV6) 628 if (pkt_dev->flags & F_IPSRC_RND) 631 if (pkt_dev->flags & F_IPDST_RND) 634 if (pkt_dev->flags & F_TXSIZE_RND) 637 if (pkt_dev->flags & F_UDPSRC_RND) 640 if (pkt_dev->flags [all...] |
H A D | skbuff.c | 123 static void *__kmalloc_reserve(size_t size, gfp_t flags, int node, argument 134 flags | __GFP_NOMEMALLOC | __GFP_NOWARN, 136 if (obj || !(gfp_pfmemalloc_allowed(flags))) 141 obj = kmalloc_node_track_caller(size, flags, node); 185 * @flags: If SKB_ALLOC_FCLONE is set, allocate from fclone cache 199 int flags, int node) 207 cache = (flags & SKB_ALLOC_FCLONE) 210 if (sk_memalloc_socks() && (flags & SKB_ALLOC_RX)) 259 if (flags & SKB_ALLOC_FCLONE) { 345 unsigned long flags; local 198 __alloc_skb(unsigned int size, gfp_t gfp_mask, int flags, int node) argument 992 int flags = skb_alloc_rx_flag(skb) | (fclone ? SKB_ALLOC_FCLONE : 0); local 1813 skb_splice_bits(struct sk_buff *skb, unsigned int offset, struct pipe_inode_info *pipe, unsigned int tlen, unsigned int flags) argument 2252 unsigned long flags; local 2272 unsigned long flags; local 2311 unsigned long flags; local 2332 unsigned long flags; local 2352 unsigned long flags; local 2372 unsigned long flags; local 2394 unsigned long flags; local [all...] |
/net/ipv4/ |
H A D | tcp_output.c | 388 static void tcp_init_nondata_skb(struct sk_buff *skb, u32 seq, u8 flags) argument 395 TCP_SKB_CB(skb)->tcp_flags = flags; 403 if (flags & (TCPHDR_SYN | TCPHDR_FIN)) 737 unsigned long flags; local 742 local_irq_save(flags); 744 local_irq_restore(flags); 780 unsigned long flags, nflags; local 784 flags = tp->tsq_flags; 785 if (!(flags & TCP_DEFERRED_ALL)) 787 nflags = flags 861 unsigned long flags; local 1134 u8 flags; local 1672 u8 flags; local [all...] |
/net/ipv6/ |
H A D | route.c | 142 if (!(rt->dst.flags & DST_HOST)) 305 int flags, 309 0, DST_OBSOLETE_FORCE_CHK, flags); 327 if (!(rt->dst.flags & DST_HOST)) 442 int flags) 456 if (dev->flags & IFF_LOOPBACK) { 459 if (flags & RT6_LOOKUP_F_IFACE && oif) 469 flags & RT6_LOOKUP_F_IFACE)) 478 if (flags & RT6_LOOKUP_F_IFACE) 564 if ((dev->flags 303 ip6_dst_alloc(struct net *net, struct net_device *dev, int flags, struct fib6_table *table) argument 438 rt6_device_match(struct net *net, struct rt6_info *rt, const struct in6_addr *saddr, int oif, int flags) argument 789 ip6_pol_route_lookup(struct net *net, struct fib6_table *table, struct flowi6 *fl6, int flags) argument 811 ip6_route_lookup(struct net *net, struct flowi6 *fl6, int flags) argument 826 int flags = strict ? RT6_LOOKUP_F_IFACE : 0; local 911 ip6_pol_route(struct net *net, struct fib6_table *table, int oif, struct flowi6 *fl6, int flags) argument 982 ip6_pol_route_input(struct net *net, struct fib6_table *table, struct flowi6 *fl6, int flags) argument 988 ip6_route_input_lookup(struct net *net, struct net_device *dev, struct flowi6 *fl6, int flags) argument 1002 int flags = RT6_LOOKUP_F_HAS_SADDR; local 1015 ip6_pol_route_output(struct net *net, struct fib6_table *table, struct flowi6 *fl6, int flags) argument 1024 int flags = 0; local 1195 __ip6_route_redirect(struct net *net, struct fib6_table *table, struct flowi6 *fl6, int flags) argument 1250 int flags = RT6_LOOKUP_F_HAS_SADDR; local 2516 rt6_fill_node(struct net *net, struct sk_buff *skb, struct rt6_info *rt, struct in6_addr *dst, struct in6_addr *src, int iif, int type, u32 portid, u32 seq, int prefix, int nowait, unsigned int flags) argument 2725 int flags = 0; local [all...] |
/net/key/ |
H A D | af_key.c | 834 if (x->props.flags & XFRM_STATE_NOECN) 836 if (x->props.flags & XFRM_STATE_DECAP_DSCP) 838 if (x->props.flags & XFRM_STATE_NOPMTUDISC) 1103 x->props.flags |= XFRM_STATE_NOECN; 1105 x->props.flags |= XFRM_STATE_DECAP_DSCP; 1107 x->props.flags |= XFRM_STATE_NOPMTUDISC; 1159 /* x->algo.flags = sa->sadb_sa_flags; */ 1195 /* x->algo.flags = sa->sadb_sa_flags; */ 3635 int flags) 3643 if (flags 3633 pfkey_recvmsg(struct kiocb *kiocb, struct socket *sock, struct msghdr *msg, size_t len, int flags) argument [all...] |