/net/netfilter/ipset/ |
H A D | pfxlen.c | 294 /* Find the largest network which matches the range from left, in host order. */ 296 ip_set_range_to_cidr(u32 from, u32 to, u8 *cidr) argument 302 if ((from & ip_set_hostmask(i)) != from) 304 last = from | ~ip_set_hostmask(i); 311 return from;
|
/net/atm/ |
H A D | atm_misc.c | 87 void sonet_copy_stats(struct k_sonet_stats *from, struct sonet_stats *to) argument 89 #define __HANDLE_ITEM(i) to->i = atomic_read(&from->i) 95 void sonet_subtract_stats(struct k_sonet_stats *from, struct sonet_stats *to) argument 97 #define __HANDLE_ITEM(i) atomic_sub(to->i, &from->i)
|
H A D | resources.c | 144 * if we remove current device from atm_devs list, new device 146 * release async all vccs and remove them from vccs list too 160 static void copy_aal_stats(struct k_atm_aal_stats *from, argument 163 #define __HANDLE_ITEM(i) to->i = atomic_read(&from->i) 168 static void subtract_aal_stats(struct k_atm_aal_stats *from, argument 171 #define __HANDLE_ITEM(i) atomic_sub(to->i, &from->i)
|
/net/sched/ |
H A D | em_text.c | 36 int from, to; local 39 from = tcf_get_base_ptr(skb, tm->from_layer) - skb->data; 40 from += tm->from_offset; 45 return skb_find_text(skb, from, to, tm->config, &state) != UINT_MAX;
|
/net/x25/ |
H A D | x25_forward.c | 22 int x25_forward_call(struct x25_address *dest_addr, struct x25_neigh *from, argument 46 if (rt->dev == from->dev) { 72 new_frwd->dev2 = from->dev; 97 int x25_forward_data(int lci, struct x25_neigh *from, struct sk_buff *skb) { argument 111 if (from->dev == frwd->dev1) {
|
/net/core/ |
H A D | dev_addr_lists.c | 168 /* address on from list is not marked synced */ 235 * This funciton is intended to be called from the ndo_set_rx_mode 281 * __hw_addr_unsync_dev - Remove synchonized addresses from device 282 * @list: address list to remove syncronized addresses from 287 * This function is intended to be called from the ndo_stop or ndo_open 375 * Get the first (previously created) address from the list 417 * Release reference to a device address and remove it from the device 431 * We can not remove the first address from the list because 508 * from the device if the reference count drops to zero. 527 * @from 537 dev_uc_sync(struct net_device *to, struct net_device *from) argument 567 dev_uc_sync_multiple(struct net_device *to, struct net_device *from) argument 592 dev_uc_unsync(struct net_device *to, struct net_device *from) argument 758 dev_mc_sync(struct net_device *to, struct net_device *from) argument 788 dev_mc_sync_multiple(struct net_device *to, struct net_device *from) argument 813 dev_mc_unsync(struct net_device *to, struct net_device *from) argument [all...] |
H A D | utils.c | 112 * in4_pton - convert an IPv4 address from literal to binary representation 178 * in6_pton - convert an IPv6 address from literal to binary representation 307 __be32 from, __be32 to, int pseudohdr) 310 *sum = csum_fold(csum_add(csum_sub(~csum_unfold(*sum), from), 313 skb->csum = ~csum_add(csum_sub(~(skb->csum), from), to); 315 *sum = ~csum_fold(csum_add(csum_sub(csum_unfold(*sum), from), 321 const __be32 *from, const __be32 *to, 325 ~from[0], ~from[1], ~from[ 306 inet_proto_csum_replace4(__sum16 *sum, struct sk_buff *skb, __be32 from, __be32 to, int pseudohdr) argument 320 inet_proto_csum_replace16(__sum16 *sum, struct sk_buff *skb, const __be32 *from, const __be32 *to, int pseudohdr) argument [all...] |
H A D | datagram.c | 12 * Authors: Alan Cox <alan@lxorguk.ukuu.org.uk>. (datagram_poll() from old 16 * Alan Cox : NULL return from skb_peek_copy() 83 * Wait for the last received packet to be different from skb 138 * @off: an offset in bytes to peek skb from. Returns an offset 314 * @offset: offset in the buffer to start copying from 316 * @len: amount of data to copy from buffer to iovec 398 * @offset: offset in the buffer to start copying from 401 * @len: amount of data to copy from buffer to iovec 485 * skb_copy_datagram_from_iovec - Copy a datagram from an iovec. 488 * @from 495 skb_copy_datagram_from_iovec(struct sk_buff *skb, int offset, const struct iovec *from, int from_offset, int len) argument 590 zerocopy_sg_from_iovec(struct sk_buff *skb, const struct iovec *from, int offset, size_t count) argument [all...] |
/net/dccp/ |
H A D | options.c | 409 const unsigned char *tail, *from; local 434 from = av->av_buf + av->av_buf_head; 453 if (from + copylen > tail) { 454 const u16 tailsize = tail - from; 456 memcpy(to, from, tailsize); 460 from = av->av_buf; 463 memcpy(to, from, copylen); 464 from += copylen; 566 * Obtain RTT sample from Request/Response exchange. 599 /* Obtain RTT sample from Respons [all...] |
H A D | feat.c | 7 * Rewrote from scratch, some bits from earlier code by 30 /* feature-specific sysctls - initialised to the defaults from RFC 4340, 6.4 */ 140 * Lookup table for location and type of features (from RFC 4340/4342) 177 /* The first 9 entries are occupied by the types from RFC 4340, 6.4 */ 554 /* generate @to as full clone of @from - @to must not contain any nodes */ 555 int dccp_feat_clone_list(struct list_head const *from, struct list_head *to) argument 560 list_for_each_entry(entry, from, node) { 629 * dccp_feat_insert_opts - Generate FN options from current list state 694 * @feat: an NN feature from [all...] |
/net/netfilter/ipvs/ |
H A D | ip_vs_ftp.c | 14 * Most code here is taken from ip_masq_ftp.c in kernel 2.2. The difference 82 * Get <addr,port> from the string "xxx.xxx.xxx.xxx,ppp,ppp", started 158 * from the server (inside-to-outside). 176 union nf_inet_addr from; local 214 &from.ip, &port, 219 &from.ip, ntohs(port), &cp->caddr.ip, 0); 227 iph->protocol, &from, port, local 237 n_cp = ip_vs_conn_new(&p, AF_INET, &from, port, 251 from.ip = n_cp->vaddr.ip; 254 ((unsigned char *)&from [all...] |
/net/rxrpc/ |
H A D | ar-output.c | 32 * extract control messages from the sendmsg() control buffer 532 unsigned char __user *from; local 552 from = iov->iov_base; 567 _debug("SEGMENT %d @%p", segment, from); 642 ret = skb_add_data(skb, from, copy); 652 from += copy; 654 from = iov->iov_base;
|
/net/caif/ |
H A D | cfpkt_skbuff.c | 127 u8 *from; local 142 from = skb_pull(skb, len); 143 from -= len; 145 memcpy(data, from, len); 154 u8 *from; local 166 from = skb_tail_pointer(skb) - len; 168 memcpy(data, from, len);
|
/net/can/ |
H A D | gw.c | 16 * may be used to endorse or promote products derived from this software 24 * The provided data structures and external interfaces from this code 213 int from = calc_idx(xor->from_idx, cf->can_dlc); local 219 if (from < 0 || to < 0 || res < 0) 222 if (from <= to) { 223 for (i = from; i <= to; i++) 226 for (i = from; i >= to; i--) 257 int from = calc_idx(crc8->from_idx, cf->can_dlc); local 263 if (from < 0 || to < 0 || res < 0) 266 if (from < [all...] |
/net/ipv4/ |
H A D | icmp.c | 12 * module were derived from [icmp.c 1.0.11 06/02/93] by 36 * Martin Mares : Now copying as much data from the 56 * broadcast responses from broken routers. 117 /* An array of errno for error messages from dest unreach. */ 336 static int icmp_glue_bits(void *from, char *to, int offset, int len, int odd, argument 339 struct icmp_bxm *icmp_param = (struct icmp_bxm *)from; 564 * Check this, icmp_send is called from the most obscure devices 815 * RFC 1122: 3.2.2 MUST extract the protocol ID from the passed 1038 * triggered by ICMP_ECHOREPLY which sent from kernel.
|
H A D | ip_output.c | 230 * from host network stack. 362 /* Note: skb->sk can be different from sk, in case of tunnels */ 452 static void ip_copy_metadata(struct sk_buff *to, struct sk_buff *from) argument 454 to->pkt_type = from->pkt_type; 455 to->priority = from->priority; 456 to->protocol = from->protocol; 458 skb_dst_copy(to, from); 459 to->dev = from->dev; 460 to->mark = from->mark; 463 IPCB(to)->flags = IPCB(from) 755 ip_generic_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb) argument 783 ip_ufo_append_data(struct sock *sk, struct sk_buff_head *queue, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int hh_len, int fragheaderlen, int transhdrlen, int maxfraglen, unsigned int flags) argument 835 __ip_append_data(struct sock *sk, struct flowi4 *fl4, struct sk_buff_head *queue, struct inet_cork *cork, struct page_frag *pfrag, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, unsigned int flags) argument 1134 ip_append_data(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) argument 1458 ip_make_skb(struct sock *sk, struct flowi4 *fl4, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, struct ipcm_cookie *ipc, struct rtable **rtp, unsigned int flags) argument [all...] |
H A D | ping.c | 601 * Copy and checksum an ICMP Echo packet from user space into a buffer 602 * starting from the payload. 605 int ping_getfrag(void *from, char *to, argument 608 struct pingfakehdr *pfh = (struct pingfakehdr *)from; 985 /* We're called from icmp_rcv(). kfree_skb() is done there. */
|
H A D | raw.c | 330 void *from, size_t length, 375 if (memcpy_fromiovecend((void *)iph, from, 0, length)) 513 /* ANK: I did not forget to get protocol from port field. 329 raw_send_hdrinc(struct sock *sk, struct flowi4 *fl4, void *from, size_t length, struct rtable **rtp, unsigned int flags) argument
|
/net/ipv6/ |
H A D | icmp.c | 285 static int icmpv6_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb) argument 287 struct icmpv6_msg *msg = (struct icmpv6_msg *) from; 850 * gets used from softirqs, which is safe for
|
H A D | ip6_output.c | 442 We don't send redirects to frames decapsulated from IPsec. 523 static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) argument 525 to->pkt_type = from->pkt_type; 526 to->priority = from->priority; 527 to->protocol = from->protocol; 529 skb_dst_set(to, dst_clone(skb_dst(from))); 530 to->dev = from->dev; 531 to->mark = from->mark; 534 to->tc_index = from->tc_index; 536 nf_copy(to, from); 1043 ip6_ufo_append_data(struct sock *sk, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int hh_len, int fragheaderlen, int transhdrlen, int mtu, unsigned int flags, struct rt6_info *rt) argument 1137 ip6_append_data(struct sock *sk, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, int hlimit, int tclass, struct ipv6_txoptions *opt, struct flowi6 *fl6, struct rt6_info *rt, unsigned int flags, int dontfrag) argument [all...] |
H A D | raw.c | 8 * Adapted from linux/net/ipv4/raw.c 611 static int rawv6_send_hdrinc(struct sock *sk, void *from, int length, argument 650 err = memcpy_fromiovecend((void *)iph, from, 0, length);
|
/net/rds/ |
H A D | ib_recv.c | 6 * General Public License (GPL) Version 2, available from the file 75 * The entire 'from' list, including the from element itself, is put on 78 static void list_splice_entire_tail(struct list_head *from, argument 81 struct list_head *from_last = from->prev; 319 * ibinc was taken from recv if recv contained the start of a message. 507 rdsdebug("%lu bytes to user [%p, %zu] + %lu from frag " 555 * When the remote host receives our ack they'll free the sent message from 649 * 1. We call rds_ib_attempt_ack from the recv completion handler 656 * 3. If the ACK WR is done sending, we get called from th [all...] |
/net/batman-adv/ |
H A D | main.c | 236 * batadv_seq_print_text_primary_if_get - called from debugfs table printing 586 unsigned int from; local 593 from = (unsigned int)(payload_ptr - skb->data); 595 skb_prepare_seq_read(skb, from, to, &st); 617 * batadv_tvlv_handler_get - retrieve tvlv handler from the tvlv handler list 663 * batadv_tvlv_container_get - retrieve tvlv container from the tvlv container 721 * batadv_tvlv_container_remove - remove tvlv container from the tvlv container 1173 * batadv_get_vid - extract the VLAN identifier from skb if any
|
/net/openvswitch/ |
H A D | flow_netlink.c | 446 OVS_NLERR("Geneve option key length (%d) is different from mask length (%d).", 920 * Instead, we use a stream of netlink attributes, copied from 1004 * extracted from the packet itself. 1605 static int copy_action(const struct nlattr *from, argument 1608 int totlen = NLA_ALIGN(from->nla_len); 1611 to = reserve_sfa_size(sfa, from->nla_len); 1615 memcpy(to, from, totlen);
|
/net/sctp/ |
H A D | protocol.c | 163 /* Extract our IP addresses from the system and stash them in the 229 /* Initialize a sctp_addr from in incoming skb. */ 233 void *from; local 243 from = &ip_hdr(skb)->saddr; 246 from = &ip_hdr(skb)->daddr; 248 memcpy(&addr->v4.sin_addr.s_addr, from, sizeof(struct in_addr)); 251 /* Initialize an sctp_addr from a socket. */ 259 /* Initialize sk->sk_rcv_saddr from sctp_addr. */ 265 /* Initialize sk->sk_daddr from sctp_addr. */ 271 /* Initialize a sctp_addr from a [all...] |