Searched refs:len (Results 276 - 300 of 675) sorted by relevance

<<11121314151617181920>>

/net/nfc/hci/
H A Dcore.c216 if (atqa_skb->len != 2 || sak_skb->len != 1) {
236 if (uid_skb->len == 0 || uid_skb->len > NFC_NFCID1_MAXSIZE) {
241 memcpy(targets->nfcid1, uid_skb->data, uid_skb->len);
242 targets->nfcid1_len = uid_skb->len;
306 if (skb->len < 1) { /* no status data? */
383 if (skb->len && skb->len == strlen(hdev->init_data.session_id) &&
385 skb->len)
[all...]
/net/nfc/nci/
H A Dcore.c180 size_t len; member in struct:nci_set_config_param
189 BUG_ON(param->len > NCI_MAX_PARAM_LEN);
193 cmd.param.len = param->len;
194 memcpy(cmd.param.val, param->val, param->len);
196 nci_send_cmd(ndev, NCI_OP_CORE_SET_CONFIG_CMD, (3 + param->len), &cmd);
424 int nci_set_config(struct nci_dev *ndev, __u8 id, size_t len, __u8 *val) argument
428 if (!val || !len)
432 param.len = len;
[all...]
/net/openvswitch/
H A Dvport-internal_dev.c223 int len; local
225 len = skb->len;
238 return len;
/net/sched/
H A Dact_pedit.c29 [TCA_PEDIT_PARMS] = { .len = sizeof(struct tc_pedit) },
145 if (offset > 0 && offset > skb->len) {
148 offset, skb->len);
209 return skb->len;
H A Dact_csum.c42 [TCA_CSUM_PARMS] = { .len = sizeof(struct tc_csum), },
225 * udph->len to get the real length without any protocol check,
226 * UDPLITE uses udph->len for another thing,
235 ul = ntohs(udph->len);
278 * udph->len to get the real length without any protocol check,
279 * UDPLITE uses udph->len for another thing,
288 ul = ntohs(udph->len);
384 int off, len, optlen; local
388 len = ixhl - off;
390 while (len >
[all...]
H A Dsch_drr.c55 unsigned int len = cl->qdisc->q.qlen; local
58 qdisc_tree_decrease_qlen(cl->qdisc, len);
390 unsigned int len; local
402 len = qdisc_pkt_len(skb);
403 if (len <= cl->deficit) {
404 cl->deficit -= len;
426 unsigned int len; local
430 len = cl->qdisc->ops->drop(cl->qdisc);
431 if (len > 0) {
435 return len;
[all...]
/net/tipc/
H A Dnetlink.c64 rep_nlh->nlmsg_len = rep_buf->len;
/net/netfilter/
H A Dnfnetlink.c318 while (skb->len >= nlmsg_total_size(0)) {
417 if (msglen > skb->len)
418 msglen = skb->len;
438 skb->len < nlh->nlmsg_len)
450 if (msglen > skb->len)
451 msglen = skb->len;
454 skb->len < NLMSG_HDRLEN + sizeof(struct nfgenmsg))
H A Dnf_conntrack_ftp.c124 u_int32_t i, len; local
129 for (i = 0, len = 0; len < dlen && i < array_size; len++, data++) {
140 return len;
143 len, i, *data);
419 if (dataoff >= skb->len) {
421 skb->len);
424 datalen = skb->len - dataoff;
/net/ieee802154/
H A D6lowpan_rtnl.c105 const void *_saddr, unsigned int len)
166 raw_dump_table(__func__, "raw skb data dump", skb->data, skb->len);
168 if (skb->len < 2)
248 int offset, int len)
254 frag = lowpan_alloc_frag(skb, frag_hdrlen + len, wpan_hdr);
259 memcpy(skb_put(frag, len), skb_network_header(skb) + offset, len);
261 raw_dump_table(__func__, " fragment dump", frag->data, frag->len);
290 skb_unprocessed = skb->len - skb->mac_len - skb_offset;
344 lowpan_header_compress(skb, dev, ETH_P_IPV6, daddr, saddr, skb->len);
103 lowpan_header_create(struct sk_buff *skb, struct net_device *dev, unsigned short type, const void *_daddr, const void *_saddr, unsigned int len) argument
246 lowpan_xmit_fragment(struct sk_buff *skb, const struct ieee802154_hdr *wpan_hdr, u8 *frag_hdr, int frag_hdrlen, int offset, int len) argument
[all...]
/net/iucv/
H A Daf_iucv.c243 * PRMDATA[7] socket data length value (len is 0xff - PRMDATA[7])
247 * If the socket data len is greater 7, then PRMDATA can be used for special
249 * if the socket data len is > 7, the function returns 8.
360 if (skb->len > skb->dev->mtu) {
982 int *len, int peer)
989 *len = sizeof(struct sockaddr_iucv);
1009 * @skb: The socket data to send, skb->len MUST BE <= 7
1013 * list and the socket data len at index 7 (last byte).
1023 memcpy(prmdata, (void *) skb->data, skb->len);
1024 prmdata[7] = 0xff - (u8) skb->len;
981 iucv_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) argument
1029 iucv_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len) argument
1210 iucv_fragment_skb(struct sock *sk, struct sk_buff *skb, int len) argument
1253 unsigned int len; local
1322 iucv_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags) argument
1635 int len; local
1788 int len; local
[all...]
/net/nfc/
H A Ddigital_core.c48 unsigned int len)
52 skb = alloc_skb(len + ddev->tx_headroom + ddev->tx_tailroom,
65 crc = crc_func(init, skb->data, skb->len);
83 if (skb->len <= 2)
86 crc = crc_func(crc_init, skb->data, skb->len - 2);
94 rc = (skb->data[skb->len - 2] - (crc & 0xFF)) +
95 (skb->data[skb->len - 1] - ((crc >> 8) & 0xFF));
100 skb_trim(skb, skb->len - 2);
137 cmd->resp->data, cmd->resp->len, false);
179 cmd->req->data, cmd->req->len, fals
47 digital_skb_alloc(struct nfc_digital_dev *ddev, unsigned int len) argument
[all...]
/net/ipv4/netfilter/
H A Dnf_log_ipv4.c55 * TOS, len, DF/MF, fragment offset, TTL, src, dst, options. */
143 skb->len - iphoff - ih->ihl*4);
153 skb->len-iphoff-ih->ihl*4 < required_len[ich->type]) {
155 skb->len - iphoff - ih->ihl*4);
213 skb->len - iphoff - ih->ihl*4);
236 skb->len - iphoff - ih->ihl*4);
/net/ipv6/netfilter/
H A Dnf_log_ipv6.c149 skb->len - ptr);
180 skb->len - ptr);
226 skb->len - ptr);
313 unsigned int len = dev->hard_header_len; local
325 for (i = 1; i < len; i++)
/net/rxrpc/
H A Drxkad.c210 unsigned int len; local
239 len = data_size + call->conn->size_align - 1;
240 len &= ~(call->conn->size_align - 1);
243 skb_to_sgvec(skb, sg, 0, len);
244 crypto_blkcipher_encrypt_iv(&desc, sg, sg, len);
379 if (data_size > skb->len)
381 else if (data_size < skb->len)
382 skb->len = data_size;
416 _enter(",{%d}", skb->len);
433 skb_to_sgvec(skb, sg, 0, skb->len);
573 size_t len; local
636 size_t len; local
[all...]
/net/wireless/
H A Dutil.c337 if (unlikely(skb->len < 10))
340 if (unlikely(hdrlen > skb->len))
466 __be16 len; local
469 len = htons(skb->len);
473 ehdr->h_proto = len;
491 if (unlikely(skb->len < ETH_HLEN))
623 __be16 len = eth->h_proto; local
624 unsigned int subframe_len = sizeof(struct ethhdr) + ntohs(len);
626 remaining = skb->len;
677 memcpy(skb_push(frame, sizeof(__be16)), &len, local
1127 cfg80211_get_p2p_attr(const u8 *ies, unsigned int len, enum ieee80211_p2p_attr_id attr, u8 *buf, unsigned int bufsize) argument
[all...]
/net/bridge/netfilter/
H A Debtables.c235 (*(counter_base + i)).bcnt += skb->len;
1096 unsigned int len)
1105 if (len != sizeof(tmp) + tmp.entries_size) {
1106 BUGPRINT("Wrong len argument\n");
1281 const void __user *user, unsigned int len)
1328 unsigned int len)
1335 if (len != sizeof(hlp) + hlp.num_counters * sizeof(struct ebt_counter))
1339 hlp.num_counters, user, len);
1428 const int *len, int cmd)
1451 if (*len !
1095 do_replace(struct net *net, const void __user *user, unsigned int len) argument
1278 do_update_counters(struct net *net, const char *name, struct ebt_counter __user *counters, unsigned int num_counters, const void __user *user, unsigned int len) argument
1327 update_counters(struct net *net, const void __user *user, unsigned int len) argument
1427 copy_everything_to_user(struct ebt_table *t, void __user *user, const int *len, int cmd) argument
1479 do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len) argument
1501 do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument
1795 compat_copy_everything_to_user(struct ebt_table *t, void __user *user, int *len, int cmd) argument
2139 compat_copy_ebt_replace_from_user(struct ebt_replace *repl, void __user *user, unsigned int len) argument
2175 compat_do_replace(struct net *net, void __user *user, unsigned int len) argument
2272 compat_update_counters(struct net *net, void __user *user, unsigned int len) argument
2288 compat_do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len) argument
2310 compat_do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument
[all...]
/net/netfilter/ipset/
H A Dip_set_core.c286 .len = sizeof(struct in6_addr) },
332 .len = sizeof(struct ip_set_counter),
337 .len = sizeof(unsigned long),
343 .len = sizeof(struct ip_set_skbinfo),
349 .len = sizeof(struct ip_set_comment),
365 ip_set_elem_len(struct ip_set *set, struct nlattr *tb[], size_t len) argument
378 offset += ALIGN(len + offset, ip_set_extensions[id].align);
381 offset += ip_set_extensions[id].len;
383 return len + offset;
744 .len
1839 ip_set_sockfn_get(struct sock *sk, int optval, void __user *user, int *len) argument
[all...]
/net/netfilter/ipvs/
H A Dip_vs_sync.c536 int len; local
575 len = (cp->flags & IP_VS_CONN_F_SEQ_MASK) ? FULL_CONN_SIZE :
598 m->size = htons(ntohs(m->size) + len);
599 buff->head += len;
633 unsigned int len, pe_name_len, pad; local
668 len = sizeof(struct ip_vs_sync_v6);
671 len = sizeof(struct ip_vs_sync_v4);
674 len += sizeof(struct ip_vs_sync_conn_options) + 2;
677 len += cp->pe_data_len + 2; /* + Param hdr field */
679 len
1546 int len; local
1578 int len; local
1685 int len; local
[all...]
/net/irda/
H A Diriap.c447 __u16 len; local
461 len = get_unaligned_be16(fp + n);
464 IRDA_DEBUG(4, "%s(), len=%d\n", __func__, len);
514 if (n + value_len < skb->len)
569 IRDA_ASSERT(value->len <= 1024, return;);
579 tx_skb = alloc_skb(value->len + self->max_header_size + 32,
604 skb_put(tx_skb, 3 + value->len);
607 fp[n++] = (__u8) value->len;
608 memcpy(fp+n, value->t.string, value->len);
[all...]
/net/l2tp/
H A Dl2tp_netlink.c397 return skb->len;
465 u16 len = nla_len(info->attrs[L2TP_ATTR_COOKIE]); local
466 if (len > 8) {
470 cfg.cookie_len = len;
471 memcpy(&cfg.cookie[0], nla_data(info->attrs[L2TP_ATTR_COOKIE]), len);
474 u16 len = nla_len(info->attrs[L2TP_ATTR_PEER_COOKIE]); local
475 if (len > 8) {
479 cfg.peer_cookie_len = len;
480 memcpy(&cfg.peer_cookie[0], nla_data(info->attrs[L2TP_ATTR_PEER_COOKIE]), len);
750 return skb->len;
[all...]
/net/llc/
H A Daf_llc.c701 * @len: Size of user buffer.
708 struct msghdr *msg, size_t len, int flags)
736 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
815 skb_len = skb->len;
817 used = skb->len - offset;
818 if (len < used)
819 used = len;
834 len -= used;
850 } while (len > 0);
877 * @len
707 llc_ui_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags) argument
882 llc_ui_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len) argument
1119 int val = 0, len = 0, rc = -EINVAL; local
[all...]
/net/decnet/
H A Ddn_nsp_out.c287 static inline __le16 *dn_mk_common_header(struct dn_scp *scp, struct sk_buff *skb, unsigned char msgflag, int len) argument
289 unsigned char *ptr = skb_push(skb, len);
291 BUG_ON(len < 5);
520 __u8 len = (__u8)le16_to_cpu(scp->conndata_out.opt_optl); local
522 if ((skb = dn_alloc_skb(sk, 50 + len, gfp)) == NULL)
533 *skb_put(skb,1) = len;
535 if (len > 0)
536 memcpy(skb_put(skb, len), scp->conndata_out.opt_data, len); local
/net/dsa/
H A Dslave.c281 int len = ETH_GSTRING_LEN; local
283 strncpy(data, "tx_packets", len);
284 strncpy(data + len, "tx_bytes", len);
285 strncpy(data + 2 * len, "rx_packets", len);
286 strncpy(data + 3 * len, "rx_bytes", len);
288 ds->drv->get_strings(ds, p->port, data + 4 * len);
/net/batman-adv/
H A Dmain.c587 unsigned int to = skb->len;
590 unsigned int len; local
596 while ((len = skb_seq_read(consumed, &data, &st)) != 0) {
597 crc = crc32c(crc, data, len);
598 consumed += len;
714 tvlv_len += ntohs(tvlv->tvlv_hdr.len);
785 tvlv_new->tvlv_hdr.len = htons(tvlv_value_len);
787 memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len));
874 tvlv_hdr->len = tvlv->tvlv_hdr.len;
[all...]

Completed in 331 milliseconds

<<11121314151617181920>>