/net/nfc/hci/ |
H A D | core.c | 216 if (atqa_skb->len != 2 || sak_skb->len != 1) { 236 if (uid_skb->len == 0 || uid_skb->len > NFC_NFCID1_MAXSIZE) { 241 memcpy(targets->nfcid1, uid_skb->data, uid_skb->len); 242 targets->nfcid1_len = uid_skb->len; 306 if (skb->len < 1) { /* no status data? */ 383 if (skb->len && skb->len == strlen(hdev->init_data.session_id) && 385 skb->len) [all...] |
/net/nfc/nci/ |
H A D | core.c | 180 size_t len; member in struct:nci_set_config_param 189 BUG_ON(param->len > NCI_MAX_PARAM_LEN); 193 cmd.param.len = param->len; 194 memcpy(cmd.param.val, param->val, param->len); 196 nci_send_cmd(ndev, NCI_OP_CORE_SET_CONFIG_CMD, (3 + param->len), &cmd); 424 int nci_set_config(struct nci_dev *ndev, __u8 id, size_t len, __u8 *val) argument 428 if (!val || !len) 432 param.len = len; [all...] |
/net/openvswitch/ |
H A D | vport-internal_dev.c | 223 int len; local 225 len = skb->len; 238 return len;
|
/net/sched/ |
H A D | act_pedit.c | 29 [TCA_PEDIT_PARMS] = { .len = sizeof(struct tc_pedit) }, 145 if (offset > 0 && offset > skb->len) { 148 offset, skb->len); 209 return skb->len;
|
H A D | act_csum.c | 42 [TCA_CSUM_PARMS] = { .len = sizeof(struct tc_csum), }, 225 * udph->len to get the real length without any protocol check, 226 * UDPLITE uses udph->len for another thing, 235 ul = ntohs(udph->len); 278 * udph->len to get the real length without any protocol check, 279 * UDPLITE uses udph->len for another thing, 288 ul = ntohs(udph->len); 384 int off, len, optlen; local 388 len = ixhl - off; 390 while (len > [all...] |
H A D | sch_drr.c | 55 unsigned int len = cl->qdisc->q.qlen; local 58 qdisc_tree_decrease_qlen(cl->qdisc, len); 390 unsigned int len; local 402 len = qdisc_pkt_len(skb); 403 if (len <= cl->deficit) { 404 cl->deficit -= len; 426 unsigned int len; local 430 len = cl->qdisc->ops->drop(cl->qdisc); 431 if (len > 0) { 435 return len; [all...] |
/net/tipc/ |
H A D | netlink.c | 64 rep_nlh->nlmsg_len = rep_buf->len;
|
/net/netfilter/ |
H A D | nfnetlink.c | 318 while (skb->len >= nlmsg_total_size(0)) { 417 if (msglen > skb->len) 418 msglen = skb->len; 438 skb->len < nlh->nlmsg_len) 450 if (msglen > skb->len) 451 msglen = skb->len; 454 skb->len < NLMSG_HDRLEN + sizeof(struct nfgenmsg))
|
H A D | nf_conntrack_ftp.c | 124 u_int32_t i, len; local 129 for (i = 0, len = 0; len < dlen && i < array_size; len++, data++) { 140 return len; 143 len, i, *data); 419 if (dataoff >= skb->len) { 421 skb->len); 424 datalen = skb->len - dataoff;
|
/net/ieee802154/ |
H A D | 6lowpan_rtnl.c | 105 const void *_saddr, unsigned int len) 166 raw_dump_table(__func__, "raw skb data dump", skb->data, skb->len); 168 if (skb->len < 2) 248 int offset, int len) 254 frag = lowpan_alloc_frag(skb, frag_hdrlen + len, wpan_hdr); 259 memcpy(skb_put(frag, len), skb_network_header(skb) + offset, len); 261 raw_dump_table(__func__, " fragment dump", frag->data, frag->len); 290 skb_unprocessed = skb->len - skb->mac_len - skb_offset; 344 lowpan_header_compress(skb, dev, ETH_P_IPV6, daddr, saddr, skb->len); 103 lowpan_header_create(struct sk_buff *skb, struct net_device *dev, unsigned short type, const void *_daddr, const void *_saddr, unsigned int len) argument 246 lowpan_xmit_fragment(struct sk_buff *skb, const struct ieee802154_hdr *wpan_hdr, u8 *frag_hdr, int frag_hdrlen, int offset, int len) argument [all...] |
/net/iucv/ |
H A D | af_iucv.c | 243 * PRMDATA[7] socket data length value (len is 0xff - PRMDATA[7]) 247 * If the socket data len is greater 7, then PRMDATA can be used for special 249 * if the socket data len is > 7, the function returns 8. 360 if (skb->len > skb->dev->mtu) { 982 int *len, int peer) 989 *len = sizeof(struct sockaddr_iucv); 1009 * @skb: The socket data to send, skb->len MUST BE <= 7 1013 * list and the socket data len at index 7 (last byte). 1023 memcpy(prmdata, (void *) skb->data, skb->len); 1024 prmdata[7] = 0xff - (u8) skb->len; 981 iucv_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) argument 1029 iucv_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len) argument 1210 iucv_fragment_skb(struct sock *sk, struct sk_buff *skb, int len) argument 1253 unsigned int len; local 1322 iucv_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags) argument 1635 int len; local 1788 int len; local [all...] |
/net/nfc/ |
H A D | digital_core.c | 48 unsigned int len) 52 skb = alloc_skb(len + ddev->tx_headroom + ddev->tx_tailroom, 65 crc = crc_func(init, skb->data, skb->len); 83 if (skb->len <= 2) 86 crc = crc_func(crc_init, skb->data, skb->len - 2); 94 rc = (skb->data[skb->len - 2] - (crc & 0xFF)) + 95 (skb->data[skb->len - 1] - ((crc >> 8) & 0xFF)); 100 skb_trim(skb, skb->len - 2); 137 cmd->resp->data, cmd->resp->len, false); 179 cmd->req->data, cmd->req->len, fals 47 digital_skb_alloc(struct nfc_digital_dev *ddev, unsigned int len) argument [all...] |
/net/ipv4/netfilter/ |
H A D | nf_log_ipv4.c | 55 * TOS, len, DF/MF, fragment offset, TTL, src, dst, options. */ 143 skb->len - iphoff - ih->ihl*4); 153 skb->len-iphoff-ih->ihl*4 < required_len[ich->type]) { 155 skb->len - iphoff - ih->ihl*4); 213 skb->len - iphoff - ih->ihl*4); 236 skb->len - iphoff - ih->ihl*4);
|
/net/ipv6/netfilter/ |
H A D | nf_log_ipv6.c | 149 skb->len - ptr); 180 skb->len - ptr); 226 skb->len - ptr); 313 unsigned int len = dev->hard_header_len; local 325 for (i = 1; i < len; i++)
|
/net/rxrpc/ |
H A D | rxkad.c | 210 unsigned int len; local 239 len = data_size + call->conn->size_align - 1; 240 len &= ~(call->conn->size_align - 1); 243 skb_to_sgvec(skb, sg, 0, len); 244 crypto_blkcipher_encrypt_iv(&desc, sg, sg, len); 379 if (data_size > skb->len) 381 else if (data_size < skb->len) 382 skb->len = data_size; 416 _enter(",{%d}", skb->len); 433 skb_to_sgvec(skb, sg, 0, skb->len); 573 size_t len; local 636 size_t len; local [all...] |
/net/wireless/ |
H A D | util.c | 337 if (unlikely(skb->len < 10)) 340 if (unlikely(hdrlen > skb->len)) 466 __be16 len; local 469 len = htons(skb->len); 473 ehdr->h_proto = len; 491 if (unlikely(skb->len < ETH_HLEN)) 623 __be16 len = eth->h_proto; local 624 unsigned int subframe_len = sizeof(struct ethhdr) + ntohs(len); 626 remaining = skb->len; 677 memcpy(skb_push(frame, sizeof(__be16)), &len, local 1127 cfg80211_get_p2p_attr(const u8 *ies, unsigned int len, enum ieee80211_p2p_attr_id attr, u8 *buf, unsigned int bufsize) argument [all...] |
/net/bridge/netfilter/ |
H A D | ebtables.c | 235 (*(counter_base + i)).bcnt += skb->len; 1096 unsigned int len) 1105 if (len != sizeof(tmp) + tmp.entries_size) { 1106 BUGPRINT("Wrong len argument\n"); 1281 const void __user *user, unsigned int len) 1328 unsigned int len) 1335 if (len != sizeof(hlp) + hlp.num_counters * sizeof(struct ebt_counter)) 1339 hlp.num_counters, user, len); 1428 const int *len, int cmd) 1451 if (*len ! 1095 do_replace(struct net *net, const void __user *user, unsigned int len) argument 1278 do_update_counters(struct net *net, const char *name, struct ebt_counter __user *counters, unsigned int num_counters, const void __user *user, unsigned int len) argument 1327 update_counters(struct net *net, const void __user *user, unsigned int len) argument 1427 copy_everything_to_user(struct ebt_table *t, void __user *user, const int *len, int cmd) argument 1479 do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len) argument 1501 do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument 1795 compat_copy_everything_to_user(struct ebt_table *t, void __user *user, int *len, int cmd) argument 2139 compat_copy_ebt_replace_from_user(struct ebt_replace *repl, void __user *user, unsigned int len) argument 2175 compat_do_replace(struct net *net, void __user *user, unsigned int len) argument 2272 compat_update_counters(struct net *net, void __user *user, unsigned int len) argument 2288 compat_do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len) argument 2310 compat_do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) argument [all...] |
/net/netfilter/ipset/ |
H A D | ip_set_core.c | 286 .len = sizeof(struct in6_addr) }, 332 .len = sizeof(struct ip_set_counter), 337 .len = sizeof(unsigned long), 343 .len = sizeof(struct ip_set_skbinfo), 349 .len = sizeof(struct ip_set_comment), 365 ip_set_elem_len(struct ip_set *set, struct nlattr *tb[], size_t len) argument 378 offset += ALIGN(len + offset, ip_set_extensions[id].align); 381 offset += ip_set_extensions[id].len; 383 return len + offset; 744 .len 1839 ip_set_sockfn_get(struct sock *sk, int optval, void __user *user, int *len) argument [all...] |
/net/netfilter/ipvs/ |
H A D | ip_vs_sync.c | 536 int len; local 575 len = (cp->flags & IP_VS_CONN_F_SEQ_MASK) ? FULL_CONN_SIZE : 598 m->size = htons(ntohs(m->size) + len); 599 buff->head += len; 633 unsigned int len, pe_name_len, pad; local 668 len = sizeof(struct ip_vs_sync_v6); 671 len = sizeof(struct ip_vs_sync_v4); 674 len += sizeof(struct ip_vs_sync_conn_options) + 2; 677 len += cp->pe_data_len + 2; /* + Param hdr field */ 679 len 1546 int len; local 1578 int len; local 1685 int len; local [all...] |
/net/irda/ |
H A D | iriap.c | 447 __u16 len; local 461 len = get_unaligned_be16(fp + n); 464 IRDA_DEBUG(4, "%s(), len=%d\n", __func__, len); 514 if (n + value_len < skb->len) 569 IRDA_ASSERT(value->len <= 1024, return;); 579 tx_skb = alloc_skb(value->len + self->max_header_size + 32, 604 skb_put(tx_skb, 3 + value->len); 607 fp[n++] = (__u8) value->len; 608 memcpy(fp+n, value->t.string, value->len); [all...] |
/net/l2tp/ |
H A D | l2tp_netlink.c | 397 return skb->len; 465 u16 len = nla_len(info->attrs[L2TP_ATTR_COOKIE]); local 466 if (len > 8) { 470 cfg.cookie_len = len; 471 memcpy(&cfg.cookie[0], nla_data(info->attrs[L2TP_ATTR_COOKIE]), len); 474 u16 len = nla_len(info->attrs[L2TP_ATTR_PEER_COOKIE]); local 475 if (len > 8) { 479 cfg.peer_cookie_len = len; 480 memcpy(&cfg.peer_cookie[0], nla_data(info->attrs[L2TP_ATTR_PEER_COOKIE]), len); 750 return skb->len; [all...] |
/net/llc/ |
H A D | af_llc.c | 701 * @len: Size of user buffer. 708 struct msghdr *msg, size_t len, int flags) 736 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len); 815 skb_len = skb->len; 817 used = skb->len - offset; 818 if (len < used) 819 used = len; 834 len -= used; 850 } while (len > 0); 877 * @len 707 llc_ui_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags) argument 882 llc_ui_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len) argument 1119 int val = 0, len = 0, rc = -EINVAL; local [all...] |
/net/decnet/ |
H A D | dn_nsp_out.c | 287 static inline __le16 *dn_mk_common_header(struct dn_scp *scp, struct sk_buff *skb, unsigned char msgflag, int len) argument 289 unsigned char *ptr = skb_push(skb, len); 291 BUG_ON(len < 5); 520 __u8 len = (__u8)le16_to_cpu(scp->conndata_out.opt_optl); local 522 if ((skb = dn_alloc_skb(sk, 50 + len, gfp)) == NULL) 533 *skb_put(skb,1) = len; 535 if (len > 0) 536 memcpy(skb_put(skb, len), scp->conndata_out.opt_data, len); local
|
/net/dsa/ |
H A D | slave.c | 281 int len = ETH_GSTRING_LEN; local 283 strncpy(data, "tx_packets", len); 284 strncpy(data + len, "tx_bytes", len); 285 strncpy(data + 2 * len, "rx_packets", len); 286 strncpy(data + 3 * len, "rx_bytes", len); 288 ds->drv->get_strings(ds, p->port, data + 4 * len);
|
/net/batman-adv/ |
H A D | main.c | 587 unsigned int to = skb->len; 590 unsigned int len; local 596 while ((len = skb_seq_read(consumed, &data, &st)) != 0) { 597 crc = crc32c(crc, data, len); 598 consumed += len; 714 tvlv_len += ntohs(tvlv->tvlv_hdr.len); 785 tvlv_new->tvlv_hdr.len = htons(tvlv_value_len); 787 memcpy(tvlv_new + 1, tvlv_value, ntohs(tvlv_new->tvlv_hdr.len)); 874 tvlv_hdr->len = tvlv->tvlv_hdr.len; [all...] |