/net/l2tp/ |
H A D | l2tp_ip6.c | 136 int length; local 167 length = min(32u, skb->len); 168 if (!pskb_may_pull(skb, length)) 172 print_hex_dump_bytes("", DUMP_PREFIX_OFFSET, ptr, length);
|
H A D | l2tp_core.h | 72 u16 l2specific_len; /* Layer 2 specific length */ 265 int length, int (*payload_hook)(struct sk_buff *skb));
|
/net/sctp/ |
H A D | ulpevent.c | 156 /* Trim the buffer to the right length. */ 158 ntohs(chunk->chunk_hdr->length) - 200 * This field is the total length of the notification data, including 287 * This field is the total length of the notification data, including 383 elen = WORD_ROUND(ntohs(ch->length)) - sizeof(sctp_errhdr_t); 404 /* Trim the buffer to the right length. */ 435 int len = ntohs(chunk->chunk_hdr->length); 483 * This field is the total length of the notification data, including 572 * This field is the total length of the notification data, including 676 * pass up the wrong length t [all...] |
H A D | sm_statefuns.c | 160 /* Small helper function that checks if the chunk length 161 * is of the appropriate length. The 'required_length' argument 163 * Return Values: 1 = Valid length 164 * 0 = Invalid length 171 __u16 chunk_length = ntohs(chunk->chunk_hdr->length); 238 /* Make sure that the SHUTDOWN_COMPLETE chunk has a valid length. */ 344 /* Make sure that the INIT chunk has a valid length. 373 ntohs(err_chunk->chunk_hdr->length) - 395 /* Tag the variable length parameters. */ 420 len = ntohs(err_chunk->chunk_hdr->length) [all...] |
H A D | input.c | 669 /* Break out if chunk length is less then minimal. */ 670 if (ntohs(ch->length) < sizeof(sctp_chunkhdr_t)) 673 ch_end = ((__u8 *)ch) + WORD_ROUND(ntohs(ch->length)); 1047 /* Break out if chunk length is less then minimal. */ 1048 if (ntohs(ch->length) < sizeof(sctp_chunkhdr_t)) 1051 ch_end = ((__u8 *)ch) + WORD_ROUND(ntohs(ch->length)); 1109 * that the chunk length doesn't cause overflow. Otherwise, we'll 1112 if (WORD_ROUND(ntohs(ch->length)) > skb->len)
|
H A D | ipv6.c | 473 /* Initialize an address parameter from a sctp_addr and return the length 479 int length = sizeof(sctp_ipv6addr_param_t); local 482 param->v6.param_hdr.length = htons(length); 485 return length;
|
/net/netfilter/ |
H A D | xt_osf.c | 249 foptsize += f->opt[optnum].length; 260 __u32 len = f->opt[optnum].length;
|
/net/sunrpc/xprtrdma/ |
H A D | verbs.c | 211 dprintk("RPC: %s: rep %p status %X opcode %X length %u\n", 1577 if (req->rl_iov.length == 0) /* special case xprt_rdma_allocate() */ 1623 iov->length = len; 1636 ipb.size = iov->length; 1641 "registered 0x%llx length %d\n", 1665 iov->addr, iov->length, DMA_BIDIRECTIONAL); 1762 fastreg_wr.wr.fast_reg.length = page_no << PAGE_SHIFT; 1763 if (fastreg_wr.wr.fast_reg.length < len) { 1986 req->rl_send_iov[3].addr, req->rl_send_iov[3].length, 1989 req->rl_send_iov[1].addr, req->rl_send_iov[1].length, [all...] |
H A D | transport.c | 322 /* Set some length limits */ 476 * Outgoing length shortage. Our inline write max must have 514 nreq->rl_iov.length = 0; 543 if (req->rl_iov.length == 0) { /* see allocate above */ 566 if (req->rl_iov.length == 0) { /* see allocate above */
|
H A D | rpc_rdma.c | 148 * of type RDMA_NOMSG carrying the xid and length. As a result, reply 283 * Marshal chunks. This routine returns the header length 503 /* new length after pullup */ 537 req->rl_send_iov[0].length = hdrlen; 541 req->rl_send_iov[1].length = rpclen; 550 req->rl_send_iov[2].length = padlen; 554 req->rl_send_iov[3].length = rqst->rq_slen - rpclen; 564 * Chase down a received write or reply chunklist to get length
|
/net/wireless/ |
H A D | wext-compat.c | 152 data->length = sizeof(struct iw_range); 336 /* Fragment length must be even, so strip LSB. */ 619 else if (erq->length == 0) { 634 params.key_len = erq->length; 635 if (erq->length == 5) 637 else if (erq->length == 13) 763 erq->length = 0; 767 erq->length = min_t(size_t, erq->length, 769 memcpy(keybuf, wdev->wext.keys->params[idx].key, erq->length); [all...] |
H A D | sme.c | 606 wrqu.data.length = req_ie_len; 612 wrqu.data.length = resp_ie_len; 678 * - and country_ie[1] which is the IE length 754 wrqu.data.length = req_ie_len; 761 wrqu.data.length = resp_ie_len;
|
/net/rds/ |
H A D | ib_recv.c | 64 sge->length = sizeof(struct rds_header); 69 sge->length = RDS_FRAG_SIZE; 339 sge->length = sizeof(struct rds_header); 343 sge->length = ib_sg_dma_len(ic->i_cm_id->device, &recv->r_frag->f_sg); 537 sge->length = sizeof(struct rds_header);
|
H A D | iw_recv.c | 100 sge->length = RDS_FRAG_SIZE; 105 sge->length = sizeof(struct rds_header); 195 sge->length = RDS_FRAG_SIZE; 199 sge->length = sizeof(struct rds_header); 368 sge->length = sizeof(struct rds_header);
|
/net/ipv6/ |
H A D | raw.c | 555 total_len = inet_sk(sk)->cork.base.length; 611 static int rawv6_send_hdrinc(struct sock *sk, void *from, int length, argument 623 if (length > rt->dst.dev->mtu) { 631 length + hlen + tlen + 15, 643 skb_put(skb, length); 650 err = memcpy_fromiovecend((void *)iph, from, 0, length);
|
H A D | ah6.c | 193 if (hao->length != sizeof(hao->addr)) { 194 net_warn_ratelimited("destopt hao: invalid header length: %u\n", 195 hao->length); 511 * as AH header length. Then copy back the copy as long as hdr_len
|
/net/sched/ |
H A D | sch_teql.c | 319 unsigned int length = qdisc_pkt_len(skb); local 328 master->tx_bytes += length;
|
/net/mac80211/ |
H A D | spectmgmt.c | 219 msr_report->u.action.u.measurement.length =
|
/net/atm/ |
H A D | mpc.c | 378 uint8_t length, mpoa_device_type, number_of_mps_macs; local 384 dprintk("total length of all TLVs %d\n", sizeoftlvs); 394 length = tlvs[4]; 396 dprintk(" type 0x%x length %02x\n", type, length); 397 if (tlvs + length > end_of_tlvs) { 409 tlvs += length; 417 length < (42 + number_of_mps_macs*ETH_ALEN)) { /* :) */ 423 length < 22 + number_of_mps_macs*ETH_ALEN) { 1343 tlv[4] = 1 + 1 + ATM_ESA_LEN; /* length */ [all...] |
/net/rxrpc/ |
H A D | rxkad.c | 361 /* remove the decrypted packet length */ 446 /* remove the decrypted packet length */ 704 sg[0].length = PAGE_SIZE - sg[0].offset; 705 sg_set_buf(&sg[1], buf + sg[0].length, buflen - sg[0].length); 711 ASSERTCMP(sg[0].length + sg[1].length, ==, buflen);
|
/net/ax25/ |
H A D | af_ax25.c | 686 int maxlen, length; local 698 length = min_t(unsigned int, maxlen, sizeof(int)); 753 length = strlen(devname) + 1; 756 length = 1; 768 if (put_user(length, optlen)) 771 return copy_to_user(optval, valptr, length) ? -EFAULT : 0;
|
/net/9p/ |
H A D | client.c | 1714 "<<< mode=%8.8x atime=%8.8x mtime=%8.8x length=%llx\n" 1719 ret->atime, ret->mtime, (unsigned long long)ret->length, 1799 /* NOTE: size shouldn't include its own length */ 1801 /* mode[4] atime[4] mtime[4] length[8]*/ 1836 " mode=%8.8x atime=%8.8x mtime=%8.8x length=%llx\n" 1841 wst->atime, wst->mtime, (unsigned long long)wst->length, 2195 "start %lld length %lld proc_id %d client_id %s\n", 2197 flock->length, flock->proc_id, flock->client_id); 2200 flock->flags, flock->start, flock->length, 2228 "length [all...] |
H A D | protocol.c | 211 &stbuf->mtime, &stbuf->length, 434 stbuf->mtime, stbuf->length,
|
H A D | trans_rdma.c | 408 sge.length = client->msize; 499 sge.length = c->req->tc->size;
|
/net/core/ |
H A D | flow.c | 164 const u32 length = keysize * sizeof(flow_compare_t) / sizeof(u32); local 166 return jhash2(k, length, fcp->hash_rnd)
|