/net/ipv4/ |
H A D | tcp_lp.c | 50 * We create this set of state flag mainly for debugging. 61 * @flag: TCP-LP state flag 77 u32 flag; member in struct:lp 99 lp->flag = 0; 122 if (!(lp->flag & LP_WITHIN_INF)) 165 lp->flag |= LP_VALID_RHZ; 167 lp->flag &= ~LP_VALID_RHZ; 194 if (lp->flag & LP_VALID_RHZ) { 203 lp->flag | [all...] |
H A D | tcp_input.c | 1133 int flag; member in struct:tcp_sacktag_state 1234 state->flag |= FLAG_ORIG_SACK_ACKED; 1252 state->flag |= FLAG_DATA_SACKED; 1652 state.flag = 0; 1665 state.flag |= FLAG_DSACKING_ACK; 1839 return state.flag; 2004 static bool tcp_check_sack_reneging(struct sock *sk, int flag) argument 2006 if (flag & FLAG_SACK_RENEGING) { 2043 static bool tcp_pause_early_retransmit(struct sock *sk, int flag) argument 2053 (flag 2160 tcp_time_to_recover(struct sock *sk, int flag) argument 2574 tcp_try_to_open(struct sock *sk, int flag, const int prior_unsacked) argument 2697 tcp_process_loss(struct sock *sk, int flag, bool is_dupack) argument 2786 tcp_fastretrans_alert(struct sock *sk, const int acked, const int prior_unsacked, bool is_dupack, int flag) argument 2900 tcp_ack_update_rtt(struct sock *sk, const int flag, long seq_rtt_us, long sack_rtt_us) argument 3069 int flag = 0; local 3245 tcp_ack_is_dubious(const struct sock *sk, const int flag) argument 3252 tcp_may_raise_cwnd(const struct sock *sk, const int flag) argument 3290 int flag = 0; local 3363 tcp_process_tlp_ack(struct sock *sk, u32 ack, int flag) argument 3401 tcp_ack(struct sock *sk, const struct sk_buff *skb, int flag) argument [all...] |
H A D | arp.c | 421 int flag = 0; local 430 flag = 1; 433 return flag;
|
/net/mac80211/ |
H A D | sta_info.h | 37 * IEEE80211_TX_CTL_CLEAR_PS_FILT control flag) when the next 132 * only if, the state has the flag %HT_AGG_STATE_OPERATIONAL 272 * @last_rx_rate_flag: rx status flag of the last data packet 273 * @last_rx_rate_vht_flag: rx status vht flag of the last data packet 470 enum ieee80211_sta_info_flags flag) 472 WARN_ON(flag == WLAN_STA_AUTH || 473 flag == WLAN_STA_ASSOC || 474 flag == WLAN_STA_AUTHORIZED); 475 set_bit(flag, &sta->_flags); 479 enum ieee80211_sta_info_flags flag) 469 set_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 478 clear_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 487 test_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 493 test_and_clear_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument 502 test_and_set_sta_flag(struct sta_info *sta, enum ieee80211_sta_info_flags flag) argument [all...] |
H A D | rx.c | 63 if (status->flag & (RX_FLAG_FAILED_FCS_CRC | 106 if (status->flag & RX_FLAG_HT) /* HT info */ 109 if (status->flag & RX_FLAG_AMPDU_DETAILS) { 114 if (status->flag & RX_FLAG_VHT) { 197 if (status->flag & (RX_FLAG_FAILED_FCS_CRC | RX_FLAG_FAILED_PLCP_CRC)) 199 if (status->flag & RX_FLAG_SHORTPRE) 204 if (!rate || status->flag & (RX_FLAG_HT | RX_FLAG_VHT)) { 215 if (status->flag & RX_FLAG_10MHZ) 217 else if (status->flag & RX_FLAG_5MHZ) 226 if (status->flag [all...] |
H A D | wpa.c | 108 if (status->flag & (RX_FLAG_MMIC_STRIPPED | RX_FLAG_IV_STRIPPED)) { 109 if (status->flag & RX_FLAG_MMIC_ERROR) 112 if (!(status->flag & RX_FLAG_IV_STRIPPED) && rx->key && 122 * MIC. Ignore the flag them to avoid triggering countermeasures. 125 !(status->flag & RX_FLAG_DECRYPTED)) 138 if (status->flag & RX_FLAG_MMIC_ERROR) 284 if (status->flag & RX_FLAG_DECRYPTED) 511 if (status->flag & RX_FLAG_DECRYPTED) { 528 if (!(status->flag & RX_FLAG_DECRYPTED)) { 612 !(status->flag [all...] |
H A D | ht.c | 25 u16 flag) 27 __le16 le_flag = cpu_to_le16(flag); 30 ht_cap->cap &= ~flag; 37 u16 flag) 39 __le16 le_flag = cpu_to_le16(flag); 43 ht_cap->cap |= flag; 308 * When this flag is set, new sessions should be 310 * down by the code that set the flag, so this 22 __check_htcap_disable(struct ieee80211_ht_cap *ht_capa, struct ieee80211_ht_cap *ht_capa_mask, struct ieee80211_sta_ht_cap *ht_cap, u16 flag) argument 34 __check_htcap_enable(struct ieee80211_ht_cap *ht_capa, struct ieee80211_ht_cap *ht_capa_mask, struct ieee80211_sta_ht_cap *ht_cap, u16 flag) argument
|
H A D | vht.c | 18 u32 flag) 20 __le32 le_flag = cpu_to_le32(flag); 24 vht_cap->cap &= ~flag; 16 __check_vhtcap_disable(struct ieee80211_sub_if_data *sdata, struct ieee80211_sta_vht_cap *vht_cap, u32 flag) argument
|
H A D | wep.c | 285 if (!(status->flag & RX_FLAG_DECRYPTED)) { 290 } else if (!(status->flag & RX_FLAG_IV_STRIPPED)) {
|
H A D | scan.c | 79 if (rx_status->flag & RX_FLAG_5MHZ) 81 if (rx_status->flag & RX_FLAG_10MHZ) 155 if (!(rx_status->flag & RX_FLAG_HT) && 156 !(rx_status->flag & RX_FLAG_VHT))
|
H A D | util.c | 1902 * Clear the WLAN_STA_BLOCK_BA flag so new aggregation 2446 if (status->flag & RX_FLAG_HT) { 2449 if (status->flag & RX_FLAG_40MHZ) 2451 if (status->flag & RX_FLAG_SHORT_GI) 2453 } else if (status->flag & RX_FLAG_VHT) { 2457 if (status->flag & RX_FLAG_40MHZ) 2465 if (status->flag & RX_FLAG_SHORT_GI) 2472 if (status->flag & RX_FLAG_10MHZ) 2474 if (status->flag & RX_FLAG_5MHZ) 2485 status->flag, statu [all...] |
H A D | ieee80211_i.h | 130 * @IEEE80211_BSS_VALID_ERP: ERP flag was gathered from non-corrupt IE 1414 WARN_ON_ONCE(status->flag & RX_FLAG_MACTIME_START && 1415 status->flag & RX_FLAG_MACTIME_END); 1416 return status->flag & (RX_FLAG_MACTIME_START | RX_FLAG_MACTIME_END); 1754 if (status->flag & RX_FLAG_AMSDU_MORE)
|
/net/netfilter/ |
H A D | xt_HMARK.c | 170 int flag = IP6_FH_F_AUTH; local 176 nexthdr = ipv6_find_hdr(skb, &nhoff, -1, &fragoff, &flag); 180 if ((flag & IP6_FH_F_FRAG) || (nexthdr != IPPROTO_ICMPV6)) 188 flag = IP6_FH_F_AUTH; 189 nexthdr = ipv6_find_hdr(skb, &nhoff, -1, &fragoff, &flag); 204 if (flag & IP6_FH_F_FRAG)
|
H A D | xt_dccp.c | 30 #define DCCHECK(cond, option, flag, invflag) (!((flag) & (option)) \
|
H A D | xt_sctp.c | 20 #define SCCHECK(cond, option, flag, invflag) (!((flag) & (option)) \ 33 return (chunkflags & flag_info[i].flag_mask) == flag_info[i].flag;
|
H A D | nf_conntrack_proto_sctp.c | 203 int flag; local 205 flag = 0; 213 flag = 1; 222 flag) &&
|
/net/ax25/ |
H A D | ax25_addr.c | 219 const ax25_address *dest, const ax25_digi *d, int flag, int modulus) 228 if (flag == AX25_COMMAND) buf[6] |= AX25_CBIT; 242 if (flag == AX25_RESPONSE) buf[6] |= AX25_CBIT; 218 ax25_addr_build(unsigned char *buf, const ax25_address *src, const ax25_address *dest, const ax25_digi *d, int flag, int modulus) argument
|
/net/rds/ |
H A D | ib_rdma.c | 267 unsigned long *flag; local 270 flag = this_cpu_ptr(&clean_list_grace); 271 set_bit(CLEAN_LIST_BUSY_BIT, flag); 276 clear_bit(CLEAN_LIST_BUSY_BIT, flag); 284 unsigned long *flag; local 287 flag = &per_cpu(clean_list_grace, cpu); 288 while (test_bit(CLEAN_LIST_BUSY_BIT, flag))
|
/net/netfilter/ipvs/ |
H A D | ip_vs_app.c | 352 unsigned int flag, __u32 seq, int diff) 356 if (!(cp->flags & flag) || after(seq, vseq->init_seq)) { 360 cp->flags |= flag; 351 vs_seq_update(struct ip_vs_conn *cp, struct ip_vs_seq *vseq, unsigned int flag, __u32 seq, int diff) argument
|
/net/8021q/ |
H A D | vlan.h | 104 int vlan_dev_change_flags(const struct net_device *dev, u32 flag, u32 mask);
|
H A D | vlan.c | 551 args.vlan_qos ? args.u.flag : 0, 552 args.u.flag);
|
/net/bridge/ |
H A D | br_netlink.c | 316 u8 flag = nla_get_u8(tb[attrtype]); local 317 if (flag)
|
/net/wireless/ |
H A D | ibss.c | 107 u32 flag = params->chandef.chan->band == IEEE80211_BAND_5GHZ ? local 112 if (sband->bitrates[j].flags & flag)
|
/net/netfilter/ipset/ |
H A D | ip_set_core.c | 331 .flag = IPSET_FLAG_WITH_COUNTERS, 342 .flag = IPSET_FLAG_WITH_SKBINFO, 348 .flag = IPSET_FLAG_WITH_COMMENT, 359 return ip_set_extensions[id].flag ? 360 (flags & ip_set_extensions[id].flag) : 1276 pr_debug("dump type, flag: %u %u index: %ld\n", 1989 inst->is_deleted = 1; /* flag for ip_set_nfnl_put */
|
/net/atm/ |
H A D | lec.c | 148 mesg->content.normal.flag = *buff & 0x01; 364 mesg->content.normal.flag); 367 priv->topology_change = mesg->content.normal.flag; 370 lec_flush_complete(priv, mesg->content.normal.flag); 384 mesg->content.normal.flag, 422 mesg->content.normal.flag); 426 (unsigned short)(0xffff & mesg->content.normal.flag);
|