/net/sctp/ |
H A D | ssnmap.c | 40 /* Storage size needed for map includes 2 headers and then the 56 int size; local 58 size = sctp_ssnmap_size(in, out); 59 if (size <= KMALLOC_MAX_SIZE) 60 retval = kmalloc(size, gfp); 63 __get_free_pages(gfp, get_order(size)); 75 if (size <= KMALLOC_MAX_SIZE) 78 free_pages((unsigned long)retval, get_order(size)); 104 size_t size; local 106 size 113 int size; local [all...] |
/net/core/ |
H A D | tso.c | 15 int size, bool is_last) 25 iph->tot_len = htons(size + hdr_len - mac_hdr_len); 39 void tso_build_data(struct sk_buff *skb, struct tso_t *tso, int size) argument 41 tso->tcp_seq += size; 42 tso->size -= size; 43 tso->data += size; 45 if ((tso->size == 0) && 50 tso->size = frag->size; 14 tso_build_hdr(struct sk_buff *skb, char *hdr, struct tso_t *tso, int size, bool is_last) argument [all...] |
H A D | iovec.c | 40 int size, ct, err; local 57 size = m->msg_iovlen * sizeof(struct iovec); 58 if (copy_from_user(iov, (void __user __force *) m->msg_iov, size)) 166 int pages = 0, len, size; local 177 size = ((base & ~PAGE_MASK) + len + ~PAGE_MASK) >> PAGE_SHIFT; 178 pages += size;
|
H A D | sysctl_net_core.c | 33 unsigned int orig_size, size; local 36 .data = &size, 37 .maxlen = sizeof(size), 47 size = orig_size = orig_sock_table ? orig_sock_table->mask + 1 : 0; 52 if (size) { 53 if (size > 1<<30) { 58 size = roundup_pow_of_two(size); 59 if (size != orig_size) { 61 vmalloc(RPS_SOCK_FLOW_TABLE_SIZE(size)); [all...] |
/net/wireless/ |
H A D | radiotap.c | 26 [IEEE80211_RADIOTAP_TSFT] = { .align = 8, .size = 8, }, 27 [IEEE80211_RADIOTAP_FLAGS] = { .align = 1, .size = 1, }, 28 [IEEE80211_RADIOTAP_RATE] = { .align = 1, .size = 1, }, 29 [IEEE80211_RADIOTAP_CHANNEL] = { .align = 2, .size = 4, }, 30 [IEEE80211_RADIOTAP_FHSS] = { .align = 2, .size = 2, }, 31 [IEEE80211_RADIOTAP_DBM_ANTSIGNAL] = { .align = 1, .size = 1, }, 32 [IEEE80211_RADIOTAP_DBM_ANTNOISE] = { .align = 1, .size = 1, }, 33 [IEEE80211_RADIOTAP_LOCK_QUALITY] = { .align = 2, .size = 2, }, 34 [IEEE80211_RADIOTAP_TX_ATTENUATION] = { .align = 2, .size = 2, }, 35 [IEEE80211_RADIOTAP_DB_TX_ATTENUATION] = { .align = 2, .size 216 int pad, align, size, subns; local [all...] |
/net/batman-adv/ |
H A D | hash.c | 26 for (i = 0; i < hash->size; i++) { 41 struct batadv_hashtable *batadv_hash_new(uint32_t size) argument 49 hash->table = kmalloc_array(size, sizeof(*hash->table), GFP_ATOMIC); 53 hash->list_locks = kmalloc_array(size, sizeof(*hash->list_locks), 58 hash->size = size; 74 for (i = 0; i < hash->size; i++)
|
H A D | hash.h | 31 * argument and the size the second 39 uint32_t size; /* size of hashtable */ member in struct:batadv_hashtable 43 struct batadv_hashtable *batadv_hash_new(uint32_t size); 65 for (i = 0; i < hash->size; i++) { 86 * @size: number of bytes to be hashed 91 uint32_t size) 96 for (i = 0; i < size; i++) { 130 index = choose(data, hash->size); 170 index = choose(data, hash->size); 90 batadv_hash_bytes(uint32_t hash, const void *data, uint32_t size) argument [all...] |
H A D | fragmentation.c | 62 orig_node->fragments[i].size = 0; 70 * batadv_frag_size_limit - maximum possible size of packet to be fragmented 72 * Returns the maximum size of payload that can be fragmented. 106 chain->size = 0; 163 chain->size = skb->len - hdr_size; 179 chain->size += skb->len - hdr_size; 192 chain->size += skb->len - hdr_size; 198 if (chain->size > batadv_frag_size_limit() || 200 /* Clear chain if total size of either the list or the packet 201 * exceeds the maximum size o 237 int size, hdr_size = sizeof(struct batadv_frag_packet); local 273 size); local [all...] |
/net/ceph/ |
H A D | snapshot.c | 46 size_t size; local 48 size = sizeof (struct ceph_snap_context); 49 size += snap_count * sizeof (snapc->snaps[0]); 50 snapc = kzalloc(size, gfp_flags);
|
/net/netfilter/ |
H A D | nf_conntrack_labels.c | 67 unsigned int size, i; local 74 size = labels->words * sizeof(long); 75 if (size < (words32 * sizeof(u32))) 76 words32 = size / sizeof(u32); 84 size /= sizeof(u32); 85 for (i = words32; i < size; i++) /* pad */
|
H A D | nft_hash.c | 23 /* We target a hash table size of 4, element hint is 75% of final size */ 51 unsigned int size; local 56 size = sizeof(*he); 58 size += sizeof(he->data[0]); 60 he = kzalloc(size, GFP_KERNEL); 132 for (i = 0; i < tbl->size; i++) { 167 .nelem_hint = desc->size ? : NFT_HASH_ELEMENT_HINT, 187 for (i = 0; i < tbl->size; i++) { 206 if (desc->size) { [all...] |
H A D | xt_quota2.c | 68 size_t size; local 74 size = NLMSG_SPACE(sizeof(*pm)); 75 size = max(size, (size_t)NLMSG_GOODSIZE); 76 log_skb = alloc_skb(size, GFP_ATOMIC); 123 size_t size, loff_t *ppos) 132 return simple_read_from_buffer(buf, size, ppos, tmp, tmp_size); 136 size_t size, loff_t *ppos) 141 if (size > sizeof(buf)) 142 size 122 quota_proc_read(struct file *file, char __user *buf, size_t size, loff_t *ppos) argument 135 quota_proc_write(struct file *file, const char __user *input, size_t size, loff_t *ppos) argument 163 unsigned int size; local [all...] |
/net/atm/ |
H A D | resources.c | 198 int error, len, number, size = 0; local 230 size += sizeof(int); 231 if (size > len) { 235 tmp_buf = kmalloc(size, GFP_ATOMIC); 246 error = ((copy_to_user(buf, tmp_buf, size)) || 247 put_user(size, iobuf_len)) 289 size = strlen(dev->type) + 1; 290 if (copy_to_user(buf, dev->type, size)) { 296 size = ESI_LEN; 297 if (copy_to_user(buf, dev->esi, size)) { [all...] |
H A D | addr.h | 18 size_t size, enum atm_addr_type_t type);
|
/net/9p/ |
H A D | protocol.h | 34 size_t pdu_read(struct p9_fcall *pdu, void *data, size_t size);
|
H A D | protocol.c | 55 size_t pdu_read(struct p9_fcall *pdu, void *data, size_t size) argument 57 size_t len = min(pdu->size - pdu->offset, size); 60 return size - len; 63 static size_t pdu_write(struct p9_fcall *pdu, const void *data, size_t size) argument 65 size_t len = min(pdu->capacity - pdu->size, size); 66 memcpy(&pdu->sdata[pdu->size], data, len); 67 pdu->size += len; 68 return size 72 pdu_write_u(struct p9_fcall *pdu, const char __user *udata, size_t size) argument 590 int size = pdu->size; local [all...] |
/net/sunrpc/ |
H A D | auth_null.c | 88 u32 size; local 96 size = ntohl(*p++); 97 if (size != 0) { 98 printk("RPC: bad verf size: %u\n", size);
|
/net/ipv4/netfilter/ |
H A D | arp_tables.c | 406 unsigned int oldpos, size; local 435 size = e->next_offset; 437 (entry0 + pos + size); 439 pos += size; 446 if (newpos > newinfo->size - 515 find_check_entry(struct arpt_entry *e, const char *name, unsigned int size) argument 578 duprintf("checking: element %p size %u\n", 630 newinfo->size = repl->size; 639 duprintf("translate_table: size 1121 int size; local 1211 check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1284 compat_copy_entry_from_user(struct compat_arpt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1332 unsigned int size; local 1478 u32 size; member in struct:compat_arpt_replace 1564 compat_copy_entry_to_user(struct arpt_entry *e, void __user **dstptr, compat_uint_t *size, struct xt_counters *counters, unsigned int i) argument 1605 unsigned int size; local 1631 compat_uint_t size; member in struct:compat_arpt_get_entries [all...] |
H A D | ip_tables.c | 270 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 480 unsigned int oldpos, size; local 517 size = e->next_offset; 519 (entry0 + pos + size); 521 pos += size; 528 if (newpos > newinfo->size - 656 unsigned int size) 741 duprintf("checking: element %p size %u\n", 800 newinfo->size = repl->size; 655 find_check_entry(struct ipt_entry *e, struct net *net, const char *name, unsigned int size) argument 1309 int size; local 1394 u32 size; member in struct:compat_ipt_replace 1403 compat_copy_entry_to_user(struct ipt_entry *e, void __user **dstptr, unsigned int *size, struct xt_counters *counters, unsigned int i) argument 1442 compat_find_calc_match(struct xt_entry_match *m, const char *name, const struct ipt_ip *ip, unsigned int hookmask, int *size) argument 1475 check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1563 compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1654 unsigned int size; local 1878 compat_uint_t size; member in struct:compat_ipt_get_entries 1889 unsigned int size; local [all...] |
/net/wimax/ |
H A D | op-msg.c | 94 * @size: size of the message to send (in bytes), including the header. 122 const void *msg, size_t size, 131 msg_size = nla_total_size(size) 158 result = nla_put(skb, WIMAX_GNL_MSG_DATA, size, msg); 160 dev_err(dev, "no memory to add payload (msg %p size %zu) in " 161 "attribute: %d\n", msg, size, result); 177 * wimax_msg_data_len - Return a pointer and size of a message's payload 180 * @size: Pointer to where to store the message's size 120 wimax_msg_alloc(struct wimax_dev *wimax_dev, const char *pipe_name, const void *msg, size_t size, gfp_t gfp_flags) argument 184 wimax_msg_data_len(struct sk_buff *msg, size_t *size) argument 277 size_t size = skb->len; local 309 wimax_msg(struct wimax_dev *wimax_dev, const char *pipe_name, const void *buf, size_t size, gfp_t gfp_flags) argument [all...] |
/net/nfc/ |
H A D | llcp_commands.c | 320 u8 cmd, u16 size) 329 size + LLCP_HEADER_SIZE, &err); 369 u16 size = 0; local 377 size += LLCP_HEADER_SIZE; 378 size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE; 380 skb = alloc_skb(size, GFP_KERNEL); 404 u16 size = 0, miux; local 417 size += service_name_tlv_length; 427 size += miux_tlv_length; 430 size 319 llcp_allocate_pdu(struct nfc_llcp_sock *sock, u8 cmd, u16 size) argument 468 u16 size = 0, miux; local 515 u16 size = 0; local 602 u16 size = 1; /* Reason code */ local [all...] |
/net/tipc/ |
H A D | core.c | 56 * @size: message size (including TIPC header) 58 * Returns a new buffer with data pointers set to the specified size. 63 struct sk_buff *tipc_buf_acquire(u32 size) argument 66 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u; 71 skb_put(skb, size);
|
/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 296 xt_entry_foreach(iter, root, private->size - private->hook_entry[hook]) 490 unsigned int oldpos, size; local 527 size = e->next_offset; 529 (entry0 + pos + size); 531 pos += size; 538 if (newpos > newinfo->size - 667 unsigned int size) 752 duprintf("checking: element %p size %u\n", 810 newinfo->size = repl->size; 666 find_check_entry(struct ip6t_entry *e, struct net *net, const char *name, unsigned int size) argument 1319 int size; local 1406 u32 size; member in struct:compat_ip6t_replace 1415 compat_copy_entry_to_user(struct ip6t_entry *e, void __user **dstptr, unsigned int *size, struct xt_counters *counters, unsigned int i) argument 1454 compat_find_calc_match(struct xt_entry_match *m, const char *name, const struct ip6t_ip6 *ipv6, unsigned int hookmask, int *size) argument 1487 check_compat_entry_size_and_hooks(struct compat_ip6t_entry *e, struct xt_table_info *newinfo, unsigned int *size, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, const char *name) argument 1575 compat_copy_entry_from_user(struct compat_ip6t_entry *e, void **dstptr, unsigned int *size, const char *name, struct xt_table_info *newinfo, unsigned char *base) argument 1664 unsigned int size; local 1888 compat_uint_t size; member in struct:compat_ip6t_get_entries 1899 unsigned int size; local [all...] |
/net/netfilter/ipset/ |
H A D | ip_set_list_set.c | 41 u32 size; /* size of set list array */ member in struct:list_set 64 for (i = 0; i < map->size; i++) { 97 for (i = 0; i < map->size; i++) { 121 for (i = 0; i < map->size; i++) { 161 if (i >= map->size) 178 if (i == map->size - 1) { 184 map->size - 1); 192 set->dsize * (map->size - (i + 1))); 219 if (i < map->size 606 init_list_set(struct net *net, struct ip_set *set, u32 size) argument 634 u32 size = IP_SET_LIST_DEFAULT_SIZE; local [all...] |
/net/bluetooth/cmtp/ |
H A D | core.c | 109 int size; local 113 size = (skb) ? skb->len + count : count; 115 nskb = alloc_skb(size, GFP_ATOMIC); 161 BT_ERR("Wrong size or header information in CMTP frame"); 213 unsigned int size, tail; local 233 size = min_t(uint, ((tail < 258) ? (tail - 2) : (tail - 3)), skb->len); 243 if (size < 256) { 247 | ((skb->len == size) ? 0x00 : 0x01); 248 hdr[1] = size; 253 | ((skb->len == size) [all...] |