Home
last modified time | relevance | path

Searched refs:a (Results 1 – 25 of 208) sorted by relevance

123456789

/net/ceph/crush/
A Dhash.c14 a = a-b; a = a-c; a = a^(c>>13); \
15 b = b-c; b = b-a; b = b^(a<<8); \
17 a = a-b; a = a-c; a = a^(c>>12); \
18 b = b-c; b = b-a; b = b^(a<<16); \
20 a = a-b; a = a-c; a = a^(c>>3); \
21 b = b-c; b = b-a; b = b^(a<<10); \
30 __u32 b = a; in crush_hash32_rjenkins1()
34 crush_hashmix(y, a, hash); in crush_hash32_rjenkins1()
43 crush_hashmix(a, b, hash); in crush_hash32_rjenkins1_2()
44 crush_hashmix(x, a, hash); in crush_hash32_rjenkins1_2()
[all …]
/net/ceph/
A Dceph_hash.c12 a = a - b; a = a - c; a = a ^ (c >> 13); \
13 b = b - c; b = b - a; b = b ^ (a << 8); \
15 a = a - b; a = a - c; a = a ^ (c >> 12); \
16 b = b - c; b = b - a; b = b ^ (a << 16); \
18 a = a - b; a = a - c; a = a ^ (c >> 3); \
19 b = b - c; b = b - a; b = b ^ (a << 10); \
32 b = a; in ceph_str_hash_rjenkins()
74 a = a + ((__u32)k[3] << 24); in ceph_str_hash_rjenkins()
77 a = a + ((__u32)k[2] << 16); in ceph_str_hash_rjenkins()
80 a = a + ((__u32)k[1] << 8); in ceph_str_hash_rjenkins()
[all …]
A Darmor.c43 unsigned char a, b, c; in ceph_armor() local
45 a = *src++; in ceph_armor()
46 *dst++ = encode_bits(a >> 2); in ceph_armor()
49 *dst++ = encode_bits(((a & 3) << 4) | (b >> 4)); in ceph_armor()
60 *dst++ = encode_bits(((a & 3) << 4)); in ceph_armor()
80 int a, b, c, d; in ceph_unarmor() local
88 a = decode_bits(src[0]); in ceph_unarmor()
92 if (a < 0 || b < 0 || c < 0 || d < 0) in ceph_unarmor()
95 *dst++ = (a << 2) | (b >> 4); in ceph_unarmor()
/net/openvswitch/
A Dflow_netlink.c1101 a, log); in __parse_vlan_from_nlattrs()
2343 ovs_nla_free_nested_actions(nla_data(a), nla_len(a)); in ovs_nla_free_check_pkt_len_action()
2357 a = nla_next(a, &rem); in ovs_nla_free_clone_action()
2369 ovs_nla_free_nested_actions(nla_data(a), nla_len(a)); in ovs_nla_free_dec_ttl_action()
2382 a = nla_next(a, &rem); in ovs_nla_free_sample_action()
2501 return a; in __add_action()
2510 return a; in __add_action()
3651 err = ovs_nla_put_actions(nla_data(a), nla_len(a), skb); in check_pkt_len_action_to_attr()
3662 a = nla_next(a, &rem); in check_pkt_len_action_to_attr()
3670 err = ovs_nla_put_actions(nla_data(a), nla_len(a), skb); in check_pkt_len_action_to_attr()
[all …]
A Dactions.c930 const struct nlattr *a; in output_userspace() local
938 switch (nla_type(a)) { in output_userspace()
940 upcall.userdata = a; in output_userspace()
1103 #define get_mask(a, type) ((const type)nla_data(a) + 1) argument
1111 switch (nla_type(a)) { in execute_masked_set_action()
1119 OVS_SET_MASKED(skb->mark, nla_get_u32(a), *get_mask(a, u32 *)); in execute_masked_set_action()
1163 err = set_mpls(skb, flow_key, nla_data(a), get_mask(a, in execute_masked_set_action()
1283 const struct nlattr *a; in execute_psample() local
1324 a = nla_next(a, &rem)) { in do_execute_actions()
1449 nla_data(a)); in do_execute_actions()
[all …]
A Ddatapath.c628 if (!a[OVS_PACKET_ATTR_PACKET] || !a[OVS_PACKET_ATTR_KEY] || in ovs_packet_cmd_execute()
1013 if (!a[OVS_FLOW_ATTR_KEY]) { in ovs_flow_cmd_new()
1205 struct nlattr **a, in ovs_nla_init_match_and_action() argument
1212 if (a[OVS_FLOW_ATTR_KEY]) { in ovs_nla_init_match_and_action()
1324 if (a[OVS_FLOW_ATTR_CLEAR]) in ovs_flow_cmd_set()
1361 if (a[OVS_FLOW_ATTR_KEY]) { in ovs_flow_cmd_get()
1420 if (a[OVS_FLOW_ATTR_KEY]) { in ovs_flow_cmd_del()
1658 if (!a[OVS_DP_ATTR_NAME]) in lookup_datapath()
1823 if (!a[OVS_DP_ATTR_NAME] || !a[OVS_DP_ATTR_UPCALL_PID]) in ovs_dp_cmd_new()
1866 err = ovs_dp_change(dp, a); in ovs_dp_cmd_new()
[all …]
/net/appletalk/
A Daarp.c93 kfree(a); in aarp_entry_put()
161 a->xmit_count++; in __aarp_send_query()
396 struct aarp_entry *a = kmalloc(sizeof(*a), GFP_ATOMIC); in aarp_alloc() local
397 if (!a) in aarp_alloc()
402 return a; in aarp_alloc()
435 if (a) in aarp_proxy_remove()
618 if (!a) { in aarp_send_ddp()
627 a->dev = dev; in aarp_send_ddp()
755 if (a && a->status & ATIF_PROBE) { in aarp_rcv()
771 if (!a || dev != a->dev) in aarp_rcv()
[all …]
/net/
A Dcompat.c439 ret = audit_socketcall_compat(len / sizeof(a[0]), a); in COMPAT_SYSCALL_DEFINE2()
443 a0 = a[0]; in COMPAT_SYSCALL_DEFINE2()
444 a1 = a[1]; in COMPAT_SYSCALL_DEFINE2()
469 ret = __sys_socketpair(a0, a1, a[2], compat_ptr(a[3])); in COMPAT_SYSCALL_DEFINE2()
472 ret = __sys_sendto(a0, compat_ptr(a1), a[2], a[3], NULL, 0); in COMPAT_SYSCALL_DEFINE2()
475 ret = __sys_sendto(a0, compat_ptr(a1), a[2], a[3], in COMPAT_SYSCALL_DEFINE2()
476 compat_ptr(a[4]), a[5]); in COMPAT_SYSCALL_DEFINE2()
479 ret = __compat_sys_recvfrom(a0, compat_ptr(a1), a[2], a[3], in COMPAT_SYSCALL_DEFINE2()
483 ret = __compat_sys_recvfrom(a0, compat_ptr(a1), a[2], a[3], in COMPAT_SYSCALL_DEFINE2()
491 ret = __sys_setsockopt(a0, a1, a[2], compat_ptr(a[3]), a[4]); in COMPAT_SYSCALL_DEFINE2()
[all …]
/net/dsa/
A Dswitch.c178 if (a) { in dsa_port_do_mdb_add()
185 a = kzalloc(sizeof(*a), GFP_KERNEL); in dsa_port_do_mdb_add()
186 if (!a) { in dsa_port_do_mdb_add()
230 if (!a) { in dsa_port_do_mdb_del()
250 kfree(a); in dsa_port_do_mdb_del()
277 if (a) { in dsa_port_do_fdb_add()
283 a = kzalloc(sizeof(*a), GFP_KERNEL); in dsa_port_do_fdb_add()
284 if (!a) { in dsa_port_do_fdb_add()
327 if (!a) { in dsa_port_do_fdb_del()
364 if (a) { in dsa_switch_do_lag_fdb_add()
[all …]
/net/sched/
A Dact_api.c712 *a = p; in tcf_idr_search()
821 *a = p; in tcf_idr_create()
903 *a = p; in tcf_idr_check_alloc()
915 *a = NULL; in tcf_idr_check_alloc()
1094 res = a; in tc_lookup_action_n()
1113 res = a; in tc_lookup_action()
1195 ops = a->ops; in tcf_action_destroy()
1241 return a->ops->dump(skb, a, bind, ref); in tcf_action_dump_old()
1327 idr_replace(&idrinfo->action_idr, a, a->tcfa_index); in tcf_idr_insert_many()
1447 return a; in tcf_action_init_1()
[all …]
A Dact_simple.c26 const struct tc_action *a, in tcf_simp_act() argument
29 struct tcf_defact *d = to_defact(a); in tcf_simp_act()
46 static void tcf_simp_release(struct tc_action *a) in tcf_simp_release() argument
48 struct tcf_defact *d = to_defact(a); in tcf_simp_release()
72 d = to_defact(a); in reset_policy()
89 struct nlattr *est, struct tc_action **a, in tcf_simp_init() argument
125 tcf_idr_release(*a, bind); in tcf_simp_init()
132 ret = tcf_idr_create(tn, index, est, a, in tcf_simp_init()
139 d = to_defact(*a); in tcf_simp_init()
167 tcf_idr_release(*a, bind); in tcf_simp_init()
[all …]
A Dact_sample.c37 struct nlattr *est, struct tc_action **a, in tcf_sample_init() argument
72 ret = tcf_idr_create(tn, index, est, a, in tcf_sample_init()
80 tcf_idr_release(*a, bind); in tcf_sample_init()
107 s = to_sample(*a); in tcf_sample_init()
132 tcf_idr_release(*a, bind); in tcf_sample_init()
138 struct tcf_sample *s = to_sample(a); in tcf_sample_cleanup()
165 const struct tc_action *a, in tcf_sample_act() argument
168 struct tcf_sample *s = to_sample(a); in tcf_sample_act()
217 struct tcf_sample *s = to_sample(a); in tcf_sample_stats_update()
228 struct tcf_sample *s = to_sample(a); in tcf_sample_dump()
[all …]
A Dact_vlan.c23 const struct tc_action *a, in tcf_vlan_act() argument
26 struct tcf_vlan *v = to_vlan(a); in tcf_vlan_act()
164 tcf_idr_release(*a, bind); in tcf_vlan_init()
172 tcf_idr_release(*a, bind); in tcf_vlan_init()
186 tcf_idr_release(*a, bind); in tcf_vlan_init()
204 tcf_idr_release(*a, bind); in tcf_vlan_init()
212 tcf_idr_release(*a, bind); in tcf_vlan_init()
229 tcf_idr_release(*a, bind); in tcf_vlan_init()
237 v = to_vlan(*a); in tcf_vlan_init()
273 tcf_idr_release(*a, bind); in tcf_vlan_init()
[all …]
A DKconfig10 When the kernel has several packets to send out over a network
59 To compile this code as a module, choose M here: the
68 To compile this code as a module, choose M here: the
77 To compile this code as a module, choose M here: the
86 To compile this code as a module, choose M here: the
97 To compile this code as a module, choose M here: the
108 To compile this code as a module, choose M here: the
119 To compile this code as a module, choose M here: the
131 To compile this code as a module, choose M here: the
142 To compile this code as a module, choose M here: the
[all …]
A Dact_connmark.c32 const struct tc_action *a, in tcf_connmark_act() argument
38 struct tcf_connmark_info *ca = to_connmark(a); in tcf_connmark_act()
99 struct nlattr *est, struct tc_action **a, in tcf_connmark_init() argument
130 ret = tcf_idr_check_alloc(tn, &index, a, bind); in tcf_connmark_init()
132 ret = tcf_idr_create_from_flags(tn, index, est, a, in tcf_connmark_init()
140 ci = to_connmark(*a); in tcf_connmark_init()
147 ci = to_connmark(*a); in tcf_connmark_init()
186 tcf_idr_release(*a, bind); in tcf_connmark_init()
195 const struct tcf_connmark_info *ci = to_connmark(a); in tcf_connmark_dump()
227 static void tcf_connmark_cleanup(struct tc_action *a) in tcf_connmark_cleanup() argument
[all …]
/net/netfilter/ipset/
A DKconfig12 To compile it as a module, choose M here. If unsure, say N.
33 can store IPv4 addresses (or network addresses) from a range.
35 To compile it as a module, choose M here. If unsure, say N.
51 can store TCP/UDP port numbers from a range.
61 in a set.
89 address triples in a set.
99 network address/prefix triples in a set.
117 one can store MAC (ethernet address) elements in a set.
126 one can store two IPv4/IPv6 subnets, and a protocol/port in a set.
154 protocol/port pairs as elements in a set.
[all …]
/net/netfilter/
A DKconfig615 a hash operation on registers.
795 Netfilter allows you to store a mark value per connection (a.k.a.
952 This can be used to turn a spare LED into a network activity LED,
1080 This option adds a "TEE" target with which a packet can be cloned and
1269 This is a general conntrack match module, a superset of the state match.
1353 with a single rule.
1416 This option allows you to match the length of a packet against a
1454 a series of source or destination ports: normally a rule can only
1455 match a single range of ports.
1528 This option adds a `quota' match, which allows to match on a
[all …]
/net/ipv6/netfilter/
A DKconfig16 ip6tables is a legacy packet classifier.
77 This is a backwards-compat option for the user's convenience
91 To compile it as a module, choose M here. If unsure, say N.
102 To compile it as a module, choose M here. If unsure, say N.
112 To compile it as a module, choose M here. If unsure, say N.
121 To compile it as a module, choose M here. If unsure, say N.
128 and destination options headers of a packet.
130 To compile it as a module, choose M here. If unsure, say N.
203 Packet filtering defines a table `filter', which has a series of
253 If you want to compile it as a module, say M here and read
[all …]
/net/ipv4/netfilter/
A DKconfig20 iptables is a legacy packet classifier.
84 This is a backwards-compat option for the user's convenience
92 This is a backwards-compat option for the user's convenience
109 SNMP payloads. In conjunction with NAT, it allows a network
149 This match extension allows you to match a range of SPIs
159 This is a backwards-compat option for the user's convenience
179 This is a backwards-compat option for the user's convenience
189 Packet filtering defines a table `filter', which has a series of
319 This option adds a `security' table to iptables, for use
333 arptables is a legacy packet classifier.
[all …]
/net/6lowpan/
A Diphc.c106 (((a)->s6_addr[15]) == (m)[7]))
112 ((((a)->s6_addr16[4]) == 0) && \
113 (((a)->s6_addr[10]) == 0) && \
116 (((a)->s6_addr[13]) == 0))
122 ((((a)->s6_addr16[1]) == 0) && \
123 (((a)->s6_addr16[2]) == 0) && \
124 (((a)->s6_addr16[3]) == 0) && \
126 (((a)->s6_addr[10]) == 0))
135 (((a)->s6_addr[12]) == 0))
139 ((((a)->s6_addr[1]) == 2) && \
[all …]
/net/bridge/netfilter/
A DKconfig33 Connection tracking keeps a record of what packets have passed
37 the bridge. This provides a replacement for the `br_netfilter'
40 To compile it as a module, choose M here. If unsure, say N.
58 ebtables is a general, extensible frame/packet identification
76 To compile it as a module, choose M here. If unsure, say N.
86 To compile it as a module, choose M here. If unsure, say N.
96 To compile it as a module, choose M here. If unsure, say N.
105 To compile it as a module, choose M here. If unsure, say N.
114 To compile it as a module, choose M here. If unsure, say N.
145 the rate at which a rule can be matched. This match is the
[all …]
/net/caif/
A DKconfig11 The "Communication CPU to Application CPU Interface" (CAIF) is a packet
15 Say Y (or M) here if you build for a phone product (e.g. Android or
19 built as a module. You will also need to say Y (or M) to any CAIF
22 See Documentation/networking/caif for a further explanation on how to
39 Say Y if you will be using a CAIF based GPRS network device.
40 This can be either built-in or a loadable module.
41 If you select to build it as a built-in then the main CAIF device must
42 also be a built-in.
51 This can be either built-in or a loadable module.
52 If you select to build it as a built-in then the main CAIF device must
[all …]
/net/sctp/
A Dbind_addr.c68 error = sctp_copy_one_addr(net, dest, &addr->a, in sctp_bind_addr_copy()
105 error = sctp_add_bind_addr(dest, &addr->a, sizeof(addr->a), in sctp_bind_addr_dup()
159 if (!addr->a.v4.sin_port) in sctp_add_bind_addr()
160 addr->a.v4.sin_port = htons(bp->port); in sctp_add_bind_addr()
188 if (sctp_cmp_addr_exact(&addr->a, del_addr)) { in sctp_del_bind_addr()
248 len = af->to_addr_param(&addr->a, &rawaddr); in sctp_bind_addrs_to_raw()
346 if (sp->pf->af->cmp_addr(&laddr->a, &laddr2->a) && in sctp_bind_addrs_check()
413 if (af->cmp_addr(&laddr->a, addr)) in sctp_bind_addr_state()
446 if (opt->pf->cmp_addr(&laddr->a, addr, opt)) in sctp_find_unmatch_addr()
452 return &laddr->a; in sctp_find_unmatch_addr()
[all …]
/net/vmw_vsock/
A DKconfig9 Virtual Socket Protocol is a socket protocol similar to TCP/IP
16 To compile this driver as a module, choose M here: the module
35 This module implements a loopback transport for Virtual Sockets,
38 To compile this driver as a module, choose M here: the module
45 This module implements a VMCI transport for Virtual Sockets.
47 Enable this transport if your Virtual Machine runs on a VMware
50 To compile this driver as a module, choose M here: the module
58 This module implements a virtio transport for Virtual Sockets.
63 To compile this driver as a module, choose M here: the module will be
77 This module implements a Hyper-V transport for Virtual Sockets.
[all …]
/net/netfilter/ipvs/
A DKconfig10 IP Virtual Server support will let you build a high-performance
13 that will take care of intercepting incoming connections to a
24 If you want to compile it in kernel, say Y. To compile it as a
119 connections to different real servers in a round-robin manner.
121 If you want to compile it in kernel, say Y. To compile it as a
129 in a round-robin manner. Servers with higher weights receive
134 If you want to compile it in kernel, say Y. To compile it as a
144 If you want to compile it in kernel, say Y. To compile it as a
154 If you want to compile it in kernel, say Y. To compile it as a
164 If you want to compile it in kernel, say Y. To compile it as a
[all …]

Completed in 863 milliseconds

123456789