| /net/ceph/crush/ |
| A D | hash.c | 14 a = a-b; a = a-c; a = a^(c>>13); \ 15 b = b-c; b = b-a; b = b^(a<<8); \ 17 a = a-b; a = a-c; a = a^(c>>12); \ 18 b = b-c; b = b-a; b = b^(a<<16); \ 20 a = a-b; a = a-c; a = a^(c>>3); \ 21 b = b-c; b = b-a; b = b^(a<<10); \ 30 __u32 b = a; in crush_hash32_rjenkins1() 34 crush_hashmix(y, a, hash); in crush_hash32_rjenkins1() 43 crush_hashmix(a, b, hash); in crush_hash32_rjenkins1_2() 44 crush_hashmix(x, a, hash); in crush_hash32_rjenkins1_2() [all …]
|
| /net/ceph/ |
| A D | ceph_hash.c | 12 a = a - b; a = a - c; a = a ^ (c >> 13); \ 13 b = b - c; b = b - a; b = b ^ (a << 8); \ 15 a = a - b; a = a - c; a = a ^ (c >> 12); \ 16 b = b - c; b = b - a; b = b ^ (a << 16); \ 18 a = a - b; a = a - c; a = a ^ (c >> 3); \ 19 b = b - c; b = b - a; b = b ^ (a << 10); \ 32 b = a; in ceph_str_hash_rjenkins() 74 a = a + ((__u32)k[3] << 24); in ceph_str_hash_rjenkins() 77 a = a + ((__u32)k[2] << 16); in ceph_str_hash_rjenkins() 80 a = a + ((__u32)k[1] << 8); in ceph_str_hash_rjenkins() [all …]
|
| A D | armor.c | 43 unsigned char a, b, c; in ceph_armor() local 45 a = *src++; in ceph_armor() 46 *dst++ = encode_bits(a >> 2); in ceph_armor() 49 *dst++ = encode_bits(((a & 3) << 4) | (b >> 4)); in ceph_armor() 60 *dst++ = encode_bits(((a & 3) << 4)); in ceph_armor() 80 int a, b, c, d; in ceph_unarmor() local 88 a = decode_bits(src[0]); in ceph_unarmor() 92 if (a < 0 || b < 0 || c < 0 || d < 0) in ceph_unarmor() 95 *dst++ = (a << 2) | (b >> 4); in ceph_unarmor()
|
| /net/openvswitch/ |
| A D | flow_netlink.c | 1101 a, log); in __parse_vlan_from_nlattrs() 2343 ovs_nla_free_nested_actions(nla_data(a), nla_len(a)); in ovs_nla_free_check_pkt_len_action() 2357 a = nla_next(a, &rem); in ovs_nla_free_clone_action() 2369 ovs_nla_free_nested_actions(nla_data(a), nla_len(a)); in ovs_nla_free_dec_ttl_action() 2382 a = nla_next(a, &rem); in ovs_nla_free_sample_action() 2501 return a; in __add_action() 2510 return a; in __add_action() 3651 err = ovs_nla_put_actions(nla_data(a), nla_len(a), skb); in check_pkt_len_action_to_attr() 3662 a = nla_next(a, &rem); in check_pkt_len_action_to_attr() 3670 err = ovs_nla_put_actions(nla_data(a), nla_len(a), skb); in check_pkt_len_action_to_attr() [all …]
|
| A D | actions.c | 930 const struct nlattr *a; in output_userspace() local 938 switch (nla_type(a)) { in output_userspace() 940 upcall.userdata = a; in output_userspace() 1103 #define get_mask(a, type) ((const type)nla_data(a) + 1) argument 1111 switch (nla_type(a)) { in execute_masked_set_action() 1119 OVS_SET_MASKED(skb->mark, nla_get_u32(a), *get_mask(a, u32 *)); in execute_masked_set_action() 1163 err = set_mpls(skb, flow_key, nla_data(a), get_mask(a, in execute_masked_set_action() 1283 const struct nlattr *a; in execute_psample() local 1324 a = nla_next(a, &rem)) { in do_execute_actions() 1449 nla_data(a)); in do_execute_actions() [all …]
|
| A D | datapath.c | 628 if (!a[OVS_PACKET_ATTR_PACKET] || !a[OVS_PACKET_ATTR_KEY] || in ovs_packet_cmd_execute() 1013 if (!a[OVS_FLOW_ATTR_KEY]) { in ovs_flow_cmd_new() 1205 struct nlattr **a, in ovs_nla_init_match_and_action() argument 1212 if (a[OVS_FLOW_ATTR_KEY]) { in ovs_nla_init_match_and_action() 1324 if (a[OVS_FLOW_ATTR_CLEAR]) in ovs_flow_cmd_set() 1361 if (a[OVS_FLOW_ATTR_KEY]) { in ovs_flow_cmd_get() 1420 if (a[OVS_FLOW_ATTR_KEY]) { in ovs_flow_cmd_del() 1658 if (!a[OVS_DP_ATTR_NAME]) in lookup_datapath() 1823 if (!a[OVS_DP_ATTR_NAME] || !a[OVS_DP_ATTR_UPCALL_PID]) in ovs_dp_cmd_new() 1866 err = ovs_dp_change(dp, a); in ovs_dp_cmd_new() [all …]
|
| /net/appletalk/ |
| A D | aarp.c | 93 kfree(a); in aarp_entry_put() 161 a->xmit_count++; in __aarp_send_query() 396 struct aarp_entry *a = kmalloc(sizeof(*a), GFP_ATOMIC); in aarp_alloc() local 397 if (!a) in aarp_alloc() 402 return a; in aarp_alloc() 435 if (a) in aarp_proxy_remove() 618 if (!a) { in aarp_send_ddp() 627 a->dev = dev; in aarp_send_ddp() 755 if (a && a->status & ATIF_PROBE) { in aarp_rcv() 771 if (!a || dev != a->dev) in aarp_rcv() [all …]
|
| /net/ |
| A D | compat.c | 439 ret = audit_socketcall_compat(len / sizeof(a[0]), a); in COMPAT_SYSCALL_DEFINE2() 443 a0 = a[0]; in COMPAT_SYSCALL_DEFINE2() 444 a1 = a[1]; in COMPAT_SYSCALL_DEFINE2() 469 ret = __sys_socketpair(a0, a1, a[2], compat_ptr(a[3])); in COMPAT_SYSCALL_DEFINE2() 472 ret = __sys_sendto(a0, compat_ptr(a1), a[2], a[3], NULL, 0); in COMPAT_SYSCALL_DEFINE2() 475 ret = __sys_sendto(a0, compat_ptr(a1), a[2], a[3], in COMPAT_SYSCALL_DEFINE2() 476 compat_ptr(a[4]), a[5]); in COMPAT_SYSCALL_DEFINE2() 479 ret = __compat_sys_recvfrom(a0, compat_ptr(a1), a[2], a[3], in COMPAT_SYSCALL_DEFINE2() 483 ret = __compat_sys_recvfrom(a0, compat_ptr(a1), a[2], a[3], in COMPAT_SYSCALL_DEFINE2() 491 ret = __sys_setsockopt(a0, a1, a[2], compat_ptr(a[3]), a[4]); in COMPAT_SYSCALL_DEFINE2() [all …]
|
| /net/dsa/ |
| A D | switch.c | 178 if (a) { in dsa_port_do_mdb_add() 185 a = kzalloc(sizeof(*a), GFP_KERNEL); in dsa_port_do_mdb_add() 186 if (!a) { in dsa_port_do_mdb_add() 230 if (!a) { in dsa_port_do_mdb_del() 250 kfree(a); in dsa_port_do_mdb_del() 277 if (a) { in dsa_port_do_fdb_add() 283 a = kzalloc(sizeof(*a), GFP_KERNEL); in dsa_port_do_fdb_add() 284 if (!a) { in dsa_port_do_fdb_add() 327 if (!a) { in dsa_port_do_fdb_del() 364 if (a) { in dsa_switch_do_lag_fdb_add() [all …]
|
| /net/sched/ |
| A D | act_api.c | 712 *a = p; in tcf_idr_search() 821 *a = p; in tcf_idr_create() 903 *a = p; in tcf_idr_check_alloc() 915 *a = NULL; in tcf_idr_check_alloc() 1094 res = a; in tc_lookup_action_n() 1113 res = a; in tc_lookup_action() 1195 ops = a->ops; in tcf_action_destroy() 1241 return a->ops->dump(skb, a, bind, ref); in tcf_action_dump_old() 1327 idr_replace(&idrinfo->action_idr, a, a->tcfa_index); in tcf_idr_insert_many() 1447 return a; in tcf_action_init_1() [all …]
|
| A D | act_simple.c | 26 const struct tc_action *a, in tcf_simp_act() argument 29 struct tcf_defact *d = to_defact(a); in tcf_simp_act() 46 static void tcf_simp_release(struct tc_action *a) in tcf_simp_release() argument 48 struct tcf_defact *d = to_defact(a); in tcf_simp_release() 72 d = to_defact(a); in reset_policy() 89 struct nlattr *est, struct tc_action **a, in tcf_simp_init() argument 125 tcf_idr_release(*a, bind); in tcf_simp_init() 132 ret = tcf_idr_create(tn, index, est, a, in tcf_simp_init() 139 d = to_defact(*a); in tcf_simp_init() 167 tcf_idr_release(*a, bind); in tcf_simp_init() [all …]
|
| A D | act_sample.c | 37 struct nlattr *est, struct tc_action **a, in tcf_sample_init() argument 72 ret = tcf_idr_create(tn, index, est, a, in tcf_sample_init() 80 tcf_idr_release(*a, bind); in tcf_sample_init() 107 s = to_sample(*a); in tcf_sample_init() 132 tcf_idr_release(*a, bind); in tcf_sample_init() 138 struct tcf_sample *s = to_sample(a); in tcf_sample_cleanup() 165 const struct tc_action *a, in tcf_sample_act() argument 168 struct tcf_sample *s = to_sample(a); in tcf_sample_act() 217 struct tcf_sample *s = to_sample(a); in tcf_sample_stats_update() 228 struct tcf_sample *s = to_sample(a); in tcf_sample_dump() [all …]
|
| A D | act_vlan.c | 23 const struct tc_action *a, in tcf_vlan_act() argument 26 struct tcf_vlan *v = to_vlan(a); in tcf_vlan_act() 164 tcf_idr_release(*a, bind); in tcf_vlan_init() 172 tcf_idr_release(*a, bind); in tcf_vlan_init() 186 tcf_idr_release(*a, bind); in tcf_vlan_init() 204 tcf_idr_release(*a, bind); in tcf_vlan_init() 212 tcf_idr_release(*a, bind); in tcf_vlan_init() 229 tcf_idr_release(*a, bind); in tcf_vlan_init() 237 v = to_vlan(*a); in tcf_vlan_init() 273 tcf_idr_release(*a, bind); in tcf_vlan_init() [all …]
|
| A D | Kconfig | 10 When the kernel has several packets to send out over a network 59 To compile this code as a module, choose M here: the 68 To compile this code as a module, choose M here: the 77 To compile this code as a module, choose M here: the 86 To compile this code as a module, choose M here: the 97 To compile this code as a module, choose M here: the 108 To compile this code as a module, choose M here: the 119 To compile this code as a module, choose M here: the 131 To compile this code as a module, choose M here: the 142 To compile this code as a module, choose M here: the [all …]
|
| A D | act_connmark.c | 32 const struct tc_action *a, in tcf_connmark_act() argument 38 struct tcf_connmark_info *ca = to_connmark(a); in tcf_connmark_act() 99 struct nlattr *est, struct tc_action **a, in tcf_connmark_init() argument 130 ret = tcf_idr_check_alloc(tn, &index, a, bind); in tcf_connmark_init() 132 ret = tcf_idr_create_from_flags(tn, index, est, a, in tcf_connmark_init() 140 ci = to_connmark(*a); in tcf_connmark_init() 147 ci = to_connmark(*a); in tcf_connmark_init() 186 tcf_idr_release(*a, bind); in tcf_connmark_init() 195 const struct tcf_connmark_info *ci = to_connmark(a); in tcf_connmark_dump() 227 static void tcf_connmark_cleanup(struct tc_action *a) in tcf_connmark_cleanup() argument [all …]
|
| /net/netfilter/ipset/ |
| A D | Kconfig | 12 To compile it as a module, choose M here. If unsure, say N. 33 can store IPv4 addresses (or network addresses) from a range. 35 To compile it as a module, choose M here. If unsure, say N. 51 can store TCP/UDP port numbers from a range. 61 in a set. 89 address triples in a set. 99 network address/prefix triples in a set. 117 one can store MAC (ethernet address) elements in a set. 126 one can store two IPv4/IPv6 subnets, and a protocol/port in a set. 154 protocol/port pairs as elements in a set. [all …]
|
| /net/netfilter/ |
| A D | Kconfig | 615 a hash operation on registers. 795 Netfilter allows you to store a mark value per connection (a.k.a. 952 This can be used to turn a spare LED into a network activity LED, 1080 This option adds a "TEE" target with which a packet can be cloned and 1269 This is a general conntrack match module, a superset of the state match. 1353 with a single rule. 1416 This option allows you to match the length of a packet against a 1454 a series of source or destination ports: normally a rule can only 1455 match a single range of ports. 1528 This option adds a `quota' match, which allows to match on a [all …]
|
| /net/ipv6/netfilter/ |
| A D | Kconfig | 16 ip6tables is a legacy packet classifier. 77 This is a backwards-compat option for the user's convenience 91 To compile it as a module, choose M here. If unsure, say N. 102 To compile it as a module, choose M here. If unsure, say N. 112 To compile it as a module, choose M here. If unsure, say N. 121 To compile it as a module, choose M here. If unsure, say N. 128 and destination options headers of a packet. 130 To compile it as a module, choose M here. If unsure, say N. 203 Packet filtering defines a table `filter', which has a series of 253 If you want to compile it as a module, say M here and read [all …]
|
| /net/ipv4/netfilter/ |
| A D | Kconfig | 20 iptables is a legacy packet classifier. 84 This is a backwards-compat option for the user's convenience 92 This is a backwards-compat option for the user's convenience 109 SNMP payloads. In conjunction with NAT, it allows a network 149 This match extension allows you to match a range of SPIs 159 This is a backwards-compat option for the user's convenience 179 This is a backwards-compat option for the user's convenience 189 Packet filtering defines a table `filter', which has a series of 319 This option adds a `security' table to iptables, for use 333 arptables is a legacy packet classifier. [all …]
|
| /net/6lowpan/ |
| A D | iphc.c | 106 (((a)->s6_addr[15]) == (m)[7])) 112 ((((a)->s6_addr16[4]) == 0) && \ 113 (((a)->s6_addr[10]) == 0) && \ 116 (((a)->s6_addr[13]) == 0)) 122 ((((a)->s6_addr16[1]) == 0) && \ 123 (((a)->s6_addr16[2]) == 0) && \ 124 (((a)->s6_addr16[3]) == 0) && \ 126 (((a)->s6_addr[10]) == 0)) 135 (((a)->s6_addr[12]) == 0)) 139 ((((a)->s6_addr[1]) == 2) && \ [all …]
|
| /net/bridge/netfilter/ |
| A D | Kconfig | 33 Connection tracking keeps a record of what packets have passed 37 the bridge. This provides a replacement for the `br_netfilter' 40 To compile it as a module, choose M here. If unsure, say N. 58 ebtables is a general, extensible frame/packet identification 76 To compile it as a module, choose M here. If unsure, say N. 86 To compile it as a module, choose M here. If unsure, say N. 96 To compile it as a module, choose M here. If unsure, say N. 105 To compile it as a module, choose M here. If unsure, say N. 114 To compile it as a module, choose M here. If unsure, say N. 145 the rate at which a rule can be matched. This match is the [all …]
|
| /net/caif/ |
| A D | Kconfig | 11 The "Communication CPU to Application CPU Interface" (CAIF) is a packet 15 Say Y (or M) here if you build for a phone product (e.g. Android or 19 built as a module. You will also need to say Y (or M) to any CAIF 22 See Documentation/networking/caif for a further explanation on how to 39 Say Y if you will be using a CAIF based GPRS network device. 40 This can be either built-in or a loadable module. 41 If you select to build it as a built-in then the main CAIF device must 42 also be a built-in. 51 This can be either built-in or a loadable module. 52 If you select to build it as a built-in then the main CAIF device must [all …]
|
| /net/sctp/ |
| A D | bind_addr.c | 68 error = sctp_copy_one_addr(net, dest, &addr->a, in sctp_bind_addr_copy() 105 error = sctp_add_bind_addr(dest, &addr->a, sizeof(addr->a), in sctp_bind_addr_dup() 159 if (!addr->a.v4.sin_port) in sctp_add_bind_addr() 160 addr->a.v4.sin_port = htons(bp->port); in sctp_add_bind_addr() 188 if (sctp_cmp_addr_exact(&addr->a, del_addr)) { in sctp_del_bind_addr() 248 len = af->to_addr_param(&addr->a, &rawaddr); in sctp_bind_addrs_to_raw() 346 if (sp->pf->af->cmp_addr(&laddr->a, &laddr2->a) && in sctp_bind_addrs_check() 413 if (af->cmp_addr(&laddr->a, addr)) in sctp_bind_addr_state() 446 if (opt->pf->cmp_addr(&laddr->a, addr, opt)) in sctp_find_unmatch_addr() 452 return &laddr->a; in sctp_find_unmatch_addr() [all …]
|
| /net/vmw_vsock/ |
| A D | Kconfig | 9 Virtual Socket Protocol is a socket protocol similar to TCP/IP 16 To compile this driver as a module, choose M here: the module 35 This module implements a loopback transport for Virtual Sockets, 38 To compile this driver as a module, choose M here: the module 45 This module implements a VMCI transport for Virtual Sockets. 47 Enable this transport if your Virtual Machine runs on a VMware 50 To compile this driver as a module, choose M here: the module 58 This module implements a virtio transport for Virtual Sockets. 63 To compile this driver as a module, choose M here: the module will be 77 This module implements a Hyper-V transport for Virtual Sockets. [all …]
|
| /net/netfilter/ipvs/ |
| A D | Kconfig | 10 IP Virtual Server support will let you build a high-performance 13 that will take care of intercepting incoming connections to a 24 If you want to compile it in kernel, say Y. To compile it as a 119 connections to different real servers in a round-robin manner. 121 If you want to compile it in kernel, say Y. To compile it as a 129 in a round-robin manner. Servers with higher weights receive 134 If you want to compile it in kernel, say Y. To compile it as a 144 If you want to compile it in kernel, say Y. To compile it as a 154 If you want to compile it in kernel, say Y. To compile it as a 164 If you want to compile it in kernel, say Y. To compile it as a [all …]
|