/linux-4.1.27/arch/powerpc/net/ |
H A D | bpf_jit_asm.S | 24 * r15 skb headlen 30 * generate them inline. Inline code can do the simple headlen check 41 /* Are we accessing past headlen? */
|
H A D | bpf_jit.h | 44 * skb headlen r15 (skb->len - skb->data_len)
|
/linux-4.1.27/net/sunrpc/auth_gss/ |
H A D | gss_krb5_wrap.c | 167 int headlen; gss_wrap_kerberos_v1() local 182 headlen = g_token_size(&kctx->mech_used, gss_wrap_kerberos_v1() 188 xdr_extend_head(buf, offset, headlen); gss_wrap_kerberos_v1() 191 BUG_ON((buf->len - offset - headlen) % blocksize); gss_wrap_kerberos_v1() 224 if (make_checksum(kctx, ptr, 8, buf, offset + headlen - conflen, gss_wrap_kerberos_v1() 252 offset + headlen - conflen, pages); gss_wrap_kerberos_v1() 258 offset + headlen - conflen, pages)) gss_wrap_kerberos_v1()
|
/linux-4.1.27/include/linux/ |
H A D | dccp.h | 70 static inline struct dccp_hdr *dccp_zeroed_hdr(struct sk_buff *skb, int headlen) dccp_zeroed_hdr() argument 72 skb_push(skb, headlen); dccp_zeroed_hdr() 74 return memset(skb_transport_header(skb), 0, headlen); dccp_zeroed_hdr()
|
/linux-4.1.27/crypto/ |
H A D | authencesn.c | 41 unsigned int headlen; member in struct:authenc_esn_request_ctx 358 ahash_request_set_crypt(ahreq, areq_ctx->hsg, hash, areq_ctx->headlen); crypto_authenc_esn_ahash() 434 areq_ctx->headlen = assoc->length + assoc2->length; crypto_authenc_esn_genicv() 602 areq_ctx->headlen = assoc->length + assoc2->length; crypto_authenc_esn_iverify()
|
/linux-4.1.27/net/xfrm/ |
H A D | xfrm_user.c | 2608 int headlen, err; xfrm_notify_sa() local 2610 headlen = sizeof(*p); xfrm_notify_sa() 2612 len += nla_total_size(headlen); xfrm_notify_sa() 2613 headlen = sizeof(*id); xfrm_notify_sa() 2616 len += NLMSG_ALIGN(headlen); xfrm_notify_sa() 2622 nlh = nlmsg_put(skb, c->portid, c->seq, c->event, headlen, 0); xfrm_notify_sa() 2868 int headlen, err; xfrm_notify_policy() local 2870 headlen = sizeof(*p); xfrm_notify_policy() 2872 len += nla_total_size(headlen); xfrm_notify_policy() 2873 headlen = sizeof(*id); xfrm_notify_policy() 2877 len += NLMSG_ALIGN(headlen); xfrm_notify_policy() 2883 nlh = nlmsg_put(skb, c->portid, c->seq, c->event, headlen, 0); xfrm_notify_policy()
|
/linux-4.1.27/net/batman-adv/ |
H A D | bridge_loop_avoidance.c | 869 int headlen; batadv_bla_process_claim() local 876 headlen = ETH_HLEN; batadv_bla_process_claim() 887 vhdr = skb_header_pointer(skb, headlen, VLAN_HLEN, batadv_bla_process_claim() 893 headlen += VLAN_HLEN; batadv_bla_process_claim() 903 if (unlikely(!pskb_may_pull(skb, headlen + arp_hdr_len(skb->dev)))) batadv_bla_process_claim() 908 arphdr = (struct arphdr *)((uint8_t *)ethhdr + headlen); batadv_bla_process_claim()
|
/linux-4.1.27/net/core/ |
H A D | datagram.c | 520 * The function will first copy up to headlen, and then pin the userspace 531 /* copy up to skb headlen */ zerocopy_sg_from_iter()
|
H A D | skbuff.c | 3229 unsigned int headlen = skb_headlen(skb); skb_gro_receive() local 3240 if (headlen <= offset) { skb_gro_receive() 3249 offset -= headlen; skb_gro_receive() 3276 unsigned int first_size = headlen - offset; skb_gro_receive() 3302 if (offset > headlen) { skb_gro_receive() 3303 unsigned int eat = offset - headlen; skb_gro_receive() 3309 offset = headlen; skb_gro_receive()
|
/linux-4.1.27/drivers/infiniband/hw/nes/ |
H A D | nes_nic.c | 497 * nes_debug(NES_DBG_NIC_TX, "%s Request to tx NIC packet length %u, headlen %u," nes_netdev_start_xmit() 593 nes_debug(NES_DBG_NIC_TX, "ERROR: SKB header too big, headlen=%u, FIRST_FRAG_SIZE=%u\n", nes_netdev_start_xmit() 595 nes_debug(NES_DBG_NIC_TX, "%s Request to tx NIC packet length %u, headlen %u," nes_netdev_start_xmit()
|
/linux-4.1.27/drivers/net/ethernet/intel/ixgbe/ |
H A D | ixgbe_fcoe.c | 584 /* include trailer in headlen as it is replicated per frame */ ixgbe_fso()
|
/linux-4.1.27/arch/x86/net/ |
H A D | bpf_jit_comp.c | 235 /* r9d : skb->len - skb->data_len (headlen) do_jit()
|
/linux-4.1.27/arch/arm/net/ |
H A D | bpf_jit_32.c | 193 /* headlen = len - data_len */ build_prologue()
|