| tag | line | file | source code |
| prot | 44 | mm/mmap.c | mmap_chr(unsigned long addr, size_t len, int prot, int flags, |
| prot | 79 | mm/mmap.c | if (remap_page_range(addr, off, len, PERMISS(flags, prot))) |
| prot | 90 | mm/mmap.c | int prot, flags, fd; |
| prot | 96 | mm/mmap.c | prot = (int) get_fs_long(buffer+2); /* protection */ |
| prot | 115 | mm/mmap.c | if ((prot & PROT_WRITE) && !(file->f_mode & 2)) |
| prot | 132 | mm/mmap.c | if (prot & PROT_EXEC) { |
| prot | 171 | mm/mmap.c | addr = (unsigned long)mmap_chr(base + addr, len, prot, flags, |
| prot | 107 | net/tcp/ip.c | get_protocol(unsigned char prot) |
| prot | 111 | net/tcp/ip.c | PRINTK (("get_protocol (%d)\n ", prot)); |
| prot | 112 | net/tcp/ip.c | hash = prot & (MAX_IP_PROTOS -1); |
| prot | 116 | net/tcp/ip.c | if (p->protocol == prot) |
| prot | 125 | net/tcp/ip.c | add_ip_protocol (struct ip_protocol *prot) |
| prot | 129 | net/tcp/ip.c | hash = prot->protocol & (MAX_IP_PROTOS-1); |
| prot | 130 | net/tcp/ip.c | prot ->next = ip_protos[hash]; |
| prot | 131 | net/tcp/ip.c | ip_protos[hash] = prot; |
| prot | 132 | net/tcp/ip.c | prot->copy = 0; |
| prot | 134 | net/tcp/ip.c | for (p2 = (struct ip_protocol *)prot->next; |
| prot | 138 | net/tcp/ip.c | if (p2->protocol == prot->protocol) |
| prot | 140 | net/tcp/ip.c | prot->copy = 1; |
| prot | 148 | net/tcp/ip.c | delete_ip_protocol (struct ip_protocol *prot) |
| prot | 155 | net/tcp/ip.c | hash = prot->protocol & (MAX_IP_PROTOS -1); |
| prot | 156 | net/tcp/ip.c | if (prot == ip_protos[hash]) |
| prot | 169 | net/tcp/ip.c | if (p->next != NULL && p->next == prot) |
| prot | 176 | net/tcp/ip.c | p->next = prot->next; |
| prot | 180 | net/tcp/ip.c | if (p->next != NULL && p->next->protocol == prot->protocol) |
| prot | 987 | net/tcp/ip.c | struct proto *prot; |
| prot | 990 | net/tcp/ip.c | prot = sk->prot; |
| prot | 1016 | net/tcp/ip.c | sk->prot->retransmits ++; |
| prot | 156 | net/tcp/packet.c | skb = sk->prot->wmalloc (sk, len+sizeof (*skb), 0, GFP_KERNEL); |
| prot | 173 | net/tcp/packet.c | sk->prot->wfree (sk, skb->mem_addr, skb->mem_len); |
| prot | 268 | net/tcp/raw.c | skb = sk->prot->wmalloc (sk, len+sizeof (*skb) + sk->prot->max_header, |
| prot | 295 | net/tcp/raw.c | skb->mem_len = len + sizeof (*skb) +sk->prot->max_header; |
| prot | 301 | net/tcp/raw.c | tmp = sk->prot->build_header (skb, sk->saddr, |
| prot | 307 | net/tcp/raw.c | sk->prot->wfree (sk, skb->mem_addr, skb->mem_len); |
| prot | 315 | net/tcp/raw.c | sk->prot->queue_xmit (sk, dev, skb, 1); |
| prot | 214 | net/tcp/sock.c | printk (" prot = %X\n", sk->prot); |
| prot | 274 | net/tcp/sock.c | skb->sk->prot->rfree (skb->sk, skb->mem_addr, skb->mem_len); |
| prot | 278 | net/tcp/sock.c | skb->sk->prot->wfree (skb->sk, skb->mem_addr, skb->mem_len); |
| prot | 300 | net/tcp/sock.c | sk_inuse( struct proto *prot, int num) |
| prot | 303 | net/tcp/sock.c | for (sk = prot->sock_array[num & (SOCK_ARRAY_SIZE -1 )]; |
| prot | 312 | net/tcp/sock.c | get_new_socknum(struct proto *prot, unsigned short base) |
| prot | 334 | net/tcp/sock.c | sk = prot->sock_array[(i+base+1) & (SOCK_ARRAY_SIZE -1)]; |
| prot | 354 | net/tcp/sock.c | while (sk_inuse (prot, base +best+1)) |
| prot | 377 | net/tcp/sock.c | if (sk->prot->sock_array[num] == NULL) |
| prot | 379 | net/tcp/sock.c | sk->prot->sock_array[num] = sk; |
| prot | 396 | net/tcp/sock.c | sk1 = sk->prot->sock_array[num]; |
| prot | 403 | net/tcp/sock.c | sk->next = sk->prot->sock_array[num]; |
| prot | 404 | net/tcp/sock.c | sk->prot->sock_array[num] = sk; |
| prot | 434 | net/tcp/sock.c | if (!sk1->prot) |
| prot | 442 | net/tcp/sock.c | sk2 = sk1->prot->sock_array[sk1->num & (SOCK_ARRAY_SIZE -1)]; |
| prot | 445 | net/tcp/sock.c | sk1->prot->sock_array[sk1->num & (SOCK_ARRAY_SIZE -1)] = sk1->next; |
| prot | 515 | net/tcp/sock.c | skb->sk->prot->close (skb->sk, 0); |
| prot | 643 | net/tcp/sock.c | sk->pair->prot->close (sk->pair, 0); |
| prot | 817 | net/tcp/sock.c | if (sk->prot == &tcp_prot) |
| prot | 862 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 928 | net/tcp/sock.c | struct proto *prot; |
| prot | 947 | net/tcp/sock.c | prot = &tcp_prot; |
| prot | 957 | net/tcp/sock.c | prot=&udp_prot; |
| prot | 972 | net/tcp/sock.c | prot = &raw_prot; |
| prot | 991 | net/tcp/sock.c | prot = &packet_prot; |
| prot | 1055 | net/tcp/sock.c | sk->prot = prot; |
| prot | 1094 | net/tcp/sock.c | if (sk->prot->init) |
| prot | 1096 | net/tcp/sock.c | err = sk->prot->init(sk); |
| prot | 1128 | net/tcp/sock.c | sk->prot->close(sk,0); |
| prot | 1134 | net/tcp/sock.c | sk->prot->close(sk, 0); |
| prot | 1203 | net/tcp/sock.c | snum = get_new_socknum (sk->prot, 0); |
| prot | 1213 | net/tcp/sock.c | sk->prot->sock_array[snum & (SOCK_ARRAY_SIZE -1)])); |
| prot | 1216 | net/tcp/sock.c | for (sk2 = sk->prot->sock_array[snum & (SOCK_ARRAY_SIZE -1)]; |
| prot | 1267 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1273 | net/tcp/sock.c | if (sk->prot->connect == NULL) |
| prot | 1276 | net/tcp/sock.c | err = sk->prot->connect (sk, (struct sockaddr_in *)uaddr, addr_len); |
| prot | 1331 | net/tcp/sock.c | if (sk1->prot->accept == NULL) return (-EOPNOTSUPP); |
| prot | 1342 | net/tcp/sock.c | sk2 = sk1->prot->accept (sk1,flags); |
| prot | 1437 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1443 | net/tcp/sock.c | return (sk->prot->read (sk, ubuf, size, noblock,0)); |
| prot | 1461 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1467 | net/tcp/sock.c | return (sk->prot->read (sk, ubuf, size, noblock, flags)); |
| prot | 1489 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1495 | net/tcp/sock.c | return (sk->prot->write (sk, ubuf, size, noblock, 0)); |
| prot | 1519 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1525 | net/tcp/sock.c | return (sk->prot->write (sk, ubuf, size, noblock, flags)); |
| prot | 1546 | net/tcp/sock.c | if (sk->prot->sendto == NULL) return (-EOPNOTSUPP); |
| prot | 1551 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1557 | net/tcp/sock.c | return (sk->prot->sendto (sk, ubuf, size, noblock, flags, |
| prot | 1573 | net/tcp/sock.c | if (sk->prot->recvfrom == NULL) return (-EOPNOTSUPP); |
| prot | 1578 | net/tcp/sock.c | sk->num = get_new_socknum (sk->prot, 0); |
| prot | 1584 | net/tcp/sock.c | return (sk->prot->recvfrom (sk, ubuf, size, noblock, flags, |
| prot | 1609 | net/tcp/sock.c | if (sk->prot->shutdown) |
| prot | 1610 | net/tcp/sock.c | sk->prot->shutdown (sk, how); |
| prot | 1625 | net/tcp/sock.c | if (sk->prot->select == NULL) |
| prot | 1630 | net/tcp/sock.c | return (sk->prot->select(sk, sel_type, wait)); |
| prot | 1686 | net/tcp/sock.c | if (!sk->prot->ioctl) |
| prot | 1688 | net/tcp/sock.c | return (sk->prot->ioctl (sk, cmd, arg)); |
| prot | 1800 | net/tcp/sock.c | volatile struct sock *get_sock (struct proto *prot, unsigned short num, |
| prot | 1806 | net/tcp/sock.c | prot, num, raddr, rnum, laddr)); |
| prot | 1815 | net/tcp/sock.c | for (s=prot->sock_array[num&(SOCK_ARRAY_SIZE-1)]; s != NULL; s=s->next) |
| prot | 1840 | net/tcp/sock.c | if (!sk->prot) |
| prot | 1869 | net/tcp/sock.c | if (sk->prot->rcv) |
| prot | 1870 | net/tcp/sock.c | sk->prot->rcv(skb, skb->dev, sk->opt, |
| prot | 83 | net/tcp/sock.h | struct proto *prot; |
| prot | 245 | net/tcp/tcp.c | sk->prot->close(sk, 0); |
| prot | 343 | net/tcp/tcp.c | if (sk->prot->wspace(sk) >= sk->mtu) |
| prot | 432 | net/tcp/tcp.c | amount = sk->prot->wspace(sk)/2; |
| prot | 557 | net/tcp/tcp.c | sk->prot->queue_xmit (sk, skb->dev, skb,0); |
| prot | 578 | net/tcp/tcp.c | buff=sk->prot->wmalloc(sk,MAX_ACK_SIZE,1, GFP_ATOMIC); |
| prot | 599 | net/tcp/tcp.c | tmp = sk->prot->build_header (buff, sk->saddr, daddr, &dev, |
| prot | 603 | net/tcp/tcp.c | sk->prot->wfree(sk, buff->mem_addr, buff->mem_len); |
| prot | 616 | net/tcp/tcp.c | sk->window = sk->prot->rspace(sk); |
| prot | 641 | net/tcp/tcp.c | sk->prot->queue_xmit(sk, dev, buff, 1); |
| prot | 660 | net/tcp/tcp.c | sk->window = sk->prot->rspace(sk); |
| prot | 678 | net/tcp/tcp.c | struct proto *prot; |
| prot | 684 | net/tcp/tcp.c | prot = sk->prot; |
| prot | 780 | net/tcp/tcp.c | copy = min (sk->mss - skb->len + 128 + prot->max_header, len); |
| prot | 818 | net/tcp/tcp.c | skb=prot->wmalloc (sk, |
| prot | 819 | net/tcp/tcp.c | sk->mss + 128 + prot->max_header + sizeof (*skb), |
| prot | 824 | net/tcp/tcp.c | skb->mem_len = sk->mss + 128 + prot->max_header+sizeof (*skb); |
| prot | 830 | net/tcp/tcp.c | skb=prot->wmalloc (sk, copy + prot->max_header+sizeof (*skb),0, |
| prot | 834 | net/tcp/tcp.c | skb->mem_len = copy+prot->max_header+sizeof (*skb); |
| prot | 882 | net/tcp/tcp.c | tmp = prot->build_header (skb, sk->saddr, sk->daddr, &dev, |
| prot | 886 | net/tcp/tcp.c | prot->wfree (sk, skb->mem_addr, skb->mem_len); |
| prot | 900 | net/tcp/tcp.c | prot->wfree (sk, skb->mem_addr, skb->mem_len); |
| prot | 953 | net/tcp/tcp.c | prot->queue_xmit (sk, dev, skb,0); |
| prot | 997 | net/tcp/tcp.c | buff=sk->prot->wmalloc(sk,MAX_ACK_SIZE,1, GFP_ATOMIC); |
| prot | 1014 | net/tcp/tcp.c | tmp = sk->prot->build_header (buff, sk->saddr, sk->daddr, &dev, |
| prot | 1018 | net/tcp/tcp.c | sk->prot->wfree(sk, buff->mem_addr, buff->mem_len); |
| prot | 1036 | net/tcp/tcp.c | sk->window = sk->prot->rspace(sk); |
| prot | 1041 | net/tcp/tcp.c | sk->prot->queue_xmit(sk, dev, buff, 1); |
| prot | 1077 | net/tcp/tcp.c | sk->window - sk->bytes_rcv, sk->prot->rspace(sk))); |
| prot | 1088 | net/tcp/tcp.c | if ((sk->prot->rspace(sk) > |
| prot | 1430 | net/tcp/tcp.c | struct proto *prot; |
| prot | 1450 | net/tcp/tcp.c | prot = (struct proto *)sk->prot; |
| prot | 1453 | net/tcp/tcp.c | buff=prot->wmalloc(sk, MAX_RESET_SIZE,1 , GFP_KERNEL); |
| prot | 1470 | net/tcp/tcp.c | tmp = prot->build_header (buff,sk->saddr, sk->daddr, &dev, |
| prot | 1475 | net/tcp/tcp.c | prot->wfree (sk,buff->mem_addr, buff->mem_len); |
| prot | 1494 | net/tcp/tcp.c | t1->window = net16(sk->prot->rspace(sk)); |
| prot | 1512 | net/tcp/tcp.c | sk->prot->queue_xmit (sk, dev, buff,0); |
| prot | 1553 | net/tcp/tcp.c | struct proto *prot, struct options *opt, struct device *dev) |
| prot | 1560 | net/tcp/tcp.c | buff=prot->wmalloc(NULL, MAX_RESET_SIZE,1, GFP_ATOMIC); |
| prot | 1573 | net/tcp/tcp.c | tmp = prot->build_header (buff, saddr, daddr, &dev, IPPROTO_TCP, opt, |
| prot | 1577 | net/tcp/tcp.c | prot->wfree (NULL,buff->mem_addr, buff->mem_len); |
| prot | 1596 | net/tcp/tcp.c | prot->queue_xmit(NULL, dev, buff, 1); |
| prot | 1631 | net/tcp/tcp.c | tcp_reset (daddr, saddr, th, sk->prot, opt, dev); |
| prot | 1730 | net/tcp/tcp.c | buff=newsk->prot->wmalloc(newsk,MAX_SYN_SIZE,1, GFP_ATOMIC); |
| prot | 1749 | net/tcp/tcp.c | tmp = sk->prot->build_header (buff, newsk->saddr, newsk->daddr, &dev, |
| prot | 1756 | net/tcp/tcp.c | sk->prot->wfree(newsk, buff->mem_addr, buff->mem_len); |
| prot | 1774 | net/tcp/tcp.c | newsk->window = newsk->prot->rspace(newsk); |
| prot | 1792 | net/tcp/tcp.c | newsk->prot->queue_xmit(newsk, dev, buff, 0); |
| prot | 1827 | net/tcp/tcp.c | struct proto *prot; |
| prot | 1900 | net/tcp/tcp.c | prot = (struct proto *)sk->prot; |
| prot | 1903 | net/tcp/tcp.c | buff=prot->wmalloc(sk, MAX_FIN_SIZE,1, GFP_ATOMIC); |
| prot | 1922 | net/tcp/tcp.c | tmp = prot->build_header (buff,sk->saddr, sk->daddr, &dev, |
| prot | 1927 | net/tcp/tcp.c | prot->wfree (sk,buff->mem_addr, buff->mem_len); |
| prot | 1945 | net/tcp/tcp.c | t1->window = net16(sk->prot->rspace(sk)); |
| prot | 1953 | net/tcp/tcp.c | prot->queue_xmit(sk, dev, buff, 0); |
| prot | 2012 | net/tcp/tcp.c | sk->prot->queue_xmit (sk, skb->dev, skb, skb->free); |
| prot | 2214 | net/tcp/tcp.c | sk->prot->retransmit (sk,1); |
| prot | 2331 | net/tcp/tcp.c | sk->prot, NULL, skb->dev); |
| prot | 2576 | net/tcp/tcp.c | buff=sk->prot->wmalloc(sk,MAX_ACK_SIZE,1, GFP_ATOMIC); |
| prot | 2590 | net/tcp/tcp.c | tmp = sk->prot->build_header (buff, sk->saddr, sk->daddr, &dev, |
| prot | 2594 | net/tcp/tcp.c | sk->prot->wfree(sk, buff->mem_addr, buff->mem_len); |
| prot | 2614 | net/tcp/tcp.c | t1->window = net16(sk->prot->rspace(sk)); |
| prot | 2640 | net/tcp/tcp.c | sk->prot->queue_xmit (sk, dev, buff,0); |
| prot | 2727 | net/tcp/tcp.c | buff=sk->prot->wmalloc(sk,MAX_SYN_SIZE,0, GFP_KERNEL); |
| prot | 2742 | net/tcp/tcp.c | tmp = sk->prot->build_header (buff, sk->saddr, sk->daddr, &dev, |
| prot | 2746 | net/tcp/tcp.c | sk->prot->wfree(sk, buff->mem_addr, buff->mem_len); |
| prot | 2779 | net/tcp/tcp.c | sk->prot->queue_xmit(sk, dev, buff, 0); |
| prot | 2961 | net/tcp/tcp.c | if (!sk->prot) |
| prot | 3046 | net/tcp/tcp.c | tcp_reset (daddr, saddr, th, sk->prot, opt,dev); |
| prot | 3106 | net/tcp/tcp.c | tcp_reset (daddr, saddr, th, sk->prot, opt,dev); |
| prot | 3121 | net/tcp/tcp.c | tcp_reset (daddr, saddr, th, sk->prot, opt,dev ); |
| prot | 3179 | net/tcp/tcp.c | tcp_reset (daddr, saddr, th, sk->prot, opt, dev); |
| prot | 3206 | net/tcp/tcp.c | tcp_reset(daddr, saddr, th, sk->prot, opt,dev); |
| prot | 3231 | net/tcp/tcp.c | tcp_reset(daddr, saddr, th, sk->prot, opt, dev); |
| prot | 3310 | net/tcp/tcp.c | buff=sk->prot->wmalloc(sk,MAX_ACK_SIZE,1, GFP_ATOMIC); |
| prot | 3324 | net/tcp/tcp.c | tmp = sk->prot->build_header (buff, sk->saddr, sk->daddr, &dev, |
| prot | 3328 | net/tcp/tcp.c | sk->prot->wfree(sk, buff->mem_addr, buff->mem_len); |
| prot | 3349 | net/tcp/tcp.c | t1->window = net16(sk->prot->rspace(sk)); |
| prot | 3354 | net/tcp/tcp.c | sk->prot->queue_xmit(sk, dev, buff, 1); |
| prot | 204 | net/tcp/timer.c | sk->prot->read_wakeup(sk); |
| prot | 258 | net/tcp/timer.c | sk->prot->retransmit (sk, 0); |
| prot | 284 | net/tcp/timer.c | sk->prot->close (sk,1); |
| prot | 297 | net/tcp/timer.c | if (sk->prot->write_wakeup != NULL) |
| prot | 298 | net/tcp/timer.c | sk->prot->write_wakeup(sk); |
| prot | 302 | net/tcp/timer.c | sk->prot->close (sk,1); |
| prot | 329 | net/tcp/timer.c | sk->prot->close (sk, 1); |
| prot | 123 | net/tcp/udp.c | if (sk->prot->wspace(sk) >= MIN_WRITE_SPACE) |
| prot | 167 | net/tcp/udp.c | sk->prot->close(sk, 0); |
| prot | 264 | net/tcp/udp.c | pair = get_sock (sk->prot, net16(port), saddr, |
| prot | 269 | net/tcp/udp.c | skb = pair->prot->rmalloc (pair, |
| prot | 378 | net/tcp/udp.c | skb = sk->prot->wmalloc (sk, len + sizeof (*skb) |
| prot | 379 | net/tcp/udp.c | + sk->prot->max_header, 0, |
| prot | 407 | net/tcp/udp.c | skb->mem_len = len + sizeof (*skb) + sk->prot->max_header; |
| prot | 414 | net/tcp/udp.c | tmp = sk->prot->build_header (skb, saddr, |
| prot | 419 | net/tcp/udp.c | sk->prot->wfree (sk, skb->mem_addr, skb->mem_len); |
| prot | 458 | net/tcp/udp.c | sk->prot->queue_xmit (sk, dev, skb, 1); |
| prot | 485 | net/tcp/udp.c | amount = sk->prot->wspace(sk)/2; |
| prot | 646 | net/tcp/udp.c | struct proto *prot=&udp_prot; |
| prot | 654 | net/tcp/udp.c | sk = get_sock (prot, net16(uh->dest), saddr, uh->source, daddr); |