Lines Matching defs:packet

440 /* sanity checking of input packet lists received */
1254 /* Initialize the packet filter */
1261 /* Initialize packet schedulers */
1472 * d) packet injections
1575 * the corresponding input thread where the packet arrived
1663 * the corresponding input thread where the packet arrived
1931 * Drop the packet(s) if the parameters are invalid, or if the
1984 panic_plain("%s: invalid input packet chain for %s%d, "
1990 * Assert packet count only for the extended variant, for backwards
1997 panic_plain("%s: input packet count mismatch for %s%d, "
2039 * the rcvif of the packet header: loopback (lo0) packets use a
2061 panic_plain("%s%d: invalid packet count %d "
2541 /* enqueue the packet */
2546 * for the packet is suspended (EQSUSPENDED), as the driver could still
2616 * Pass the inbound packet to the interface filters
2646 * Strip away M_PROTO1 bit prior to sending packet up the stack as
2662 * Pass the outbound packet to the interface filters
2700 /* Version 1 protocols get one packet at a time */
2716 /* Version 2 protocols support packet lists */
2880 /* find which protocol family this packet is for */
2929 /* no protocol for this packet, discard */
3320 * If this is a broadcast packet that needs to be
3323 * us to determine that it is a legitimate packet
3373 * Strip away M_PROTO1 bit prior to sending packet to the driver
3380 * packet whose data portion spans across physically disjoint
3381 * pages, we need to "normalize" the packet so that we pass
3383 * resides in the system page boundary. If the packet does
3392 * If this is a TSO packet, make sure the interface still
4188 struct mbuf *packet, char *header)
4190 #pragma unused(ifp, protocol, packet, header)
4196 struct mbuf *packet)
4198 #pragma unused(ifp, protocol, packet)
4205 mbuf_t *packet, const struct sockaddr *dest, void *route, char *frame_type,
4208 #pragma unused(ifp, protocol, packet, dest, route, frame_type, link_layer_dest)
4606 * Attach packet filter to this interface, if enabled.
5124 * Detach this interface from packet filter, if enabled.