/Linux-v5.4/lib/ |
D | test_stackinit.c | 25 static size_t fill_size, target_size; variable 115 for (sum = 0, i = 0; i < target_size; i++) \ 129 target_start, target_size)) { \ 139 for (sum = 0, i = 0; i < target_size; i++) \ 169 target_size = sizeof(var); \ 188 memcpy(check_buf, target_start, target_size); \ 290 target_size = sizeof(var); in __leaf_switch_none() 297 memcpy(check_buf, target_start, target_size); in __leaf_switch_none() 301 target_size = sizeof(var); in __leaf_switch_none() 308 memcpy(check_buf, target_start, target_size); in __leaf_switch_none()
|
/Linux-v5.4/include/scsi/ |
D | scsi_transport.h | 32 int target_size; member 60 t->target_private_offset = ALIGN(t->target_size, sizeof(void *)); in scsi_transport_reserve_target() 61 t->target_size = t->target_private_offset + space; in scsi_transport_reserve_target()
|
/Linux-v5.4/include/uapi/linux/netfilter/ |
D | x_tables.h | 37 __u16 target_size; member 44 __u16 target_size; member 51 __u16 target_size; member 60 .target_size = XT_ALIGN(__size), \
|
/Linux-v5.4/drivers/md/ |
D | dm-clone-metadata.c | 50 __le64 target_size; member 108 sector_t target_size; member 305 sb->target_size = cpu_to_le64(cmd->target_size); in __prepare_superblock() 326 cmd->target_size != le64_to_cpu(sb->target_size)) { in __open_metadata() 530 sector_t target_size, in dm_clone_metadata_open() argument 543 cmd->target_size = target_size; in dm_clone_metadata_open() 545 cmd->nr_regions = dm_sector_div_up(cmd->target_size, cmd->region_size); in dm_clone_metadata_open()
|
D | dm-clone-metadata.h | 66 sector_t target_size,
|
/Linux-v5.4/net/sched/ |
D | act_ipt.c | 56 ret = xt_check_target(&par, t->u.target_size - sizeof(*t), 0, false); in ipt_init_target() 137 if (nla_len(tb[TCA_IPT_TARG]) != td->u.target_size) { in __tcf_ipt_init() 172 t = kmemdup(td, td->u.target_size, GFP_KERNEL); in __tcf_ipt_init() 290 t = kmemdup(ipt->tcfi_t, ipt->tcfi_t->u.user.target_size, GFP_ATOMIC); in tcf_ipt_dump() 298 if (nla_put(skb, TCA_IPT_TARG, ipt->tcfi_t->u.user.target_size, t) || in tcf_ipt_dump()
|
/Linux-v5.4/include/linux/ |
D | bpf.h | 324 struct bpf_prog *prog, u32 *target_size); 494 u32 *target_size); 1073 u32 *target_size); 1091 u32 *target_size) in bpf_sock_convert_ctx_access() argument 1105 u32 *target_size); 1114 u32 *target_size); 1127 u32 *target_size) in bpf_tcp_sock_convert_ctx_access() argument 1142 u32 *target_size) in bpf_xdp_sock_convert_ctx_access() argument
|
/Linux-v5.4/net/core/ |
D | filter.c | 5573 struct bpf_prog *prog, u32 *target_size) in bpf_tcp_sock_convert_ctx_access() argument 5764 struct bpf_prog *prog, u32 *target_size) in bpf_xdp_sock_convert_ctx_access() argument 7192 u32 *target_size) in flow_dissector_convert_ctx_access() argument 7223 struct bpf_prog *prog, u32 *target_size) in bpf_convert_ctx_access() argument 7232 target_size)); in bpf_convert_ctx_access() 7238 target_size)); in bpf_convert_ctx_access() 7244 target_size)); in bpf_convert_ctx_access() 7251 target_size)); in bpf_convert_ctx_access() 7255 target_size)); in bpf_convert_ctx_access() 7261 target_size)); in bpf_convert_ctx_access() [all …]
|
/Linux-v5.4/include/linux/netfilter/ |
D | x_tables.h | 473 u_int16_t target_size; member 478 u_int16_t target_size; member 481 u_int16_t target_size; member
|
/Linux-v5.4/net/netfilter/ |
D | x_tables.c | 816 if (t->u.target_size < sizeof(*t)) in xt_compat_check_entry_offsets() 819 if (target_offset + t->u.target_size > next_offset) in xt_compat_check_entry_offsets() 833 if (!error_tg_ok(t->u.target_size, sizeof(*et), in xt_compat_check_entry_offsets() 910 if (t->u.target_size < sizeof(*t)) in xt_check_entry_offsets() 913 if (target_offset + t->u.target_size > next_offset) in xt_check_entry_offsets() 927 if (!error_tg_ok(t->u.target_size, sizeof(*et), in xt_check_entry_offsets() 1118 u_int16_t tsize = ct->u.user.target_size; in xt_compat_target_from_user() 1132 t->u.user.target_size = tsize; in xt_compat_target_from_user() 1148 u_int16_t tsize = t->u.user.target_size - off; in xt_compat_target_to_user()
|
/Linux-v5.4/include/uapi/linux/netfilter_bridge/ |
D | ebtables.h | 157 unsigned int target_size; member
|
/Linux-v5.4/kernel/bpf/ |
D | cgroup.c | 1334 struct bpf_prog *prog, u32 *target_size) in sysctl_convert_ctx_access() argument 1346 target_size)); in sysctl_convert_ctx_access() 1386 *target_size = sizeof(u32); in sysctl_convert_ctx_access() 1492 u32 *target_size) in cg_sockopt_convert_ctx_access() argument
|
D | verifier.c | 8494 u32 target_size, size_default, off; in convert_ctx_accesses() local 8617 target_size = 0; in convert_ctx_accesses() 8619 &target_size); in convert_ctx_accesses() 8621 (ctx_field_size && !target_size)) { in convert_ctx_accesses() 8626 if (is_narrower_load && size < target_size) { in convert_ctx_accesses()
|
/Linux-v5.4/kernel/trace/ |
D | bpf_trace.c | 1150 struct bpf_prog *prog, u32 *target_size) in pe_prog_convert_ctx_access() argument 1161 target_size)); in pe_prog_convert_ctx_access() 1169 target_size)); in pe_prog_convert_ctx_access()
|
/Linux-v5.4/net/tls/ |
D | tls_sw.c | 264 static void tls_trim_both_msgs(struct sock *sk, int target_size) in tls_trim_both_msgs() argument 271 sk_msg_trim(sk, &rec->msg_plaintext, target_size); in tls_trim_both_msgs() 272 if (target_size > 0) in tls_trim_both_msgs() 273 target_size += prot->overhead_size; in tls_trim_both_msgs() 274 sk_msg_trim(sk, &rec->msg_encrypted, target_size); in tls_trim_both_msgs()
|
/Linux-v5.4/net/bridge/netfilter/ |
D | ebtables.c | 734 } else if (t->target_size > gap - sizeof(struct ebt_entry_target)) { in ebt_check_entry() 742 ret = xt_check_target(&tgpar, t->target_size, in ebt_check_entry() 1375 t->u.target->usersize, t->target_size, in ebt_entry_to_user() 1627 compat_uint_t tsize = t->target_size - off; in compat_target_to_user() 1629 if (WARN_ON(off >= t->target_size)) in compat_target_to_user()
|
/Linux-v5.4/fs/f2fs/ |
D | file.c | 3340 size_t target_size = 0; in f2fs_file_write_iter() local 3358 target_size = iocb->ki_pos + iov_iter_count(from); in f2fs_file_write_iter() 3372 if (preallocated && i_size_read(inode) < target_size) in f2fs_file_write_iter()
|
/Linux-v5.4/drivers/scsi/ |
D | scsi_scan.c | 417 + shost->transportt->target_size; in scsi_alloc_target()
|
D | scsi_transport_spi.c | 1570 i->t.target_size = sizeof(struct spi_transport_attrs); in spi_attach_transport()
|
D | scsi_transport_fc.c | 2165 i->t.target_size = sizeof(struct fc_starget_attrs); in fc_attach_transport()
|
/Linux-v5.4/net/ipv4/netfilter/ |
D | arp_tables.c | 399 return xt_check_target(&par, t->u.target_size - sizeof(*t), 0, false); in check_target()
|
D | ip_tables.c | 511 return xt_check_target(&par, t->u.target_size - sizeof(*t), in check_target()
|
/Linux-v5.4/net/ipv6/netfilter/ |
D | ip6_tables.c | 529 return xt_check_target(&par, t->u.target_size - sizeof(*t), in check_target()
|