| /linux/crypto/ |
| H A D | testmgr.h | 44 unsigned short ksize; member 4863 .ksize = 32, 4882 .ksize = 32, 4975 .ksize = 32, 4989 .ksize = 37, 5003 .ksize = 32, 5012 .ksize = 4, 6191 .ksize = 16, 6200 .ksize = 16, 6208 .ksize = 16, [all …]
|
| H A D | testmgr.c | 828 static int prepare_keybuf(const u8 *key, unsigned int ksize, in prepare_keybuf() argument 839 keybuf = kmalloc(key_offset + ksize, GFP_KERNEL); in prepare_keybuf() 843 memcpy(keyptr, key, ksize); in prepare_keybuf() 854 #define do_setkey(setkey_f, tfm, key, ksize, cfg, alignmask) \ argument 859 err = prepare_keybuf((key), (ksize), (cfg), (alignmask), \ 864 err = setkey_f((tfm), keyptr, (ksize)); \ 1305 if (vec->ksize) { in test_shash_vec_cfg() 1306 err = do_setkey(crypto_shash_setkey, tfm, vec->key, vec->ksize, in test_shash_vec_cfg() 1492 if (vec->ksize) { in test_ahash_vec_cfg() 1493 err = do_setkey(crypto_ahash_setkey, tfm, vec->key, vec->ksize, in test_ahash_vec_cfg() [all …]
|
| /linux/include/linux/ |
| H A D | sockptr.h | 77 static inline int copy_safe_from_sockptr(void *dst, size_t ksize, in copy_safe_from_sockptr() argument 80 if (optlen < ksize) in copy_safe_from_sockptr() 82 if (copy_from_sockptr(dst, optval, ksize)) in copy_safe_from_sockptr() 87 static inline int copy_struct_from_sockptr(void *dst, size_t ksize, in copy_struct_from_sockptr() argument 90 size_t size = min(ksize, usize); in copy_struct_from_sockptr() 91 size_t rest = max(ksize, usize) - size; in copy_struct_from_sockptr() 94 return copy_struct_from_user(dst, ksize, src.user, size); in copy_struct_from_sockptr() 96 if (usize < ksize) { in copy_struct_from_sockptr() 98 } else if (usize > ksize) { in copy_struct_from_sockptr()
|
| H A D | uaccess.h | 395 copy_struct_from_user(void *dst, size_t ksize, const void __user *src, in copy_struct_from_user() argument 398 size_t size = min(ksize, usize); in copy_struct_from_user() 399 size_t rest = max(ksize, usize) - size; in copy_struct_from_user() 402 if (WARN_ON_ONCE(ksize > __builtin_object_size(dst, 1))) in copy_struct_from_user() 406 if (usize < ksize) { in copy_struct_from_user() 408 } else if (usize > ksize) { in copy_struct_from_user() 493 size_t ksize, bool *ignored_trailing) in copy_struct_to_user() argument 495 size_t size = min(ksize, usize); in copy_struct_to_user() 496 size_t rest = max(ksize, usize) - size; in copy_struct_to_user() 499 if (WARN_ON_ONCE(ksize > __builtin_object_size(src, 1))) in copy_struct_to_user() [all …]
|
| H A D | slab.h | 527 size_t ksize(const void *objp);
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_get_stack_rawtp.c | 62 long usize, ksize; in bpf_prog1() local 91 ksize = bpf_get_stack(ctx, raw_data + usize, max_len - usize, 0); in bpf_prog1() 92 if (ksize < 0) in bpf_prog1() 95 total_size = usize + ksize; in bpf_prog1()
|
| /linux/arch/powerpc/platforms/powernv/ |
| H A D | opal-secvar.c | 57 static int opal_get_variable(const char *key, u64 ksize, u8 *data, u64 *dsize) in opal_get_variable() argument 66 rc = opal_secvar_get(key, ksize, data, dsize); in opal_get_variable() 89 static int opal_set_variable(const char *key, u64 ksize, u8 *data, u64 dsize) in opal_set_variable() argument 96 rc = opal_secvar_enqueue_update(key, ksize, data, dsize); in opal_set_variable()
|
| /linux/arch/alpha/boot/ |
| H A D | misc.c | 152 size_t ksize, in decompress_kernel() argument 160 free_mem_ptr = (ulg)output_start + ksize; in decompress_kernel() 161 free_mem_end_ptr = (ulg)output_start + ksize + 0x200000; in decompress_kernel()
|
| H A D | Makefile | 46 $(obj)/main.o: $(obj)/ksize.h 47 $(obj)/bootp.o: $(obj)/ksize.h 50 $(obj)/ksize.h: $(obj)/vmlinux.nh FORCE
|
| H A D | bootpz.c | 49 size_t ksize, size_t kzsize);
|
| /linux/arch/microblaze/mm/ |
| H A D | init.c | 169 unsigned int kstart, ksize; in mmu_init() local 200 ksize = PAGE_ALIGN(((u32)_end - (u32)CONFIG_KERNEL_START)); in mmu_init() 201 memblock_reserve(kstart, ksize); in mmu_init()
|
| /linux/security/landlock/ |
| H A D | syscalls.c | 64 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user() argument 74 BUILD_BUG_ON(ksize <= 0); in copy_min_struct_from_user() 75 BUILD_BUG_ON(ksize < ksize_min); in copy_min_struct_from_user() 82 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
|
| /linux/drivers/md/dm-vdo/ |
| H A D | memory-alloc.c | 244 add_kmalloc_block(ksize(p)); in vdo_allocate_memory() 310 add_kmalloc_block(ksize(p)); in vdo_allocate_memory_nowait() 322 remove_kmalloc_block(ksize(ptr)); in vdo_free()
|
| /linux/drivers/nvmem/ |
| H A D | core.c | 85 unsigned int kend, ksize; in nvmem_access_with_keepouts() local 101 ksize = kend - offset; in nvmem_access_with_keepouts() 103 rc = __nvmem_reg_write(nvmem, offset, val, ksize); in nvmem_access_with_keepouts() 105 rc = __nvmem_reg_read(nvmem, offset, val, ksize); in nvmem_access_with_keepouts() 110 offset += ksize; in nvmem_access_with_keepouts() 111 val += ksize; in nvmem_access_with_keepouts() 119 ksize = kend - offset; in nvmem_access_with_keepouts() 121 memset(val, keepout->value, ksize); in nvmem_access_with_keepouts() 123 val += ksize; in nvmem_access_with_keepouts() 124 offset += ksize; in nvmem_access_with_keepouts() [all …]
|
| /linux/drivers/gpu/drm/ |
| H A D | drm_ioctl.c | 832 unsigned int in_size, out_size, drv_size, ksize; in drm_ioctl() local 867 ksize = max(max(in_size, out_size), drv_size); in drm_ioctl() 883 if (ksize <= sizeof(stack_kdata)) { in drm_ioctl() 886 kdata = kmalloc(ksize, GFP_KERNEL); in drm_ioctl() 898 if (ksize > in_size) in drm_ioctl() 899 memset(kdata + in_size, 0, ksize - in_size); in drm_ioctl()
|
| /linux/drivers/crypto/ |
| H A D | padlock-aes.c | 50 ksize:2; member 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
|
| /linux/net/sched/ |
| H A D | act_pedit.c | 170 int i, ksize; in tcf_pedit_init() local 219 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init() 220 if (nla_len(pattr) < sizeof(*parm) + ksize) { in tcf_pedit_init() 249 nparms->tcfp_keys = kmemdup(parm->keys, ksize, GFP_KERNEL); in tcf_pedit_init()
|
| /linux/tools/testing/selftests/net/mptcp/ |
| H A D | mptcp_connect.sh | 565 local ksize 575 ksize=$((SIZE / 1024)) 576 rem=$((SIZE - (ksize * 1024))) 578 mptcp_lib_make_file $name 1024 $ksize
|
| /linux/security/tomoyo/ |
| H A D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok()
|
| H A D | gc.c | 23 tomoyo_memory_used[TOMOYO_MEMORY_POLICY] -= ksize(ptr); in tomoyo_memory_free()
|
| /linux/mm/ |
| H A D | slab_common.c | 1229 ks = ksize(mem); in kfree_sensitive() 1238 size_t ksize(const void *objp) in ksize() function 1260 EXPORT_SYMBOL(ksize);
|
| /linux/net/netfilter/ |
| H A D | nft_set_rbtree.c | 828 .ksize = nft_rbtree_ksize,
|
| /linux/mm/kasan/ |
| H A D | kasan_test_c.c | 894 real_size = ksize(ptr); in ksize_unpoisons_memory() 926 KUNIT_EXPECT_KASAN_FAIL(test, ksize(ptr)); in ksize_uaf()
|
| /linux/drivers/base/ |
| H A D | devres.c | 918 total_old_size = ksize(container_of(ptr, struct devres, data)); in devm_krealloc()
|
| /linux/arch/sparc/kernel/ |
| H A D | head_64.S | 310 stx %l3, [%sp + 2047 + 128 + 0x30] ! arg4: roundup(ksize, 4MB)
|