| /linux/include/trace/events/ |
| H A D | icmp.h | 25 __field(unsigned short, ulen) 43 __entry->ulen = 0; 47 __entry->ulen = ntohs(uh->len); 57 TP_printk("icmp_send: type=%d, code=%d. From %pI4:%u to %pI4:%u ulen=%d skbaddr=%p", 60 __entry->dport, __entry->ulen, __entry->skbaddr)
|
| /linux/tools/bpf/ |
| H A D | bpf_jit_disasm.c | 181 int ret, flen, pass, ulen = 0; in get_last_jit_image() local 227 while ((ptr = strtok(tmp, "\n")) != NULL && ulen < proglen) { in get_last_jit_image() 236 image[ulen++] = (uint8_t) strtoul(pptr, &pptr, 16); in get_last_jit_image() 238 ulen--; in get_last_jit_image() 241 if (ulen >= proglen) in get_last_jit_image() 247 assert(ulen == proglen); in get_last_jit_image() 253 *ilen = ulen; in get_last_jit_image()
|
| /linux/kernel/bpf/ |
| H A D | syscall.c | 3829 static int bpf_copy_to_user(char __user *ubuf, const char *buf, u32 ulen, in bpf_copy_to_user() argument 3832 if (ulen >= len + 1) { in bpf_copy_to_user() 3838 if (copy_to_user(ubuf, buf, ulen - 1)) in bpf_copy_to_user() 3840 if (put_user(zero, ubuf + ulen - 1)) in bpf_copy_to_user() 3855 u32 ulen = info->raw_tracepoint.tp_name_len; in bpf_raw_tp_link_fill_link_info() local 3858 if (!ulen ^ !ubuf) in bpf_raw_tp_link_fill_link_info() 3867 return bpf_copy_to_user(ubuf, tp_name, ulen, tp_len); in bpf_raw_tp_link_fill_link_info() 3905 u32 prog_id, ulen; in bpf_perf_link_fill_common() local 3909 ulen = *ulenp; in bpf_perf_link_fill_common() 3910 if (!ulen ^ !uname) in bpf_perf_link_fill_common() [all …]
|
| H A D | bpf_iter.c | 458 u32 ulen = info->iter.target_name_len; in bpf_iter_link_fill_link_info() local 462 if (!ulen ^ !ubuf) in bpf_iter_link_fill_link_info() 470 if (ulen >= target_len + 1) { in bpf_iter_link_fill_link_info() 476 if (copy_to_user(ubuf, target_name, ulen - 1)) in bpf_iter_link_fill_link_info() 478 if (put_user(zero, ubuf + ulen - 1)) in bpf_iter_link_fill_link_info()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | test_tcp_custom_syncookie.h | 90 __u32 ulen; in csum_ipv6_magic() local 126 ulen = (__force u32)bpf_htonl((__u32)len); in csum_ipv6_magic() 127 sum += ulen; in csum_ipv6_magic() 128 carry = (sum < ulen); in csum_ipv6_magic()
|
| /linux/fs/nfs/ |
| H A D | fscache.c | 88 int nfs_fscache_get_super_cookie(struct super_block *sb, const char *uniq, int ulen) in nfs_fscache_get_super_cookie() argument 96 nfss->fscache_uniq = kmemdup_nul(uniq, ulen, GFP_KERNEL); in nfs_fscache_get_super_cookie() 120 if (ulen > 0) { in nfs_fscache_get_super_cookie() 121 if (ulen > NFS_MAX_KEY_LEN - len) in nfs_fscache_get_super_cookie() 124 memcpy(key + len, uniq, ulen); in nfs_fscache_get_super_cookie() 125 len += ulen; in nfs_fscache_get_super_cookie()
|
| H A D | nfs42xdr.c | 1287 u32 count, len, ulen; in decode_listxattrs() local 1349 ulen = len + XATTR_USER_PREFIX_LEN + 1; in decode_listxattrs() 1351 if (ulen > left) { in decode_listxattrs() 1359 buf[ulen - 1] = 0; in decode_listxattrs() 1360 buf += ulen; in decode_listxattrs() 1361 left -= ulen; in decode_listxattrs() 1363 copied += ulen; in decode_listxattrs()
|
| H A D | super.c | 1258 int ulen = 0; in nfs_get_cache_cookie() local 1271 ulen = strlen(uniq); in nfs_get_cache_cookie() 1278 ulen = strlen(ctx->fscache_uniq); in nfs_get_cache_cookie() 1282 return nfs_fscache_get_super_cookie(sb, uniq, ulen); in nfs_get_cache_cookie()
|
| /linux/io_uring/ |
| H A D | cmd_net.c | 158 int __user *ulen; in io_uring_cmd_getsockname() local 164 ulen = u64_to_user_ptr(READ_ONCE(sqe->addr3)); in io_uring_cmd_getsockname() 168 return do_getsockname(sock, peer, uaddr, ulen); in io_uring_cmd_getsockname()
|
| H A D | rsrc.h | 91 int io_validate_user_buf_range(u64 uaddr, u64 ulen);
|
| H A D | rsrc.c | 86 int io_validate_user_buf_range(u64 uaddr, u64 ulen) in io_validate_user_buf_range() argument 89 unsigned long acct_len = (unsigned long)PAGE_ALIGN(ulen); in io_validate_user_buf_range() 92 if (ulen > SZ_1G || !ulen) in io_validate_user_buf_range()
|
| /linux/lib/ |
| H A D | bitmap-str.c | 19 * @ulen: buffer size in bytes. If string is smaller than this 25 unsigned int ulen, unsigned long *maskp, in bitmap_parse_user() argument 31 buf = memdup_user_nul(ubuf, ulen); in bitmap_parse_user() 408 * @ulen: buffer size in bytes. If string is smaller than this 416 unsigned int ulen, unsigned long *maskp, in bitmap_parselist_user() argument 422 buf = memdup_user_nul(ubuf, ulen); in bitmap_parselist_user()
|
| /linux/fs/xfs/libxfs/ |
| H A D | xfs_refcount.c | 912 unsigned long long ulen = left->rc_blockcount; in xfs_refc_want_merge_center() local 936 * The new record cannot exceed the max length. ulen is a ULL as the in xfs_refc_want_merge_center() 940 ulen += cleft->rc_blockcount + right->rc_blockcount; in xfs_refc_want_merge_center() 941 if (ulen >= XFS_REFC_LEN_MAX) in xfs_refc_want_merge_center() 944 *ulenp = ulen; in xfs_refc_want_merge_center() 954 unsigned long long ulen = left->rc_blockcount; in xfs_refc_want_merge_left() local 971 * The new record cannot exceed the max length. ulen is a ULL as the in xfs_refc_want_merge_left() 975 ulen += cleft->rc_blockcount; in xfs_refc_want_merge_left() 976 if (ulen >= XFS_REFC_LEN_MAX) in xfs_refc_want_merge_left() 988 unsigned long long ulen = right->rc_blockcount; in xfs_refc_want_merge_right() local [all …]
|
| /linux/drivers/s390/crypto/ |
| H A D | zcrypt_cca_key.h | 16 unsigned short ulen; member 145 key->t6_hdr.ulen = key->pubhdr.token_length + 4; in zcrypt_type6_mex_key_en() 195 key->t6_hdr.ulen = size - 2; in zcrypt_type6_crt_key()
|
| H A D | zcrypt_msgtype6.c | 44 unsigned short ulen; member 197 .ulen = 10, in icamex_msg_to_type6mex_msgx() 266 .ulen = 10, in icacrt_msg_to_type6crt_msgx()
|
| /linux/arch/riscv/lib/ |
| H A D | csum.c | 24 unsigned int ulen, uproto; in csum_ipv6_magic() local 37 ulen = (__force unsigned int)htonl((unsigned int)len); in csum_ipv6_magic() 38 sum += ulen; in csum_ipv6_magic()
|
| /linux/net/ipv4/ |
| H A D | udp.c | 1239 int ulen = len, free = 0, connected = 0; in udp_sendmsg() local 1279 ulen += sizeof(struct udphdr); in udp_sendmsg() 1438 skb = ip_make_skb(sk, fl4, ip_generic_getfrag, msg, ulen, in udp_sendmsg() 1468 up->len += ulen; in udp_sendmsg() 1469 err = ip_append_data(sk, fl4, ip_generic_getfrag, msg, ulen, in udp_sendmsg() 2030 unsigned int ulen, copied; in udp_recvmsg() local 2042 ulen = udp_skb_len(skb); in udp_recvmsg() 2044 if (copied > ulen - off) in udp_recvmsg() 2045 copied = ulen - off; in udp_recvmsg() 2046 else if (copied < ulen) in udp_recvmsg() [all …]
|
| /linux/fs/smb/client/ |
| H A D | reparse.c | 801 int rc, ulen; in smb2_parse_native_symlink() local 815 ulen = UniStrnlen((wchar_t *)buf, len/2); in smb2_parse_native_symlink() 816 if (ulen != len/2) { in smb2_parse_native_symlink() 818 rc = smb_EIO2(smb_eio_trace_reparse_native_nul, ulen, len); in smb2_parse_native_symlink() 1044 size_t ulen = strnlen(buf->Target, symname_utf8_len); in parse_reparse_wsl_symlink() local 1046 if (ulen != symname_utf8_len) { in parse_reparse_wsl_symlink() 1049 ulen, symname_utf8_len); in parse_reparse_wsl_symlink()
|
| /linux/net/ |
| H A D | socket.c | 242 * @ulen: Length in user space 249 int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr) in move_addr_to_kernel() argument 251 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage)) in move_addr_to_kernel() 253 if (ulen == 0) in move_addr_to_kernel() 255 if (copy_from_user(kaddr, uaddr, ulen)) in move_addr_to_kernel() 257 return audit_sockaddr(ulen, kaddr); in move_addr_to_kernel() 265 * @ulen: pointer to user length field 267 * The value pointed to by ulen on entry is the buffer length available. 278 void __user *uaddr, int __user *ulen) in move_addr_to_user() argument 284 scoped_user_rw_access_size(ulen, 4, efault_end) { in move_addr_to_user() [all …]
|
| /linux/security/apparmor/ |
| H A D | label.c | 1478 size_t ulen = len; \ 1481 total += ulen; \ 1482 ulen = min(ulen, size); \ 1483 size -= ulen; \ 1484 str += ulen; \
|
| /linux/tools/power/pm-graph/ |
| H A D | bootgraph.py | 237 def newAction(self, phase, name, pid, start, end, ret, ulen): argument 252 'ret': ret, 'ulen': ulen } 575 dev['ulen']/1000.0, dev['ret'])
|
| /linux/drivers/media/dvb-core/ |
| H A D | dvb_net.c | 823 __be16 ulen = htons(h.priv->ule_sndu_len); in dvb_net_ule() local 827 { &ulen, sizeof ulen }, in dvb_net_ule() 836 ulen |= htons(0x8000); in dvb_net_ule()
|
| /linux/net/xfrm/ |
| H A D | xfrm_user.c | 737 unsigned int ulen; in xfrm_replay_verify_len() local 743 ulen = xfrm_replay_state_esn_len(up); in xfrm_replay_verify_len() 747 if (nla_len(rp) < (int)ulen) { in xfrm_replay_verify_len() 752 if (xfrm_replay_state_esn_len(replay_esn) != ulen) { in xfrm_replay_verify_len() 775 unsigned int klen, ulen; in xfrm_alloc_replay_state_esn() local 782 ulen = nla_len(rta) >= (int)klen ? klen : sizeof(*up); in xfrm_alloc_replay_state_esn() 794 memcpy(p, up, ulen); in xfrm_alloc_replay_state_esn() 795 memcpy(pp, up, ulen); in xfrm_alloc_replay_state_esn()
|
| /linux/net/netfilter/ |
| H A D | nf_tables_api.c | 4306 unsigned int size, i, n, ulen = 0, usize = 0; in nf_tables_newrule() 4423 ulen = nla_len(nla[NFTA_RULE_USERDATA]); in nft_rule_lookup_byid() 4424 if (ulen > 0) in nft_rule_lookup_byid() 4425 usize = sizeof(struct nft_userdata) + ulen; in nft_rule_lookup_byid() 4437 rule->udata = ulen ? 1 : 0; in nf_tables_delrule() 4439 if (ulen) { in nf_tables_delrule() 4441 udata->len = ulen - 1; in nf_tables_delrule() 4442 nla_memcpy(udata->data, nla[NFTA_RULE_USERDATA], ulen); in nf_tables_delrule() 7257 u8 ulen; in nft_add_set_elem() 7501 ulen in nft_add_set_elem() 4178 unsigned int size, i, n, ulen = 0, usize = 0; nf_tables_newrule() local 7129 u8 ulen; nft_add_set_elem() local [all...] |
| /linux/tools/perf/trace/beauty/include/linux/ |
| H A D | socket.h | 408 extern int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr);
|