/linux/net/netfilter/ |
H A D | xt_CT.c | 341 .usersize = offsetof(struct xt_ct_target_info, ct), 353 .usersize = offsetof(struct xt_ct_target_info, ct), 365 .usersize = offsetof(struct xt_ct_target_info, ct), 385 .usersize = offsetof(struct xt_ct_target_info, ct), 397 .usersize = offsetof(struct xt_ct_target_info, ct), 409 .usersize = offsetof(struct xt_ct_target_info, ct),
|
H A D | xt_nfacct.c | 66 .usersize = offsetof(struct xt_nfacct_match_info, nfacct), 77 .usersize = offsetof(struct xt_nfacct_match_info_v1, nfacct),
|
H A D | xt_bpf.c | 126 .usersize = offsetof(struct xt_bpf_info, filter), 137 .usersize = offsetof(struct xt_bpf_info_v1, filter),
|
H A D | xt_SECMARK.c | 175 .usersize = offsetof(struct xt_secmark_target_info_v1, secid), 197 .usersize = offsetof(struct xt_secmark_target_info_v1, secid),
|
H A D | xt_connlimit.c | 128 .usersize = offsetof(struct xt_connlimit_info, data), 140 .usersize = offsetof(struct xt_connlimit_info, data),
|
H A D | xt_LED.c | 187 .usersize = offsetof(struct xt_led_info, internal_data), 199 .usersize = offsetof(struct xt_led_info, internal_data),
|
H A D | xt_IDLETIMER.c | 467 .usersize = offsetof(struct idletimer_tg_info, timer), 478 .usersize = offsetof(struct idletimer_tg_info_v1, timer), 489 .usersize = offsetof(struct idletimer_tg_info, timer), 500 .usersize = offsetof(struct idletimer_tg_info_v1, timer),
|
H A D | xt_cgroup.c | 185 .usersize = offsetof(struct xt_cgroup_info_v1, priv), 199 .usersize = offsetof(struct xt_cgroup_info_v2, priv),
|
H A D | x_tables.c | 313 int usersize, int size, int aligned_size) in xt_data_to_user() argument 315 usersize = usersize ? : size; in xt_data_to_user() 316 if (copy_to_user(dst, src, usersize)) in xt_data_to_user() 318 if (usersize != aligned_size && in xt_data_to_user() 319 clear_user(dst + usersize, aligned_size - usersize)) in xt_data_to_user() 328 K->u.kernel.TYPE->usersize, \ 658 static bool error_tg_ok(unsigned int usersize, unsigned int kernsize, in error_tg_ok() argument 661 return usersize == kernsize && strnlen(msg, msglen) < msglen; in error_tg_ok() 780 K->u.kernel.TYPE->usersize, \
|
H A D | xt_TEE.c | 153 .usersize = offsetof(struct xt_tee_tginfo, priv), 165 .usersize = offsetof(struct xt_tee_tginfo, priv),
|
H A D | xt_RATEEST.c | 191 .usersize = offsetof(struct xt_rateest_target_info, est), 203 .usersize = offsetof(struct xt_rateest_target_info, est),
|
H A D | xt_quota.c | 77 .usersize = offsetof(struct xt_quota_info, master),
|
H A D | xt_string.c | 78 .usersize = offsetof(struct xt_string_info, config),
|
H A D | xt_statistic.c | 84 .usersize = offsetof(struct xt_statistic_info, master),
|
H A D | xt_rateest.c | 133 .usersize = offsetof(struct xt_rateest_match_info, est1),
|
H A D | xt_limit.c | 200 .usersize = offsetof(struct xt_rateinfo, prev),
|
H A D | nft_compat.c | 343 target->targetsize, target->usersize)) in nft_target_dump() 589 match->matchsize, match->usersize)) in __nft_match_dump()
|
/linux/mm/ |
H A D | slab_common.c | 162 if (s->usersize) in slab_unmergeable() 326 WARN_ON(!args->usersize && args->useroffset) || in __kmem_cache_create_args() 327 WARN_ON(object_size < args->usersize || in __kmem_cache_create_args() 328 object_size - args->usersize < args->useroffset)) in __kmem_cache_create_args() 329 args->usersize = args->useroffset = 0; in __kmem_cache_create_args() 331 if (!args->usersize) in __kmem_cache_create_args() 391 unsigned int usersize, in kmem_buckets_create() argument 438 cache_usersize = min(size - cache_useroffset, usersize); in kmem_buckets_create() 658 unsigned int useroffset, unsigned int usersize) in create_boot_cache() argument 675 kmem_args.usersize = usersize; in create_boot_cache()
|
H A D | slub.c | 5814 offset - s->useroffset <= s->usersize && in __check_heap_object() 5815 n <= s->useroffset - offset + s->usersize) in __check_heap_object() 6163 s->usersize = args->usersize; in do_kmem_cache_create() 6809 return sysfs_emit(buf, "%u\n", s->usersize); in usersize_show() 6811 SLAB_ATTR_RO(usersize);
|
/linux/net/ipv6/netfilter/ |
H A D | ip6t_NPT.c | 151 .usersize = offsetof(struct ip6t_npt_tginfo, adjustment), 163 .usersize = offsetof(struct ip6t_npt_tginfo, adjustment),
|
/linux/net/bridge/netfilter/ |
H A D | ebt_limit.c | 109 .usersize = offsetof(struct ebt_limit_info, prev),
|
H A D | ebtables.c | 1442 int usersize, int datasize, u8 revision) in ebt_obj_to_user() argument 1453 xt_data_to_user(um + entrysize, data, usersize, datasize, in ebt_obj_to_user() 1465 m->u.match->usersize, m->match_size, in ebt_match_to_user() 1474 w->u.watcher->usersize, w->watcher_size, in ebt_watcher_to_user() 1506 t->u.target->usersize, t->target_size, in ebt_entry_to_user() 1660 if (xt_data_to_user(cm->data, m->data, match->usersize, msize, in compat_match_to_user() 1692 if (xt_data_to_user(cm->data, t->data, target->usersize, tsize, in compat_target_to_user()
|
/linux/net/sched/ |
H A D | em_ipt.c | 263 im->match->usersize ?: im->match->matchsize, in em_ipt_dump()
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-kernel-slab | 500 What: /sys/kernel/slab/<cache>/usersize 504 The usersize file is read-only and contains the usercopy
|
/linux/kernel/ |
H A D | fork.c | 1059 unsigned long useroffset, usersize; in fork_init() local 1062 task_struct_whitelist(&useroffset, &usersize); in fork_init() 1066 useroffset, usersize, NULL); in fork_init()
|