Searched refs:target_size (Results 1 – 8 of 8) sorted by relevance
/net/sched/ |
D | act_ipt.c | 56 ret = xt_check_target(&par, t->u.target_size - sizeof(*t), 0, false); in ipt_init_target() 137 if (nla_len(tb[TCA_IPT_TARG]) != td->u.target_size) { in __tcf_ipt_init() 172 t = kmemdup(td, td->u.target_size, GFP_KERNEL); in __tcf_ipt_init() 288 t = kmemdup(ipt->tcfi_t, ipt->tcfi_t->u.user.target_size, GFP_ATOMIC); in tcf_ipt_dump() 296 if (nla_put(skb, TCA_IPT_TARG, ipt->tcfi_t->u.user.target_size, t) || in tcf_ipt_dump()
|
/net/core/ |
D | filter.c | 6284 struct bpf_prog *prog, u32 *target_size) in bpf_tcp_sock_convert_ctx_access() argument 6479 struct bpf_prog *prog, u32 *target_size) in bpf_xdp_sock_convert_ctx_access() argument 8287 u32 *target_size) in flow_dissector_convert_ctx_access() argument 8339 struct bpf_prog *prog, u32 *target_size) in bpf_convert_ctx_access() argument 8348 target_size)); in bpf_convert_ctx_access() 8354 target_size)); in bpf_convert_ctx_access() 8360 target_size)); in bpf_convert_ctx_access() 8367 target_size)); in bpf_convert_ctx_access() 8371 target_size)); in bpf_convert_ctx_access() 8377 target_size)); in bpf_convert_ctx_access() [all …]
|
/net/netfilter/ |
D | x_tables.c | 815 if (t->u.target_size < sizeof(*t)) in xt_compat_check_entry_offsets() 818 if (target_offset + t->u.target_size > next_offset) in xt_compat_check_entry_offsets() 832 if (!error_tg_ok(t->u.target_size, sizeof(*et), in xt_compat_check_entry_offsets() 909 if (t->u.target_size < sizeof(*t)) in xt_check_entry_offsets() 912 if (target_offset + t->u.target_size > next_offset) in xt_check_entry_offsets() 926 if (!error_tg_ok(t->u.target_size, sizeof(*et), in xt_check_entry_offsets() 1117 u_int16_t tsize = ct->u.user.target_size; in xt_compat_target_from_user() 1128 t->u.user.target_size = tsize; in xt_compat_target_from_user() 1144 u_int16_t tsize = t->u.user.target_size - off; in xt_compat_target_to_user()
|
/net/tls/ |
D | tls_sw.c | 279 static void tls_trim_both_msgs(struct sock *sk, int target_size) in tls_trim_both_msgs() argument 286 sk_msg_trim(sk, &rec->msg_plaintext, target_size); in tls_trim_both_msgs() 287 if (target_size > 0) in tls_trim_both_msgs() 288 target_size += prot->overhead_size; in tls_trim_both_msgs() 289 sk_msg_trim(sk, &rec->msg_encrypted, target_size); in tls_trim_both_msgs()
|
/net/bridge/netfilter/ |
D | ebtables.c | 734 } else if (t->target_size > gap - sizeof(struct ebt_entry_target)) { in ebt_check_entry() 742 ret = xt_check_target(&tgpar, t->target_size, in ebt_check_entry() 1388 t->u.target->usersize, t->target_size, in ebt_entry_to_user() 1560 compat_uint_t tsize = t->target_size - off; in compat_target_to_user() 1562 if (WARN_ON(off >= t->target_size)) in compat_target_to_user()
|
/net/ipv4/netfilter/ |
D | arp_tables.c | 400 return xt_check_target(&par, t->u.target_size - sizeof(*t), 0, false); in check_target()
|
D | ip_tables.c | 511 return xt_check_target(&par, t->u.target_size - sizeof(*t), in check_target()
|
/net/ipv6/netfilter/ |
D | ip6_tables.c | 530 return xt_check_target(&par, t->u.target_size - sizeof(*t), in check_target()
|