Searched refs:target_size (Results 1 – 8 of 8) sorted by relevance
/net/sched/ |
D | act_ipt.c | 56 ret = xt_check_target(&par, t->u.target_size - sizeof(*t), 0, false); in ipt_init_target() 139 if (nla_len(tb[TCA_IPT_TARG]) != td->u.target_size) { in __tcf_ipt_init() 186 t = kmemdup(td, td->u.target_size, GFP_KERNEL); in __tcf_ipt_init() 302 t = kmemdup(ipt->tcfi_t, ipt->tcfi_t->u.user.target_size, GFP_ATOMIC); in tcf_ipt_dump() 310 if (nla_put(skb, TCA_IPT_TARG, ipt->tcfi_t->u.user.target_size, t) || in tcf_ipt_dump()
|
/net/core/ |
D | filter.c | 6643 struct bpf_prog *prog, u32 *target_size) in bpf_tcp_sock_convert_ctx_access() argument 6838 struct bpf_prog *prog, u32 *target_size) in bpf_xdp_sock_convert_ctx_access() argument 8676 u32 *target_size) in flow_dissector_convert_ctx_access() argument 8728 struct bpf_prog *prog, u32 *target_size) in bpf_convert_ctx_access() argument 8737 target_size)); in bpf_convert_ctx_access() 8743 target_size)); in bpf_convert_ctx_access() 8749 target_size)); in bpf_convert_ctx_access() 8756 target_size)); in bpf_convert_ctx_access() 8760 target_size)); in bpf_convert_ctx_access() 8766 target_size)); in bpf_convert_ctx_access() [all …]
|
/net/netfilter/ |
D | x_tables.c | 835 if (t->u.target_size < sizeof(*t)) in xt_compat_check_entry_offsets() 838 if (target_offset + t->u.target_size > next_offset) in xt_compat_check_entry_offsets() 852 if (!error_tg_ok(t->u.target_size, sizeof(*et), in xt_compat_check_entry_offsets() 929 if (t->u.target_size < sizeof(*t)) in xt_check_entry_offsets() 932 if (target_offset + t->u.target_size > next_offset) in xt_check_entry_offsets() 946 if (!error_tg_ok(t->u.target_size, sizeof(*et), in xt_check_entry_offsets() 1137 u_int16_t tsize = ct->u.user.target_size; in xt_compat_target_from_user() 1148 t->u.user.target_size = tsize; in xt_compat_target_from_user() 1164 u_int16_t tsize = t->u.user.target_size - off; in xt_compat_target_to_user()
|
/net/bridge/netfilter/ |
D | ebtables.c | 773 } else if (t->target_size > gap - sizeof(struct ebt_entry_target)) { in ebt_check_entry() 781 ret = xt_check_target(&tgpar, t->target_size, in ebt_check_entry() 1501 t->u.target->usersize, t->target_size, in ebt_entry_to_user() 1673 compat_uint_t tsize = t->target_size - off; in compat_target_to_user() 1675 if (WARN_ON(off >= t->target_size)) in compat_target_to_user()
|
/net/tls/ |
D | tls_sw.c | 284 static void tls_trim_both_msgs(struct sock *sk, int target_size) in tls_trim_both_msgs() argument 291 sk_msg_trim(sk, &rec->msg_plaintext, target_size); in tls_trim_both_msgs() 292 if (target_size > 0) in tls_trim_both_msgs() 293 target_size += prot->overhead_size; in tls_trim_both_msgs() 294 sk_msg_trim(sk, &rec->msg_encrypted, target_size); in tls_trim_both_msgs()
|
/net/ipv4/netfilter/ |
D | arp_tables.c | 400 return xt_check_target(&par, t->u.target_size - sizeof(*t), 0, false); in check_target()
|
D | ip_tables.c | 511 return xt_check_target(&par, t->u.target_size - sizeof(*t), in check_target()
|
/net/ipv6/netfilter/ |
D | ip6_tables.c | 530 return xt_check_target(&par, t->u.target_size - sizeof(*t), in check_target()
|