Home
last modified time | relevance | path

Searched refs:buf_len (Results 1 – 6 of 6) sorted by relevance

/kernel/
Dkexec_elf.c63 static bool elf_is_ehdr_sane(const struct elfhdr *ehdr, size_t buf_len) in elf_is_ehdr_sane() argument
91 } else if (ehdr->e_phoff + phdr_size > buf_len) { in elf_is_ehdr_sane()
110 } else if (ehdr->e_shoff + shdr_size > buf_len) { in elf_is_ehdr_sane()
185 static bool elf_is_phdr_sane(const struct elf_phdr *phdr, size_t buf_len) in elf_is_phdr_sane() argument
191 } else if (phdr->p_offset + phdr->p_filesz > buf_len) { in elf_is_phdr_sane()
Dkexec_file.c52 unsigned long buf_len) in kexec_image_probe_default() argument
58 ret = (*fops)->probe(buf, buf_len); in kexec_image_probe_default()
147 unsigned long buf_len) in kexec_image_verify_sig() argument
154 return image->fops->verify_sig(buf, buf_len); in kexec_image_verify_sig()
/kernel/bpf/
Dhelpers.c438 static int __bpf_strtoull(const char *buf, size_t buf_len, u64 flags, in __bpf_strtoull() argument
443 size_t cur_len = buf_len; in __bpf_strtoull()
448 if (!buf || !buf_len || !res || !is_negative) in __bpf_strtoull()
457 while (cur_buf < buf + buf_len && isspace(*cur_buf)) in __bpf_strtoull()
460 *is_negative = (cur_buf < buf + buf_len && *cur_buf == '-'); in __bpf_strtoull()
489 static int __bpf_strtoll(const char *buf, size_t buf_len, u64 flags, in __bpf_strtoll() argument
496 err = __bpf_strtoull(buf, buf_len, flags, &_res, &is_negative); in __bpf_strtoll()
511 BPF_CALL_4(bpf_strtol, const char *, buf, size_t, buf_len, u64, flags, in BPF_CALL_4() argument
517 err = __bpf_strtoll(buf, buf_len, flags, &_res); in BPF_CALL_4()
536 BPF_CALL_4(bpf_strtoul, const char *, buf, size_t, buf_len, u64, flags, in BPF_CALL_4() argument
[all …]
Dcgroup.c2033 size_t, buf_len, u64, flags) in BPF_CALL_4() argument
2043 tmp_ret = sysctl_cpy_dir(ctx->head->parent, &buf, &buf_len); in BPF_CALL_4()
2048 ret = strscpy(buf, ctx->table->procname, buf_len); in BPF_CALL_4()
2090 char *, buf, size_t, buf_len) in BPF_CALL_3() argument
2092 return copy_sysctl_value(buf, buf_len, ctx->cur_val, ctx->cur_len); in BPF_CALL_3()
2105 size_t, buf_len) in BPF_CALL_3() argument
2108 if (buf && buf_len) in BPF_CALL_3()
2109 memset(buf, '\0', buf_len); in BPF_CALL_3()
2112 return copy_sysctl_value(buf, buf_len, ctx->new_val, ctx->new_len); in BPF_CALL_3()
2125 const char *, buf, size_t, buf_len) in BPF_CALL_3() argument
[all …]
Dsyscall.c4370 if (put_user(len, &uattr->task_fd_query.buf_len)) in bpf_task_fd_query_copy()
4372 input_len = attr->task_fd_query.buf_len; in bpf_task_fd_query_copy()
/kernel/trace/
Dtrace_output.c218 trace_print_hex_seq(struct trace_seq *p, const unsigned char *buf, int buf_len, in trace_print_hex_seq() argument
225 for (i = 0; i < buf_len; i += 16) in trace_print_hex_seq()
226 trace_seq_printf(p, fmt, min(buf_len - i, 16), &buf[i]); in trace_print_hex_seq()
240 size_t buf_len = count * el_size; in trace_print_array_seq() local
244 while (ptr < buf + buf_len) { in trace_print_array_seq()