/linux/crypto/ |
H A D | testmgr.h | 5949 .ksize = 4, 7247 .ksize = 4, 7324 .ksize = 4, 7402 .ksize = 4, 7634 .ksize = 4, 36701 .ksize = 1, 36741 .ksize = 1, 36766 .ksize = 1, 36813 .ksize = 1, 36846 .ksize = 1, [all …]
|
H A D | testmgr.c | 837 memcpy(keyptr, key, ksize); in prepare_keybuf() 853 err = setkey_f((tfm), keyptr, (ksize)); \ 1285 if (vec->ksize) { in test_shash_vec_cfg() 1472 if (vec->ksize) { in test_ahash_vec_cfg() 1703 vec->ksize = 0; in generate_random_hash_testvec() 1705 vec->ksize = maxkeysize; in generate_random_hash_testvec() 1711 vec->ksize); in generate_random_hash_testvec() 1722 vec->psize, vec->ksize); in generate_random_hash_testvec() 1998 if (template[nr_unkeyed].ksize) in alg_test_hash() 2002 if (!template[nr_unkeyed + nr_keyed].ksize) { in alg_test_hash() [all …]
|
/linux/lib/ |
H A D | test_user_copy.c | 110 size_t ksize, usize; in test_copy_struct_from_user() local 128 ksize = size; in test_copy_struct_from_user() 131 memcpy(expected, umem_src, ksize); in test_copy_struct_from_user() 136 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user() 140 ksize = size; in test_copy_struct_from_user() 149 ret |= test(memcmp(kmem, expected, ksize), in test_copy_struct_from_user() 153 ksize = size / 2; in test_copy_struct_from_user() 161 ksize = size / 2; in test_copy_struct_from_user() 164 memcpy(expected, umem_src, ksize); in test_copy_struct_from_user() 165 ret |= test(clear_user(umem + ksize, usize - ksize), in test_copy_struct_from_user() [all …]
|
/linux/include/linux/ |
H A D | sockptr.h | 75 static inline int copy_safe_from_sockptr(void *dst, size_t ksize, in copy_safe_from_sockptr() argument 78 if (optlen < ksize) in copy_safe_from_sockptr() 80 return copy_from_sockptr(dst, optval, ksize); in copy_safe_from_sockptr() 83 static inline int copy_struct_from_sockptr(void *dst, size_t ksize, in copy_struct_from_sockptr() argument 86 size_t size = min(ksize, usize); in copy_struct_from_sockptr() 87 size_t rest = max(ksize, usize) - size; in copy_struct_from_sockptr() 90 return copy_struct_from_user(dst, ksize, src.user, size); in copy_struct_from_sockptr() 92 if (usize < ksize) { in copy_struct_from_sockptr() 94 } else if (usize > ksize) { in copy_struct_from_sockptr()
|
H A D | uaccess.h | 348 copy_struct_from_user(void *dst, size_t ksize, const void __user *src, in copy_struct_from_user() argument 351 size_t size = min(ksize, usize); in copy_struct_from_user() 352 size_t rest = max(ksize, usize) - size; in copy_struct_from_user() 355 if (WARN_ON_ONCE(ksize > __builtin_object_size(dst, 1))) in copy_struct_from_user() 359 if (usize < ksize) { in copy_struct_from_user() 361 } else if (usize > ksize) { in copy_struct_from_user()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | test_get_stack_rawtp.c | 62 long usize, ksize; in bpf_prog1() local 91 ksize = bpf_get_stack(ctx, raw_data + usize, max_len - usize, 0); in bpf_prog1() 92 if (ksize < 0) in bpf_prog1() 95 total_size = usize + ksize; in bpf_prog1()
|
/linux/drivers/dma-buf/ |
H A D | dma-heap.c | 132 unsigned int in_size, out_size, drv_size, ksize; in dma_heap_ioctl() local 151 ksize = max(max(in_size, out_size), drv_size); in dma_heap_ioctl() 154 if (ksize > sizeof(stack_kdata)) { in dma_heap_ioctl() 155 kdata = kmalloc(ksize, GFP_KERNEL); in dma_heap_ioctl() 166 if (ksize > in_size) in dma_heap_ioctl() 167 memset(kdata + in_size, 0, ksize - in_size); in dma_heap_ioctl()
|
/linux/arch/powerpc/platforms/powernv/ |
H A D | opal-secvar.c | 57 static int opal_get_variable(const char *key, u64 ksize, u8 *data, u64 *dsize) in opal_get_variable() argument 66 rc = opal_secvar_get(key, ksize, data, dsize); in opal_get_variable() 89 static int opal_set_variable(const char *key, u64 ksize, u8 *data, u64 dsize) in opal_set_variable() argument 96 rc = opal_secvar_enqueue_update(key, ksize, data, dsize); in opal_set_variable()
|
/linux/arch/alpha/boot/ |
H A D | misc.c | 152 size_t ksize, in decompress_kernel() argument 160 free_mem_ptr = (ulg)output_start + ksize; in decompress_kernel() 161 free_mem_end_ptr = (ulg)output_start + ksize + 0x200000; in decompress_kernel()
|
H A D | Makefile | 46 $(obj)/main.o: $(obj)/ksize.h 47 $(obj)/bootp.o: $(obj)/ksize.h 50 $(obj)/ksize.h: $(obj)/vmlinux.nh FORCE
|
/linux/arch/microblaze/mm/ |
H A D | init.c | 194 unsigned int kstart, ksize; in mmu_init() local 230 ksize = PAGE_ALIGN(((u32)_end - (u32)CONFIG_KERNEL_START)); in mmu_init() 231 memblock_reserve(kstart, ksize); in mmu_init()
|
/linux/security/landlock/ |
H A D | syscalls.c | 60 copy_min_struct_from_user(void *const dst, const size_t ksize, in copy_min_struct_from_user() argument 70 BUILD_BUG_ON(ksize <= 0); in copy_min_struct_from_user() 71 BUILD_BUG_ON(ksize < ksize_min); in copy_min_struct_from_user() 78 return copy_struct_from_user(dst, ksize, src, usize); in copy_min_struct_from_user()
|
/linux/drivers/s390/crypto/ |
H A D | pkey_api.c | 731 switch (ksize) { in pkey_genseckey2() 793 switch (ksize) { in pkey_clr2seckey2() 850 if (ksize) in pkey_verifykey2() 880 if (ksize) { in pkey_verifykey2() 881 *ksize = PKEY_SIZE_UNKNOWN; in pkey_verifykey2() 883 *ksize = PKEY_SIZE_AES_128; in pkey_verifykey2() 885 *ksize = PKEY_SIZE_AES_192; in pkey_verifykey2() 918 if (ksize) in pkey_verifykey2() 919 *ksize = kb->head.bitlen; in pkey_verifykey2() 945 if (ksize) in pkey_verifykey2() [all …]
|
/linux/drivers/gpu/drm/ |
H A D | drm_ioctl.c | 772 unsigned int in_size, out_size, drv_size, ksize; in drm_ioctl() local 807 ksize = max(max(in_size, out_size), drv_size); in drm_ioctl() 823 if (ksize <= sizeof(stack_kdata)) { in drm_ioctl() 826 kdata = kmalloc(ksize, GFP_KERNEL); in drm_ioctl() 838 if (ksize > in_size) in drm_ioctl() 839 memset(kdata + in_size, 0, ksize - in_size); in drm_ioctl()
|
/linux/drivers/md/dm-vdo/ |
H A D | memory-alloc.c | 244 add_kmalloc_block(ksize(p)); in vdo_allocate_memory() 310 add_kmalloc_block(ksize(p)); in vdo_allocate_memory_nowait() 322 remove_kmalloc_block(ksize(ptr)); in vdo_free()
|
/linux/arch/x86/kernel/fpu/ |
H A D | xstate.c | 1500 static int fpstate_realloc(u64 xfeatures, unsigned int ksize, in fpstate_realloc() argument 1508 fpsize = ksize + ALIGN(offsetof(struct fpstate, regs), 64); in fpstate_realloc() 1513 newfps->size = ksize; in fpstate_realloc() 1598 unsigned int ksize, usize; in __xstate_request_perm() local 1611 ksize = xstate_calculate_size(mask, compacted); in __xstate_request_perm() 1627 perm->__state_size = ksize; in __xstate_request_perm() 1681 unsigned int ksize, usize; in __xfd_enable_feature() local 1701 ksize = perm->__state_size; in __xfd_enable_feature() 1716 if (fpstate_realloc(xfd_event, ksize, usize, guest_fpu)) in __xfd_enable_feature()
|
/linux/drivers/nvmem/ |
H A D | core.c | 88 unsigned int kend, ksize; in nvmem_access_with_keepouts() local 104 ksize = kend - offset; in nvmem_access_with_keepouts() 106 rc = __nvmem_reg_write(nvmem, offset, val, ksize); in nvmem_access_with_keepouts() 108 rc = __nvmem_reg_read(nvmem, offset, val, ksize); in nvmem_access_with_keepouts() 113 offset += ksize; in nvmem_access_with_keepouts() 114 val += ksize; in nvmem_access_with_keepouts() 122 ksize = kend - offset; in nvmem_access_with_keepouts() 124 memset(val, keepout->value, ksize); in nvmem_access_with_keepouts() 126 val += ksize; in nvmem_access_with_keepouts() 127 offset += ksize; in nvmem_access_with_keepouts() [all …]
|
/linux/drivers/crypto/ |
H A D | padlock-aes.c | 50 ksize:2; member 136 ctx->cword.encrypt.ksize = (key_len - 16) / 8; in aes_set_key() 137 ctx->cword.decrypt.ksize = ctx->cword.encrypt.ksize; in aes_set_key()
|
/linux/net/sched/ |
H A D | act_pedit.c | 170 int i, ksize; in tcf_pedit_init() local 219 ksize = parm->nkeys * sizeof(struct tc_pedit_key); in tcf_pedit_init() 220 if (nla_len(pattr) < sizeof(*parm) + ksize) { in tcf_pedit_init() 249 nparms->tcfp_keys = kmemdup(parm->keys, ksize, GFP_KERNEL); in tcf_pedit_init()
|
/linux/lib/kunit/ |
H A D | string-stream-test.c | 482 actual_bytes_used = ksize(stream); in string_stream_performance_test() 487 actual_bytes_used += ksize(frag_container); in string_stream_performance_test() 492 actual_bytes_used += ksize(frag_container->fragment); in string_stream_performance_test()
|
/linux/drivers/net/ethernet/chelsio/inline_crypto/chtls/ |
H A D | chtls_hw.c | 161 int ksize; in chtls_init_kmap() local 168 ksize = sizeof(*cdev->kmap.addr) * bsize; in chtls_init_kmap() 169 cdev->kmap.addr = kvzalloc(ksize, GFP_KERNEL); in chtls_init_kmap()
|
/linux/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_connect.sh | 564 local ksize 574 ksize=$((SIZE / 1024)) 575 rem=$((SIZE - (ksize * 1024))) 577 mptcp_lib_make_file $name 1024 $ksize
|
/linux/mm/ |
H A D | slab_common.c | 1173 ks = ksize(p); in __do_krealloc() 1240 ks = ksize(mem); in kfree_sensitive() 1249 size_t ksize(const void *objp) in ksize() function 1271 EXPORT_SYMBOL(ksize);
|
/linux/mm/kfence/ |
H A D | kfence_test.c | 705 KUNIT_EXPECT_EQ(test, ksize(buf), size); /* Precise size match after KFENCE alloc. */ in test_krealloc() 712 KUNIT_EXPECT_GE(test, ksize(buf), size * 3); in test_krealloc() 719 KUNIT_EXPECT_GE(test, ksize(buf), size * 2); in test_krealloc()
|
/linux/security/tomoyo/ |
H A D | memory.c | 50 const size_t s = ksize(ptr); in tomoyo_memory_ok()
|