Home
last modified time | relevance | path

Searched refs:verifier (Results 1 – 18 of 18) sorted by relevance

/linux-4.1.27/kernel/bpf/
DMakefile2 obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o hashtab.o arraymap.o helpers.o
/linux-4.1.27/fs/nfs/
Dnfs3xdr.c294 static __be32 *xdr_encode_cookieverf3(__be32 *p, const __be32 *verifier) in xdr_encode_cookieverf3() argument
296 memcpy(p, verifier, NFS3_COOKIEVERFSIZE); in xdr_encode_cookieverf3()
300 static int decode_cookieverf3(struct xdr_stream *xdr, __be32 *verifier) in decode_cookieverf3() argument
307 memcpy(verifier, p, NFS3_COOKIEVERFSIZE); in decode_cookieverf3()
319 static void encode_createverf3(struct xdr_stream *xdr, const __be32 *verifier) in encode_createverf3() argument
324 memcpy(p, verifier, NFS3_CREATEVERFSIZE); in encode_createverf3()
327 static int decode_writeverf3(struct xdr_stream *xdr, struct nfs_write_verifier *verifier) in decode_writeverf3() argument
334 memcpy(verifier->data, p, NFS3_WRITEVERFSIZE); in decode_writeverf3()
1049 encode_createverf3(xdr, args->verifier); in encode_createhow3()
1688 if (decode_writeverf3(xdr, &result->verf->verifier)) in decode_write3resok()
[all …]
Dpnfs_nfs.c36 memcpy(&data->verf.verifier, &first->wb_verf, in pnfs_generic_prepare_to_resend_writes()
37 sizeof(data->verf.verifier)); in pnfs_generic_prepare_to_resend_writes()
38 data->verf.verifier.data[0]++; /* ensure verifier mismatch */ in pnfs_generic_prepare_to_resend_writes()
Dnfs3proc.c341 data->arg.create.verifier[0] = cpu_to_be32(jiffies); in nfs3_proc_create()
342 data->arg.create.verifier[1] = cpu_to_be32(current->pid); in nfs3_proc_create()
Dnfs4xdr.c1398 encode_nfs4_verifier(xdr, &arg->u.verifier); in encode_createmode()
1402 encode_nfs4_verifier(xdr, &arg->u.verifier); in encode_createmode()
1586 encode_nfs4_verifier(xdr, &readdir->verifier); in encode_readdir()
1593 memcpy(verf, readdir->verifier.data, sizeof(verf)); in encode_readdir()
1748 encode_nfs4_verifier(xdr, args->verifier); in encode_exchange_id()
4254 static int decode_verifier(struct xdr_stream *xdr, void *verifier) in decode_verifier() argument
4256 return decode_opaque_fixed(xdr, verifier, NFS4_VERIFIER_SIZE); in decode_verifier()
4259 static int decode_write_verifier(struct xdr_stream *xdr, struct nfs_write_verifier *verifier) in decode_write_verifier() argument
4261 return decode_opaque_fixed(xdr, verifier->data, NFS4_VERIFIER_SIZE); in decode_write_verifier()
4270 status = decode_write_verifier(xdr, &res->verf->verifier); in decode_commit()
[all …]
Dnfs4proc.c263 static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry, in nfs4_setup_readdir() argument
270 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier)); in nfs4_setup_readdir()
275 memset(&readdir->verifier, 0, sizeof(readdir->verifier)); in nfs4_setup_readdir()
1072 memcpy(p->o_arg.u.verifier.data, verf, in nfs4_opendata_alloc()
1073 sizeof(p->o_arg.u.verifier.data)); in nfs4_opendata_alloc()
3908 memcpy(NFS_I(dir)->cookieverf, res.verifier.data, NFS4_VERIFIER_SIZE); in _nfs4_proc_readdir()
6834 nfs4_verifier verifier; in _nfs4_proc_exchange_id() local
6836 .verifier = &verifier, in _nfs4_proc_exchange_id()
6858 nfs4_init_boot_verifier(clp, &verifier); in _nfs4_proc_exchange_id()
Dwrite.c902 memcpy(&req->wb_verf, &hdr->verf.verifier, sizeof(req->wb_verf)); in nfs_write_completion()
1712 if (!memcmp(&req->wb_verf, &data->verf.verifier, sizeof(req->wb_verf))) { in nfs_commit_release_pages()
/linux-4.1.27/Documentation/networking/
Dfilter.txt797 In the future an eBPF verifier can be used to validate internal BPF programs.
828 Safety of internal BPF can come from a verifier (TBD). In such use cases as
1005 eBPF verifier
1019 If verifier sees an insn that does R2=R1, then R2 has now type
1023 (In 'secure' mode verifier will reject any type of pointer arithmetic to make
1053 A callback is used to customize verifier to restrict eBPF program access to only
1059 If R6=PTR_TO_CTX, via is_valid_access() callback the verifier will know
1061 the verifier will reject the program.
1066 The verifier will allow eBPF program to read data from stack only after
1068 Classic BPF verifier does similar check with M[0-15] memory slots.
[all …]
/linux-4.1.27/include/linux/
Dnfs_xdr.h340 nfs4_verifier verifier; /* EXCLUSIVE */ member
499 struct nfs_write_verifier verifier; member
753 __be32 verifier[2]; member
961 nfs4_verifier verifier; member
971 nfs4_verifier verifier; member
1148 nfs4_verifier *verifier; member
/linux-4.1.27/fs/nfsd/
Dvfs.h68 u32 *verifier, bool *truncp, bool *created);
Dvfs.c1334 struct svc_fh *resfhp, int createmode, u32 *verifier, in do_nfsd_create() argument
1396 v_mtime = verifier[0]&0x7fffffff; in do_nfsd_create()
1397 v_atime = verifier[1]&0x7fffffff; in do_nfsd_create()
Dxdr4.h399 nfs4_verifier verifier; member
Dnfs4proc.c577 static void gen_boot_verifier(nfs4_verifier *verifier, struct net *net) in gen_boot_verifier() argument
588 memcpy(verifier->data, verf, sizeof(verifier->data)); in gen_boot_verifier()
Dnfs4xdr.c1284 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE); in nfsd4_decode_exchange_id()
Dnfs4state.c2328 nfs4_verifier verf = exid->verifier; in nfsd4_exchange_id()
/linux-4.1.27/Documentation/filesystems/
Dxfs-self-describing-metadata.txt217 A typical buffer read verifier is structured as follows:
240 The verifier function will take a couple of different forms, depending on
268 If there are different magic numbers for the different formats, the verifier
294 the opposite order to the read verifiers. A typical write verifier:
/linux-4.1.27/lib/
DKconfig.debug1738 verifier used by user space verifier testsuite.
/linux-4.1.27/init/
DKconfig1538 # syscall, maps, verifier