/openbmc/linux/fs/nfs/ |
H A D | callback_proc.c | 691 memcpy(&cp_state->verf.verifier.data[0], in nfs4_copy_cb_args() 692 &args->wr_writeverf.verifier.data[0], in nfs4_copy_cb_args()
|
H A D | nfs42xdr.c | 827 res->verifier.committed = be32_to_cpup(p); in decode_write_response() 828 return decode_verifier(xdr, &res->verifier.verifier); in decode_write_response()
|
H A D | nfs3proc.c | 361 data->arg.create.verifier[0] = cpu_to_be32(jiffies); in nfs3_proc_create() 362 data->arg.create.verifier[1] = cpu_to_be32(current->pid); in nfs3_proc_create()
|
H A D | nfs4xdr.c | 1446 encode_nfs4_verifier(xdr, &arg->u.verifier); in encode_createmode() 1450 encode_nfs4_verifier(xdr, &arg->u.verifier); in encode_createmode() 1634 encode_nfs4_verifier(xdr, &readdir->verifier); in encode_readdir() 1641 memcpy(verf, readdir->verifier.data, sizeof(verf)); in encode_readdir() 1815 encode_nfs4_verifier(xdr, &args->verifier); in encode_exchange_id() 4397 static int decode_verifier(struct xdr_stream *xdr, void *verifier) in decode_verifier() argument 4399 return decode_opaque_fixed(xdr, verifier, NFS4_VERIFIER_SIZE); in decode_verifier() 4414 status = decode_write_verifier(xdr, &verf->verifier); in decode_commit() 5316 status = decode_verifier(xdr, readdir->verifier.data); in decode_readdir() 5319 memcpy(verf, readdir->verifier.data, sizeof(verf)); in decode_readdir() [all …]
|
H A D | pnfs_nfs.c | 37 memset(&verf->verifier, 0, sizeof(verf->verifier)); in pnfs_generic_prepare_to_resend_writes()
|
H A D | nfs4proc.c | 315 static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry, in nfs4_setup_readdir() argument 323 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier)); in nfs4_setup_readdir() 328 memset(&readdir->verifier, 0, sizeof(readdir->verifier)); in nfs4_setup_readdir() 1397 memcpy(p->o_arg.u.verifier.data, c->verf, in nfs4_opendata_alloc() 1398 sizeof(p->o_arg.u.verifier.data)); in nfs4_opendata_alloc() 5161 memcpy(nr_res->verf, res.verifier.data, NFS4_VERIFIER_SIZE); in _nfs4_proc_readdir() 8770 nfs4_init_boot_verifier(clp, &calldata->args.verifier); in nfs4_run_exchange_id() 8809 memcpy(calldata->args.verifier.data, clp->cl_confirm.data, in nfs4_run_exchange_id() 8810 sizeof(calldata->args.verifier.data)); in nfs4_run_exchange_id() 8895 memcpy(clp->cl_confirm.data, argp->verifier.data, in _nfs4_proc_exchange_id()
|
H A D | internal.h | 611 !nfs_write_verifier_cmp(&req->wb_verf, &verf->verifier); in nfs_write_match_verf()
|
H A D | direct.c | 760 memcpy(&req->wb_verf, &hdr->verf.verifier, in nfs_direct_write_completion()
|
H A D | callback_xdr.c | 540 memcpy(&args->wr_writeverf.verifier.data[0], p, in decode_write_response()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | xfs-self-describing-metadata.rst | 221 A typical buffer read verifier is structured as follows:: 244 The verifier function will take a couple of different forms, depending on 272 If there are different magic numbers for the different formats, the verifier 298 the opposite order to the read verifiers. A typical write verifier::
|
/openbmc/linux/fs/nfsd/ |
H A D | nfs3proc.c | 273 u32 *verifier = (u32 *)argp->verf; in nfsd3_create_file() local 280 v_mtime = verifier[0] & 0x7fffffff; in nfsd3_create_file() 281 v_atime = verifier[1] & 0x7fffffff; in nfsd3_create_file()
|
H A D | nfs4proc.c | 285 u32 *verifier = (u32 *)open->op_verf.data; in nfsd4_create_file() local 295 v_mtime = verifier[0] & 0x7fffffff; in nfsd4_create_file() 296 v_atime = verifier[1] & 0x7fffffff; in nfsd4_create_file() 754 static void gen_boot_verifier(nfs4_verifier *verifier, struct net *net) in gen_boot_verifier() argument 756 __be32 *verf = (__be32 *)verifier->data; in gen_boot_verifier() 758 BUILD_BUG_ON(2*sizeof(*verf) != sizeof(verifier->data)); in gen_boot_verifier()
|
H A D | xdr4.h | 422 nfs4_verifier verifier; member
|
/openbmc/linux/samples/bpf/ |
H A D | README.rst | 4 This directory contains a test stubs, verifier test-suite and examples
|
/openbmc/linux/Documentation/bpf/ |
H A D | map_cpumap.rst | 51 program will result in the program failing to load and a verifier warning.
|
H A D | prog_flow_dissector.rst | 14 in BPF to gain all the benefits of BPF verifier (namely, limits on the
|
H A D | map_xskmap.rst | 90 result in the program failing to load and a verifier warning.
|
H A D | classic_vs_extended.rst | 199 An in-kernel verifier.rst is used to validate eBPF programs. 230 Safety of eBPF can come from the verifier.rst. In such use cases as
|
H A D | map_devmap.rst | 76 program will result in the program failing to load and a verifier warning.
|
H A D | cpumasks.rst | 184 the verifier will reject any program that tries to do so).
|
H A D | map_sockmap.rst | 252 Therefore, at load time, all checks on pointers previously done by the verifier
|
H A D | bpf_iterators.rst | 233 - Specifies the verifier states for BPF program arguments associated with
|
/openbmc/openbmc/poky/meta/classes/ |
H A D | create-spdx-2.2.bbclass | 271 verifier = hashlib.sha1() 273 verifier.update(v.encode("utf-8")) 274 spdx_pkg.packageVerificationCode.packageVerificationCodeValue = verifier.hexdigest()
|
/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | net.rst | 59 through bpf(2) and passing a verifier in the kernel, a JIT will then
|
/openbmc/linux/Documentation/hid/ |
H A D | hid-bpf.rst | 207 return 0; /* ensure data is correct, now the verifier knows we
|