/linux-6.12.1/tools/testing/selftests/net/ |
D | vrf-xfrm-tests.sh | 262 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 269 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 277 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 284 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 292 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 299 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 \ 307 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \ 314 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 \
|
/linux-6.12.1/fs/ |
D | dax.c | 380 bool trunc) in dax_disassociate_entry() argument 390 WARN_ON_ONCE(trunc && page_ref_count(page) > 1); in dax_disassociate_entry() 746 pgoff_t index, bool trunc) in __dax_invalidate_entry() argument 756 if (!trunc && in __dax_invalidate_entry() 760 dax_disassociate_entry(entry, mapping, trunc); in __dax_invalidate_entry()
|
/linux-6.12.1/fs/ocfs2/ |
D | alloc.h | 221 unsigned int start, unsigned int end, int trunc);
|
D | alloc.c | 7386 unsigned int start, unsigned int end, int trunc) in ocfs2_truncate_inline() argument 7440 if (trunc) { in ocfs2_truncate_inline()
|
/linux-6.12.1/tools/testing/selftests/net/netfilter/ |
D | nft_queue.sh | 515 timeout 10 ip netns exec "$ns2" socat UDP-LISTEN:12345,fork OPEN:"$TMPFILE1",trunc & 518 timeout 10 ip netns exec "$ns3" socat UDP-LISTEN:12345,fork OPEN:"$TMPFILE2",trunc &
|
/linux-6.12.1/drivers/char/ipmi/ |
D | ipmi_devintf.c | 199 bool trunc, struct ipmi_recv *rsp, in handle_recv() argument 250 if (trunc) { in handle_recv()
|
/linux-6.12.1/drivers/net/ethernet/atheros/atlx/ |
D | atl2.h | 299 unsigned trunc:1; /* current frame truncated due to rxram full */ member
|
/linux-6.12.1/drivers/net/wireless/ath/ath6kl/ |
D | init.c | 1666 char *trunc = "..."; in ath6kl_init_get_fwcaps() local 1679 trunc_len = strlen(trunc) + 1; in ath6kl_init_get_fwcaps() 1680 memcpy(buf + buf_len - trunc_len, trunc, trunc_len); in ath6kl_init_get_fwcaps()
|
/linux-6.12.1/drivers/net/ethernet/chelsio/cxgb4/ |
D | t4_msg.h | 1265 u8 trunc:1; member 1269 u8 trunc:1; member 1286 __u8 trunc:1; member 1290 __u8 trunc:1; member
|
/linux-6.12.1/net/openvswitch/ |
D | actions.c | 1401 struct ovs_action_trunc *trunc = nla_data(a); in do_execute_actions() local 1403 if (skb->len > trunc->max_len) in do_execute_actions() 1404 OVS_CB(skb)->cutlen = skb->len - trunc->max_len; in do_execute_actions()
|
D | flow_netlink.c | 3266 const struct ovs_action_trunc *trunc = nla_data(a); in __ovs_nla_copy_actions() local 3268 if (trunc->max_len < ETH_HLEN) in __ovs_nla_copy_actions()
|
/linux-6.12.1/security/smack/ |
D | smackfs.c | 452 int trunc = 0; in smk_write_rules_list() local 472 trunc = 1; in smk_write_rules_list() 484 if (trunc) { in smk_write_rules_list()
|
/linux-6.12.1/fs/fuse/ |
D | dir.c | 631 bool trunc = flags & O_TRUNC; in fuse_create_open() local 656 if (fm->fc->handle_killpriv_v2 && trunc && in fuse_create_open() 715 if (fm->fc->atomic_o_trunc && trunc) in fuse_create_open()
|
/linux-6.12.1/fs/ceph/ |
D | caps.c | 4035 struct ceph_mds_caps *trunc, in handle_cap_trunc() argument 4042 int seq = le32_to_cpu(trunc->seq); in handle_cap_trunc() 4043 u32 truncate_seq = le32_to_cpu(trunc->truncate_seq); in handle_cap_trunc() 4044 u64 truncate_size = le64_to_cpu(trunc->truncate_size); in handle_cap_trunc() 4045 u64 size = le64_to_cpu(trunc->size); in handle_cap_trunc()
|
/linux-6.12.1/arch/m68k/fpsp040/ |
D | setox.S | 474 cmpil #0x400CB167,%d0 | ...16380 log2 trunc. 16 bits
|
/linux-6.12.1/Documentation/bpf/standardization/ |
D | instruction-set.rst | 399 a % n = a - n * trunc(a / n)
|
/linux-6.12.1/arch/m68k/ifpsp060/src/ |
D | fplsp.S | 7114 cmp.l %d1,&0x400CB167 # 16380 log2 trunc. 16 bits
|