Lines Matching defs:len

194 				u32 len;
197 ceph_decode_32_safe(p, end, len, bad);
198 ceph_decode_skip_n(p, end, len, bad);
200 ceph_decode_32_safe(p, end, len, bad);
201 ceph_decode_skip_n(p, end, len, bad);
505 oname.len = _name_len;
512 oname.len = altname_len;
522 rde->name_len = oname.len;
578 u64 start, len;
581 ceph_decode_64_safe(p, end, len, bad);
585 pr_warn_ratelimited("ceph: ignoring reserved inode range delegation (start=0x%llx len=0x%llx)\n",
586 start, len);
589 while (len--) {
673 /* struct_v, struct_compat, and len */
748 u32 len;
756 ceph_decode_32_safe(&p, end, len, bad);
757 if (len > 0) {
758 ceph_decode_need(&p, end, len, bad);
759 err = parse_reply_info_trace(&p, p+len, info, features);
765 ceph_decode_32_safe(&p, end, len, bad);
766 if (len > 0) {
767 ceph_decode_need(&p, end, len, bad);
768 err = parse_reply_info_extra(&p, p+len, req, features, s);
774 ceph_decode_32_safe(&p, end, len, bad);
775 info->snapblob_len = len;
777 p += len;
842 dname.len = dentry->d_name.len;
2537 u32 len = 0;
2556 if (!fscrypt_fname_encrypted_size(dir, dentry->d_name.len, NAME_MAX,
2557 &len)) {
2563 if (len <= CEPH_NOHASH_NAME_MAX) {
2564 len = 0;
2568 cryptbuf = kmalloc(len, GFP_KERNEL);
2572 ret = fscrypt_fname_encrypt(dir, &dentry->d_name, cryptbuf, len);
2578 *plen = len;
2648 pos -= cur->d_name.len;
2653 memcpy(path + pos, cur->d_name.name, cur->d_name.len);
2657 int len, ret;
2664 memcpy(buf, cur->d_name.name, cur->d_name.len);
2665 len = cur->d_name.len;
2677 len = ceph_encode_encrypted_fname(d_inode(parent),
2679 if (len < 0) {
2682 return ERR_PTR(len);
2685 pos -= len;
2690 memcpy(path + pos, buf, len);
2743 *ppathlen = dentry->d_name.len;
2872 int len;
2918 len = sizeof(struct ceph_mds_request_head_legacy);
2920 len = sizeof(struct ceph_mds_request_head_old);
2922 len = sizeof(struct ceph_mds_request_head);
2925 len += 2 * (1 + sizeof(u32) + sizeof(u64));
2926 len += pathlen1 + pathlen2;
2929 len += sizeof(struct ceph_mds_request_release) *
2934 len += pathlen1;
2936 len += pathlen2;
2941 len += sizeof(struct ceph_timespec);
2944 len += sizeof(u32) + (sizeof(u64) * req->r_cred->group_info->ngroups);
2947 len += sizeof(u32) + req->r_altname_len;
2950 len += sizeof(u32); // fscrypt_auth
2952 len += ceph_fscrypt_auth_len(req->r_fscrypt_auth);
2955 len += sizeof(u32);
2957 len += sizeof(__le64);
2959 msg = ceph_msg_new2(CEPH_MSG_CLIENT_REQUEST, len, 1, GFP_NOFS, false);
3909 u32 len;
3910 ceph_decode_32_safe(p, end, len, bad);
3911 ceph_decode_need(p, end, len, bad);
3912 err_str = !strncmp(*p, "error_string", len);
3913 *p += len;
3914 ceph_decode_32_safe(p, end, len, bad);
3915 ceph_decode_need(p, end, len, bad);
3920 if (err_str && strnstr(*p, "blacklisted", len))
3922 *p += len;
3955 u32 len;
3965 ceph_decode_32_safe(&p, end, len, bad);
3966 if (len) {
3968 p += len - sizeof(features);
3973 u32 flags, len;
3977 ceph_decode_32_safe(&p, end, len, bad); /* len */
3978 ceph_decode_skip_n(&p, end, len, bad); /* metric_spec */
4111 pr_err("mdsc_handle_session corrupt message mds%d len %d\n", mds,
4918 dname.len = get_unaligned_le32(h + 1);
4919 if (msg->front.iov_len < sizeof(*h) + sizeof(u32) + dname.len)
4927 dname.len, dname.name);
4942 dname.hash = full_name_hash(parent, dname.name, dname.len);
5009 int len = sizeof(*lease) + sizeof(u32) + NAME_MAX;
5014 msg = ceph_msg_new(CEPH_MSG_CLIENT_LEASE, len, GFP_NOFS, false);
5026 put_unaligned_le32(dentry->d_name.len, lease + 1);
5028 dentry->d_name.name, dentry->d_name.len);
5654 dout("handle_map epoch %u len %d\n", epoch, (int)maplen);
5926 pr_err("unable to allocate msg type %d len %d\n",