Searched refs:required_size (Results 1 – 6 of 6) sorted by relevance
/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/ |
A D | perf_branches.c | 13 int required_size = skel->bss->required_size_out; in check_good_sample() local 28 CHECK(required_size <= 0, "read_branches_size", "err %d\n", required_size); in check_good_sample() 44 int required_size = skel->bss->required_size_out; in check_bad_sample() local 52 CHECK((required_size != -EINVAL && required_size != -ENOENT), in check_bad_sample() 53 "read_branches_size", "err %d\n", required_size); in check_bad_sample()
|
/linux-6.3-rc2/tools/testing/selftests/bpf/progs/ |
A D | test_perf_branches.c | 25 int required_size, written_stack, written_global; in perf_branches() local 34 required_size = bpf_read_branch_records(ctx, NULL, 0, in perf_branches() 42 required_size_out = required_size; in perf_branches()
|
/linux-6.3-rc2/drivers/acpi/acpica/ |
A D | nsnames.c | 136 acpi_size required_size; in acpi_ns_handle_to_pathname() local 147 required_size = in acpi_ns_handle_to_pathname() 149 if (!required_size) { in acpi_ns_handle_to_pathname() 155 status = acpi_ut_initialize_buffer(buffer, required_size); in acpi_ns_handle_to_pathname() 163 (u32)required_size, no_trailing); in acpi_ns_handle_to_pathname() 166 (char *)buffer->pointer, (u32) required_size)); in acpi_ns_handle_to_pathname()
|
/linux-6.3-rc2/lib/ |
A D | stackdepot.c | 262 size_t required_size = struct_size(stack, entries, size); in depot_alloc_stack() local 264 required_size = ALIGN(required_size, 1 << DEPOT_STACK_ALIGN); in depot_alloc_stack() 267 if (unlikely(pool_offset + required_size > DEPOT_POOL_SIZE)) { in depot_alloc_stack() 308 pool_offset += required_size; in depot_alloc_stack()
|
/linux-6.3-rc2/net/tls/ |
A D | tls_sw.c | 946 int required_size; in tls_sw_sendmsg() local 1001 required_size = msg_pl->sg.size + try_to_copy + in tls_sw_sendmsg() 1008 ret = tls_alloc_encrypted_msg(sk, required_size); in tls_sw_sendmsg() 1017 try_to_copy -= required_size - msg_en->sg.size; in tls_sw_sendmsg() 1056 required_size = msg_pl->sg.size + try_to_copy; in tls_sw_sendmsg() 1058 ret = tls_clone_plaintext_msg(sk, required_size); in tls_sw_sendmsg() 1067 try_to_copy -= required_size - msg_pl->sg.size; in tls_sw_sendmsg() 1115 if (ctx->open_rec && msg_en->sg.size < required_size) in tls_sw_sendmsg() 1180 size_t copy, required_size; in tls_sw_do_sendpage() local 1211 ret = tls_alloc_encrypted_msg(sk, required_size); in tls_sw_do_sendpage() [all …]
|
/linux-6.3-rc2/drivers/hid/ |
A D | hid-sensor-custom.c | 438 int required_size = sizeof(struct hid_sensor_sample) + in hid_sensor_capture_sample() local 443 if (kfifo_avail(&sensor_inst->data_fifo) >= required_size) { in hid_sensor_capture_sample()
|
Completed in 13 milliseconds