/linux-6.3-rc2/drivers/iio/chemical/ |
A D | sps30_serial.c | 134 const unsigned char *arg, size_t arg_size) in sps30_serial_prep_frame() argument 143 num += sps30_serial_put_byte(buf + num, arg_size); in sps30_serial_prep_frame() 145 for (i = 0; i < arg_size; i++) in sps30_serial_prep_frame() 191 const void *arg, size_t arg_size, void *rsp, size_t rsp_size) in sps30_serial_command() argument 197 size = sps30_serial_prep_frame(buf, cmd, arg, arg_size); in sps30_serial_command()
|
A D | sps30_i2c.c | 65 static int sps30_i2c_command(struct sps30_state *state, u16 cmd, void *arg, size_t arg_size, in sps30_i2c_command() argument 94 while (arg_size) { in sps30_i2c_command() 98 arg_size -= 2; in sps30_i2c_command()
|
/linux-6.3-rc2/tools/testing/selftests/drivers/s390x/uvdevice/ |
A D | test_uvdevice.c | 30 uint32_t arg_size; in FIXTURE_VARIANT() local 35 .arg_size = sizeof(struct uvio_attest), in FIXTURE_VARIANT_ADD() 43 self->uvio_ioctl.argument_len = variant->arg_size; in FIXTURE_SETUP() 106 self->uvio_ioctl.argument_len = variant->arg_size; in TEST_F()
|
/linux-6.3-rc2/arch/x86/xen/ |
A D | multicalls.h | 67 struct multicall_space xen_mc_extend_args(unsigned long op, size_t arg_size);
|
/linux-6.3-rc2/arch/x86/net/ |
A D | bpf_jit_comp.c | 1863 int i, j, arg_size; in save_regs() local 1873 arg_size = m->arg_size[j]; in save_regs() 1874 if (arg_size > 8) { in save_regs() 1875 arg_size = 8; in save_regs() 1879 emit_stx(prog, bytes_to_bpf_size(arg_size), in save_regs() 1891 int i, j, arg_size; in restore_regs() local 1901 arg_size = m->arg_size[j]; in restore_regs() 1902 if (arg_size > 8) { in restore_regs() 1903 arg_size = 8; in restore_regs() 1907 emit_ldx(prog, bytes_to_bpf_size(arg_size), in restore_regs() [all …]
|
A D | bpf_jit_comp32.c | 1587 int regs_needed = fm->arg_size[i] > sizeof(u32) ? 2 : 1; in emit_kfunc_call() 1599 if (fm->arg_size[i - 1] > sizeof(u32)) { in emit_kfunc_call() 1613 if (fm->arg_size[i - 1] > sizeof(u32)) in emit_kfunc_call()
|
/linux-6.3-rc2/tools/perf/util/ |
A D | bpf-prologue.c | 70 int arg_size = type ? atoi(&type[1]) : 64; in argtype_to_ldx_size() local 72 switch (arg_size) { in argtype_to_ldx_size()
|
/linux-6.3-rc2/security/apparmor/ |
A D | lsm.c | 663 size_t arg_size; in apparmor_setprocattr() local 690 arg_size = size - (args - (largs ? largs : (char *) value)); in apparmor_setprocattr() 693 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr() 696 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr()
|
/linux-6.3-rc2/arch/s390/net/ |
A D | bpf_jit_comp.c | 1438 m->arg_size[j], in bpf_jit_insn() 2227 if (m->arg_size[i] <= 8) in __arch_prepare_bpf_trampoline() 2229 else if (m->arg_size[i] <= 16) in __arch_prepare_bpf_trampoline() 2269 if (m->arg_size[i] <= 8) { in __arch_prepare_bpf_trampoline()
|
/linux-6.3-rc2/arch/sparc/include/asm/ |
A D | hypervisor.h | 3428 unsigned long arg_size);
|
/linux-6.3-rc2/include/linux/ |
A D | bpf.h | 748 size_t arg_size[5]; member 941 u8 arg_size[MAX_BPF_FUNC_ARGS]; member
|
/linux-6.3-rc2/arch/riscv/net/ |
A D | bpf_jit_comp64.c | 830 nregs += round_up(m->arg_size[i], 8) / 8 - 1; in __arch_prepare_bpf_trampoline()
|
/linux-6.3-rc2/kernel/bpf/ |
A D | btf.c | 6570 m->arg_size[i] = 8; in btf_distill_func_proto() 6618 m->arg_size[i] = ret; in btf_distill_func_proto()
|
A D | verifier.c | 6899 fn->arg_size[arg], false, in check_func_arg() 7300 bool has_size = fn->arg_size[arg] != 0; in check_args_pair_invalid()
|