/kernel/linux/linux-6.6/drivers/iio/chemical/ |
H A D | sps30_serial.c | 134 const unsigned char *arg, size_t arg_size) in sps30_serial_prep_frame() 143 num += sps30_serial_put_byte(buf + num, arg_size); in sps30_serial_prep_frame() 145 for (i = 0; i < arg_size; i++) in sps30_serial_prep_frame() 191 const void *arg, size_t arg_size, void *rsp, size_t rsp_size) in sps30_serial_command() 197 size = sps30_serial_prep_frame(buf, cmd, arg, arg_size); in sps30_serial_command() 133 sps30_serial_prep_frame(unsigned char *buf, unsigned char cmd, const unsigned char *arg, size_t arg_size) sps30_serial_prep_frame() argument 190 sps30_serial_command(struct sps30_state *state, unsigned char cmd, const void *arg, size_t arg_size, void *rsp, size_t rsp_size) sps30_serial_command() argument
|
H A D | sps30_i2c.c | 65 static int sps30_i2c_command(struct sps30_state *state, u16 cmd, void *arg, size_t arg_size, in sps30_i2c_command() argument 94 while (arg_size) { in sps30_i2c_command() 98 arg_size -= 2; in sps30_i2c_command()
|
/kernel/linux/linux-6.6/tools/testing/selftests/drivers/s390x/uvdevice/ |
H A D | test_uvdevice.c | 30 uint32_t arg_size; in FIXTURE_VARIANT() local 35 .arg_size = sizeof(struct uvio_attest), in FIXTURE_VARIANT_ADD() 43 self->uvio_ioctl.argument_len = variant->arg_size; in FIXTURE_SETUP() 106 self->uvio_ioctl.argument_len = variant->arg_size; in TEST_F()
|
/kernel/linux/linux-5.10/arch/x86/xen/ |
H A D | multicalls.h | 61 * arg_size bytes. 67 struct multicall_space xen_mc_extend_args(unsigned long op, size_t arg_size);
|
/kernel/linux/linux-6.6/arch/x86/xen/ |
H A D | multicalls.h | 61 * arg_size bytes. 67 struct multicall_space xen_mc_extend_args(unsigned long op, size_t arg_size);
|
/kernel/linux/linux-5.10/tools/perf/util/ |
H A D | bpf-prologue.c | 70 int arg_size = type ? atoi(&type[1]) : 64; in argtype_to_ldx_size() local 72 switch (arg_size) { in argtype_to_ldx_size()
|
/kernel/linux/linux-6.6/arch/x86/net/ |
H A D | bpf_jit_comp.c | 1959 int arg_size, off; in clean_stack_garbage() local 1989 arg_size = m->arg_size[m->nr_args - 1]; in clean_stack_garbage() 1990 if (arg_size <= 4) { in clean_stack_garbage() 2009 arg_regs = (m->arg_size[i] + 7) / 8; in get_nr_used_regs() 2032 arg_regs = (m->arg_size[i] + 7) / 8; in save_args() 2110 arg_regs = (m->arg_size[i] + 7) / 8; in restore_regs() 2373 nr_regs += (m->arg_size[i] + 7) / 8 - 1; in arch_prepare_bpf_trampoline()
|
H A D | bpf_jit_comp32.c | 1587 int regs_needed = fm->arg_size[i] > sizeof(u32) ? 2 : 1; in emit_kfunc_call() 1599 if (fm->arg_size[i - 1] > sizeof(u32)) { in emit_kfunc_call() 1613 if (fm->arg_size[i - 1] > sizeof(u32)) in emit_kfunc_call()
|
/kernel/linux/linux-6.6/drivers/accel/qaic/ |
H A D | qaic_data.c | 929 unsigned long arg_size; in qaic_attach_slice_bo_ioctl() local 938 arg_size = args->hdr.count * sizeof(*slice_ent); in qaic_attach_slice_bo_ioctl() 939 if (arg_size / args->hdr.count != sizeof(*slice_ent)) in qaic_attach_slice_bo_ioctl() 972 slice_ent = kzalloc(arg_size, GFP_KERNEL); in qaic_attach_slice_bo_ioctl() 978 ret = copy_from_user(slice_ent, user_data, arg_size); in qaic_attach_slice_bo_ioctl()
|
/kernel/linux/linux-6.6/arch/s390/net/ |
H A D | bpf_jit_comp.c | 1438 m->arg_size[j], in bpf_jit_insn() 2240 if (m->arg_size[i] <= 8) in __arch_prepare_bpf_trampoline() 2242 else if (m->arg_size[i] <= 16) in __arch_prepare_bpf_trampoline() 2299 if (m->arg_size[i] <= 8) { in __arch_prepare_bpf_trampoline()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | lsm.c | 619 size_t arg_size; in apparmor_setprocattr() local 645 arg_size = size - (args - (largs ? largs : (char *) value)); in apparmor_setprocattr() 648 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr() 651 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr()
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | lsm.c | 694 size_t arg_size; in apparmor_setprocattr() local 721 arg_size = size - (args - (largs ? largs : (char *) value)); in apparmor_setprocattr() 724 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr() 727 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr()
|
/kernel/linux/linux-5.10/arch/sparc/include/asm/ |
H A D | hypervisor.h | 3428 unsigned long arg_size);
|
/kernel/linux/linux-6.6/arch/sparc/include/asm/ |
H A D | hypervisor.h | 3428 unsigned long arg_size);
|
/kernel/linux/linux-5.10/arch/x86/net/ |
H A D | bpf_jit_comp.c | 1520 emit_stx(prog, bytes_to_bpf_size(m->arg_size[i]), in save_regs() 1537 emit_ldx(prog, bytes_to_bpf_size(m->arg_size[i]), in restore_regs()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | bpf.h | 815 size_t arg_size[5]; member 1011 u8 arg_size[MAX_BPF_FUNC_ARGS]; member
|
/kernel/linux/linux-6.6/arch/arm64/net/ |
H A D | bpf_jit_comp.c | 2044 /* The arg_size is at most 16 bytes, enforced by the verifier. */ in arch_prepare_bpf_trampoline() 2046 nregs += (m->arg_size[i] + 7) / 8 - 1; in arch_prepare_bpf_trampoline()
|
/kernel/linux/linux-6.6/arch/riscv/net/ |
H A D | bpf_jit_comp64.c | 847 nregs += round_up(m->arg_size[i], 8) / 8 - 1; in __arch_prepare_bpf_trampoline()
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | bpf.h | 576 u8 arg_size[MAX_BPF_FUNC_ARGS]; member
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | btf.c | 4952 m->arg_size[i] = 8; in btf_distill_func_proto() 4994 m->arg_size[i] = ret; in btf_distill_func_proto()
|
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | btf.c | 6564 m->arg_size[i] = 8; in btf_distill_func_proto() 6612 m->arg_size[i] = ret; in btf_distill_func_proto()
|
H A D | verifier.c | 8472 /* arg_btf_id and arg_size are in a union. */ in check_func_arg() 8631 fn->arg_size[arg], false, in check_func_arg() 9036 bool has_size = fn->arg_size[arg] != 0; in check_args_pair_invalid() 9076 /* arg_btf_id and arg_size are in a union. */ in check_btf_id_ok()
|