/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
H A D | perf_branches.c | 13 int required_size = skel->bss->required_size_out; in check_good_sample() local 28 CHECK(required_size <= 0, "read_branches_size", "err %d\n", required_size); in check_good_sample() 44 int required_size = skel->bss->required_size_out; in check_bad_sample() local 52 CHECK((required_size != -EINVAL && required_size != -ENOENT), in check_bad_sample() 53 "read_branches_size", "err %d\n", required_size); in check_bad_sample()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/prog_tests/ |
H A D | perf_branches.c | 13 int required_size = skel->bss->required_size_out; in check_good_sample() local 28 CHECK(required_size <= 0, "read_branches_size", "err %d\n", required_size); in check_good_sample() 44 int required_size = skel->bss->required_size_out; in check_bad_sample() local 52 CHECK((required_size != -EINVAL && required_size != -ENOENT), in check_bad_sample() 53 "read_branches_size", "err %d\n", required_size); in check_bad_sample()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/progs/ |
H A D | test_perf_branches.c | 25 int required_size, written_stack, written_global; in perf_branches() local 34 required_size = bpf_read_branch_records(ctx, NULL, 0, in perf_branches() 42 required_size_out = required_size; in perf_branches()
|
/kernel/linux/linux-6.6/tools/testing/selftests/bpf/progs/ |
H A D | test_perf_branches.c | 25 int required_size, written_stack, written_global; in perf_branches() local 34 required_size = bpf_read_branch_records(ctx, NULL, 0, in perf_branches() 42 required_size_out = required_size; in perf_branches()
|
/kernel/linux/linux-5.10/drivers/acpi/acpica/ |
H A D | nsnames.c | 136 acpi_size required_size; in acpi_ns_handle_to_pathname() local 147 required_size = in acpi_ns_handle_to_pathname() 149 if (!required_size) { in acpi_ns_handle_to_pathname() 155 status = acpi_ut_initialize_buffer(buffer, required_size); in acpi_ns_handle_to_pathname() 163 (u32)required_size, no_trailing); in acpi_ns_handle_to_pathname() 166 (char *)buffer->pointer, (u32) required_size)); in acpi_ns_handle_to_pathname()
|
/kernel/linux/linux-6.6/drivers/acpi/acpica/ |
H A D | nsnames.c | 136 acpi_size required_size; in acpi_ns_handle_to_pathname() local 147 required_size = in acpi_ns_handle_to_pathname() 149 if (!required_size) { in acpi_ns_handle_to_pathname() 155 status = acpi_ut_initialize_buffer(buffer, required_size); in acpi_ns_handle_to_pathname() 163 (u32)required_size, no_trailing); in acpi_ns_handle_to_pathname() 166 (char *)buffer->pointer, (u32) required_size)); in acpi_ns_handle_to_pathname()
|
/kernel/linux/linux-5.10/lib/ |
H A D | stackdepot.c | 107 int required_size = offsetof(struct stack_record, entries) + in depot_alloc_stack() local 111 required_size = ALIGN(required_size, 1 << STACK_ALLOC_ALIGN); in depot_alloc_stack() 113 if (unlikely(depot_offset + required_size > STACK_ALLOC_SIZE)) { in depot_alloc_stack() 140 depot_offset += required_size; in depot_alloc_stack()
|
/kernel/linux/linux-6.6/lib/ |
H A D | stackdepot.c | 263 size_t required_size = struct_size(stack, entries, size); in depot_alloc_stack() local 265 required_size = ALIGN(required_size, 1 << DEPOT_STACK_ALIGN); in depot_alloc_stack() 268 if (unlikely(pool_offset + required_size > DEPOT_POOL_SIZE)) { in depot_alloc_stack() 309 pool_offset += required_size; in depot_alloc_stack() 314 kmsan_unpoison_memory(stack, required_size); in depot_alloc_stack()
|
/kernel/linux/linux-5.10/net/tls/ |
H A D | tls_sw.c | 935 int required_size; in tls_sw_sendmsg() local 990 required_size = msg_pl->sg.size + try_to_copy + in tls_sw_sendmsg() 997 ret = tls_alloc_encrypted_msg(sk, required_size); in tls_sw_sendmsg() 1006 try_to_copy -= required_size - msg_en->sg.size; in tls_sw_sendmsg() 1045 required_size = msg_pl->sg.size + try_to_copy; in tls_sw_sendmsg() 1047 ret = tls_clone_plaintext_msg(sk, required_size); in tls_sw_sendmsg() 1056 try_to_copy -= required_size - msg_pl->sg.size; in tls_sw_sendmsg() 1104 if (ctx->open_rec && msg_en->sg.size < required_size) in tls_sw_sendmsg() 1169 size_t copy, required_size; in tls_sw_do_sendpage() local 1195 required_size in tls_sw_do_sendpage() [all...] |
/kernel/linux/linux-6.6/net/tls/ |
H A D | tls_sw.c | 1020 int required_size; in tls_sw_sendmsg_locked() local 1068 required_size = msg_pl->sg.size + try_to_copy + in tls_sw_sendmsg_locked() 1075 ret = tls_alloc_encrypted_msg(sk, required_size); in tls_sw_sendmsg_locked() 1084 try_to_copy -= required_size - msg_en->sg.size; in tls_sw_sendmsg_locked() 1138 required_size = msg_pl->sg.size + try_to_copy; in tls_sw_sendmsg_locked() 1140 ret = tls_clone_plaintext_msg(sk, required_size); in tls_sw_sendmsg_locked() 1149 try_to_copy -= required_size - msg_pl->sg.size; in tls_sw_sendmsg_locked() 1198 if (ctx->open_rec && msg_en->sg.size < required_size) in tls_sw_sendmsg_locked()
|
/kernel/linux/linux-5.10/drivers/hid/ |
H A D | hid-sensor-custom.c | 433 int required_size = sizeof(struct hid_sensor_sample) + in hid_sensor_capture_sample() local 438 if (kfifo_avail(&sensor_inst->data_fifo) >= required_size) { in hid_sensor_capture_sample()
|
/kernel/linux/linux-6.6/drivers/hid/ |
H A D | hid-sensor-custom.c | 438 int required_size = sizeof(struct hid_sensor_sample) + in hid_sensor_capture_sample() local 443 if (kfifo_avail(&sensor_inst->data_fifo) >= required_size) { in hid_sensor_capture_sample()
|