| /Linux-v5.4/drivers/dma/bestcomm/ |
| D | bestcomm.c | 281 unsigned int tdt_size, ctx_size, var_size, fdt_size; in bcom_engine_init() local 285 ctx_size = BCOM_MAX_TASKS * BCOM_CTX_SIZE; in bcom_engine_init() 290 bcom_eng->ctx = bcom_sram_alloc(ctx_size, BCOM_CTX_ALIGN, &ctx_pa); in bcom_engine_init() 306 memset(bcom_eng->ctx, 0x00, ctx_size); in bcom_engine_init()
|
| /Linux-v5.4/arch/powerpc/kernel/ |
| D | signal_64.c | 641 struct ucontext __user *, new_ctx, long, ctx_size) in SYSCALL_DEFINE3() argument 655 if (ctx_size < UCONTEXTSIZEWITHOUTVSX) in SYSCALL_DEFINE3() 661 if ((ctx_size < sizeof(struct ucontext)) && in SYSCALL_DEFINE3() 665 if (ctx_size >= sizeof(struct ucontext)) in SYSCALL_DEFINE3() 669 if (!access_ok(old_ctx, ctx_size) in SYSCALL_DEFINE3() 678 if (!access_ok(new_ctx, ctx_size) in SYSCALL_DEFINE3() 680 || __get_user(tmp, (u8 __user *) new_ctx + ctx_size - 1)) in SYSCALL_DEFINE3()
|
| D | signal_32.c | 1057 struct ucontext __user *, new_ctx, int, ctx_size) in COMPAT_SYSCALL_DEFINE3() argument 1060 struct ucontext __user *, new_ctx, long, ctx_size) in COMPAT_SYSCALL_DEFINE3() 1088 if (ctx_size < UCONTEXTSIZEWITHOUTVSX) in COMPAT_SYSCALL_DEFINE3() 1094 if ((ctx_size < sizeof(struct ucontext)) && in COMPAT_SYSCALL_DEFINE3() 1098 if (ctx_size >= sizeof(struct ucontext)) in COMPAT_SYSCALL_DEFINE3() 1104 if (ctx_size < sizeof(struct ucontext)) in COMPAT_SYSCALL_DEFINE3() 1119 if (!access_ok(old_ctx, ctx_size) in COMPAT_SYSCALL_DEFINE3() 1127 if (!access_ok(new_ctx, ctx_size) || in COMPAT_SYSCALL_DEFINE3() 1128 fault_in_pages_readable((u8 __user *)new_ctx, ctx_size)) in COMPAT_SYSCALL_DEFINE3()
|
| /Linux-v5.4/fs/crypto/ |
| D | policy.c | 162 int ctx_size) in fscrypt_policy_from_context() argument 166 if (ctx_size <= 0 || ctx_size != fscrypt_context_size(ctx_u)) in fscrypt_policy_from_context()
|
| D | fscrypt_private.h | 480 int ctx_size);
|
| /Linux-v5.4/drivers/net/ethernet/qlogic/qed/ |
| D | qed_init_fw_funcs.c | 1421 u16 ctx_size, u8 ctx_type, u32 cid) in qed_calc_session_ctx_validation() argument 1430 memset(p_ctx, 0, ctx_size); in qed_calc_session_ctx_validation() 1439 u16 ctx_size, u8 ctx_type, u32 tid) in qed_calc_task_ctx_validation() argument 1446 memset(p_ctx, 0, ctx_size); in qed_calc_task_ctx_validation() 1452 void qed_memset_session_ctx(void *p_ctx_mem, u32 ctx_size, u8 ctx_type) in qed_memset_session_ctx() argument 1466 memset(p_ctx, 0, ctx_size); in qed_memset_session_ctx() 1474 void qed_memset_task_ctx(void *p_ctx_mem, u32 ctx_size, u8 ctx_type) in qed_memset_task_ctx() argument 1484 memset(p_ctx, 0, ctx_size); in qed_memset_task_ctx()
|
| D | qed_hsi.h | 4196 u16 ctx_size, u8 ctx_type, u32 cid); 4208 u16 ctx_size, u8 ctx_type, u32 tid); 4219 void qed_memset_session_ctx(void *p_ctx_mem, u32 ctx_size, u8 ctx_type); 4229 void qed_memset_task_ctx(void *p_ctx_mem, u32 ctx_size, u8 ctx_type);
|
| /Linux-v5.4/drivers/crypto/ccp/ |
| D | ccp-ops.c | 1481 int ctx_size; in ccp_run_sha_cmd() local 1574 ctx_size = SHA1_DIGEST_SIZE; in ccp_run_sha_cmd() 1584 ctx_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1595 ctx_size = SHA256_DIGEST_SIZE; in ccp_run_sha_cmd() 1602 ctx_size = SHA512_DIGEST_SIZE; in ccp_run_sha_cmd() 1610 ctx_size = SHA512_DIGEST_SIZE; in ccp_run_sha_cmd() 1646 memcpy(ctx.address + ioffset, init, ctx_size); in ccp_run_sha_cmd() 1650 memcpy(ctx.address + ctx_size / 2, init, in ccp_run_sha_cmd() 1651 ctx_size / 2); in ccp_run_sha_cmd() 1652 memcpy(ctx.address, init + ctx_size / 2, in ccp_run_sha_cmd() [all …]
|
| /Linux-v5.4/net/key/ |
| D | af_key.c | 471 int ctx_size = sec_ctx->sadb_x_ctx_len; in pfkey_sadb2xfrm_user_sec_ctx() local 473 uctx = kmalloc((sizeof(*uctx)+ctx_size), gfp); in pfkey_sadb2xfrm_user_sec_ctx() 776 int ctx_size = 0; in __pfkey_xfrm_state2msg() local 800 ctx_size = PFKEY_ALIGN8(xfrm_ctx->ctx_len); in __pfkey_xfrm_state2msg() 801 size += sizeof(struct sadb_x_sec_ctx) + ctx_size; in __pfkey_xfrm_state2msg() 1033 sizeof(struct sadb_x_sec_ctx) + ctx_size); in __pfkey_xfrm_state2msg() 1035 (sizeof(struct sadb_x_sec_ctx) + ctx_size) / sizeof(uint64_t); in __pfkey_xfrm_state2msg() 2187 int ctx_size = pfkey_xfrm_policy2sec_ctx_size(xp); in pfkey_xfrm_policy2msg() local 2189 sec_ctx = skb_put(skb, ctx_size); in pfkey_xfrm_policy2msg() 2190 sec_ctx->sadb_x_sec_len = ctx_size / sizeof(uint64_t); in pfkey_xfrm_policy2msg() [all …]
|
| /Linux-v5.4/drivers/firmware/ |
| D | qcom_scm.c | 46 __le32 ctx_size; member 487 destvm->ctx_size = 0; in qcom_scm_assign_mem()
|
| /Linux-v5.4/arch/powerpc/include/asm/ |
| D | asm-prototypes.h | 90 long ctx_size);
|
| /Linux-v5.4/kernel/trace/ |
| D | bpf_trace.c | 516 void *ctx, u64 ctx_size, bpf_ctx_copy_t ctx_copy) in bpf_event_output() argument 521 .size = ctx_size, in bpf_event_output() 527 .next = ctx_size ? &frag : NULL, in bpf_event_output()
|
| /Linux-v5.4/drivers/gpu/drm/i915/gvt/ |
| D | cmd_parser.c | 2931 int ctx_size = wa_ctx->indirect_ctx.size; in shadow_indirect_ctx() local 2942 roundup(ctx_size + CACHELINE_BYTES, in shadow_indirect_ctx() 2965 guest_gma, guest_gma + ctx_size, in shadow_indirect_ctx()
|
| /Linux-v5.4/include/linux/ |
| D | bpf.h | 497 void *ctx, u64 ctx_size, bpf_ctx_copy_t ctx_copy);
|
| /Linux-v5.4/net/xfrm/ |
| D | xfrm_user.c | 816 int ctx_size = sizeof(*uctx) + s->ctx_len; in copy_sec_ctx() local 818 attr = nla_reserve(skb, XFRMA_SEC_CTX, ctx_size); in copy_sec_ctx() 824 uctx->len = ctx_size; in copy_sec_ctx()
|
| /Linux-v5.4/kernel/bpf/ |
| D | core.c | 2053 void *ctx, u64 ctx_size, bpf_ctx_copy_t ctx_copy) in bpf_event_output() argument
|