Home
last modified time | relevance | path

Searched refs:arg_size (Results 1 – 15 of 15) sorted by relevance

/Linux-v6.6/drivers/iio/chemical/
Dsps30_serial.c134 const unsigned char *arg, size_t arg_size) in sps30_serial_prep_frame() argument
143 num += sps30_serial_put_byte(buf + num, arg_size); in sps30_serial_prep_frame()
145 for (i = 0; i < arg_size; i++) in sps30_serial_prep_frame()
191 const void *arg, size_t arg_size, void *rsp, size_t rsp_size) in sps30_serial_command() argument
197 size = sps30_serial_prep_frame(buf, cmd, arg, arg_size); in sps30_serial_command()
Dsps30_i2c.c65 static int sps30_i2c_command(struct sps30_state *state, u16 cmd, void *arg, size_t arg_size, in sps30_i2c_command() argument
94 while (arg_size) { in sps30_i2c_command()
98 arg_size -= 2; in sps30_i2c_command()
/Linux-v6.6/tools/testing/selftests/drivers/s390x/uvdevice/
Dtest_uvdevice.c30 uint32_t arg_size; in FIXTURE_VARIANT() local
35 .arg_size = sizeof(struct uvio_attest), in FIXTURE_VARIANT_ADD()
43 self->uvio_ioctl.argument_len = variant->arg_size; in FIXTURE_SETUP()
106 self->uvio_ioctl.argument_len = variant->arg_size; in TEST_F()
/Linux-v6.6/arch/x86/xen/
Dmulticalls.h67 struct multicall_space xen_mc_extend_args(unsigned long op, size_t arg_size);
/Linux-v6.6/arch/x86/net/
Dbpf_jit_comp.c1957 int arg_size, off; in clean_stack_garbage() local
1987 arg_size = m->arg_size[m->nr_args - 1]; in clean_stack_garbage()
1988 if (arg_size <= 4) { in clean_stack_garbage()
2007 arg_regs = (m->arg_size[i] + 7) / 8; in get_nr_used_regs()
2030 arg_regs = (m->arg_size[i] + 7) / 8; in save_args()
2108 arg_regs = (m->arg_size[i] + 7) / 8; in restore_regs()
2371 nr_regs += (m->arg_size[i] + 7) / 8 - 1; in arch_prepare_bpf_trampoline()
Dbpf_jit_comp32.c1587 int regs_needed = fm->arg_size[i] > sizeof(u32) ? 2 : 1; in emit_kfunc_call()
1599 if (fm->arg_size[i - 1] > sizeof(u32)) { in emit_kfunc_call()
1613 if (fm->arg_size[i - 1] > sizeof(u32)) in emit_kfunc_call()
/Linux-v6.6/security/apparmor/
Dlsm.c663 size_t arg_size; in apparmor_setprocattr() local
690 arg_size = size - (args - (largs ? largs : (char *) value)); in apparmor_setprocattr()
693 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr()
696 error = aa_setprocattr_changehat(args, arg_size, in apparmor_setprocattr()
/Linux-v6.6/drivers/accel/qaic/
Dqaic_data.c931 unsigned long arg_size; in qaic_attach_slice_bo_ioctl() local
940 arg_size = args->hdr.count * sizeof(*slice_ent); in qaic_attach_slice_bo_ioctl()
941 if (arg_size / args->hdr.count != sizeof(*slice_ent)) in qaic_attach_slice_bo_ioctl()
974 slice_ent = kzalloc(arg_size, GFP_KERNEL); in qaic_attach_slice_bo_ioctl()
980 ret = copy_from_user(slice_ent, user_data, arg_size); in qaic_attach_slice_bo_ioctl()
/Linux-v6.6/arch/s390/net/
Dbpf_jit_comp.c1438 m->arg_size[j], in bpf_jit_insn()
2240 if (m->arg_size[i] <= 8) in __arch_prepare_bpf_trampoline()
2242 else if (m->arg_size[i] <= 16) in __arch_prepare_bpf_trampoline()
2299 if (m->arg_size[i] <= 8) { in __arch_prepare_bpf_trampoline()
/Linux-v6.6/arch/sparc/include/asm/
Dhypervisor.h3428 unsigned long arg_size);
/Linux-v6.6/include/linux/
Dbpf.h806 size_t arg_size[5]; member
998 u8 arg_size[MAX_BPF_FUNC_ARGS]; member
/Linux-v6.6/arch/riscv/net/
Dbpf_jit_comp64.c847 nregs += round_up(m->arg_size[i], 8) / 8 - 1; in __arch_prepare_bpf_trampoline()
/Linux-v6.6/arch/arm64/net/
Dbpf_jit_comp.c2046 nregs += (m->arg_size[i] + 7) / 8 - 1; in arch_prepare_bpf_trampoline()
/Linux-v6.6/kernel/bpf/
Dbtf.c6564 m->arg_size[i] = 8; in btf_distill_func_proto()
6612 m->arg_size[i] = ret; in btf_distill_func_proto()
Dverifier.c8295 fn->arg_size[arg], false, in check_func_arg()
8700 bool has_size = fn->arg_size[arg] != 0; in check_args_pair_invalid()