Searched refs:required_size (Results 1 – 6 of 6) sorted by relevance
| /Linux-v6.6/tools/testing/selftests/bpf/prog_tests/ |
| D | perf_branches.c | 13 int required_size = skel->bss->required_size_out; in check_good_sample() local 28 CHECK(required_size <= 0, "read_branches_size", "err %d\n", required_size); in check_good_sample() 44 int required_size = skel->bss->required_size_out; in check_bad_sample() local 52 CHECK((required_size != -EINVAL && required_size != -ENOENT), in check_bad_sample() 53 "read_branches_size", "err %d\n", required_size); in check_bad_sample()
|
| /Linux-v6.6/tools/testing/selftests/bpf/progs/ |
| D | test_perf_branches.c | 25 int required_size, written_stack, written_global; in perf_branches() local 34 required_size = bpf_read_branch_records(ctx, NULL, 0, in perf_branches() 42 required_size_out = required_size; in perf_branches()
|
| /Linux-v6.6/drivers/acpi/acpica/ |
| D | nsnames.c | 136 acpi_size required_size; in acpi_ns_handle_to_pathname() local 147 required_size = in acpi_ns_handle_to_pathname() 149 if (!required_size) { in acpi_ns_handle_to_pathname() 155 status = acpi_ut_initialize_buffer(buffer, required_size); in acpi_ns_handle_to_pathname() 163 (u32)required_size, no_trailing); in acpi_ns_handle_to_pathname() 166 (char *)buffer->pointer, (u32) required_size)); in acpi_ns_handle_to_pathname()
|
| /Linux-v6.6/lib/ |
| D | stackdepot.c | 263 size_t required_size = struct_size(stack, entries, size); in depot_alloc_stack() local 265 required_size = ALIGN(required_size, 1 << DEPOT_STACK_ALIGN); in depot_alloc_stack() 268 if (unlikely(pool_offset + required_size > DEPOT_POOL_SIZE)) { in depot_alloc_stack() 309 pool_offset += required_size; in depot_alloc_stack() 314 kmsan_unpoison_memory(stack, required_size); in depot_alloc_stack()
|
| /Linux-v6.6/net/tls/ |
| D | tls_sw.c | 978 int required_size; in tls_sw_sendmsg_locked() local 1027 required_size = msg_pl->sg.size + try_to_copy + in tls_sw_sendmsg_locked() 1034 ret = tls_alloc_encrypted_msg(sk, required_size); in tls_sw_sendmsg_locked() 1043 try_to_copy -= required_size - msg_en->sg.size; in tls_sw_sendmsg_locked() 1093 required_size = msg_pl->sg.size + try_to_copy; in tls_sw_sendmsg_locked() 1095 ret = tls_clone_plaintext_msg(sk, required_size); in tls_sw_sendmsg_locked() 1104 try_to_copy -= required_size - msg_pl->sg.size; in tls_sw_sendmsg_locked() 1153 if (ctx->open_rec && msg_en->sg.size < required_size) in tls_sw_sendmsg_locked()
|
| /Linux-v6.6/drivers/hid/ |
| D | hid-sensor-custom.c | 438 int required_size = sizeof(struct hid_sensor_sample) + in hid_sensor_capture_sample() local 443 if (kfifo_avail(&sensor_inst->data_fifo) >= required_size) { in hid_sensor_capture_sample()
|