/linux-master/kernel/trace/ |
H A D | trace_probe.c | 1945 const char *group, bool alloc_filter, int nargs) 1981 tp->nr_args = nargs; 1983 if (nargs) 1984 memset(tp->args, 0, sizeof(tp->args[0]) * nargs); 1944 trace_probe_init(struct trace_probe *tp, const char *event, const char *group, bool alloc_filter, int nargs) argument
|
H A D | trace_kprobe.c | 262 int nargs, bool is_return) 267 tk = kzalloc(struct_size(tk, tp.args, nargs), GFP_KERNEL); 293 ret = trace_probe_init(&tk->tp, event, group, false, nargs); 1839 offs, 0 /* maxactive */, 0 /* nargs */, 256 alloc_trace_kprobe(const char *group, const char *event, void *addr, const char *symbol, unsigned long offs, int maxactive, int nargs, bool is_return) argument
|
/linux-master/drivers/iio/adc/ |
H A D | qcom-pm8xxx-xoadc.c | 708 if (iiospec->nargs != 2) { 711 iiospec->nargs);
|
H A D | ingenic-adc.c | 727 if (!iiospec->nargs)
|
/linux-master/drivers/pwm/ |
H A D | core.c | 802 if (args.nargs < 2) 816 if (args.nargs > 2 && args.args[2] & PWM_POLARITY_INVERTED)
|
/linux-master/security/selinux/ |
H A D | selinuxfs.c | 911 int nargs; local 935 nargs = sscanf(buf, "%s %s %hu %s", scon, tcon, &tclass, namebuf); 936 if (nargs < 3 || nargs > 4) 938 if (nargs == 4) {
|
/linux-master/kernel/bpf/ |
H A D | btf.c | 6822 u32 i, nargs; local 6839 nargs = btf_type_vlen(func); 6840 if (nargs > MAX_BPF_FUNC_ARGS) { 6843 tname, nargs); 6856 for (i = 0; i < nargs; i++) { 6857 if (i == nargs - 1 && args[i].type == 0) { 6881 m->nr_args = nargs; 7139 u32 i, nargs, btf_id; local 7182 nargs = btf_type_vlen(t); 7183 if (nargs > MAX_BPF_FUNC_REG_ARG [all...] |
H A D | verifier.c | 11070 int argno, int nargs) 11133 if (argno + 1 < nargs && 11611 u32 i, nargs; local 11615 nargs = btf_type_vlen(meta->func_proto); 11616 if (nargs > MAX_BPF_FUNC_REG_ARGS) { 11617 verbose(env, "Function %s has %d > %d args\n", func_name, nargs, 11625 for (i = 0; i < nargs; i++) { 11711 kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs); 12097 u32 i, nargs, ptr_type_id, release_ref_obj_id; local 12486 nargs 11066 get_kfunc_ptr_arg_type(struct bpf_verifier_env *env, struct bpf_kfunc_call_arg_meta *meta, const struct btf_type *t, const struct btf_type *ref_t, const char *ref_tname, const struct btf_param *args, int argno, int nargs) argument [all...] |
/linux-master/scripts/ |
H A D | spdxcheck.py | 325 ap.add_argument('path', nargs='*', help='Check path or file. If not given full git tree scan. For stdin use "-"')
|
H A D | bpf_doc.py | 878 argParser.add_argument('target', nargs='?', default='helpers',
|
/linux-master/tools/perf/scripts/python/ |
H A D | intel-pt-events.py | 80 ap.add_argument("--interleave", type=int, nargs='?', const=4, default=0)
|
H A D | exported-sql-viewer.py | 4987 ap.add_argument("dbname", nargs="?")
|
/linux-master/include/net/ |
H A D | tcp.h | 2624 static inline int tcp_call_bpf(struct sock *sk, int op, u32 nargs, u32 *args) argument 2637 if (nargs > 0) 2638 memcpy(sock_ops.args, args, nargs * sizeof(*args)); 2664 static inline int tcp_call_bpf(struct sock *sk, int op, u32 nargs, u32 *args) argument
|
/linux-master/drivers/gpio/ |
H A D | gpiolib-acpi.c | 638 args->nargs = 3; 833 if (args.nargs != 3)
|
/linux-master/drivers/iio/ |
H A D | inkern.c | 133 if (!iiospec->nargs)
|
/linux-master/tools/perf/pmu-events/ |
H A D | jevents.py | 1255 'output_file', type=argparse.FileType('w', encoding='utf-8'), nargs='?', default=sys.stdout)
|
/linux-master/net/ |
H A D | socket.c | 3059 static const unsigned char nargs[21] = { variable 3087 len = nargs[call]; 3095 err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
|
/linux-master/tools/testing/selftests/net/openvswitch/ |
H A D | ovs-dpctl.py | 2088 "showdp", metavar="N", type=str, nargs="?", help="Datapath Name"
|
/linux-master/tools/net/ynl/ |
H A D | ynl-gen-c.py | 2608 parser.add_argument('--user-header', nargs='+', default=[])
|
/linux-master/arch/x86/crypto/ |
H A D | poly1305-x86_64-cryptogams.pl | 109 my ($name, $align, $nargs) = @_; 115 $code .= ".type $name,\@function,$nargs\n";
|