/barrelfish-2018-10-04/usr/vmkitmon/ |
H A D | pci_ethernet.h | 15 #define ETH_MMIO_MASK(eth) (~(~eth->bytes + 1)) // I think ~(-eth->bytes) is also correct 20 #define ETH_MMIO_ADDR_CHECK(eth,addr) ( eth->phys_base_addr <= addr && addr <= eth->phys_base_addr + eth->bytes ) 28 size_t bytes; member in struct:pci_ethernet
|
/barrelfish-2018-10-04/usr/vnode_map_32/ |
H A D | vnode_map_32.c | 55 size_t bytes = DEFAULT_SIZE; local 60 printf("\tpagesize: %i, \taddr: %i\n", (int)bytes, (int)SAFE_VADDR); 67 err = frame_alloc(&frame, bytes, &bytes); 69 assert(bytes >= DEFAULT_SIZE); 108 bytes = DEFAULT_SIZE; 109 err = frame_alloc(&frame, bytes, &bytes); 111 assert(bytes >= DEFAULT_SIZE); 113 a.size = bytes; [all...] |
/barrelfish-2018-10-04/lib/blk/dma_mem/ |
H A D | dma_mem.c | 29 mem->bytes = id.bytes; 30 mem->requested = id.bytes; 34 err = vspace_map_one_frame_attr(&addr, mem->bytes, mem->frame, VREGION_FLAGS_READ_WRITE, 49 * \param bytes minimum size of the memory region in bytes 56 errval_t dma_mem_alloc(size_t bytes, struct dma_mem *mem) argument 59 mem->requested = bytes; 60 bytes = ROUND_UP(BASE_PAGE_SIZE, bytes); [all...] |
H A D | dma_mem.h | 20 uint64_t bytes; ///< size of the region in bytes member in struct:dma_mem 21 uint64_t requested; ///< requested size of the region in bytes (<= bytes) 28 * \param bytes minimum size of the memory region in bytes 34 errval_t dma_mem_alloc(size_t bytes, struct dma_mem *mem);
|
/barrelfish-2018-10-04/lib/dma/include/ |
H A D | dma_mem_utils.h | 19 * \param bytes minimum size of the memory region in bytes 26 errval_t dma_mem_alloc(size_t bytes,
|
/barrelfish-2018-10-04/lib/barrelfish/ |
H A D | morecore.c | 28 typedef void *(*morecore_alloc_func_t)(size_t bytes, size_t *retbytes); 31 typedef void (*morecore_free_func_t)(void *base, size_t bytes); 39 * be smaller than bytes if we were able to allocate a smaller memory 42 static void *morecore_alloc(size_t bytes, size_t *retbytes) argument 49 if (bytes < LARGE_PAGE_SIZE) { 50 bytes = LARGE_PAGE_SIZE; 53 bytes = ROUND_UP(bytes, LARGE_PAGE_SIZE); 58 size_t step = bytes; 59 while (mapped < bytes) { 91 morecore_free(void *base, size_t bytes) argument [all...] |
/barrelfish-2018-10-04/lib/vfs/ |
H A D | vfs_blockdevfs.h | 47 size_t bytes, size_t *bytes_read); 49 size_t bytes, size_t *bytes_written); 56 size_t bytes, size_t *bytes_read); 58 size_t bytes, size_t *bytes_written); 65 size_t bytes, size_t *bytes_read); 67 size_t bytes, size_t *bytes_written);
|
H A D | vfs_blockdevfs_megaraid.c | 50 size_t bytes, size_t *bytes_read) 53 handle, pos, buffer, bytes); 59 size_t bytes, size_t *bytes_written) 64 handle, pos, buffer, bytes); 66 size_t mycount = STORAGE_VSIC_ROUND(&h->vsic, bytes); 72 *bytes_written = bytes; 49 blockdevfs_megaraid_read(void *handle, size_t pos, void *buffer, size_t bytes, size_t *bytes_read) argument 58 blockdevfs_megaraid_write(void *handle, size_t pos, const void *buffer, size_t bytes, size_t *bytes_written) argument
|
/barrelfish-2018-10-04/lib/dma/ioat/ |
H A D | ioat_dma_request.c | 81 size_t bytes) 85 bytes += (max_xfer_size - 1); 86 return (uint32_t) (bytes / max_xfer_size); 143 uint32_t num_desc = req_num_desc_needed(ioat_chan, setup->args.memcpy.bytes); 145 IOATREQ_DEBUG("DMA Memcpy request: [0x%016lx]->[0x%016lx] of %lu bytes (%u desc)\n", 147 setup->args.memcpy.bytes, num_desc); 170 size_t length = setup->args.memcpy.bytes; 173 size_t bytes, max_xfer_size = dma_channel_get_max_xfer_size(chan); local 182 bytes = length; 189 bytes 80 req_num_desc_needed(struct ioat_dma_channel *chan, size_t bytes) argument 280 size_t bytes, max_xfer_size = dma_channel_get_max_xfer_size(chan); local [all...] |
/barrelfish-2018-10-04/usr/bench/largepage/ |
H A D | largepage_64_bench.c | 173 size_t bytes = DEFAULT_SIZE; local 182 err = frame_alloc(&frame, bytes, &bytes); 188 assert(bytes >= DEFAULT_SIZE); 193 err = pmap->f.determine_addr_raw(pmap, bytes, X86_64_BASE_PAGE_SIZE, &address); 201 err = pmap->f.map(pmap, address, frame, 0, bytes, PMAP_DEFAULT_ACCESS, NULL, &bytes); 211 err = pmap->f.unmap(pmap, address, bytes, NULL); 220 bytes = DEFAULT_SIZE; 222 err = frame_alloc(&frame2, bytes, [all...] |
/barrelfish-2018-10-04/lib/dma/xeon_phi/ |
H A D | xeon_phi_dma_request.c | 80 size_t bytes) 84 bytes += (max_xfer_size - 1); 85 return (uint32_t) (bytes / max_xfer_size); 142 uint32_t num_desc = req_num_desc_needed(xchan, setup->args.memcpy.bytes); 144 XPHIREQ_DEBUG("DMA Memcpy request: [0x%016lx]->[0x%016lx] of %lu bytes (%u desc)\n", 146 setup->args.memcpy.bytes, num_desc); 165 size_t length = setup->args.memcpy.bytes; 169 size_t bytes, max_xfer_size = dma_channel_get_max_xfer_size(chan); local 178 bytes = length; 181 bytes 79 req_num_desc_needed(struct xeon_phi_dma_channel *chan, size_t bytes) argument [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/rand/ |
H A D | rand_egd.c | 66 * RAND_query_egd_bytes(path, buf, bytes) 67 * will actually query "bytes" bytes of entropy form the egd-socket located 70 * The number of bytes is not limited by the maximum chunk size of EGD, 71 * which is 255 bytes. If more than 255 bytes are wanted, several chunks 72 * of entropy bytes are requested. The connection is left open until the 76 * num the number of bytes read from the EGD socket. This number is either 77 * the number of bytes requested or smaller, if the EGD pool is 82 * RAND_egd_bytes(path, bytes) wil 101 RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes) argument 110 RAND_egd_bytes(const char *path,int bytes) argument 138 RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes) argument 286 RAND_egd_bytes(const char *path, int bytes) argument [all...] |
H A D | randfile.c | 106 int RAND_load_file(const char *file, long bytes) argument 108 /* If bytes >= 0, read up to 'bytes' bytes. 109 * if bytes == -1, read complete file. */ 132 if (bytes == 0) return(ret); 143 * of bytes from a random device, nor do we want to use buffered 146 bytes = (bytes == -1) ? 2048 : bytes; /* o [all...] |
/barrelfish-2018-10-04/usr/vnode_map_test/ |
H A D | vnode_map_test.c | 64 size_t bytes = DEFAULT_SIZE; local 73 err = frame_alloc(&frame, bytes, &bytes); 75 assert(bytes >= DEFAULT_SIZE); 192 bytes = DEFAULT_SIZE; 193 err = frame_alloc(&frame, bytes, &bytes); 195 assert(bytes >= DEFAULT_SIZE); 201 err = pmap->f.map(pmap, SAFE_PMAP_ADDR, frame, 0, bytes, PMAP_DEFAULT_ACCESS | 0x0100, NULL, &bytes); [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_att.c | 98 const void *bytes, int len) 101 type, bytes, len)) return 1; 107 const void *bytes, int len) 110 type, bytes, len)) return 1; 116 const void *bytes, int len) 119 type, bytes, len)) return 1; 164 const void *bytes, int len) 167 type, bytes, len)) return 1; 173 const void *bytes, int len) 176 type, bytes, le 96 CMS_signed_add1_attr_by_OBJ(CMS_SignerInfo *si, const ASN1_OBJECT *obj, int type, const void *bytes, int len) argument 105 CMS_signed_add1_attr_by_NID(CMS_SignerInfo *si, int nid, int type, const void *bytes, int len) argument 114 CMS_signed_add1_attr_by_txt(CMS_SignerInfo *si, const char *attrname, int type, const void *bytes, int len) argument 162 CMS_unsigned_add1_attr_by_OBJ(CMS_SignerInfo *si, const ASN1_OBJECT *obj, int type, const void *bytes, int len) argument 171 CMS_unsigned_add1_attr_by_NID(CMS_SignerInfo *si, int nid, int type, const void *bytes, int len) argument 180 CMS_unsigned_add1_attr_by_txt(CMS_SignerInfo *si, const char *attrname, int type, const void *bytes, int len) argument [all...] |
/barrelfish-2018-10-04/include/openssl/ |
H A D | whrlpool.h | 28 int WHIRLPOOL_Update (WHIRLPOOL_CTX *c,const void *inp,size_t bytes); 31 unsigned char *WHIRLPOOL(const void *inp,size_t bytes,unsigned char *md);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/whrlpool/ |
H A D | whrlpool.h | 28 int WHIRLPOOL_Update (WHIRLPOOL_CTX *c,const void *inp,size_t bytes); 31 unsigned char *WHIRLPOOL(const void *inp,size_t bytes,unsigned char *md);
|
/barrelfish-2018-10-04/lib/dma/ |
H A D | dma_mem_utils.c | 20 * \param bytes minimum size of the memory region in bytes 27 errval_t dma_mem_alloc(size_t bytes, argument 37 err = frame_alloc(&mem->frame, bytes, &mem->bytes); 52 err = vspace_map_one_frame_attr(&addr, mem->bytes, mem->frame, flags, NULL,
|
/barrelfish-2018-10-04/usr/drivers/ioat_dma/ |
H A D | dma_service.h | 54 * \param bytes size of the transfer in bytes 63 size_t bytes,
|
/barrelfish-2018-10-04/include/ |
H A D | arranet_debug.h | 50 uint8_t bytes[24]; member in union:__anon33 69 uint8_t bytes[24]; member in union:__anon35 79 uint8_t bytes[sizeof(protocol_binary_request_header)]; member in union:__anon37 89 uint8_t bytes[sizeof(protocol_binary_response_header)]; member in union:__anon39
|
/barrelfish-2018-10-04/include/lwip2/lwip/apps/ |
H A D | tftp_server.h | 73 * @param bytes Number of bytes to copy to buf 76 int (*read)(void* handle, void* buf, int bytes);
|
/barrelfish-2018-10-04/usr/tests/ata_rw28_test/ |
H A D | ata_rw28_test.c | 31 size_t bytes = block_size*block_count; local 32 uint8_t *buf = malloc(bytes); 35 size_t count = bytes / step; 36 assert(bytes % sizeof(pat) == 0); 42 err = ata_rw28_binding->rpc_tx_vtbl.write_dma(ata_rw28_binding, buf, bytes, start_lba, &status); 51 err = ata_rw28_binding->rpc_tx_vtbl.read_dma(ata_rw28_binding, bytes, start_lba, reply.buffer, &reply.buffer_size); 54 if (reply.buffer_size != bytes)
|
/barrelfish-2018-10-04/lib/libc/isc/ |
H A D | ev_streams.c | 48 static void consume(evStream *str, size_t bytes); 232 consume(evStream *str, size_t bytes) { argument 233 while (bytes > 0U) { 234 if (bytes < (size_t)str->iovCur->iov_len) { 235 str->iovCur->iov_len -= bytes; 237 ((u_char *)str->iovCur->iov_base + bytes); 238 str->ioDone += bytes; 239 bytes = 0; 241 bytes -= str->iovCur->iov_len; 267 /* Dribble out some bytes o 271 int bytes; local 294 int bytes; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/bn/ |
H A D | bn_rand.c | 121 int ret=0,bit,bytes,mask; local 130 bytes=(bits+7)/8; 134 buf=(unsigned char *)OPENSSL_malloc(bytes); 147 if (RAND_pseudo_bytes(buf, bytes) == -1) 152 if (RAND_bytes(buf, bytes) <= 0) 164 for (i = 0; i < bytes; i++) 198 buf[bytes-1]|=1; 199 if (!BN_bin2bn(buf,bytes,rnd)) goto err; 204 OPENSSL_cleanse(buf,bytes);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509name.c | 175 unsigned char *bytes, int len, int loc, int set) 179 ne = X509_NAME_ENTRY_create_by_OBJ(NULL, obj, type, bytes, len); 187 unsigned char *bytes, int len, int loc, int set) 191 ne = X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes, len); 199 const unsigned char *bytes, int len, int loc, int set) 203 ne = X509_NAME_ENTRY_create_by_txt(NULL, field, type, bytes, len); 276 const char *field, int type, const unsigned char *bytes, int len) 289 nentry = X509_NAME_ENTRY_create_by_OBJ(ne,obj,type,bytes,len); 295 int type, unsigned char *bytes, int len) 306 nentry = X509_NAME_ENTRY_create_by_OBJ(ne,obj,type,bytes,le 174 X509_NAME_add_entry_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, int type, unsigned char *bytes, int len, int loc, int set) argument 186 X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, unsigned char *bytes, int len, int loc, int set) argument 198 X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, const unsigned char *bytes, int len, int loc, int set) argument 275 X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, const char *field, int type, const unsigned char *bytes, int len) argument 294 X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, int type, unsigned char *bytes, int len) argument 311 X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, ASN1_OBJECT *obj, int type, const unsigned char *bytes, int len) argument 349 X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, const unsigned char *bytes, int len) argument [all...] |