/linux-master/arch/x86/include/asm/ |
H A D | uprobes.h | 36 u8 ilen; member in struct:arch_uprobe::__anon206::__anon207 41 u8 ilen; member in struct:arch_uprobe::__anon206::__anon208 45 u8 ilen; member in struct:arch_uprobe::__anon206::__anon209
|
/linux-master/drivers/media/usb/dvb-usb/ |
H A D | vp702x.h | 111 extern int vp702x_usb_inout_op(struct dvb_usb_device *d, u8 *o, int olen, u8 *i, int ilen, int msec);
|
/linux-master/lib/842/ |
H A D | 842_compress.c | 91 u64 ilen; member in struct:sw842_param 470 * Compress the uncompressed buffer of length @ilen at @in to the output buffer 477 int sw842_compress(const u8 *in, unsigned int ilen, argument 494 p->ilen = ilen; 504 if (sw842_strict && (ilen % 8)) { 505 pr_err("Using strict mode, can't compress len %d\n", ilen); 510 if (unlikely(ilen < 8)) 516 while (p->ilen > 7) { 552 p->ilen [all...] |
H A D | 842_decompress.c | 53 u64 ilen; member in struct:sw842_param 101 else if (p->ilen < 8 && bits > 32 && bits <= 56) 103 else if (p->ilen < 4 && bits > 16 && bits <= 24) 106 if (DIV_ROUND_UP(bits, 8) > p->ilen) 124 p->ilen -= p->bit / 8; 265 * Decompress the 842-compressed buffer of length @ilen at @in 277 int sw842_decompress(const u8 *in, unsigned int ilen, argument 287 p.ilen = ilen;
|
/linux-master/arch/mips/include/asm/ |
H A D | sgiarcs.h | 90 ULONG ilen; /* length of string identifier */ member in struct:linux_component
|
/linux-master/arch/powerpc/sysdev/xics/ |
H A D | icp-native.c | 261 unsigned int ilen; local 272 ireg = of_get_property(np, "ibm,interrupt-server-ranges", &ilen); 277 WARN_ON((ireg == NULL) || (ilen != 2*sizeof(u32))); 281 if (ilen >= 2*sizeof(u32))
|
H A D | xics-common.c | 47 u32 ilen; local 60 ireg = of_get_property(np, "ibm,ppc-interrupt-gserver#s", &ilen); 66 i = ilen / sizeof(int);
|
/linux-master/arch/s390/kernel/ |
H A D | kprobes.c | 390 int ilen = insn_length(p->ainsn.insn[0] >> 8); local 391 if (ip - (unsigned long) p->ainsn.insn == ilen) 392 ip = (unsigned long) p->addr + ilen;
|
H A D | uprobes.c | 95 int ilen = insn_length(auprobe->insn[0] >> 8); local 97 if (regs->psw.addr - utask->xol_vaddr == ilen) 98 regs->psw.addr = utask->vaddr + ilen; 267 unsigned int ilen; local 274 ilen = insn_length(insn->opc0); 356 adjust_psw_addr(®s->psw, ilen); 359 regs->int_code = ilen << 16 | 0x0001; 363 regs->int_code = ilen << 16 | 0x0006; 367 regs->int_code = ilen << 16 | 0x0005;
|
/linux-master/arch/s390/kvm/ |
H A D | guestdbg.c | 501 const u8 ilen = kvm_s390_get_ilen(vcpu); local 505 .per_address = __rewind_psw(vcpu->arch.sie_block->gpsw, ilen),
|
H A D | intercept.c | 28 u8 ilen = 0; local 37 ilen = insn_length(vcpu->arch.sie_block->ipa >> 8); 40 ilen = (sie_block->icptstatus >> 4) & 0x6; 41 if (!ilen) 42 ilen = 4; 46 /* bit 1+2 of pgmilc are the ilc, so we directly get ilen */ 47 ilen = vcpu->arch.sie_block->pgmilc & 0x6; 50 return ilen;
|
H A D | interrupt.c | 855 u16 ilen; local 863 ilen = pgm_info.flags & KVM_S390_PGM_FLAGS_ILC_MASK; 864 VCPU_EVENT(vcpu, 3, "deliver: program irq code 0x%x, ilen:%d", 865 pgm_info.code, ilen); 954 kvm_s390_rewind_psw(vcpu, ilen); 956 /* bit 1+2 of the target are the ilc, so we can directly use ilen */ 957 rc |= put_guest_lc(vcpu, ilen, (u16 *) __LC_PGM_ILC);
|
H A D | kvm-s390.c | 4715 u8 opcode, ilen; local 4730 ilen = insn_length(opcode); 4734 /* Instruction-Fetching Exceptions - we can't detect the ilen. 4739 ilen = 4; 4741 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID; 4742 kvm_s390_forward_psw(vcpu, ilen);
|
H A D | kvm-s390.h | 330 static inline void kvm_s390_rewind_psw(struct kvm_vcpu *vcpu, int ilen) argument 334 sie_block->gpsw.addr = __rewind_psw(sie_block->gpsw, ilen); 336 static inline void kvm_s390_forward_psw(struct kvm_vcpu *vcpu, int ilen) argument 338 kvm_s390_rewind_psw(vcpu, -ilen);
|
H A D | vsie.c | 966 int ilen = insn_length(scb_s->ipa >> 8); local 970 ilen = (scb_s->icptstatus >> 4) & 0x6; 971 if (!ilen) 972 ilen = 4; 974 scb_s->gpsw.addr = __rewind_psw(scb_s->gpsw, ilen); 1321 * ilen = 4 for now, so we can avoid reading in guest 3 virtual
|
/linux-master/arch/sparc/net/ |
H A D | bpf_jit_comp_32.c | 396 int ilen; local 711 ilen = (void *) prog - (void *) temp; 713 if (unlikely(proglen + ilen > oldproglen)) { 719 memcpy(image + proglen, temp, ilen); 721 proglen += ilen;
|
/linux-master/arch/x86/boot/compressed/ |
H A D | mkpiggy.c | 22 long ilen; local 49 ilen = ftell(f); 54 printf("z_input_len = %lu\n", ilen); 65 printf("input_len:\n\t.long %lu\n", ilen);
|
/linux-master/arch/x86/kernel/ |
H A D | uprobes.c | 477 *sr = utask->vaddr + auprobe->defparam.ilen; 564 if (emulate_push_stack(regs, utask->vaddr + auprobe->defparam.ilen)) 640 unsigned long new_ip = regs->ip += auprobe->branch.ilen; 669 regs->ip += auprobe->push.ilen; 759 auprobe->branch.ilen = insn->length; 842 auprobe->push.ilen = insn->length; 904 auprobe->defparam.ilen = insn.length;
|
/linux-master/arch/x86/net/ |
H A D | bpf_jit_comp.c | 1332 int ilen, proglen = 0; local 1367 ilen = prog - temp; 1369 memcpy(rw_image + proglen, temp, ilen); 1370 proglen += ilen; 2338 ilen = prog - temp; 2339 if (ilen > BPF_MAX_INSN_SIZE) { 2353 if (unlikely(proglen + ilen > oldproglen || 2354 proglen + ilen != addrs[i])) { 2358 memcpy(rw_image + proglen, temp, ilen); 2360 proglen += ilen; [all...] |
H A D | bpf_jit_comp32.c | 1683 int ilen; local 2487 ilen = prog - temp; 2488 if (ilen > BPF_MAX_INSN_SIZE) { 2502 if (unlikely(proglen + ilen > oldproglen || 2503 proglen + ilen != addrs[i])) { 2507 memcpy(image + proglen, temp, ilen); 2509 proglen += ilen;
|
/linux-master/crypto/ |
H A D | ccm.c | 180 int ilen, err; local 192 ilen = format_adata(idata, assoclen); 193 sg_set_buf(&sg[1], idata, ilen); 196 ilen = 0; 202 ahash_request_set_crypt(ahreq, sg, NULL, assoclen + ilen + 16); 211 ilen = 16 - (assoclen + ilen) % 16; 212 if (ilen < 16) { 213 memset(idata, 0, ilen); 215 sg_set_buf(&sg[0], idata, ilen); [all...] |
H A D | testmgr.c | 3315 int ilen; local 3321 ilen = ctemplate[i].inlen; 3323 ilen, output, &dlen); 3331 ilen = dlen; 3334 ilen, decomp_output, &dlen); 3360 int ilen; local 3365 ilen = dtemplate[i].inlen; 3367 ilen, decomp_output, &dlen); 3425 int ilen = ctemplate[i].inlen; local 3428 input_vec = kmemdup(ctemplate[i].input, ilen, GFP_KERNE 3517 int ilen = dtemplate[i].inlen; local [all...] |
/linux-master/drivers/crypto/ccp/ |
H A D | ccp-ops.c | 642 unsigned int ilen; local 688 ilen = aes->src_len; 689 p_tag = scatterwalk_ffwd(sg_tag, p_outp, ilen); 692 ilen = aes->src_len - authsize; 693 p_tag = scatterwalk_ffwd(sg_tag, p_inp, ilen); 775 if (ilen > 0) { 779 ret = ccp_init_data(&src, cmd_q, p_inp, ilen, 789 ret = ccp_init_data(&dst, cmd_q, p_outp, ilen, 801 unsigned int nbytes = ilen % AES_BLOCK_SIZE; 848 final[1] = cpu_to_be64(ilen * [all...] |
/linux-master/drivers/infiniband/core/ |
H A D | uverbs.h | 58 size_t ilen, size_t olen) 62 udata->inlen = ilen; 70 size_t ilen, size_t olen) 73 ilen ? ibuf : NULL, olen ? obuf : NULL, 74 ilen, olen); 55 ib_uverbs_init_udata(struct ib_udata *udata, const void __user *ibuf, void __user *obuf, size_t ilen, size_t olen) argument 67 ib_uverbs_init_udata_buf_or_null(struct ib_udata *udata, const void __user *ibuf, void __user *obuf, size_t ilen, size_t olen) argument
|
/linux-master/drivers/media/dvb-frontends/ |
H A D | bcm3510.c | 205 static int bcm3510_do_hab_cmd(struct bcm3510_state *st, u8 cmd, u8 msgid, u8 *obuf, u8 olen, u8 *ibuf, u8 ilen) argument 210 if (ilen + 2 > sizeof(ib)) { 211 deb_hab("do_hab_cmd: ilen=%d is too big!\n", ilen); 232 (ret = bcm3510_hab_get_response(st, ib, ilen+2)) < 0) 236 dbufout(ib,ilen+2,deb_hab); 239 memcpy(ibuf,&ib[2],ilen);
|