/linux-master/tools/testing/selftests/bpf/bpf_testmod/ |
H A D | bpf_testmod.c | 415 static int *__bpf_kfunc_call_test_get_mem(struct prog_test_ref_kfunc *p, const int size) argument 417 if (size > 2 * sizeof(int)) 533 static bool bpf_testmod_ops_is_valid_access(int off, int size, argument 538 return bpf_tracing_btf_ctx_access(off, size, type, prog, info);
|
/linux-master/sound/soc/sof/ |
H A D | sof-audio.h | 65 static inline u32 mixer_to_ipc(unsigned int value, u32 *volume_map, int size) argument 67 if (value >= size) 68 return volume_map[size - 1]; 73 static inline u32 ipc_to_mixer(u32 value, u32 *volume_map, int size) argument 77 for (i = 0; i < size; i++) { 155 const unsigned int __user *binary_data, unsigned int size); 157 const unsigned int __user *binary_data, unsigned int size); 159 const unsigned int __user *binary_data, unsigned int size); 166 int size); 195 * @widget: Array of pointers to IPC-specific ops for widgets. This should always be of size 378 u32 size; /* cdata size */ member in struct:snd_sof_control [all...] |
H A D | pcm.c | 26 unsigned char *dma_area, size_t size) 38 spcm->stream[stream].page_table.area, size); 553 "spcm: allocate %s playback DMA buffer size 0x%x max 0x%x\n", 575 "spcm: allocate %s capture DMA buffer size 0x%x max 0x%x\n", 24 create_page_table(struct snd_soc_component *component, struct snd_pcm_substream *substream, unsigned char *dma_area, size_t size) argument
|
H A D | ipc3-pcm.c | 31 stream.hdr.size = sizeof(stream); 63 pcm.hdr.size = sizeof(pcm); 66 pcm.params.hdr.size = sizeof(pcm.params); 68 pcm.params.buffer.size = runtime->dma_bytes; 76 /* container size */ 154 stream.hdr.size = sizeof(stream);
|
H A D | core.c | 743 int size; local 747 size = sizeof(*plat_data->machine); 752 PLATFORM_DEVID_NONE, mach, size);
|
H A D | debug.c | 25 size_t size; local 33 size = simple_write_to_buffer(string, count, ppos, buffer, count); 34 ret = size; 48 int size; local 51 size = dfse->size; 56 if (pos >= size || !count) 59 if (count > size - pos) 60 count = size - pos; 65 /* intermediate buffer size mus 133 snd_sof_debugfs_io_item(struct snd_sof_dev *sdev, void __iomem *base, size_t size, const char *name, enum sof_debugfs_access_type access_type) argument 174 snd_sof_debugfs_add_region_item_iomem(struct snd_sof_dev *sdev, enum snd_sof_fw_blk_type blk_type, u32 offset, size_t size, const char *name, enum sof_debugfs_access_type access_type) argument 190 snd_sof_debugfs_buf_item(struct snd_sof_dev *sdev, void *base, size_t size, const char *name, mode_t mode) argument [all...] |
/linux-master/sound/soc/meson/ |
H A D | axg-fifo.c | 133 * - Half the fifo size 134 * - Half the period size 239 * Make sure the buffer and period size are multiple of the FIFO 317 size_t size = axg_fifo_hw.buffer_bytes_max; local 321 size, size);
|
/linux-master/sound/soc/intel/avs/ |
H A D | topology.c | 26 (avs_tplg_vendor_array_at(array, le32_to_cpu((array)->size))) 43 u32 tuples_size = le32_to_cpu(tuples->size); 75 u32 tuples_size = le32_to_cpu(tuples->size); 94 * matching token has been found. In such case, returned @size is 102 u32 block_size, u32 entry_id_token, u32 *size) 106 ret = avs_tplg_vendor_array_lookup_next(tuples, block_size, entry_id_token, size); 108 *size = block_size; 286 array_size = le32_to_cpu(tuples->size); 289 dev_err(comp->dev, "invalid array size 0x%x\n", array_size); 296 dev_err(comp->dev, "invalid array size 101 avs_tplg_vendor_entry_size(struct snd_soc_tplg_vendor_array *tuples, u32 block_size, u32 entry_id_token, u32 *size) argument 375 avs_ssp_sprint(char *buf, size_t size, const char *fmt, int port, int tdm) argument 1601 size_t size = strlen(dw->name) + 2; local [all...] |
H A D | icl.c | 22 u32 size, num_libs = adev->fw_cfg.max_libs_count; local 27 size = struct_size(info, logs_priorities_mask, num_libs); 28 info = kzalloc(size, GFP_KERNEL); 39 ret = avs_ipc_set_enable_logs(adev, (u8 *)info, size); 114 return tx->size; 156 ret = snd_hdac_dsp_prepare(hdac_stream(host_stream), sd_fmt, fw->size, &dmab);
|
/linux-master/sound/pci/emu10k1/ |
H A D | io.c | 47 unsigned char size, offset; local 49 size = (reg >> 24) & 0x3f; 51 mask = (1 << size) - 1; 72 unsigned char size, offset; local 74 size = (reg >> 24) & 0x3f; 76 mask = (1 << size) - 1;
|
H A D | emuproc.c | 231 unsigned short base, size; member in struct:emu10k1_reg_entry 310 unsigned size = entries[i].size; local 311 if (!size) 313 if (reg >= base && reg < base + size) { 705 entry->size = emu->audigy ? A_TOTAL_SIZE_GPR : TOTAL_SIZE_GPR; 712 entry->size = emu->audigy ? A_TOTAL_SIZE_TANKMEM_DATA : TOTAL_SIZE_TANKMEM_DATA ; 719 entry->size = emu->audigy ? A_TOTAL_SIZE_TANKMEM_ADDR : TOTAL_SIZE_TANKMEM_ADDR ; 726 entry->size = emu->audigy ? A_TOTAL_SIZE_CODE : TOTAL_SIZE_CODE;
|
H A D | emu10k1_main.c | 225 int size, n; local 227 size = ARRAY_SIZE(spi_dac_init); 228 for (n = 0; n < size; n++) 245 int size, n; local 251 size = ARRAY_SIZE(i2c_adc_init); 252 for (n = 0; n < size; n++) 680 for (n = 0; n < fw_entry->size; n++) { 1786 int size; local 1788 size = ARRAY_SIZE(saved_regs); 1790 size [all...] |
/linux-master/net/tipc/ |
H A D | msg.c | 59 * @size: message size (including TIPC header) 62 * Return: a new buffer with data pointers set to the specified size. 68 struct sk_buff *tipc_buf_acquire(u32 size, gfp_t gfp) argument 72 skb = alloc_skb_fclone(BUF_OVERHEAD + size, gfp); 75 skb_put(skb, size); 199 * @mss: max allowable size of buffer 200 * @dlen: size of data to be appended 304 * @pktmax: max size of a fragment incl. the header 364 * @pktmax: Max packet size tha [all...] |
/linux-master/net/mptcp/ |
H A D | protocol.c | 120 static void mptcp_rmem_fwd_alloc_add(struct sock *sk, int size) argument 123 mptcp_sk(sk)->rmem_fwd_alloc + size); 126 static void mptcp_rmem_charge(struct sock *sk, int size) argument 128 mptcp_rmem_fwd_alloc_add(sk, -size); 173 static void mptcp_rmem_uncharge(struct sock *sk, int size) argument 178 mptcp_rmem_fwd_alloc_add(sk, size); 319 static bool mptcp_rmem_schedule(struct sock *sk, struct sock *ssk, int size) argument 324 if (size <= msk->rmem_fwd_alloc) 327 size -= msk->rmem_fwd_alloc; 328 amt = sk_mem_pages(size); [all...] |
/linux-master/net/ipv4/ |
H A D | udp.c | 1402 static void udp_rmem_release(struct sock *sk, int size, int partial, argument 1410 up->forward_deficit += size; 1411 size = up->forward_deficit; 1412 if (size < READ_ONCE(up->forward_threshold) && 1416 size += up->forward_deficit; 1428 sk_forward_alloc_add(sk, size); 1435 atomic_sub(size, &sk->sk_rmem_alloc); 1488 static int udp_rmem_schedule(struct sock *sk, int size) argument 1492 delta = size - sk->sk_forward_alloc; 1504 int size; local [all...] |
H A D | ip_output.c | 264 * (virtio-net/vhost/tap) with TSO/GSO size set by other network 757 * smaller pieces (each of size equal to IP header plus 1248 copy = min_t(int, copy, pfrag->size - pfrag->offset); 1419 * how transforms change size of the packet, it will come out.
|
H A D | af_inet.c | 844 int inet_sendmsg(struct socket *sock, struct msghdr *msg, size_t size) argument 852 sk, msg, size); 873 int inet_recvmsg(struct socket *sock, struct msghdr *msg, size_t size, argument 884 sk, msg, size, flags, &addr_len);
|
/linux-master/net/core/ |
H A D | skmsg.c | 31 u32 osize = msg->sg.size; 34 len -= msg->sg.size; 46 use = min_t(int, len, pfrag->size - orig_offset); 74 msg->sg.size += use; 117 dst->sg.size += sge_len; 199 while (msg->sg.size) { 200 msg->sg.size -= sge->length; 203 sk_msg_check_to_free(msg, i, msg->sg.size); 238 msg->sg.size -= bytes; 242 msg->sg.size [all...] |
H A D | skbuff.c | 100 * size, and we can differentiate heads from skb_small_head_cache 101 * vs system slabs by looking at their size (skb_end_offset()). 191 * @sz: size 363 unsigned int size) 367 size -= SKB_DATA_ALIGN(sizeof(struct skb_shared_info)); 370 skb->truesize = SKB_TRUESIZE(size); 375 skb_set_end_offset(skb, size); 388 unsigned int *size) 392 /* Must find the allocation size (and grow it to match). */ 393 *size 362 __finalize_skb_around(struct sk_buff *skb, void *data, unsigned int size) argument 387 __slab_build_skb(struct sk_buff *skb, void *data, unsigned int *size) argument 413 unsigned int size; local 431 unsigned int size = frag_size; local 567 kmalloc_reserve(unsigned int *size, gfp_t flags, int node, bool *pfmemalloc) argument 639 __alloc_skb(unsigned int size, gfp_t gfp_mask, int flags, int node) argument 865 skb_add_rx_frag_netmem(struct sk_buff *skb, int i, netmem_ref netmem, int off, int size, unsigned int truesize) argument 877 skb_coalesce_rx_frag(struct sk_buff *skb, int i, int size, unsigned int truesize) argument 919 u32 size, truesize, len, max_head_size, off; local 1648 mm_account_pinned_pages(struct mmpin *mmp, size_t size) argument 1691 msg_zerocopy_alloc(struct sock *sk, size_t size) argument 1728 msg_zerocopy_realloc(struct sock *sk, size_t size, struct ubuf_info *uarg) argument 2127 unsigned int size; local 2172 unsigned int size = skb_headlen(skb) + headroom; local 2237 unsigned int size = osize + nhead + ntail; local 2830 int size = skb_frag_size(&skb_shinfo(skb)->frags[i]); local 2898 int size = skb_frag_size(&skb_shinfo(skb)->frags[i]); local 3209 size_t size = msg_data_left(msg); local 3787 int size; local 4064 int size = skb_frag_size(&skb_shinfo(skb)->frags[i]); local 4446 skb_append_pagefrags(struct sk_buff *skb, struct page *page, int offset, size_t size, size_t max_frags) argument 4708 int size; local 6559 unsigned int size = skb_end_offset(skb); local 6674 unsigned int size = skb_end_offset(skb); local [all...] |
H A D | filter.c | 122 * Run the eBPF program and then cut skb->data to correct size returned by 478 int size = bpf_size_to_bytes(BPF_SIZE(fp->code)); local 490 offset + ip_align % size == 0))) { 497 size, 2 + endian + (!ldx_off_ok * 2)); 508 *insn++ = BPF_ENDIAN(BPF_FROM_BE, BPF_REG_A, size * 8); 2616 if (len >= msg->sg.size) 2871 msg->sg.size += len; 2947 if (start >= offset + l || last >= msg->sg.size) 3048 msg->sg.size -= (len - pop); 3985 u32 size local 7067 bpf_tcp_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info) argument 7265 bpf_xdp_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info) argument 8533 bpf_skb_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 8596 sk_filter_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 8625 cg_skb_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 8669 lwt_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 8752 bpf_sock_common_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info) argument 8764 bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type, struct bpf_insn_access_aux *info) argument 8801 sock_filter_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 8901 tc_cls_act_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 8955 tc_cls_act_btf_struct_access(struct bpf_verifier_log *log, const struct bpf_reg_state *reg, int off, int size) argument 8969 __is_valid_xdp_access(int off, int size) argument 8981 xdp_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 9028 xdp_btf_struct_access(struct bpf_verifier_log *log, const struct bpf_reg_state *reg, int off, int size) argument 9042 sock_addr_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 9159 sock_ops_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 9229 sk_skb_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 9267 sk_msg_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 9311 flow_dissector_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 11298 sk_reuseport_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument 11479 sk_lookup_is_valid_access(int off, int size, enum bpf_access_type type, const struct bpf_prog *prog, struct bpf_insn_access_aux *info) argument [all...] |
/linux-master/lib/ |
H A D | scatterlist.c | 213 * sg_size is then one less than alloc size, since the last 276 * defined to return scatterlist chunks of maximum size @max_ents. 432 * @size: Number of valid bytes in the buffer (after offset) 433 * @max_segment: Maximum size of a scatterlist element in bytes 441 * size specified in @max_segment. A user may provide an offset at a start 442 * and a size of valid data in a buffer specified by the page array. The 456 unsigned long size, unsigned int max_segment, 539 min_t(unsigned long, size, chunk_size), offset); 541 size -= chunk_size; 563 * @size 454 sg_alloc_append_table_from_pages(struct sg_append_table *sgt_append, struct page **pages, unsigned int n_pages, unsigned int offset, unsigned long size, unsigned int max_segment, unsigned int left_pages, gfp_t gfp_mask) argument 578 sg_alloc_table_from_pages_segment(struct sg_table *sgt, struct page **pages, unsigned int n_pages, unsigned int offset, unsigned long size, unsigned int max_segment, gfp_t gfp_mask) argument [all...] |
/linux-master/kernel/bpf/ |
H A D | verifier.c | 597 * takes the size of two stack slots; the first slot will be at 1200 /* copy array src of length n * size bytes to dst. dst is reallocated if it's too 1207 static void *copy_array(void *dst, const void *src, size_t n, size_t size, gfp_t flags) argument 1216 if (unlikely(check_mul_overflow(n, size, &bytes))) 1236 static void *realloc_array(void *arr, size_t old_n, size_t new_n, size_t size) argument 1244 alloc_size = kmalloc_size_roundup(size_mul(new_n, size)); 1253 memset(arr + old_n * size, 0, (new_n - old_n) * size); 1294 /* Possibly update state->allocated_stack to be at least size bytes. Also 1297 static int grow_stack_state(struct bpf_verifier_env *env, struct bpf_func_state *state, int size) argument 4447 save_register_state(struct bpf_verifier_env *env, struct bpf_func_state *state, int spi, struct bpf_reg_state *reg, int size) argument 4479 check_stack_write_fixed_off(struct bpf_verifier_env *env, struct bpf_func_state *state, int off, int size, int value_regno, int insn_idx) argument 4621 check_stack_write_var_off(struct bpf_verifier_env *env, struct bpf_func_state *state, int ptr_regno, int off, int size, int value_regno, int insn_idx) argument 4779 check_stack_read_fixed_off(struct bpf_verifier_env *env, struct bpf_func_state *reg_state, int off, int size, int dst_regno) argument 4936 check_stack_read_var_off(struct bpf_verifier_env *env, int ptr_regno, int off, int size, int dst_regno) argument 4967 check_stack_read(struct bpf_verifier_env *env, int ptr_regno, int off, int size, int dst_regno) argument 5024 check_stack_write(struct bpf_verifier_env *env, int ptr_regno, int off, int size, int value_regno, int insn_idx) argument 5047 check_map_access_type(struct bpf_verifier_env *env, u32 regno, int off, int size, enum bpf_access_type type) argument 5070 __check_mem_access(struct bpf_verifier_env *env, int regno, int off, int size, u32 mem_size, bool zero_size_allowed) argument 5106 check_mem_region_access(struct bpf_verifier_env *env, u32 regno, int off, int size, u32 mem_size, bool zero_size_allowed) argument 5410 check_map_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed, enum bpf_access_src src) argument 5515 check_packet_access(struct bpf_verifier_env *env, u32 regno, int off, int size, bool zero_size_allowed) argument 5558 check_ctx_access(struct bpf_verifier_env *env, int insn_idx, int off, int size, enum bpf_access_type t, enum bpf_reg_type *reg_type, struct btf **btf, u32 *btf_id) argument 5594 check_flow_keys_access(struct bpf_verifier_env *env, int off, int size) argument 5606 check_sock_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int size, enum bpf_access_type t) argument 5734 check_pkt_ptr_alignment(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size, bool strict) argument 5769 check_generic_ptr_alignment(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, const char *pointer_desc, int off, int size, bool strict) argument 5793 check_ptr_alignment(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int off, int size, bool strict_alignment_once) argument 6035 __check_buffer_access(struct bpf_verifier_env *env, const char *buf_info, const struct bpf_reg_state *reg, int regno, int off, int size) argument 6059 check_tp_buffer_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int regno, int off, int size) argument 6075 check_buffer_access(struct bpf_verifier_env *env, const struct bpf_reg_state *reg, int regno, int off, int size, bool zero_size_allowed, u32 *max_access) argument 6104 coerce_reg_to_size(struct bpf_reg_state *reg, int size) argument 6133 set_sext64_default_val(struct bpf_reg_state *reg, int size) argument 6152 coerce_reg_to_size_sx(struct bpf_reg_state *reg, int size) argument 6211 set_sext32_default_val(struct bpf_reg_state *reg, int size) argument 6225 coerce_subreg_to_size_sx(struct bpf_reg_state *reg, int size) argument 6294 bpf_map_direct_read(struct bpf_map *map, int off, int size, u64 *val, bool is_ldsx) argument 6431 check_ptr_to_btf_access(struct bpf_verifier_env *env, struct bpf_reg_state *regs, int regno, int off, int size, enum bpf_access_type atype, int value_regno) argument 6579 check_ptr_to_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *regs, int regno, int off, int size, enum bpf_access_type atype, int value_regno) argument 6742 int size, err = 0; local 8803 int size = int_ptr_type_to_size(arg_type); local 14197 int size = BPF_CLASS(insn->code) == BPF_ALU64 ? 64 : 32; local 18906 int i, cnt, size, ctx_field_size, delta = 0; local [all...] |
H A D | core.c | 74 void *bpf_internal_load_pointer_neg_helper(const struct sk_buff *skb, int k, unsigned int size) argument 85 if (ptr >= skb->head && ptr + size <= skb_tail_pointer(skb)) 96 struct bpf_prog *bpf_prog_alloc_no_stats(unsigned int size, gfp_t gfp_extra_flags) argument 102 size = round_up(size, __PAGE_SIZE); 103 fp = __vmalloc(size, gfp_flags); 119 fp->pages = size / PAGE_SIZE; 138 struct bpf_prog *bpf_prog_alloc(unsigned int size, gfp_t gfp_extra_flags) argument 144 prog = bpf_prog_alloc_no_stats(size, gfp_extra_flags); 245 struct bpf_prog *bpf_prog_realloc(struct bpf_prog *fp_old, unsigned int size, argument 738 __bpf_address_lookup(unsigned long addr, unsigned long *size, unsigned long *off, char *sym) argument 835 u32 size = slot + 1; local 882 bpf_jit_fill_hole_with_zero(void *area, unsigned int size) argument 930 bpf_prog_pack_alloc(u32 size, bpf_jit_fill_hole_t bpf_fill_ill_insns) argument 970 bpf_prog_pack_free(void *ptr, u32 size) argument 1034 bpf_jit_charge_modmem(u32 size) argument 1046 bpf_jit_uncharge_modmem(u32 size) argument 1051 bpf_jit_alloc_exec(unsigned long size) argument 1067 u32 size, hole, start; local 1102 u32 size = hdr->size; local 1124 u32 size, hole, start; local 1192 u32 size = ro_header->size; local [all...] |
/linux-master/include/sound/ |
H A D | emu10k1.h | 455 #define CCCA 0x08 /* Filter Q, interp. ROM, byte size, cur. addr register */ 651 #define TCBS 0x44 /* Tank cache buffer size register */ 652 #define TCBS_MASK 0x00000007 /* Tank cache buffer size field */ 673 #define MICBS 0x49 /* Microphone buffer size register */ 675 #define ADCBS 0x4a /* ADC buffer size register */ 677 #define FXBS 0x4b /* FX buffer size register */ 679 /* The following mask values define the size of the ADC, MIC and FX buffers in bytes */ 1510 unsigned int capture_bs_reg; /* buffer size register */ 1514 unsigned int capture_bs_val; /* buffer size value */ 1515 unsigned int capture_bufsize; /* buffer size i [all...] |
/linux-master/include/linux/ |
H A D | skmsg.h | 30 u32 size; member in struct:sk_msg_sg 189 int which, u32 size) 192 dst->sg.data[which].length = size; 193 dst->sg.size += size; 194 src->sg.size -= size; 195 src->sg.data[which].length -= size; 196 src->sg.data[which].offset += size; 259 msg->sg.size 188 sk_msg_xfer(struct sk_msg *dst, struct sk_msg *src, int which, u32 size) argument [all...] |