Searched refs:required_size (Results 1 – 6 of 6) sorted by relevance
/linux-6.1.9/tools/testing/selftests/bpf/prog_tests/ |
D | perf_branches.c | 13 int required_size = skel->bss->required_size_out; in check_good_sample() local 28 CHECK(required_size <= 0, "read_branches_size", "err %d\n", required_size); in check_good_sample() 44 int required_size = skel->bss->required_size_out; in check_bad_sample() local 52 CHECK((required_size != -EINVAL && required_size != -ENOENT), in check_bad_sample() 53 "read_branches_size", "err %d\n", required_size); in check_bad_sample()
|
/linux-6.1.9/tools/testing/selftests/bpf/progs/ |
D | test_perf_branches.c | 25 int required_size, written_stack, written_global; in perf_branches() local 34 required_size = bpf_read_branch_records(ctx, NULL, 0, in perf_branches() 42 required_size_out = required_size; in perf_branches()
|
/linux-6.1.9/drivers/acpi/acpica/ |
D | nsnames.c | 136 acpi_size required_size; in acpi_ns_handle_to_pathname() local 147 required_size = in acpi_ns_handle_to_pathname() 149 if (!required_size) { in acpi_ns_handle_to_pathname() 155 status = acpi_ut_initialize_buffer(buffer, required_size); in acpi_ns_handle_to_pathname() 163 (u32)required_size, no_trailing); in acpi_ns_handle_to_pathname() 166 (char *)buffer->pointer, (u32) required_size)); in acpi_ns_handle_to_pathname()
|
/linux-6.1.9/lib/ |
D | stackdepot.c | 123 size_t required_size = struct_size(stack, entries, size); in depot_alloc_stack() local 125 required_size = ALIGN(required_size, 1 << STACK_ALLOC_ALIGN); in depot_alloc_stack() 127 if (unlikely(depot_offset + required_size > STACK_ALLOC_SIZE)) { in depot_alloc_stack() 155 depot_offset += required_size; in depot_alloc_stack()
|
/linux-6.1.9/net/tls/ |
D | tls_sw.c | 931 int required_size; in tls_sw_sendmsg() local 984 required_size = msg_pl->sg.size + try_to_copy + in tls_sw_sendmsg() 991 ret = tls_alloc_encrypted_msg(sk, required_size); in tls_sw_sendmsg() 1000 try_to_copy -= required_size - msg_en->sg.size; in tls_sw_sendmsg() 1039 required_size = msg_pl->sg.size + try_to_copy; in tls_sw_sendmsg() 1041 ret = tls_clone_plaintext_msg(sk, required_size); in tls_sw_sendmsg() 1050 try_to_copy -= required_size - msg_pl->sg.size; in tls_sw_sendmsg() 1098 if (ctx->open_rec && msg_en->sg.size < required_size) in tls_sw_sendmsg() 1163 size_t copy, required_size; in tls_sw_do_sendpage() local 1189 required_size = msg_pl->sg.size + copy + prot->overhead_size; in tls_sw_do_sendpage() [all …]
|
/linux-6.1.9/drivers/hid/ |
D | hid-sensor-custom.c | 437 int required_size = sizeof(struct hid_sensor_sample) + in hid_sensor_capture_sample() local 442 if (kfifo_avail(&sensor_inst->data_fifo) >= required_size) { in hid_sensor_capture_sample()
|