Home
last modified time | relevance | path

Searched full:pointers (Results 1 – 25 of 2448) sorted by relevance

12345678910>>...98

/openbmc/linux/sound/firewire/dice/
H A Ddice-transaction.c273 __be32 *pointers; in get_subaddrs() local
279 pointers = kmalloc_array(ARRAY_SIZE(min_values), sizeof(__be32), in get_subaddrs()
281 if (pointers == NULL) in get_subaddrs()
290 DICE_PRIVATE_SPACE, pointers, in get_subaddrs()
296 data = be32_to_cpu(pointers[i]); in get_subaddrs()
303 if (be32_to_cpu(pointers[1]) > 0x18) { in get_subaddrs()
310 be32_to_cpu(pointers[0]) * 4 + GLOBAL_VERSION, in get_subaddrs()
328 dice->global_offset = be32_to_cpu(pointers[0]) * 4; in get_subaddrs()
329 dice->tx_offset = be32_to_cpu(pointers[2]) * 4; in get_subaddrs()
330 dice->rx_offset = be32_to_cpu(pointers[4]) * 4; in get_subaddrs()
[all …]
H A Ddice-extension.c142 __be32 *pointers; in snd_dice_detect_extension_formats() local
147 pointers = kmalloc_array(9, sizeof(__be32) * 2, GFP_KERNEL); in snd_dice_detect_extension_formats()
148 if (pointers == NULL) in snd_dice_detect_extension_formats()
152 DICE_EXT_APP_SPACE, pointers, in snd_dice_detect_extension_formats()
162 if (pointers[i * 2] == pointers[j * 2]) { in snd_dice_detect_extension_formats()
170 section_addr = DICE_EXT_APP_SPACE + be32_to_cpu(pointers[12]) * 4; in snd_dice_detect_extension_formats()
173 kfree(pointers); in snd_dice_detect_extension_formats()
/openbmc/linux/Documentation/arch/arm64/
H A Dtagged-address-abi.rst17 userspace (EL0) to perform memory accesses through 64-bit pointers with
19 syscall ABI that allows userspace to pass certain tagged pointers to
48 tagged pointers in this context is allowed with these exceptions:
55 incorrectly accept valid tagged pointers for the ``brk()``,
65 incorrectly accept valid tagged pointers for this system call.
101 - The syscall behaviour is undefined for invalid tagged pointers: it may
109 A definition of the meaning of tagged pointers on AArch64 can be found
110 in Documentation/arch/arm64/tagged-pointers.rst.
118 - ``prctl()`` other than pointers to user data either passed directly or
121 - ``ioctl()`` other than pointers to user data either passed directly or
[all …]
H A Dpointer-authentication.rst21 whether pointers have been modified unexpectedly. A PAC is derived from
77 exposed for data pointers and instruction pointers, as the set of PAC
80 pointers).
128 instructions to sign and authenticate function pointers and other pointers
131 pointers.
/openbmc/linux/drivers/staging/media/atomisp/pci/isp/kernels/sdis/sdis_2/
H A Dia_css_sdis2_types.h30 /* DVS 2.0 Coefficient types. This structure contains 4 pointers to
48 hor_coefs; /** struct with pointers that contain the horizontal coefficients */
50 ver_coefs; /** struct with pointers that contain the vertical coefficients */
53 /* DVS 2.0 Statistic types. This structure contains 4 pointers to
71 hor_prod; /** struct with pointers that contain the horizontal statistics */
73 ver_prod; /** struct with pointers that contain the vertical statistics */
/openbmc/qemu/util/
H A Dqht.c29 * contain a few hash values and pointers; the u32 hash values are stored in
134 * Note: reading partially-updated pointers in @pointers could lead to
148 void *pointers[QHT_BUCKET_ENTRIES]; member
213 if (b->pointers[i] == NULL) { in qht_bucket_debug__locked()
219 __func__, b, i, b->hashes[i], b->pointers[i]); in qht_bucket_debug__locked()
494 if (b->pointers[i] == NULL) { in qht_bucket_reset__locked()
498 qatomic_set(&b->pointers[i], NULL); in qht_bucket_reset__locked()
569 void *p = qatomic_rcu_read(&b->pointers[i]); in qht_do_lookup()
639 if (b->pointers[i]) { in qht_insert__locked()
641 ht->cmp(b->pointers[i], p))) { in qht_insert__locked()
[all …]
/openbmc/linux/drivers/net/ethernet/intel/fm10k/
H A Dfm10k_tlv.c32 * pointers.
40 /* verify pointers are not NULL */ in fm10k_tlv_attr_put_null_string()
82 * with a valid pointers.
88 /* verify pointers are not NULL */ in fm10k_tlv_attr_get_null_string()
110 * valid pointers.
118 /* verify pointers are not NULL */ in fm10k_tlv_attr_put_mac_vlan()
147 * if provided with a valid pointers.
151 /* verify pointers are not NULL */ in fm10k_tlv_attr_get_mac_vlan()
170 * valid pointers.
174 /* verify pointers are not NULL */ in fm10k_tlv_attr_put_bool()
[all …]
/openbmc/linux/Documentation/filesystems/
H A Dsysv-fs.rst114 of limited size, and every now and then a free block contains pointers
116 contains pointers and so on. The list terminates with a "block number"
214 - 1 indirect block (pointers to blocks)
215 - 1 double-indirect block (pointer to pointers to blocks)
220 - 1 indirect block (pointers to blocks)
221 - 1 double-indirect block (pointer to pointers to blocks)
222 - 1 triple-indirect block (pointer to pointers to pointers to blocks)
H A Dqnx6.rst61 addressing block holds up to blocksize / 4 bytes pointers to data blocks.
65 Unused block pointers are always set to ~0 - regardless of root node,
86 The inode structure contains pointers to the filesystem blocks which contain
94 There are also pointers to the first 16 blocks, if the object data can be
122 starting with the superblock longfilename root node pointers.
133 no block pointers and the directory file record pointing to the target file
/openbmc/linux/fs/btrfs/
H A Draid56.c1004 * Both @faila and @failb should be valid pointers if any of in get_rbio_veritical_errors()
1187 void **pointers = rbio->finish_pointers; in generate_pq_vertical() local
1196 pointers[stripe] = kmap_local_page(sector->page) + in generate_pq_vertical()
1203 pointers[stripe++] = kmap_local_page(sector->page) + sector->pgoff; in generate_pq_vertical()
1212 pointers[stripe++] = kmap_local_page(sector->page) + in generate_pq_vertical()
1216 pointers); in generate_pq_vertical()
1219 memcpy(pointers[rbio->nr_data], pointers[0], sectorsize); in generate_pq_vertical()
1220 run_xor(pointers + 1, rbio->nr_data - 1, sectorsize); in generate_pq_vertical()
1223 kunmap_local(pointers[stripe]); in generate_pq_vertical()
1715 * @*pointers are the pre-allocated pointers by the caller, so we don't
[all …]
/openbmc/linux/fs/reiserfs/
H A Dibalance.c122 * Insert count node pointers into buffer cur before position to + 1.
124 * Items and node pointers are specified by inserted and bh respectively.
202 * Delete del_num items and node pointers from buffer cur starting from
203 * the first_i'th item and first_p'th pointers respectively.
221 "no so many pointers (%d), only (%d) or " in internal_delete_pointers_items()
276 /* delete n node pointers and items starting from given position */
284 * delete n pointers starting from `from' position in CUR; in internal_delete_childs()
291 * copy cpy_num node pointers and cpy_num - 1 items from buffer src to buffer
303 * ATTENTION! Number of node pointers in DEST is equal to number in internal_copy_pointers_items()
342 /* prepare space for cpy_num pointers */ in internal_copy_pointers_items()
[all …]
/openbmc/linux/Documentation/core-api/
H A Dprintk-formats.rst61 pointers of different types.
71 Plain Pointers
78 Pointers printed without a specifier extension (i.e unadorned %p) are
96 Error Pointers
103 For printing error pointers (i.e. a pointer for which IS_ERR() is true)
108 Symbols/Function Pointers
141 Probed Pointers from BPF / tracing
155 Kernel Pointers
162 For printing kernel pointers which should be hidden from unprivileged
168 section about %p above for discussion about how to manage hashing pointers
[all …]
H A Dassoc_array.rst11 1. Objects are opaque pointers. The implementation does not care where they
16 Pointers to objects _must_ be zero in the least significant bit.
52 pack leaf object pointers into spare space in the node rather than making an
187 pointers internally.
340 can contain mixtures of leaves and metadata pointers.
434 pointers - even if some of those leaves would like to be in the same slot.
436 A node can contain a heterogeneous mix of leaves and metadata pointers.
437 Metadata pointers must be in the slots that match their subdivisions of key
477 Each node has a maximum capacity of 16 leaves and metadata pointers. If the
523 new layout until we follow the back pointers - at which point we've
[all …]
H A Dxarray.rst13 of pointers. It meets many of the same needs as a hash or a conventional
28 Normal pointers may be stored in the XArray directly. They must be 4-byte
30 alloc_page(). It isn't true for arbitrary user-space pointers,
31 nor for function pointers. You can store pointers to statically allocated
40 Some users want to tag the pointers they store in the XArray. You can
43 to retrieve the tag of an entry. Tagged pointers use the same bits that
44 are used to distinguish value entries from normal pointers, so you must
45 decide whether they want to store value entries or tagged pointers in
48 The XArray does not support storing IS_ERR() pointers as some
111 xa_destroy(). If the XArray entries are pointers, you may wish
/openbmc/linux/Documentation/devicetree/
H A Doverlay-notes.rst127 OF_OVERLAY_PRE_REMOVE may store pointers to a device tree node in the overlay
128 or its content but these pointers must not persist past the notifier callback
136 are not allowed to store pointers to a device tree node in the overlay
137 or its content. The overlay code does not protect against such pointers
147 pointers to the overlay nodes or data. Any example of an inadvertent use
148 of such pointers is if a driver or subsystem module is loaded after an
/openbmc/linux/Documentation/RCU/
H A Drcu_dereference.rst47 *not* work in general for char* pointers.
49 - XOR bits to translate pointers, as is done in some
57 "(x-(uintptr_t)x)" for char* pointers. The compiler is within its
94 - Be very careful about comparing pointers obtained from
96 explained, if the two pointers are equal, the compiler could
122 it is safe to compare pointers from rcu_dereference()
123 against NULL pointers.
168 rcu_dereference(). In this case, both pointers depend
184 - The pointers are not equal *and* the compiler does
441 SPARSE CHECKING OF RCU-PROTECTED POINTERS
[all …]
/openbmc/linux/drivers/staging/media/atomisp/pci/
H A Dia_css_3a.h82 /* Map with host-side pointers to ISP-format statistics.
83 * These pointers can either be copies of ISP data or memory mapped
84 * ISP pointers.
85 * All of the data behind these pointers is allocated contiguously, the
165 * pointers to all relevant subsets of the 3a statistics (dmem,
H A Dia_css_env.h38 /* Environment with function pointers for local IA memory allocation.
48 /* Environment with function pointers to access the CSS hardware. This includes
76 /* Environment with function pointers to print error and debug messages.
85 /* Environment structure. This includes function pointers to access several
/openbmc/linux/arch/sparc/include/uapi/asm/
H A Dperfctr.h17 * Pointers which are passed by the user are pointers to 64-bit
33 * with zero and the user counter accumulator pointers and
38 /* Add current D0 and D1 PIC values into user pointers given
/openbmc/linux/tools/objtool/Documentation/
H A Dobjtool.txt46 to ensure that all functions referenced by function pointers have
115 Frame pointers are used for debugging purposes. They allow runtime
120 For some architectures, frame pointers are enabled by
122 required by the ABI (sometimes referred to as "backchain pointers").
125 frame pointers when the -fno-omit-frame-pointer option is used.
131 For stack traces based on frame pointers to be reliable, all
138 pointers enabled:
175 destroyed. This is an inherent limitation of frame pointers.
179 An alternative to frame pointers and DWARF, ORC unwind data can be
180 used to walk the stack. Unlike frame pointers, ORC data is out of
/openbmc/linux/drivers/staging/media/atomisp/pci/runtime/isp_param/interface/
H A Dia_css_isp_param_types.h48 /* Address/size of each parameter class in each isp memory, host memory pointers */
53 /* Address/size of each parameter class in each isp memory, css memory pointers */
58 /* Address/size of each parameter class in each isp memory, isp memory pointers */
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dverifier_unpriv.c348 __description("unpriv: spill/fill of different pointers stx")
349 __failure __msg("same insn cannot be used with different pointers")
375 __description("unpriv: spill/fill of different pointers st")
376 __failure __msg("same insn cannot be used with different pointers")
400 __description("unpriv: spill/fill of different pointers stx - ctx and sock")
439 __description("unpriv: spill/fill of different pointers stx - leak sock")
441 //.errstr = "same insn cannot be used with different pointers",
475 __description("unpriv: spill/fill of different pointers stx - sock and ctx (read)")
476 __failure __msg("same insn cannot be used with different pointers")
512 __description("unpriv: spill/fill of different pointers stx - sock and ctx (write)")
[all …]
/openbmc/linux/arch/powerpc/include/asm/book3s/64/
H A Dpgalloc.h61 * Don't scan the PGD for pointers, it contains references to PUDs but in pgd_alloc()
62 * those references are not full pointers and so can't be recognised by in pgd_alloc()
101 * pointers and don't consider it a leak. PUDs are typically only in pud_alloc_one()
103 * as pointers, leading to false leak reports. in pud_alloc_one()
/openbmc/linux/kernel/bpf/
H A Dcpumask.c133 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
247 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
262 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
277 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
295 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
311 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
327 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
402 * struct bpf_cpumask pointers may be safely passed to @src1 and @src2.
/openbmc/linux/drivers/net/ethernet/marvell/
H A Dmvneta_bm.h46 /* Address of External Buffer Pointers Pool Register */
50 /* External Buffer Pointers Pool RD pointer Register */
56 /* External Buffer Pointers Pool WR pointer */
63 /* External Buffer Pointers Pool Size Register */

12345678910>>...98