/linux/arch/m68k/include/asm/ |
H A D | bootstd.h | 60 #define _bsc1(type,name,atype,a) \ argument 61 type name(atype a) \ 72 #define _bsc2(type,name,atype,a,btype,b) \ argument 73 type name(atype a, btype b) \ 85 #define _bsc3(type,name,atype,a,btype,b,ctype,c) \ argument 86 type name(atype a, btype b, ctype c) \ 100 #define _bsc4(type,name,atype,a,btype,b,ctype,c,dtype,d) \ argument 101 type name(atype a, btype b, ctype c, dtype d) \ 116 #define _bsc5(type,name,atype,a,btype,b,ctype,c,dtype,d,etype,e) \ argument 117 type name(atype a, btype b, ctype c, dtype d, etype e) \
|
/linux/kernel/bpf/ |
H A D | cgroup.c | 49 enum cgroup_bpf_attach_type atype, in bpf_prog_run_array_cg() argument 63 array = rcu_dereference(cgrp->effective[atype]); in bpf_prog_run_array_cg() 300 unsigned int atype; in cgroup_bpf_release() local 304 for (atype = 0; atype < ARRAY_SIZE(cgrp->bpf.progs); atype++) { in cgroup_bpf_release() 305 struct hlist_head *progs = &cgrp->bpf.progs[atype]; in cgroup_bpf_release() 322 static_branch_dec(&cgroup_bpf_enabled_key[atype]); in cgroup_bpf_release() 325 cgrp->bpf.effective[atype], in cgroup_bpf_release() 390 enum cgroup_bpf_attach_type atype) in hierarchy_allows_attach() argument 419 compute_effective_progs(struct cgroup * cgrp,enum cgroup_bpf_attach_type atype,struct bpf_prog_array ** array) compute_effective_progs() argument 463 activate_effective_progs(struct cgroup * cgrp,enum cgroup_bpf_attach_type atype,struct bpf_prog_array * old_array) activate_effective_progs() argument 522 update_effective_progs(struct cgroup * cgrp,enum cgroup_bpf_attach_type atype) update_effective_progs() argument 634 enum cgroup_bpf_attach_type atype; __cgroup_bpf_attach() local 759 replace_effective_prog(struct cgroup * cgrp,enum cgroup_bpf_attach_type atype,struct bpf_cgroup_link * link) replace_effective_prog() argument 814 enum cgroup_bpf_attach_type atype; __cgroup_bpf_replace() local 912 purge_effective_progs(struct cgroup * cgrp,struct bpf_prog * prog,struct bpf_cgroup_link * link,enum cgroup_bpf_attach_type atype) purge_effective_progs() argument 970 enum cgroup_bpf_attach_type atype; __cgroup_bpf_detach() local 1045 enum cgroup_bpf_attach_type atype; __cgroup_bpf_query() local 1376 __cgroup_bpf_run_filter_skb(struct sock * sk,struct sk_buff * skb,enum cgroup_bpf_attach_type atype) __cgroup_bpf_run_filter_skb() argument 1453 __cgroup_bpf_run_filter_sk(struct sock * sk,enum cgroup_bpf_attach_type atype) __cgroup_bpf_run_filter_sk() argument 1483 __cgroup_bpf_run_filter_sock_addr(struct sock * sk,struct sockaddr * uaddr,int * uaddrlen,enum cgroup_bpf_attach_type atype,void * t_ctx,u32 * flags) __cgroup_bpf_run_filter_sock_addr() argument 1540 __cgroup_bpf_run_filter_sock_ops(struct sock * sk,struct bpf_sock_ops_kern * sock_ops,enum cgroup_bpf_attach_type atype) __cgroup_bpf_run_filter_sock_ops() argument 1550 __cgroup_bpf_check_dev_permission(short dev_type,u32 major,u32 minor,short access,enum cgroup_bpf_attach_type atype) __cgroup_bpf_check_dev_permission() argument 1713 __cgroup_bpf_run_filter_sysctl(struct ctl_table_header * head,struct ctl_table * table,int write,char ** buf,size_t * pcount,loff_t * ppos,enum cgroup_bpf_attach_type atype) __cgroup_bpf_run_filter_sysctl() argument [all...] |
H A D | btf.c | 6408 enum bpf_attach_type atype = prog->expected_attach_type; in prog_args_trusted() local 6412 return atype == BPF_TRACE_RAW_TP || atype == BPF_TRACE_ITER; in prog_args_trusted() 7054 int off, int size, enum bpf_access_type atype __maybe_unused, in btf_struct_access()
|
H A D | verifier.c | 6776 enum bpf_access_type atype, in check_ptr_to_btf_access() argument 6829 if (env->ops->btf_struct_access && !type_is_alloc(reg->type) && atype == BPF_WRITE) { in check_ptr_to_btf_access() 6840 if (atype != BPF_READ && !type_is_ptr_alloc_obj(reg->type)) { in check_ptr_to_btf_access() 6851 ret = btf_struct_access(&env->log, reg, off, size, atype, &btf_id, &flag, &field_name); in check_ptr_to_btf_access() 6917 if (atype == BPF_READ && value_regno >= 0) in check_ptr_to_btf_access() 6926 enum bpf_access_type atype, in check_ptr_to_map_access() argument 6965 if (atype != BPF_READ) { in check_ptr_to_map_access() 6973 ret = btf_struct_access(&env->log, &map_reg, off, size, atype, &btf_id, &flag, NULL); in check_ptr_to_map_access()
|
/linux/net/tipc/ |
H A D | addr.h | 64 static inline void tipc_uaddr(struct tipc_uaddr *ua, u32 atype, u32 scope, in tipc_uaddr() argument 68 ua->addrtype = atype; in tipc_uaddr() 77 u32 atype; in tipc_uaddr_valid() local 81 atype = ua->addrtype; in tipc_uaddr_valid() 84 if (atype == TIPC_SERVICE_ADDR || atype == TIPC_SOCKET_ADDR) in tipc_uaddr_valid() 86 if (atype == TIPC_SERVICE_RANGE) in tipc_uaddr_valid()
|
H A D | socket.c | 716 u32 atype = ua->addrtype; in tipc_bind() local 721 if (atype == TIPC_SOCKET_ADDR) in tipc_bind() 1418 int atype, mtu, rc; in __tipc_sendmsg() local 1426 atype = ua->addrtype; in __tipc_sendmsg() 1433 if (atype == TIPC_SERVICE_ADDR) in __tipc_sendmsg() 1435 if (atype == TIPC_SOCKET_ADDR) in __tipc_sendmsg() 1437 if (atype == TIPC_SERVICE_RANGE) in __tipc_sendmsg() 1446 atype = ua->addrtype; in __tipc_sendmsg() 1456 if (atype == TIPC_SERVICE_ADDR) in __tipc_sendmsg() 1457 tsk->conn_addrtype = atype; in __tipc_sendmsg() [all …]
|
H A D | udp_media.c | 609 int atype; in tipc_parse_udp_addr() local 611 atype = ipv6_addr_type(&ip6->sin6_addr); in tipc_parse_udp_addr() 612 if (__ipv6_addr_needs_scope_id(atype) && in tipc_parse_udp_addr()
|
/linux/include/linux/surface_aggregator/ |
H A D | controller.h | 395 #define SSAM_DEFINE_SYNC_REQUEST_W(name, atype, spec...) \ argument 396 static int name(struct ssam_controller *ctrl, const atype *arg) \ 406 rqst.length = sizeof(atype); \ 410 sizeof(atype)); \ 497 #define SSAM_DEFINE_SYNC_REQUEST_WR(name, atype, rtype, spec...) \ argument 498 static int name(struct ssam_controller *ctrl, const atype *arg, rtype *ret) \ 510 rqst.length = sizeof(atype); \ 517 status = ssam_request_do_sync_onstack(ctrl, &rqst, &rsp, sizeof(atype)); \ 598 #define SSAM_DEFINE_SYNC_REQUEST_MD_W(name, atype, spec...) \ argument 599 static int name(struct ssam_controller *ctrl, u8 tid, u8 iid, const atype *arg) \ [all …]
|
H A D | device.h | 488 #define SSAM_DEFINE_SYNC_REQUEST_CL_W(name, atype, spec...) \ argument 489 SSAM_DEFINE_SYNC_REQUEST_MD_W(__raw_##name, atype, spec) \ 490 static int name(struct ssam_device *sdev, const atype *arg) \ 558 #define SSAM_DEFINE_SYNC_REQUEST_CL_WR(name, atype, rtype, spec...) \ argument 559 SSAM_DEFINE_SYNC_REQUEST_MD_WR(__raw_##name, atype, rtype, spec) \ 560 static int name(struct ssam_device *sdev, const atype *arg, rtype *ret) \
|
/linux/net/atm/ |
H A D | addr.c | 48 void atm_reset_addr(struct atm_dev *dev, enum atm_addr_type_t atype) in atm_reset_addr() argument 55 if (atype == ATM_ADDR_LECS) in atm_reset_addr() 69 enum atm_addr_type_t atype) in atm_add_addr() argument 80 if (atype == ATM_ADDR_LECS) in atm_add_addr() 104 enum atm_addr_type_t atype) in atm_del_addr() argument 115 if (atype == ATM_ADDR_LECS) in atm_del_addr() 134 size_t size, enum atm_addr_type_t atype) in atm_get_addr() argument 143 if (atype == ATM_ADDR_LECS) in atm_get_addr()
|
/linux/fs/ntfs3/ |
H A D | record.c | 359 u32 atype; in mi_find_attr() local 366 atype = le32_to_cpu(attr->type); in mi_find_attr() 367 if (atype > type_in) in mi_find_attr() 370 if (atype < type_in) in mi_find_attr()
|
/linux/arch/s390/include/uapi/asm/ |
H A D | chsc.h | 113 } atype; member
|
/linux/drivers/net/ipvlan/ |
H A D | ipvlan_core.c | 61 if (!is_v6 && addr->atype == IPVL_IPV4) { in addr_equal() 66 } else if (is_v6 && addr->atype == IPVL_IPV6) { in addr_equal() 95 hash = (addr->atype == IPVL_IPV6) ? in ipvlan_ht_addr_add()
|
H A D | ipvlan.h | 85 ipvl_hdr_type atype; member
|
H A D | ipvlan_main.c | 818 addr->atype = IPVL_IPV4; in ipvlan_add_addr() 822 addr->atype = IPVL_IPV6; in ipvlan_add_addr()
|
/linux/drivers/dma/ti/ |
H A D | k3-udma.c | 212 u32 atype; member 257 u32 atype; member 1893 req_tx.tx_atype = ud->atype; in udma_tisci_m2m_channel_config() 1911 req_rx.rx_atype = ud->atype; in udma_tisci_m2m_channel_config() 1984 req_tx.tx_atype = uc->config.atype; in udma_tisci_tx_channel_config() 2057 req_rx.rx_atype = uc->config.atype; in udma_tisci_rx_channel_config() 4127 u32 atype; member 4150 if (filter_param->atype > 2) { in udma_dma_filter_fn() 4152 filter_param->atype); in udma_dma_filter_fn() 4163 ucc->atype = filter_param->atype; in udma_dma_filter_fn() [all …]
|
/linux/kernel/trace/ |
H A D | trace_probe.h | 206 #define ASSIGN_FETCH_TYPE_ALIAS(ptype, atype, ftype, sign) \ argument 207 _ASSIGN_FETCH_TYPE(#ptype, ptype, ftype, sizeof(ftype), sign, atype)
|
/linux/drivers/s390/cio/ |
H A D | chsc_sch.c | 789 u32 atype : 8; in chsc_ioctl_dcal() member 814 sdcal_area->atype = dcal->req.atype; in chsc_ioctl_dcal()
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_sysctl.c | 1545 enum bpf_attach_type atype = test->attach_type; in run_test_case() local 1563 if (bpf_prog_attach(progfd, cgfd, atype, BPF_F_ALLOW_OVERRIDE) < 0) { in run_test_case() 1589 bpf_prog_detach(cgfd, atype); in run_test_case()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | sockmap_listen.c | 312 enum bpf_attach_type atype; in test_destroy_orphan_child() member 322 xbpf_prog_attach(t->progfd, mapfd, t->atype, 0) != 0) in test_destroy_orphan_child() 328 xbpf_prog_detach2(t->progfd, mapfd, t->atype); in test_destroy_orphan_child()
|
/linux/tools/testing/selftests/net/ |
H A D | nettest.c | 762 enum addr_type atype) in convert_addr() argument 777 switch (atype) { in convert_addr()
|
/linux/include/linux/ |
H A D | bpf.h | 2660 int off, int size, enum bpf_access_type atype, 2947 int off, int size, enum bpf_access_type atype, in btf_struct_access() argument
|
/linux/tools/lib/bpf/ |
H A D | libbpf.c | 9381 #define SEC_DEF(sec_pfx, ptype, atype, flags, ...) { \ argument 9384 .expected_attach_type = atype, \
|