| /OK3568_Linux_fs/kernel/drivers/firmware/google/ |
| H A D | vpd_decode.c | 36 static int vpd_decode_entry(const u32 max_len, const u8 *input_buf, in vpd_decode_entry() argument 42 if (vpd_decode_len(max_len - consumed, &input_buf[consumed], in vpd_decode_entry() 49 *entry = input_buf + consumed; in vpd_decode_entry() 60 int vpd_decode_string(const u32 max_len, const u8 *input_buf, u32 *consumed, in vpd_decode_string() argument 73 type = input_buf[*consumed]; in vpd_decode_string() 80 if (vpd_decode_entry(max_len, input_buf, consumed, &key, in vpd_decode_string() 84 if (vpd_decode_entry(max_len, input_buf, consumed, &value, in vpd_decode_string()
|
| H A D | vpd_decode.h | 47 int vpd_decode_string(const u32 max_len, const u8 *input_buf, u32 *consumed,
|
| /OK3568_Linux_fs/buildroot/boot/grub2/ |
| H A D | 0012-term-Fix-overflow-on-user-inputs.patch | 10 an overflow in input_buf (keys) overwriting the next variable (npending) 16 int input_buf[6]; /* 0 24 */ 22 just to disallow overwrites input_buf, which exactly what this patch does. 60 - grub_terminfo_readkey (termi, data->input_buf, 62 + grub_terminfo_readkey (termi, data->input_buf, &data->npending, 66 if (data->npending == 1 && data->input_buf[0] == GRUB_TERM_ESC
|
| /OK3568_Linux_fs/kernel/drivers/hid/ |
| H A D | uhid.c | 48 struct uhid_event input_buf; member 736 memset(&uhid->input_buf, 0, sizeof(uhid->input_buf)); in uhid_char_write() 737 len = min(count, sizeof(uhid->input_buf)); in uhid_char_write() 739 ret = uhid_event_from_user(buffer, len, &uhid->input_buf); in uhid_char_write() 743 switch (uhid->input_buf.type) { in uhid_char_write() 756 ret = uhid_dev_create(uhid, &uhid->input_buf); in uhid_char_write() 759 ret = uhid_dev_create2(uhid, &uhid->input_buf); in uhid_char_write() 765 ret = uhid_dev_input(uhid, &uhid->input_buf); in uhid_char_write() 768 ret = uhid_dev_input2(uhid, &uhid->input_buf); in uhid_char_write() 771 ret = uhid_dev_get_report_reply(uhid, &uhid->input_buf); in uhid_char_write() [all …]
|
| H A D | hid-hyperv.c | 152 u8 input_buf[HID_MAX_BUFFER_SIZE]; member 303 (u32)sizeof(input_dev->input_buf)); in mousevsc_on_receive() 304 memcpy(input_dev->input_buf, input_report->buffer, len); in mousevsc_on_receive() 306 input_dev->input_buf, len, 1); in mousevsc_on_receive()
|
| H A D | hid-nintendo.c | 192 u8 input_buf[JC_MAX_RESP_SIZE]; member 227 memset(ctlr->input_buf, 0, JC_MAX_RESP_SIZE); in joycon_hid_send_sync() 233 memset(ctlr->input_buf, 0, JC_MAX_RESP_SIZE); in joycon_hid_send_sync() 344 report = (struct joycon_input_report *)ctlr->input_buf; in joycon_request_calibration() 655 memcpy(ctlr->input_buf, data, in joycon_ctlr_handle_event()
|
| /OK3568_Linux_fs/kernel/drivers/input/touchscreen/cyttsp5/ |
| H A D | cyttsp5_core.c | 2480 data_len = get_unaligned_le16(&cd->input_buf[6]); in cyttsp5_hid_output_bl_get_information_() 3746 int size = get_unaligned_le16(&cd->input_buf[0]); in cyttsp5_wakeup_host() 3749 if (size != 4 || cd->input_buf[2] != 4) in cyttsp5_wakeup_host() 3753 event_id = cd->input_buf[3]; in cyttsp5_wakeup_host() 3774 if (cd->input_buf[2] != 4) in cyttsp5_wakeup_host() 3787 cd->gesture_id = cd->input_buf[3]; in cyttsp5_wakeup_host() 3788 report_length = (cd->input_buf[1] << 8) | (cd->input_buf[0]); in cyttsp5_wakeup_host() 3795 cd->gesture_data[i] = cd->input_buf[4 + i]; in cyttsp5_wakeup_host() 3822 int size = get_unaligned_le16(&cd->input_buf[0]); in move_tracking_hetmap_data() 3825 tthe_print(cd, cd->input_buf, size, "THM="); in move_tracking_hetmap_data() [all …]
|
| H A D | cyttsp5_regs.h | 1005 u8 input_buf[CY_MAX_INPUT]; member
|
| /OK3568_Linux_fs/kernel/arch/s390/kernel/ |
| H A D | debug.c | 1387 char input_buf[1]; in debug_input_flush_fn() local 1396 if (copy_from_user(input_buf, user_buf, 1)) { in debug_input_flush_fn() 1400 if (input_buf[0] == '-') { in debug_input_flush_fn() 1404 if (isdigit(input_buf[0])) { in debug_input_flush_fn() 1405 int area = ((int) input_buf[0] - (int) '0'); in debug_input_flush_fn() 1412 "area\n", input_buf[0]); in debug_input_flush_fn()
|
| /OK3568_Linux_fs/kernel/net/bluetooth/hidp/ |
| H A D | hidp.h | 185 u8 input_buf[HID_MAX_BUFFER_SIZE]; member
|
| H A D | core.c | 445 memcpy(session->input_buf, data, len); in hidp_process_report() 446 hid_input_report(session->hid, type, session->input_buf, len, intr); in hidp_process_report()
|
| /OK3568_Linux_fs/u-boot/drivers/mmc/ |
| H A D | omap_hsmmc.c | 515 unsigned int *input_buf = (unsigned int *)buf; local 548 writel(*input_buf, &mmc_base->data); 549 input_buf++;
|
| /OK3568_Linux_fs/kernel/tools/lib/traceevent/ |
| H A D | event-parse.c | 30 static const char *input_buf; variable 66 input_buf = buf; in init_input_buf() 73 return input_buf; in get_input_buf() 956 return input_buf[input_buf_ptr++]; in __read_char() 969 return input_buf[input_buf_ptr]; in peek_char() 1167 save_input_buf = input_buf; in force_token() 1176 input_buf = save_input_buf; in force_token()
|
| /OK3568_Linux_fs/kernel/drivers/platform/x86/ |
| H A D | acer-wmi.c | 1622 struct acpi_buffer input_buf = { sizeof(input), input }; in acer_kbd_dock_get_initial_state() local 1628 status = wmi_evaluate_method(WMID_GUID3, 0, 0x2, &input_buf, &output_buf); in acer_kbd_dock_get_initial_state()
|
| /OK3568_Linux_fs/kernel/drivers/net/ethernet/qlogic/qed/ |
| H A D | qed.h | 982 u32 input_len, u8 *input_buf,
|
| H A D | qed_main.c | 1051 u8 *input_buf, u32 max_size, u8 *unzip_buf) in qed_unzip_data() argument 1055 p_hwfn->stream->next_in = input_buf; in qed_unzip_data()
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | testmgr.c | 3753 void *input_buf = NULL; in do_test_kpp() local 3814 input_buf = kmemdup(vec->b_public, vec->b_public_size, GFP_KERNEL); in do_test_kpp() 3815 if (!input_buf) { in do_test_kpp() 3820 sg_init_one(&src, input_buf, vec->b_public_size); in do_test_kpp() 3882 kfree(input_buf); in do_test_kpp()
|