/linux-master/tools/lib/bpf/ |
H A D | bpf.h | 64 __u32 value_size, 205 * *value_size* * *count*.
|
H A D | bpf.c | 171 __u32 value_size, 190 attr.value_size = value_size; 168 bpf_map_create(enum bpf_map_type map_type, const char *map_name, __u32 key_size, __u32 value_size, __u32 max_entries, const struct bpf_map_create_opts *opts) argument
|
H A D | libbpf_internal.h | 270 __u32 value_size; member in struct:btf_map_def
|
H A D | linker.c | 1544 if (main_def->value_size != extra_def->value_size) { 1545 reason = "value_size";
|
/linux-master/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | verifier.c | 103 for (i = 0; i < offmap->map.value_size; i++) { 436 if (off + size > offmap->map.value_size) {
|
/linux-master/net/devlink/ |
H A D | dpipe.c | 309 value->value_size, value->value)) 313 value->value_size, value->mask))
|
/linux-master/drivers/net/ethernet/sfc/ |
H A D | mae.c | 1838 void *value, size_t value_size) 1848 if (DIV_ROUND_UP(field.width, 8) != value_size) 1852 for (i = 0; i < value_size; i++) { 1857 v = ((u8 *)value)[value_size - i - 1]; 1893 /* We adjust value_size here since just 3 bytes will be copied, and 1836 efx_mae_table_populate(struct efx_tc_table_field_fmt field, __le32 *row, size_t row_bits, void *value, size_t value_size) argument
|
/linux-master/kernel/bpf/ |
H A D | ringbuf.c | 193 if (attr->key_size || attr->value_size ||
|
H A D | arena.c | 101 if (attr->key_size || attr->value_size || attr->max_entries == 0 ||
|
H A D | log.c | 721 reg->map_ptr->value_size);
|
H A D | btf.c | 3796 u32 field_mask, u32 value_size) 3822 if (info_arr[i].off + field_type_size > value_size) { 3823 WARN_ONCE(1, "verifier bug off %d size %d", info_arr[i].off, value_size); 3795 btf_parse_fields(const struct btf *btf, const struct btf_type *t, u32 field_mask, u32 value_size) argument
|
H A D | verifier.c | 97 * and the range of [ptr, ptr + map's value_size) is accessible. 5055 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", 5056 map->value_size, off, size); 5061 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", 5062 map->value_size, off, size); 5087 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", 5421 err = check_mem_region_access(env, regno, off, size, map->value_size, 8549 map->value_size - reg->off, false, 8562 if (!strnchr(str_ptr + map_off, map->value_size - map_off, 0)) { 8721 * check [value, value + map->value_size) validit [all...] |
/linux-master/tools/perf/util/ |
H A D | bpf_counter.c | 315 (map_info.value_size == sizeof(struct perf_event_attr_map_entry));
|
/linux-master/include/linux/ |
H A D | bpf.h | 265 u32 value_size; member in struct:bpf_map 492 bpf_obj_memcpy(map->record, dst, src, map->value_size, false); 497 bpf_obj_memcpy(map->record, dst, src, map->value_size, true); 522 bpf_obj_memzero(map->record, dst, map->value_size);
|
/linux-master/security/apparmor/ |
H A D | domain.c | 313 int size, value_size = 0, ret = attach->xattr_count; local 325 &value, value_size, GFP_KERNEL);
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 652 * *value_size* * *count*. 703 * *value_size* * *count*. 1458 __u32 value_size; /* size of value in bytes */ member in struct:bpf_attr::__anon2589 6582 __u32 value_size; member in struct:bpf_map_info
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 652 * *value_size* * *count*. 703 * *value_size* * *count*. 1458 __u32 value_size; /* size of value in bytes */ member in struct:bpf_attr::__anon3130 6582 __u32 value_size; member in struct:bpf_map_info
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | profiler.inc.h | 91 __uint(value_size, sizeof(int));
|
/linux-master/fs/ext4/ |
H A D | xattr.c | 2595 size_t value_size = le32_to_cpu(entry->e_value_size); local 2621 buffer = kvmalloc(value_size, GFP_NOFS); 2627 error = ext4_xattr_inode_get(inode, entry, buffer, value_size); 2648 i.value_len = value_size;
|
/linux-master/fs/ocfs2/ |
H A D | xattr.c | 3048 u64 value_size; local 3114 value_size = le64_to_cpu(xe->xe_value_size); 3141 value_size); 3144 value_size = OCFS2_XATTR_ROOT_SIZE; 3156 if (value_size >= OCFS2_XATTR_ROOT_SIZE) 3167 (value_size >= xi->xi_value_len)) ||
|
/linux-master/include/net/ |
H A D | devlink.h | 276 * @value_size: value size 287 unsigned int value_size; member in struct:devlink_dpipe_value
|
/linux-master/tools/bpf/bpftool/ |
H A D | prog.c | 277 value = malloc(map_info->value_size);
|