/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | test_xdp_with_cpumap_helpers.c | 10 __uint(key_size, sizeof(__u32));
|
H A D | test_btf_nokv.c | 13 __uint(key_size, sizeof(int));
|
H A D | verifier_prevent_map_lookup.c | 18 __uint(key_size, sizeof(int));
|
H A D | tailcall_bpf2bpf6.c | 11 __uint(key_size, sizeof(__u32));
|
H A D | test_queue_stack_map.h | 15 __uint(key_size, 0); 23 __uint(key_size, 0);
|
H A D | tailcall_bpf2bpf4.c | 8 __uint(key_size, sizeof(__u32)); 15 __uint(key_size, sizeof(__u32));
|
H A D | tailcall2.c | 9 __uint(key_size, sizeof(__u32));
|
H A D | tailcall1.c | 9 __uint(key_size, sizeof(__u32));
|
H A D | test_xdp_with_devmap_helpers.c | 7 __uint(key_size, sizeof(__u32));
|
H A D | xdp_redirect_multi_kern.c | 17 __uint(key_size, sizeof(int)); 24 __uint(key_size, sizeof(int));
|
/linux-master/samples/bpf/ |
H A D | trace_output.bpf.c | 7 __uint(key_size, sizeof(int));
|
H A D | spintest.bpf.c | 24 __uint(key_size, sizeof(long)); 31 __uint(key_size, sizeof(u32));
|
H A D | test_current_task_under_cgroup.bpf.c | 16 __uint(key_size, sizeof(u32));
|
/linux-master/include/soc/qcom/ |
H A D | ice.h | 32 u8 algorithm_id, u8 key_size,
|
/linux-master/tools/bpf/bpftool/skeleton/ |
H A D | profiler.bpf.c | 16 __uint(key_size, sizeof(u32)); 23 __uint(key_size, sizeof(u32)); 30 __uint(key_size, sizeof(u32)); 37 __uint(key_size, sizeof(u32));
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 427 size_t key_size; local 431 key_size = sizeof(*key) + sizeof(__u32); 432 key = alloca(key_size); 435 key_size, sizeof(value), 536 size_t key_size; local 540 key_size = sizeof(*key_p) + sizeof(__u32); 541 key_p = alloca(key_size); 542 next_key_p = alloca(key_size); 544 map_fd = bpf_map_create(BPF_MAP_TYPE_LPM_TRIE, NULL, key_size, sizeof(value), 100, &opts); 555 memset(key_p, 0, key_size); 694 int i, j, ret, iter, key_size; local 748 size_t key_size, value_size; local [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | btf.c | 68 __u32 key_size; member in struct:btf_raw_test 136 .key_size = sizeof(int), 191 .key_size = sizeof(int), 216 .key_size = sizeof(int), 257 .key_size = sizeof(int), 302 .key_size = sizeof(int), 324 .key_size = sizeof(int), 346 .key_size = sizeof(int), 368 .key_size = sizeof(int), 393 .key_size [all...] |
/linux-master/tools/bpf/bpftool/ |
H A D | map.c | 139 print_hex_data_json(key, info->key_size); 162 print_hex_data_json(key, info->key_size); 200 break_names = info->key_size > 16 || msg_size > 16; 201 single_line = info->key_size + msg_size <= 24 && !break_names; 204 fprint_hex(stdout, key, info->key_size, " "); 227 print_hex_data_json(key, map_info->key_size); 253 break_names = info->key_size > 16 || info->value_size > 16; 254 single_line = info->key_size + info->value_size <= 24 && 257 if (info->key_size) { 259 fprint_hex(stdout, key, info->key_size, " "); 340 parse_elem(char **argv, struct bpf_map_info *info, void *key, void *value, __u32 key_size, __u32 value_size, __u32 *flags, __u32 **value_fd) argument 1243 __u32 key_size = 0, value_size = 0, max_entries = 0; local [all...] |
/linux-master/tools/lib/bpf/ |
H A D | libbpf_probes.c | 285 int key_size, value_size, max_entries; local 289 key_size = sizeof(__u32); 298 key_size = sizeof(__u64); 304 key_size = sizeof(struct bpf_cgroup_storage_key); 310 key_size = 0; 327 key_size = 0; 338 key_size = 0; 342 key_size = 0; 388 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries, &opts);
|
/linux-master/crypto/asymmetric_keys/ |
H A D | pkcs8_parser.c | 25 u32 key_size; member in struct:pkcs8_parse_context 90 ctx->key_size = vlen; 119 pub->key = kmemdup(ctx.key, ctx.key_size, GFP_KERNEL); 123 pub->keylen = ctx.key_size;
|
/linux-master/tools/perf/util/bpf_skel/ |
H A D | bperf_cgroup.bpf.c | 18 __uint(key_size, sizeof(__u32)); 26 __uint(key_size, sizeof(__u64)); 34 __uint(key_size, sizeof(__u32)); 42 __uint(key_size, sizeof(__u32));
|
/linux-master/kernel/bpf/ |
H A D | map_in_map.c | 45 inner_map_meta->key_size = inner_map->key_size; 102 meta0->key_size == meta1->key_size &&
|
/linux-master/tools/hv/ |
H A D | hv_kvp_daemon.c | 267 static int kvp_key_delete(int pool, const __u8 *key, int key_size) argument 283 if (memcmp(key, record[i].key, key_size)) 310 static int kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, argument 318 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || 332 if (memcmp(key, record[i].key, key_size)) 357 memcpy(record[i].key, key, key_size); 364 static int kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, argument 371 if ((key_size > HV_KVP_EXCHANGE_MAX_KEY_SIZE) || 384 if (memcmp(key, record[i].key, key_size)) 396 static int kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, argument [all...] |
/linux-master/drivers/mmc/host/ |
H A D | cqhci-crypto.c | 17 enum cqhci_crypto_key_size key_size; member in struct:cqhci_crypto_alg_entry 21 .key_size = CQHCI_CRYPTO_KEY_SIZE_256, 80 ccap_array[i].key_size == alg->key_size && 149 cqhci_crypto_algs[i].key_size == cap.key_size)
|
/linux-master/tools/testing/selftests/bpf/benchs/ |
H A D | bench_bpf_hashmap_lookup.c | 21 __u32 key_size; member in struct:__anon5765 27 .key_size = 4, 43 { "key_size", ARG_KEY_SIZE, "KEY_SIZE", 0, 64 fprintf(stderr, "invalid key_size"); 67 args.key_size = ret; 167 bpf_map__set_key_size(ctx.skel->maps.hash_map_bench, args.key_size); 174 if (args.key_size > 4) { 175 for (i = 1; i < args.key_size/4; i++)
|