/linux-master/kernel/bpf/ |
H A D | syscall.c | 136 return round_up(map->value_size, 8) * num_possible_cpus(); 140 return map->value_size; 343 map->value_size = attr->value_size; 852 "value_size:\t%u\n" 861 map->value_size, 1068 u32 key_size, value_size; local 1082 value_type = btf_type_id_size(btf, &btf_value_id, &value_size); 1083 if (!value_type || value_size != map->value_size) 1530 u32 value_size; local 1605 u32 value_size; local 1838 u32 value_size, cp, max_count; local 1905 u32 value_size, cp, max_count; local 2004 u32 value_size; local [all...] |
H A D | verifier.c | 97 * and the range of [ptr, ptr + map's value_size) is accessible. 5055 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", 5056 map->value_size, off, size); 5061 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", 5062 map->value_size, off, size); 5087 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", 5421 err = check_mem_region_access(env, regno, off, size, map->value_size, 8549 map->value_size - reg->off, false, 8562 if (!strnchr(str_ptr + map_off, map->value_size - map_off, 0)) { 8721 * check [value, value + map->value_size) validit [all...] |
/linux-master/net/core/ |
H A D | bpf_sk_storage.c | 448 static int nla_value_size(u32 value_size) argument 455 nla_total_size_64bit(value_size); 562 smap->map.value_size, 610 diag_size += nla_value_size(smap->map.value_size); 677 diag_size += nla_value_size(diag->maps[i]->value_size); 877 if (prog->aux->max_rdwr_access > map->value_size) {
|
H A D | sock_map.c | 37 (attr->value_size != sizeof(u32) && 38 attr->value_size != sizeof(u64)) || 397 if (map->value_size != sizeof(u64)) 558 if (map->value_size == sizeof(u64)) 1096 (attr->value_size != sizeof(u32) && 1097 attr->value_size != sizeof(u64)) || 1193 if (map->value_size != sizeof(u64))
|
/linux-master/net/devlink/ |
H A D | dpipe.c | 309 value->value_size, value->value)) 313 value->value_size, value->mask))
|
/linux-master/net/xdp/ |
H A D | xskmap.c | 71 attr->value_size != 4 ||
|
/linux-master/samples/bpf/ |
H A D | map_perf_test.bpf.c | 61 __uint(value_size, sizeof(long)); 76 __uint(value_size, sizeof(long)); 84 __uint(value_size, sizeof(long));
|
H A D | offwaketime.bpf.c | 56 __uint(value_size, PERF_MAX_STACK_DEPTH * sizeof(u64));
|
H A D | spintest.bpf.c | 25 __uint(value_size, sizeof(long)); 32 __uint(value_size, PERF_MAX_STACK_DEPTH * sizeof(u64));
|
H A D | test_current_task_under_cgroup.bpf.c | 17 __uint(value_size, sizeof(u32));
|
H A D | trace_event_kern.c | 30 __uint(value_size, PERF_MAX_STACK_DEPTH * sizeof(u64));
|
H A D | trace_output.bpf.c | 8 __uint(value_size, sizeof(u32));
|
H A D | tracex2.bpf.c | 75 __uint(value_size, sizeof(long));
|
H A D | tracex3.bpf.c | 53 __uint(value_size, sizeof(u64));
|
H A D | tracex5.bpf.c | 21 __uint(value_size, sizeof(u32));
|
H A D | tracex6.bpf.c | 10 __uint(value_size, sizeof(u32));
|
H A D | xdp_fwd_kern.c | 29 __uint(value_size, sizeof(int));
|
H A D | xdp_router_ipv4.bpf.c | 45 __uint(value_size, sizeof(struct trie_value)); 69 __uint(value_size, sizeof(int));
|
/linux-master/security/apparmor/ |
H A D | domain.c | 313 int size, value_size = 0, ret = attach->xattr_count; local 325 &value, value_size, GFP_KERNEL);
|
/linux-master/tools/bpf/bpftool/ |
H A D | feature.c | 596 int key_size, value_size, max_entries; local 602 value_size = sizeof(__u32); 605 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries,
|
H A D | map.c | 65 return malloc(round_up(info->value_size, 8) * 68 return malloc(info->value_size); 101 step = round_up(map_info->value_size, 8); 141 print_hex_data_json(value, info->value_size); 159 step = round_up(info->value_size, 8); 173 info->value_size); 253 break_names = info->key_size > 16 || info->value_size > 16; 254 single_line = info->key_size + info->value_size <= 24 && 264 if (info->value_size) { 270 fprint_hex(stdout, value, info->value_size, " "); 340 parse_elem(char **argv, struct bpf_map_info *info, void *key, void *value, __u32 key_size, __u32 value_size, __u32 *flags, __u32 **value_fd) argument 1243 __u32 key_size = 0, value_size = 0, max_entries = 0; local [all...] |
H A D | prog.c | 277 value = malloc(map_info->value_size);
|
H A D | struct_ops.c | 377 value = calloc(1, info->value_size);
|
/linux-master/tools/bpf/bpftool/skeleton/ |
H A D | profiler.bpf.c | 17 __uint(value_size, sizeof(int)); 24 __uint(value_size, sizeof(struct bpf_perf_event_value___local)); 31 __uint(value_size, sizeof(struct bpf_perf_event_value___local)); 38 __uint(value_size, sizeof(u64));
|
/linux-master/tools/bpf/runqslower/ |
H A D | runqslower.bpf.c | 23 __uint(value_size, sizeof(u32));
|