/linux-master/tools/perf/util/bpf_skel/ |
H A D | lock_contention.bpf.c | 25 __uint(key_size, sizeof(__u32)); 41 __uint(key_size, sizeof(__u32)); 49 __uint(key_size, sizeof(struct contention_key)); 56 __uint(key_size, sizeof(__u32)); 63 __uint(key_size, sizeof(__u64)); 70 __uint(key_size, sizeof(__u32)); 77 __uint(key_size, sizeof(__u32)); 84 __uint(key_size, sizeof(__u32)); 91 __uint(key_size, sizeof(__u64)); 98 __uint(key_size, sizeo [all...] |
H A D | off_cpu.bpf.c | 37 __uint(key_size, sizeof(__u32)); 51 __uint(key_size, sizeof(struct offcpu_key)); 58 __uint(key_size, sizeof(__u32)); 65 __uint(key_size, sizeof(__u32)); 72 __uint(key_size, sizeof(__u64));
|
H A D | kwork_top.bpf.c | 59 __uint(key_size, sizeof(struct work_key)); 66 __uint(key_size, sizeof(struct task_key)); 73 __uint(key_size, sizeof(struct work_key)); 80 __uint(key_size, sizeof(u32));
|
H A D | kwork_trace.bpf.c | 37 __uint(key_size, sizeof(struct work_key)); 44 __uint(key_size, sizeof(struct work_key)); 51 __uint(key_size, sizeof(struct work_key)); 58 __uint(key_size, sizeof(__u32)); 65 __uint(key_size, sizeof(__u32));
|
/linux-master/crypto/ |
H A D | ecdh.c | 33 params.key_size > sizeof(u64) * ctx->ndigits) 36 if (!params.key || !params.key_size) 40 memcpy(ctx->private_key, params.key, params.key_size); 43 ctx->private_key, params.key_size) < 0) { 44 memzero_explicit(ctx->private_key, params.key_size);
|
/linux-master/drivers/net/ethernet/netronome/nfp/flower/ |
H A D | offload.c | 155 u32 *key_layer_two, int *key_size, bool ipv6, 166 *key_size += sizeof(struct nfp_flower_geneve_options); 175 u32 *key_layer_two, u8 *key_layer, int *key_size, 189 *key_size += sizeof(struct nfp_flower_ext_meta); 191 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); 193 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); 208 *key_size += sizeof(struct nfp_flower_ext_meta); 213 *key_size += sizeof(struct nfp_flower_ipv6_udp_tun); 215 *key_size += sizeof(struct nfp_flower_ipv4_udp_tun); 224 err = nfp_flower_calc_opt_layer(enc_op, key_layer_two, key_size, 154 nfp_flower_calc_opt_layer(struct flow_dissector_key_enc_opts *enc_opts, u32 *key_layer_two, int *key_size, bool ipv6, struct netlink_ext_ack *extack) argument 173 nfp_flower_calc_udp_tun_layer(struct flow_dissector_key_ports *enc_ports, struct flow_dissector_key_enc_opts *enc_op, u32 *key_layer_two, u8 *key_layer, int *key_size, struct nfp_flower_priv *priv, enum nfp_flower_tun_type *tun_type, bool ipv6, struct netlink_ext_ack *extack) argument 250 int key_size; local [all...] |
/linux-master/samples/bpf/ |
H A D | test_map_in_map.bpf.c | 56 __uint(key_size, sizeof(u32)); 64 __uint(key_size, sizeof(u32)); 72 __uint(key_size, sizeof(u32));
|
H A D | map_perf_test.bpf.c | 51 __uint(key_size, sizeof(u32)); 60 __uint(key_size, sizeof(u32)); 75 __uint(key_size, sizeof(u32)); 83 __uint(key_size, 8);
|
H A D | tracex6.bpf.c | 9 __uint(key_size, sizeof(int));
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | verifier_map_ptr_mixing.c | 50 __uint(key_size, sizeof(int)); 63 __uint(key_size, sizeof(int));
|
H A D | timer_mim_reject.c | 29 __uint(key_size, sizeof(int));
|
H A D | test_unpriv_bpf_disabled.c | 57 __uint(key_size, sizeof(__u32));
|
H A D | tailcall_bpf2bpf3.c | 10 __uint(key_size, sizeof(__u32));
|
H A D | xsk_xdp_progs.c | 12 __uint(key_size, sizeof(int));
|
H A D | access_map_in_map.c | 11 __uint(key_size, 4);
|
H A D | map_in_map_btf.c | 29 __uint(key_size, 4);
|
/linux-master/kernel/trace/ |
H A D | tracing_map.h | 184 unsigned int key_size; member in struct:tracing_map 242 unsigned int key_size,
|
H A D | tracing_map.c | 414 elt->key = kzalloc(map->key_size, GFP_KERNEL); 505 static inline bool keys_match(void *key, void *test_key, unsigned key_size) argument 509 if (memcmp(key, test_key, key_size)) 523 key_hash = jhash(key, map->key_size, 0); 536 keys_match(key, val->key, map->key_size)) { 576 memcpy(elt->key, key, map->key_size); 721 * @key_size: The size of the key for the map in bytes 769 unsigned int key_size, 798 map->key_size = key_size; 768 tracing_map_create(unsigned int map_bits, unsigned int key_size, const struct tracing_map_ops *ops, void *private_data) argument 966 detect_dups(struct tracing_map_sort_entry **sort_entries, int n_entries, unsigned int key_size) argument [all...] |
/linux-master/net/core/ |
H A D | sock_map.c | 36 attr->key_size != 4 || 870 u32 key_size) 876 !memcmp(&elem->key, key, key_size)) 886 u32 key_size = map->key_size, hash; local 892 hash = sock_hash_bucket_hash(key, key_size); 894 elem = sock_hash_lookup_elem_raw(&bucket->head, hash, key, key_size); 922 elem->key, map->key_size); 934 u32 hash, key_size = map->key_size; local 869 sock_hash_lookup_elem_raw(struct hlist_head *head, u32 hash, void *key, u32 key_size) argument 957 sock_hash_alloc_elem(struct bpf_shtab *htab, void *key, u32 key_size, u32 hash, struct sock *sk, struct bpf_shtab_elem *old) argument 988 u32 key_size = map->key_size, hash; local 1054 u32 hash, key_size = map->key_size; local [all...] |
/linux-master/kernel/bpf/ |
H A D | map_iter.c | 104 u32 key_acc_size, value_acc_size, key_size, value_size; local 127 key_size = map->key_size; 133 if (key_acc_size > key_size || value_acc_size > value_size) {
|
/linux-master/fs/orangefs/ |
H A D | xattr.c | 415 int key_size; local 433 key_size = 0; 486 key_size, 491 key_size); 493 new_op->downcall.resp.listxattr.key + key_size, 500 key_size); 502 key_size += new_op->downcall.resp.listxattr.lengths[i];
|
/linux-master/fs/hfs/ |
H A D | brec.c | 462 int key_size, rec; local 507 key_size = hfs_bnode_read_u8(node, 14) + 1; 509 key_size = tree->max_key_len + 1; 510 hfs_bnode_copy(new_node, 14, node, 14, key_size); 513 key_size = tree->max_key_len + 1; 516 key_size = (key_size + 1) & -2; 518 hfs_bnode_write(new_node, &cnid, 14 + key_size, 4); 521 hfs_bnode_write_u16(new_node, rec, 14 + key_size + 4);
|
/linux-master/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | cmsg.c | 95 req->key_size = cpu_to_be32(map->key_size); 231 if (memcmp(cached_key, key, map->key_size)) 243 map->key_size); 328 memcpy(nfp_bpf_ctrl_req_key(bpf, req, 0), key, map->key_size); 368 map->key_size);
|
/linux-master/fs/ecryptfs/ |
H A D | keystore.c | 259 ecryptfs_printk(KERN_ERR, "key_size [%d] larger than " 305 data_len = (5 + ECRYPTFS_SIG_SIZE_HEX + crypt_stat->key_size); 325 rc = ecryptfs_write_packet_length(&message[i], crypt_stat->key_size + 3, 334 memcpy(&message[i], crypt_stat->key, crypt_stat->key_size); 335 i += crypt_stat->key_size; 336 for (j = 0; j < crypt_stat->key_size; j++) 400 printk(KERN_ERR "%s: Encrypted key_size [%zd] larger than " 1172 crypt_stat->key_size = auth_tok->session_key.decrypted_key_size; 1183 crypt_stat->key_size); 1446 crypt_stat->key_size [all...] |
/linux-master/include/uapi/linux/ |
H A D | hyperv.h | 358 __u32 key_size; member in struct:hv_kvp_exchg_msg_value 382 __u32 key_size; member in struct:hv_kvp_msg_delete
|