/linux-master/tools/perf/util/bpf_skel/ |
H A D | lock_contention.bpf.c | 26 __uint(value_size, sizeof(__u64)); 42 __uint(value_size, sizeof(struct tstamp_data)); 50 __uint(value_size, sizeof(struct contention_data)); 57 __uint(value_size, sizeof(struct contention_task_data)); 64 __uint(value_size, sizeof(__u32)); 71 __uint(value_size, sizeof(__u8)); 78 __uint(value_size, sizeof(__u8)); 85 __uint(value_size, sizeof(__u8)); 92 __uint(value_size, sizeof(__u8)); 99 __uint(value_size, sizeo [all...] |
/linux-master/tools/hv/ |
H A D | hv_kvp_daemon.c | 322 const __u8 *value, int value_size) 330 (value_size > HV_KVP_EXCHANGE_MAX_VALUE_SIZE)) 349 memcpy(record[i].value, value, value_size); 367 memcpy(record[i].value, value, value_size); 376 int value_size) 383 (value_size > HV_KVP_EXCHANGE_MAX_VALUE_SIZE)) 400 memcpy(value, record[i].value, value_size); 408 __u8 *value, int value_size) 423 memcpy(value, record[index].value, value_size); 1834 hv_msg->body.kvp_set.data.value_size)) 321 kvp_key_add_or_modify(int pool, const __u8 *key, int key_size, const __u8 *value, int value_size) argument 375 kvp_get_value(int pool, const __u8 *key, int key_size, __u8 *value, int value_size) argument 407 kvp_pool_enumerate(int pool, int index, __u8 *key, int key_size, __u8 *value, int value_size) argument [all...] |
/linux-master/net/core/ |
H A D | sock_map.c | 37 (attr->value_size != sizeof(u32) && 38 attr->value_size != sizeof(u64)) || 397 if (map->value_size != sizeof(u64)) 558 if (map->value_size == sizeof(u64)) 1096 (attr->value_size != sizeof(u32) && 1097 attr->value_size != sizeof(u64)) || 1193 if (map->value_size != sizeof(u64))
|
/linux-master/kernel/bpf/ |
H A D | verifier.c | 97 * and the range of [ptr, ptr + map's value_size) is accessible. 5055 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", 5056 map->value_size, off, size); 5061 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", 5062 map->value_size, off, size); 5087 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", 5421 err = check_mem_region_access(env, regno, off, size, map->value_size, 8549 map->value_size - reg->off, false, 8562 if (!strnchr(str_ptr + map_off, map->value_size - map_off, 0)) { 8721 * check [value, value + map->value_size) validit [all...] |
H A D | syscall.c | 136 return round_up(map->value_size, 8) * num_possible_cpus(); 140 return map->value_size; 343 map->value_size = attr->value_size; 852 "value_size:\t%u\n" 861 map->value_size, 1068 u32 key_size, value_size; local 1082 value_type = btf_type_id_size(btf, &btf_value_id, &value_size); 1083 if (!value_type || value_size != map->value_size) 1530 u32 value_size; local 1605 u32 value_size; local 1838 u32 value_size, cp, max_count; local 1905 u32 value_size, cp, max_count; local 2004 u32 value_size; local [all...] |
H A D | bloom_filter.c | 24 u32 value_size, u32 index) 28 if (likely(value_size % 4 == 0)) 29 h = jhash2(value, value_size / 4, bloom->hash_seed + index); 31 h = jhash(value, value_size, bloom->hash_seed + index); 43 h = hash(bloom, value, map->value_size, i); 61 h = hash(bloom, value, map->value_size, i); 86 if (attr->value_size > KMALLOC_MAX_SIZE) 87 /* if value_size is bigger, the user space won't be able to 101 if (attr->key_size != 0 || attr->value_size == 0 || 23 hash(struct bpf_bloom_filter *bloom, void *value, u32 value_size, u32 index) argument
|
H A D | arena.c | 101 if (attr->key_size || attr->value_size || attr->max_entries == 0 ||
|
H A D | cpumap.c | 86 u32 value_size = attr->value_size; local 91 (value_size != offsetofend(struct bpf_cpumap_val, qsize) && 92 value_size != offsetofend(struct bpf_cpumap_val, bpf_prog.fd)) || 537 memcpy(&cpumap_value, value, map->value_size);
|
/linux-master/include/linux/ |
H A D | bpf.h | 265 u32 value_size; member in struct:bpf_map 492 bpf_obj_memcpy(map->record, dst, src, map->value_size, false); 497 bpf_obj_memcpy(map->record, dst, src, map->value_size, true); 522 bpf_obj_memzero(map->record, dst, map->value_size);
|
/linux-master/drivers/staging/vc04_services/vchiq-mmal/ |
H A D | mmal-vchiq.c | 1198 u32 parameter_id, void *value, u32 value_size) 1210 m.u.port_parameter_set.size = (2 * sizeof(u32)) + value_size; 1211 memcpy(&m.u.port_parameter_set.value, value, value_size); 1214 (4 * sizeof(u32)) + value_size, 1239 u32 parameter_id, void *value, u32 *value_size) 1251 m.u.port_parameter_get.size = (2 * sizeof(u32)) + *value_size; 1270 * whilst *value_size doesn't. 1274 if (ret || rmsg->u.port_parameter_get_reply.size > *value_size) { 1279 *value_size); 1285 *value_size 1196 port_parameter_set(struct vchiq_mmal_instance *instance, struct vchiq_mmal_port *port, u32 parameter_id, void *value, u32 value_size) argument 1237 port_parameter_get(struct vchiq_mmal_instance *instance, struct vchiq_mmal_port *port, u32 parameter_id, void *value, u32 *value_size) argument 1416 vchiq_mmal_port_parameter_set(struct vchiq_mmal_instance *instance, struct vchiq_mmal_port *port, u32 parameter, void *value, u32 value_size) argument 1433 vchiq_mmal_port_parameter_get(struct vchiq_mmal_instance *instance, struct vchiq_mmal_port *port, u32 parameter, void *value, u32 *value_size) argument [all...] |
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 514 unsigned int value_size; member in struct:bpf_map_def 1113 map->def.value_size = kern_vtype->size; 1344 map->def.value_size = type->size; 1716 return array_map_mmap_sz(map->def.value_size, map->def.max_entries); 1863 def->value_size = data_sz; 2514 } else if (strcmp(name, "value_size") == 0) { 2519 if (map_def->value_size && map_def->value_size != sz) { 2521 map_name, map_def->value_size, sz); 2524 map_def->value_size [all...] |
H A D | linker.c | 1544 if (main_def->value_size != extra_def->value_size) { 1545 reason = "value_size";
|
H A D | libbpf_probes.c | 285 int key_size, value_size, max_entries; local 290 value_size = sizeof(__u32); 295 value_size = sizeof(__u64); 299 value_size = sizeof(__u64); 305 value_size = sizeof(__u64); 318 value_size = 8; 328 value_size = 0; 343 value_size = 0; 388 fd = bpf_map_create(map_type, NULL, key_size, value_size, max_entries, &opts);
|
H A D | libbpf_internal.h | 270 __u32 value_size; member in struct:btf_map_def
|
H A D | bpf.h | 64 __u32 value_size, 205 * *value_size* * *count*.
|
H A D | bpf.c | 171 __u32 value_size, 190 attr.value_size = value_size; 168 bpf_map_create(enum bpf_map_type map_type, const char *map_name, __u32 key_size, __u32 value_size, __u32 max_entries, const struct bpf_map_create_opts *opts) argument
|
/linux-master/fs/overlayfs/ |
H A D | copy_up.c | 79 ssize_t list_size, size, value_size = 0; local 134 size = ovl_do_getxattr(oldpath, name, value, value_size); 143 if (size > value_size) { 153 value_size = size;
|
/linux-master/fs/ext4/ |
H A D | xattr.c | 2595 size_t value_size = le32_to_cpu(entry->e_value_size); local 2621 buffer = kvmalloc(value_size, GFP_NOFS); 2627 error = ext4_xattr_inode_get(inode, entry, buffer, value_size); 2648 i.value_len = value_size;
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_lpm_map.c | 748 size_t key_size, value_size; local 754 value_size = sizeof(__u32); 755 key_size = sizeof(struct bpf_lpm_trie_key_hdr) + value_size; 756 map_fd = bpf_map_create(BPF_MAP_TYPE_LPM_TRIE, NULL, key_size, value_size, 100, &opts);
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | strobemeta.h | 215 __uint(value_size, sizeof(int)); 222 __uint(value_size, sizeof(uint64_t) * PERF_MAX_STACK_DEPTH); 229 __uint(value_size, sizeof(uint64_t) * PERF_MAX_STACK_DEPTH);
|
H A D | pyperf.h | 154 __uint(value_size, sizeof(int)); 161 __uint(value_size, sizeof(long long) * 127);
|
H A D | profiler.inc.h | 91 __uint(value_size, sizeof(int));
|
H A D | map_ptr_kern.c | 33 __u32 value_size; member in struct:bpf_map 39 __u32 value_size, __u32 max_entries) 43 VERIFY(map->value_size == value_size); 55 VERIFY(indirect->value_size == direct->value_size); 63 __u32 key_size, __u32 value_size, __u32 max_entries) 66 VERIFY(check_bpf_map_fields(indirect, key_size, value_size, 38 check_bpf_map_fields(struct bpf_map *map, __u32 key_size, __u32 value_size, __u32 max_entries) argument 62 check(struct bpf_map *indirect, struct bpf_map *direct, __u32 key_size, __u32 value_size, __u32 max_entries) argument
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | btf.c | 69 __u32 value_size; member in struct:btf_raw_test 137 .value_size = 180, 192 .value_size = 68, 217 .value_size = 16, 258 .value_size = 48, 303 .value_size = 48, 325 .value_size = 4, 347 .value_size = 4, 369 .value_size = 4, 394 .value_size [all...] |
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 652 * *value_size* * *count*. 703 * *value_size* * *count*. 1458 __u32 value_size; /* size of value in bytes */ member in struct:bpf_attr::__anon3130 6582 __u32 value_size; member in struct:bpf_map_info
|