Lines Matching defs:size
83 __u8 data[0]; /* Arbitrary size */
129 * below). The size argument is the size of the union pointed to by *attr*.
346 * corresponding size field must be zero.
624 * and value size of the map *map_fd*. The *keys* buffer must be
675 * and value size of the map *map_fd*. The *keys* buffer must be
726 * size of the map *map_fd*, that is, *key_size* * *count*.
1378 __u32 key_size; /* size of key in bytes */
1379 __u32 value_size; /* size of value in bytes */
1439 __u32 log_size; /* size of user buffer */
1451 __u32 func_info_rec_size; /* userspace bpf_func_info size */
1454 __u32 line_info_rec_size; /* userspace bpf_line_info size */
1468 /* output: actual total log contents size (including termintaing zero).
1580 /* output: actual total log contents size (including termintaing zero).
1765 * long bpf_probe_read(void *dst, u32 size, const void *unsafe_ptr)
1767 * For tracing programs, safely attempt to read *size* bytes from
1786 * prints a message defined by format *fmt* (of size *fmt_size*)
1826 * **%lli**, **%llu**, **%llx**, **%p**, **%s**. No modifier (size
1880 * long bpf_l3_csum_replace(struct sk_buff *skb, u32 offset, u64 from, u64 to, u64 size)
1886 * number of bytes (2 or 4) for this field, stored in *size*.
1889 * setting *from* and *size* to 0. For both methods, *offset*
1917 * the size of the field, *flags* can be added (bitwise OR) actual
2075 * long bpf_skb_get_tunnel_key(struct sk_buff *skb, struct bpf_tunnel_key *key, u32 size, u64 flags)
2078 * empty **struct bpf_tunnel_key** of **size**, that will be
2126 * long bpf_skb_set_tunnel_key(struct sk_buff *skb, struct bpf_tunnel_key *key, u32 size, u64 flags)
2129 * tunnel metadata is set to the contents of *key*, of *size*. The
2171 * perf event file descriptors. The *map* is an array whose size
2242 * long bpf_perf_event_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
2256 * The value to write, of *size*, is passed through eBPF stack and
2350 * towards the raw buffer pointed by *to*, of size *to_size*
2373 * long bpf_skb_get_tunnel_opt(struct sk_buff *skb, void *opt, u32 size)
2377 * of *size*.
2389 * The size of the option data retrieved.
2391 * long bpf_skb_set_tunnel_opt(struct sk_buff *skb, void *opt, u32 size)
2394 * to the option data contained in the raw buffer *opt* of *size*.
2415 * The size for GSO target is adapted as well.
2526 * change the size of the packet, then the eBPF program rewrites
2649 * long bpf_probe_read_str(void *dst, u32 size, const void *unsafe_ptr)
2894 * of size *buf_size*. This helper relies on a *map* of type
2897 * descriptors. The *map* is an array whose size is the number of
2945 * the structure pointed by *buf* and of size *buf_size*. Enabled
3173 * long bpf_skb_get_xfrm_state(struct sk_buff *skb, u32 index, struct bpf_xfrm_state *xfrm_state, u32 size, u64 flags)
3179 * pointed by *xfrm_state* and of length *size*.
3189 * long bpf_get_stack(void *ctx, void *buf, u32 size, u64 flags)
3195 * a nonnegative *size*.
3220 * to sufficient large buffer size. Note that
3230 * *size* on success, or a negative error in case of failure.
3266 * *plen* argument is the size of the passed in struct.
3353 * address *hdr*, with *len* its size in bytes. *type* indicates
3403 * Adjust the size allocated to TLVs in the outermost IPv6
3518 * The type and the size of the local storage is defined
3833 * program buffer *buf* of size *buf_len*.
3850 * by program buffer *buf* of size *buf_len*.
3869 * provided by program buffer *buf* of size *buf_len*.
3885 * value provided by program in buffer *buf* of size *buf_len*.
3902 * size *buf_len* to a long integer according to the given base
3926 * size *buf_len* to an unsigned long integer according to the
4028 * long bpf_skb_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
4042 * The value to write, of *size*, is passed through eBPF stack and
4052 * long bpf_probe_read_user(void *dst, u32 size, const void *unsafe_ptr)
4054 * Safely attempt to read *size* bytes from user space address
4059 * long bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr)
4061 * Safely attempt to read *size* bytes from kernel space address
4066 * long bpf_probe_read_user_str(void *dst, u32 size, const void *unsafe_ptr)
4069 * *unsafe_ptr* to *dst*. The *size* should include the
4071 * *size*, the target is not padded with further NUL bytes. If the
4072 * string length is larger than *size*, just *size*-1 bytes are
4092 * // size, after checking its boundaries.
4110 * long bpf_probe_read_kernel_str(void *dst, u32 size, const void *unsafe_ptr)
4145 * long bpf_read_branch_records(struct bpf_perf_event_data *ctx, void *buf, u32 size, u64 flags)
4149 * and store it in the buffer pointed by *buf* up to size
4150 * *size* bytes.
4159 * **-EINVAL** if arguments invalid or **size** not a multiple
4164 * long bpf_get_ns_current_pid_tgid(u64 dev, u64 ino, struct bpf_pidns_info *nsdata, u32 size)
4176 * long bpf_xdp_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
4190 * The value to write, of *size*, is passed through eBPF stack and
4326 * The *data_len* is the size of *data* in bytes - must be a multiple of 8.
4388 * long bpf_ringbuf_output(void *ringbuf, void *data, u64 size, u64 flags)
4390 * Copy *size* bytes from *data* into a ring buffer *ringbuf*.
4405 * void *bpf_ringbuf_reserve(void *ringbuf, u64 size, u64 flags)
4407 * Reserve *size* bytes of payload in a ring buffer *ringbuf*.
4410 * Valid pointer with *size* bytes of memory available; NULL,
4447 * * **BPF_RB_RING_SIZE**: The size of ring buffer.
4520 * long bpf_get_task_stack(struct task_struct *task, void *buf, u32 size, u64 flags)
4527 * bpf program provides *buf* with a nonnegative *size*.
4543 * to sufficient large buffer size. Note that
4553 * *size* on success, or a negative error in case of failure.
4572 * specify the size of the magic by using
4589 * *len* must be at least 2 bytes which is the minimal size
4713 * returned in the provided buffer *buf* of size *sz* and
4721 * long bpf_copy_from_user(void *dst, u32 size, const void *user_ptr)
4723 * Read *size* bytes from user space address *user_ptr* and store
4744 * a limit on string size to be useful.
4761 * written if output had to be truncated due to string size),
4911 * long bpf_ima_inode_hash(struct inode *inode, void *dst, u32 size)
4914 * If the hash is larger than *size*, then only *size*
4931 * Check packet size against exceeding MTU of net device (based
4933 * with helpers that adjust/change the packet size.
4936 * size change. This allows to check MTU prior to changing packet
4938 * actual packet size (resulting in negative packet size) will in
4941 * planned size change; therefore the responsibility for catching
4942 * a negative packet size belongs in those helpers.
4950 * zero then the ctx packet size is use. When value *mtu_len* is
4979 * device. Remember the net device configured MTU is the L3 size,
5027 * Outputs a string into the **str** buffer of size **str_size**
5034 * array. The *data_len* is the size of *data* in bytes - must be
5176 * long bpf_get_branch_snapshot(void *entries, u32 size, u64 flags)
5186 * buffer *entries*. *size* is the size of *entries* in bytes.
5222 * **-EINVAL** if string *name* is not the same size as *name_sz*.
5275 * size of **s1**. **s2** must be a read-only string.
5337 * Get the total size of a given xdp buff (linear and paged area)
5339 * The total size of a given xdp buffer.
5357 * long bpf_copy_from_user_task(void *dst, u32 size, const void *user_ptr, struct task_struct *tsk, u64 flags)
5359 * Read *size* bytes from user space address *user_ptr* in *tsk*'s
5397 * long bpf_ima_file_hash(struct file *file, void *dst, u32 size)
5400 * If the hash is larger than *size*, then only *size*
5432 * long bpf_dynptr_from_mem(void *data, u32 size, u64 flags, struct bpf_dynptr *ptr)
5437 * The maximum *size* supported is DYNPTR_MAX_SIZE.
5440 * 0 on success, -E2BIG if the size exceeds DYNPTR_MAX_SIZE,
5443 * long bpf_ringbuf_reserve_dynptr(void *ringbuf, u32 size, u64 flags, struct bpf_dynptr *ptr)
5445 * Reserve *size* bytes of payload in a ring buffer *ringbuf*
5640 * larger than the size of the ring buffer, or which cannot fit
5921 * First 4 bits are for passing the header field size.
6236 __u32 snd_ssthresh; /* Slow start size threshold */
6359 __u32 qsize; /* queue size to remote target CPU */
6385 __u32 size; /* Total size of sk_msg */
7267 BPF_CORE_FIELD_BYTE_SIZE = 1, /* field size in bytes */
7275 BPF_CORE_TYPE_SIZE = 9, /* type size in bytes */