Home
last modified time | relevance | path

Searched refs:uattr_size (Results 1 – 4 of 4) sorted by relevance

/linux-6.12.1/kernel/bpf/
Dbtf.c5700 static int finalize_log(struct bpf_verifier_log *log, bpfptr_t uattr, u32 uattr_size) in finalize_log() argument
5707 if (uattr_size >= offsetofend(union bpf_attr, btf_log_true_size) && in finalize_log()
5715 static struct btf *btf_parse(const union bpf_attr *attr, bpfptr_t uattr, u32 uattr_size) in btf_parse() argument
5796 err = finalize_log(&env->log, uattr, uattr_size); in btf_parse()
5808 ret = finalize_log(&env->log, uattr, uattr_size); in btf_parse()
7689 int btf_new_fd(const union bpf_attr *attr, bpfptr_t uattr, u32 uattr_size) in btf_new_fd() argument
7694 btf = btf_parse(attr, uattr, uattr_size); in btf_new_fd()
Dsyscall.c2634 static int bpf_prog_load(union bpf_attr *attr, bpfptr_t uattr, u32 uattr_size) in bpf_prog_load() argument
2846 err = bpf_check(&prog, attr, uattr, uattr_size); in bpf_prog_load()
4953 static int bpf_btf_load(const union bpf_attr *attr, bpfptr_t uattr, __u32 uattr_size) in bpf_btf_load() argument
4980 return btf_new_fd(attr, uattr, uattr_size); in bpf_btf_load()
Dverifier.c22300 int bpf_check(struct bpf_prog **prog, union bpf_attr *attr, bpfptr_t uattr, __u32 uattr_size) in bpf_check() argument
22480 if (uattr_size >= offsetofend(union bpf_attr, log_true_size) && in bpf_check()
/linux-6.12.1/include/linux/
Dbpf.h2523 int bpf_check(struct bpf_prog **fp, union bpf_attr *attr, bpfptr_t uattr, u32 uattr_size);