Lines Matching refs:size
450 struct skb_shared_info *sinfo, u32 size, in bpf_test_finish() argument
455 u32 copy_size = size; in bpf_test_finish()
502 if (copy_to_user(&uattr->test.data_size_out, &size, sizeof(size))) in bpf_test_finish()
663 u32 size, u32 headroom, u32 tailroom) in BTF_ID_FLAGS()
671 size = SKB_DATA_ALIGN(size); in BTF_ID_FLAGS()
672 data = kzalloc(size + headroom + tailroom, GFP_USER); in BTF_ID_FLAGS()
818 u32 size = kattr->test.ctx_size_in; in bpf_ctx_init() local
830 err = bpf_check_uarg_tail_zero(USER_BPFPTR(data_in), max_size, size); in bpf_ctx_init()
836 size = min_t(u32, max_size, size); in bpf_ctx_init()
837 if (copy_from_user(data, data_in, size)) { in bpf_ctx_init()
847 u32 size) in bpf_ctx_finish() argument
851 u32 copy_size = size; in bpf_ctx_finish()
863 if (copy_to_user(&uattr->test.ctx_size_out, &size, sizeof(size))) in bpf_ctx_finish()
990 u32 size = kattr->test.data_size_in; in bpf_prog_test_run_skb() local
1005 size, NET_SKB_PAD + NET_IP_ALIGN, in bpf_prog_test_run_skb()
1049 __skb_put(skb, size); in bpf_prog_test_run_skb()
1129 size = skb->len; in bpf_prog_test_run_skb()
1132 size = skb_headlen(skb); in bpf_prog_test_run_skb()
1133 ret = bpf_test_finish(kattr, uattr, skb->data, NULL, size, retval, in bpf_prog_test_run_skb()
1212 u32 size = kattr->test.data_size_in; in bpf_prog_test_run_xdp() local
1249 if (ctx->data_meta || ctx->data_end != size || in bpf_prog_test_run_xdp()
1259 if (size > max_data_sz) { in bpf_prog_test_run_xdp()
1263 size = max_data_sz; in bpf_prog_test_run_xdp()
1266 data = bpf_test_init(kattr, size, max_data_sz, headroom, tailroom); in bpf_prog_test_run_xdp()
1275 xdp_prepare_buff(&xdp, data, headroom, size, true); in bpf_prog_test_run_xdp()
1282 if (unlikely(kattr->test.data_size_in > size)) { in bpf_prog_test_run_xdp()
1285 while (size < kattr->test.data_size_in) { in bpf_prog_test_run_xdp()
1303 data_len = min_t(u32, kattr->test.data_size_in - size, in bpf_prog_test_run_xdp()
1307 if (copy_from_user(page_address(page), data_in + size, in bpf_prog_test_run_xdp()
1313 size += data_len; in bpf_prog_test_run_xdp()
1333 size = xdp.data_end - xdp.data_meta + sinfo->xdp_frags_size; in bpf_prog_test_run_xdp()
1334 ret = bpf_test_finish(kattr, uattr, xdp.data_meta, sinfo, size, in bpf_prog_test_run_xdp()
1372 u32 size = kattr->test.data_size_in; in bpf_prog_test_run_flow_dissector() local
1386 if (size < ETH_HLEN) in bpf_prog_test_run_flow_dissector()
1389 data = bpf_test_init(kattr, kattr->test.data_size_in, size, 0, 0); in bpf_prog_test_run_flow_dissector()
1412 ctx.data_end = (__u8 *)data + size; in bpf_prog_test_run_flow_dissector()
1417 size, flags); in bpf_prog_test_run_flow_dissector()
1644 u32 size = kattr->test.data_size_in; in bpf_prog_test_run_nf() local
1657 if (size < sizeof(struct iphdr)) in bpf_prog_test_run_nf()
1660 data = bpf_test_init(kattr, kattr->test.data_size_in, size, in bpf_prog_test_run_nf()
1690 __skb_put(skb, size); in bpf_prog_test_run_nf()
1695 if (size < ETH_HLEN + sizeof(struct iphdr)) in bpf_prog_test_run_nf()
1705 if (size < ETH_HLEN + sizeof(struct ipv6hdr)) in bpf_prog_test_run_nf()