Lines Matching refs:cmd
4494 int cmd) in bpf_map_do_batch() argument
4496 bool has_read = cmd == BPF_MAP_LOOKUP_BATCH || in bpf_map_do_batch()
4497 cmd == BPF_MAP_LOOKUP_AND_DELETE_BATCH; in bpf_map_do_batch()
4498 bool has_write = cmd != BPF_MAP_LOOKUP_BATCH; in bpf_map_do_batch()
4522 if (cmd == BPF_MAP_LOOKUP_BATCH) in bpf_map_do_batch()
4524 else if (cmd == BPF_MAP_LOOKUP_AND_DELETE_BATCH) in bpf_map_do_batch()
4526 else if (cmd == BPF_MAP_UPDATE_BATCH) in bpf_map_do_batch()
4931 static int __sys_bpf(int cmd, bpfptr_t uattr, unsigned int size) in __sys_bpf() argument
4948 (cmd == BPF_MAP_CREATE || cmd == BPF_PROG_LOAD)) in __sys_bpf()
4961 trace_android_vh_check_bpf_syscall(cmd, &attr, size); in __sys_bpf()
4963 err = security_bpf(cmd, &attr, size); in __sys_bpf()
4967 switch (cmd) { in __sys_bpf()
5089 SYSCALL_DEFINE3(bpf, int, cmd, union bpf_attr __user *, uattr, unsigned int, size) in SYSCALL_DEFINE3() argument
5091 return __sys_bpf(cmd, USER_BPFPTR(uattr), size); in SYSCALL_DEFINE3()
5106 BPF_CALL_3(bpf_sys_bpf, int, cmd, union bpf_attr *, attr, u32, attr_size) in BPF_CALL_3() argument
5108 switch (cmd) { in BPF_CALL_3()
5122 return __sys_bpf(cmd, KERNEL_BPFPTR(attr), attr_size); in BPF_CALL_3()
5131 int kern_sys_bpf(int cmd, union bpf_attr *attr, unsigned int size);
5133 int kern_sys_bpf(int cmd, union bpf_attr *attr, unsigned int size) in kern_sys_bpf() argument
5138 switch (cmd) { in kern_sys_bpf()
5170 return ____bpf_sys_bpf(cmd, attr, size); in kern_sys_bpf()