Home
last modified time | relevance | path

Searched refs:MAX_BPF_FUNC_ARGS (Results 1 – 7 of 7) sorted by relevance

/linux/net/bpf/
H A Dbpf_dummy_struct_ops.c21 u64 args[MAX_BPF_FUNC_ARGS];
H A Dtest_run.c773 ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64)) in bpf_prog_test_run_raw_tp()
/linux/arch/x86/net/
H A Dbpf_jit_comp.c2711 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in get_nr_used_regs()
2734 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in save_args()
2812 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in restore_regs()
3096 /* x86-64 supports up to MAX_BPF_FUNC_ARGS arguments. 1-6 in __arch_prepare_bpf_trampoline()
3099 if (nr_regs > MAX_BPF_FUNC_ARGS) in __arch_prepare_bpf_trampoline()
/linux/include/linux/
H A Dbpf.h1106 #define MAX_BPF_FUNC_ARGS 12 macro
1123 u8 arg_size[MAX_BPF_FUNC_ARGS];
1124 u8 arg_flags[MAX_BPF_FUNC_ARGS];
2783 if (off < 0 || off >= sizeof(__u64) * MAX_BPF_FUNC_ARGS) in bpf_tracing_ctx_access()
/linux/arch/riscv/net/
H A Dbpf_jit_comp64.c1072 if (m->nr_args > MAX_BPF_FUNC_ARGS) in __arch_prepare_bpf_trampoline()
/linux/kernel/sched/
H A Dext.c5828 if (off < 0 || off >= sizeof(__u64) * MAX_BPF_FUNC_ARGS) in bpf_scx_is_valid_access()
/linux/kernel/bpf/
H A Dbtf.c7380 if (nargs > MAX_BPF_FUNC_ARGS) { in btf_distill_func_proto()