Home
last modified time | relevance | path

Searched refs:MAX_BPF_FUNC_ARGS (Results 1 – 8 of 8) sorted by relevance

/linux/net/bpf/
H A Dbpf_dummy_struct_ops.c21 u64 args[MAX_BPF_FUNC_ARGS];
H A Dtest_run.c767 ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64)) in bpf_prog_test_run_raw_tp()
/linux/include/linux/
H A Dbpf.h1064 #define MAX_BPF_FUNC_ARGS 12 macro
1081 u8 arg_size[MAX_BPF_FUNC_ARGS];
1082 u8 arg_flags[MAX_BPF_FUNC_ARGS];
2656 if (off < 0 || off >= sizeof(__u64) * MAX_BPF_FUNC_ARGS) in bpf_tracing_ctx_access()
/linux/arch/x86/net/
H A Dbpf_jit_comp.c2580 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in get_nr_used_regs()
2603 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in save_args()
2681 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in restore_regs()
2968 if (nr_regs > MAX_BPF_FUNC_ARGS) in __arch_prepare_bpf_trampoline()
/linux/arch/riscv/net/
H A Dbpf_jit_comp64.c866 if (m->nr_args > MAX_BPF_FUNC_ARGS) in __arch_prepare_bpf_trampoline()
/linux/arch/arm64/net/
H A Dbpf_jit_comp.c2333 for (i = 0; i < MAX_BPF_FUNC_ARGS; i++) { in btf_func_model_nregs()
/linux/kernel/sched/
H A Dext.c5885 if (off < 0 || off >= sizeof(__u64) * MAX_BPF_FUNC_ARGS) in bpf_scx_is_valid_access()
/linux/kernel/bpf/
H A Dbtf.c7238 if (nargs > MAX_BPF_FUNC_ARGS) { in btf_distill_func_proto()