Home
last modified time | relevance | path

Searched refs:MAX_BPF_FUNC_ARGS (Results 1 – 6 of 6) sorted by relevance

/linux-6.6.21/net/bpf/ !
Dbpf_dummy_struct_ops.c16 u64 args[MAX_BPF_FUNC_ARGS];
Dtest_run.c733 ctx_size_in > MAX_BPF_FUNC_ARGS * sizeof(u64)) in bpf_prog_test_run_raw_tp()
/linux-6.6.21/arch/x86/net/ !
Dbpf_jit_comp.c2008 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in get_nr_used_regs()
2031 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in save_args()
2109 for (i = 0; i < min_t(int, m->nr_args, MAX_BPF_FUNC_ARGS); i++) { in restore_regs()
2378 if (nr_regs > MAX_BPF_FUNC_ARGS) in arch_prepare_bpf_trampoline()
/linux-6.6.21/include/linux/ !
Dbpf.h994 #define MAX_BPF_FUNC_ARGS 12 macro
1011 u8 arg_size[MAX_BPF_FUNC_ARGS];
1012 u8 arg_flags[MAX_BPF_FUNC_ARGS];
2388 if (off < 0 || off >= sizeof(__u64) * MAX_BPF_FUNC_ARGS) in bpf_tracing_ctx_access()
/linux-6.6.21/arch/arm64/net/ !
Dbpf_jit_comp.c2043 for (i = 0; i < MAX_BPF_FUNC_ARGS; i++) { in arch_prepare_bpf_trampoline()
/linux-6.6.21/kernel/bpf/ !
Dbtf.c6574 if (nargs > MAX_BPF_FUNC_ARGS) { in btf_distill_func_proto()