Searched refs:MAX_BPF_STACK (Results 1 - 18 of 18) sorted by relevance
/kernel/linux/linux-5.10/include/linux/ |
H A D | bpf_local_storage.h | 95 (KMALLOC_MAX_SIZE - MAX_BPF_STACK - \
|
H A D | bpf_verifier.h | 8 #include <linux/filter.h> /* for MAX_BPF_STACK */ 215 #define BPF_ID_MAP_SIZE (MAX_BPF_REG + MAX_BPF_STACK / BPF_REG_SIZE)
|
H A D | filter.h | 87 #define MAX_BPF_STACK 512 macro
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | bpf_local_storage.h | 104 (KMALLOC_MAX_SIZE - MAX_BPF_STACK - \
|
H A D | bpf_verifier.h | 9 #include <linux/filter.h> /* for MAX_BPF_STACK */ 329 #define BPF_ID_MAP_SIZE ((MAX_BPF_REG + MAX_BPF_STACK / BPF_REG_SIZE) * MAX_CALL_FRAMES)
|
H A D | filter.h | 90 #define MAX_BPF_STACK 512 macro
|
/kernel/linux/linux-5.10/arch/mips/net/ |
H A D | ebpf_jit.c | 261 * | MAX_BPF_STACK (optional) | 267 * If BPF_REG_10 is never referenced, then the MAX_BPF_STACK sized 293 BUILD_BUG_ON(MAX_BPF_STACK & 7); in gen_int_prologue() 294 locals_size = (ctx->flags & EBPF_SEEN_FP) ? MAX_BPF_STACK : 0; in gen_int_prologue() 831 emit_instr(ctx, daddiu, dst, MIPS_R_SP, MAX_BPF_STACK); in build_one_insn() 834 emit_instr(ctx, daddiu, MIPS_R_AT, MIPS_R_SP, MAX_BPF_STACK); in build_one_insn() 1368 mem_off = insn->off + MAX_BPF_STACK; in build_one_insn() 1399 mem_off = insn->off + MAX_BPF_STACK; in build_one_insn() 1434 mem_off = insn->off + MAX_BPF_STACK; in build_one_insn()
|
/kernel/linux/linux-5.10/tools/include/linux/ |
H A D | filter.h | 28 #define MAX_BPF_STACK 512 macro
|
/kernel/linux/linux-6.6/tools/include/linux/ |
H A D | filter.h | 28 #define MAX_BPF_STACK 512 macro
|
/kernel/linux/linux-5.10/kernel/bpf/ |
H A D | hashtab.c | 393 if (attr->key_size > MAX_BPF_STACK) in htab_map_alloc_check() 400 MAX_BPF_STACK - sizeof(struct htab_elem)) in htab_map_alloc_check()
|
H A D | verifier.c | 2484 /* caller checked that off % size == 0 and -MAX_BPF_STACK <= off < 0, in check_stack_write_fixed_off() 3521 if (depth > MAX_BPF_STACK) { in check_max_stack_depth() 3883 * The minimum valid offset is -MAX_BPF_STACK for writes, and 3893 min_valid_off = -MAX_BPF_STACK; in check_stack_slot_within_bounds() 5959 max = MAX_BPF_STACK + mask_to_left; in retrieve_ptr_limit() 6216 if (off >= 0 || off < -MAX_BPF_STACK) { in check_stack_access_for_ptr_arithmetic() 11783 prog->aux->stack_depth = MAX_BPF_STACK; in fixup_bpf_calls()
|
/kernel/linux/linux-6.6/arch/parisc/net/ |
H A D | bpf_jit_comp64.c | 1111 bpf_stack_adjust = MAX_BPF_STACK; in bpf_jit_build_prologue()
|
H A D | bpf_jit_comp32.c | 1481 bpf_stack_adjust = MAX_BPF_STACK; in bpf_jit_build_prologue()
|
/kernel/linux/linux-5.10/net/core/ |
H A D | sock_map.c | 1125 if (attr->key_size > MAX_BPF_STACK) in sock_hash_alloc()
|
H A D | filter.c | 571 BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MAX_BPF_STACK); in bpf_convert_filter() 1651 __be32 diff[MAX_BPF_STACK / sizeof(__be32)]; 1652 u8 buff[MAX_BPF_STACK];
|
/kernel/linux/linux-6.6/net/core/ |
H A D | sock_map.c | 1094 if (attr->key_size > MAX_BPF_STACK) in sock_hash_alloc()
|
H A D | filter.c | 571 BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MAX_BPF_STACK); in bpf_convert_filter() 1650 __be32 diff[MAX_BPF_STACK / sizeof(__be32)]; 1651 u8 buff[MAX_BPF_STACK];
|
/kernel/linux/linux-6.6/kernel/bpf/ |
H A D | verifier.c | 4554 /* caller checked that off % size == 0 and -MAX_BPF_STACK <= off < 0, in check_stack_write_fixed_off() 5870 if (depth > MAX_BPF_STACK) { in check_max_stack_depth_subprog() 6578 * The minimum valid offset is -MAX_BPF_STACK for writes, and 6589 min_valid_off = -MAX_BPF_STACK; in check_stack_slot_within_bounds() 12144 max = MAX_BPF_STACK + mask_to_left; in retrieve_ptr_limit() 12401 if (off >= 0 || off < -MAX_BPF_STACK) { in check_stack_access_for_ptr_arithmetic() 19019 prog->aux->stack_depth = MAX_BPF_STACK; in do_misc_fixups()
|
Completed in 81 milliseconds