Searched refs:MAX_BPF_STACK (Results 1 – 8 of 8) sorted by relevance
/Linux-v4.19/arch/mips/net/ |
D | ebpf_jit.c | 290 BUILD_BUG_ON(MAX_BPF_STACK & 7); in gen_int_prologue() 291 locals_size = (ctx->flags & EBPF_SEEN_FP) ? MAX_BPF_STACK : 0; in gen_int_prologue() 783 emit_instr(ctx, daddiu, dst, MIPS_R_SP, MAX_BPF_STACK); in build_one_insn() 786 emit_instr(ctx, daddiu, MIPS_R_AT, MIPS_R_SP, MAX_BPF_STACK); in build_one_insn() 1288 mem_off = insn->off + MAX_BPF_STACK; in build_one_insn() 1319 mem_off = insn->off + MAX_BPF_STACK; in build_one_insn() 1354 mem_off = insn->off + MAX_BPF_STACK; in build_one_insn()
|
/Linux-v4.19/tools/include/linux/ |
D | filter.h | 28 #define MAX_BPF_STACK 512 macro
|
/Linux-v4.19/kernel/bpf/ |
D | hashtab.c | 280 if (attr->key_size > MAX_BPF_STACK) in htab_map_alloc_check() 287 MAX_BPF_STACK - sizeof(struct htab_elem)) in htab_map_alloc_check()
|
D | verifier.c | 1562 if (depth > MAX_BPF_STACK) { in check_max_stack_depth() 1750 if (off >= 0 || off < -MAX_BPF_STACK) { in check_mem_access() 1875 if (off >= 0 || off < -MAX_BPF_STACK || off + access_size > 0 || in check_stack_boundary() 4336 #define ID_MAP_SIZE (MAX_BPF_REG + MAX_BPF_STACK / BPF_REG_SIZE) 5753 env->prog->aux->stack_depth = MAX_BPF_STACK; in fixup_bpf_calls()
|
D | sockmap.c | 2186 if (attr->key_size > MAX_BPF_STACK) in sock_hash_alloc()
|
/Linux-v4.19/include/linux/ |
D | filter.h | 78 #define MAX_BPF_STACK 512 macro
|
/Linux-v4.19/net/core/ |
D | filter.c | 544 BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MAX_BPF_STACK); in bpf_convert_filter() 1623 __be32 diff[MAX_BPF_STACK / sizeof(__be32)]; 1624 u8 buff[MAX_BPF_STACK];
|
/Linux-v4.19/Documentation/networking/ |
D | filter.txt | 1072 stack bounds, which are [-MAX_BPF_STACK, 0). In this example offset is 8,
|