Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp1985353rwe; Fri, 2 Sep 2022 07:01:36 -0700 (PDT) X-Google-Smtp-Source: AA6agR5aI1dKnT2lL+0Srt4Bb20z/SSsRa5s79XZl7uxqIAyk7bWLnF2bHLRd7FUv0rOpIJ41+iz X-Received: by 2002:a05:6402:f21:b0:446:19c5:59ea with SMTP id i33-20020a0564020f2100b0044619c559eamr33559158eda.371.1662127295920; Fri, 02 Sep 2022 07:01:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662127295; cv=none; d=google.com; s=arc-20160816; b=dD5boBZGXUgR8BiHx4vhaBug/0yz6/u/IqXdnzb7e2jwrsp+3dmTlOhNEzMuV2gHVe qGmw9l6HjSwN1JY/WXHwAfCXLnXzc2zCAOj6sSd4mZbWi4rGmHy3hA98bgYClD4r1CGZ 8CJHLK8S1V+5i+6UAv2fLyT3CZicvsIOhlaBV5Ib2hB50Gc3MjLZUAfHvq8iC/fiY7Xg rdFiF5RdyoR2sFM+xvv4BSVhmdwa+OnTcz1ONiahnV8MFQO9j2HiVQs40c6TGOaFhFoc trT5uO979tT6Wbsq67dlPwC0+cmeRdfkYErDsuycZY/fhEC96+5HozzH8uuJKlRrcY5/ /Jzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=VUKUUQjEeN9deUgONQ69Pygk6MyShH73lTMPk6bWnlU=; b=omGpODcSUr6z3twWIB4WqLIJrrXCsQ/jdYzcElAOEUBAomFQP1M/8NiOhMN5kvAaEy co0v0YgJyKNlrPWb1qYLTpNVnc2QUzUOQXj+TWBP30uHgC8GuR2S98fCwzVF8jdTJSe7 yYpLsDrItG6Tyv393fm47lXQ/K9rfrpza/EeGweBTzd//LsE/eWL2iHRhiqc5BbmUF2+ KcN7ZP7AW8WqmFAXUgGNTpOsCWz57B0NhKSjS8sGR/aJCA0u+vx4DEE7HPEgw7X3kWbn s1cGLxWK9mAYgd9FkMm8Etx6Zj8HuCR4SzzeteZ/+6Jsk2zHD+faEKDHEHc4701lwmO6 Pslw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=L2d8qxKv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nc6-20020a1709071c0600b0073d95653bccsi2061094ejc.641.2022.09.02.07.01.06; Fri, 02 Sep 2022 07:01:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=L2d8qxKv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238591AbiIBN6P (ORCPT + 99 others); Fri, 2 Sep 2022 09:58:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238434AbiIBN5J (ORCPT ); Fri, 2 Sep 2022 09:57:09 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D56B14DB14 for ; Fri, 2 Sep 2022 06:30:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1662125406; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=VUKUUQjEeN9deUgONQ69Pygk6MyShH73lTMPk6bWnlU=; b=L2d8qxKvXG9yyx+axtnvS0H11avpCImpGEAHy0vdnDXEpljdbL91P72l6rV6rFlIt/R130 xIQhFFfuIW0J1/wRPnzucZzdu06zQvALMpvamtxNBrhx7ZXQkUR8NgVYFS3DI7k+710vKN AZAjONoAzHOSe1FVNcnPeHyi4so7RnU= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-483-Zxgn3Cl-NRmBb9C41GflPQ-1; Fri, 02 Sep 2022 09:30:05 -0400 X-MC-Unique: Zxgn3Cl-NRmBb9C41GflPQ-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 0D5C22919EC0; Fri, 2 Sep 2022 13:30:04 +0000 (UTC) Received: from plouf.redhat.com (unknown [10.39.193.218]) by smtp.corp.redhat.com (Postfix) with ESMTP id E9E64492C3B; Fri, 2 Sep 2022 13:29:59 +0000 (UTC) From: Benjamin Tissoires To: Greg KH , Jiri Kosina , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , Kumar Kartikeya Dwivedi , John Fastabend , KP Singh , Shuah Khan , Dave Marchevsky , Joe Stringer , Jonathan Corbet Cc: Tero Kristo , linux-kernel@vger.kernel.org, linux-input@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-doc@vger.kernel.org, Benjamin Tissoires Subject: [PATCH bpf-next v10 05/23] bpf/btf: bump BTF_KFUNC_SET_MAX_CNT Date: Fri, 2 Sep 2022 15:29:20 +0200 Message-Id: <20220902132938.2409206-6-benjamin.tissoires@redhat.com> In-Reply-To: <20220902132938.2409206-1-benjamin.tissoires@redhat.com> References: <20220902132938.2409206-1-benjamin.tissoires@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.85 on 10.11.54.9 X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org net/bpf/test_run.c is already presenting 20 kfuncs. net/netfilter/nf_conntrack_bpf.c is also presenting an extra 10 kfuncs. Given that all the kfuncs are regrouped into one unique set, having only 2 space left prevent us to add more selftests. Bump it to 64 for now. Signed-off-by: Benjamin Tissoires --- new in v10 --- kernel/bpf/btf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index eca9ea78ee5f..8280c1a8dbce 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -208,7 +208,7 @@ enum btf_kfunc_hook { }; enum { - BTF_KFUNC_SET_MAX_CNT = 32, + BTF_KFUNC_SET_MAX_CNT = 64, BTF_DTOR_KFUNC_MAX_CNT = 256, }; -- 2.36.1