Home
last modified time | relevance | path

Searched refs:BPF_MAXINSNS (Results 1 – 9 of 9) sorted by relevance

/linux-4.1.27/include/uapi/linux/
Dbpf_common.h51 #ifndef BPF_MAXINSNS
52 #define BPF_MAXINSNS 4096 macro
/linux-4.1.27/tools/net/
Dbpf_exp.y593 static struct sock_filter out[BPF_MAXINSNS];
598 if (curr_instr >= BPF_MAXINSNS) { in bpf_assert_max()
599 fprintf(stderr, "only max %u insns allowed!\n", BPF_MAXINSNS); in bpf_assert_max()
728 labels = calloc(BPF_MAXINSNS, sizeof(*labels)); in bpf_init()
730 labels_jt = calloc(BPF_MAXINSNS, sizeof(*labels_jt)); in bpf_init()
732 labels_jf = calloc(BPF_MAXINSNS, sizeof(*labels_jf)); in bpf_init()
734 labels_k = calloc(BPF_MAXINSNS, sizeof(*labels_k)); in bpf_init()
Dbpf_dbg.c131 static struct sock_filter bpf_image[BPF_MAXINSNS + 1];
135 static struct bpf_regs bpf_regs[BPF_MAXINSNS + 1];
1014 sp != separator || bpf_len > BPF_MAXINSNS || bpf_len == 0) { in cmd_load_bpf()
/linux-4.1.27/net/sched/
Dact_bpf.c167 .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
179 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in tcf_bpf_init_from_ops()
Dcls_bpf.c59 .len = sizeof(struct sock_filter) * BPF_MAXINSNS },
194 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in cls_bpf_prog_from_ops()
/linux-4.1.27/kernel/bpf/
Dsyscall.c496 if (attr->insn_cnt >= BPF_MAXINSNS) in bpf_prog_load()
Dverifier.c2046 if ((*prog)->len <= 0 || (*prog)->len > BPF_MAXINSNS) in bpf_check()
/linux-4.1.27/net/core/
Dfilter.c370 if (len <= 0 || len > BPF_MAXINSNS) in bpf_convert_filter()
759 if (flen == 0 || flen > BPF_MAXINSNS) in bpf_check_classic()
/linux-4.1.27/kernel/
Dseccomp.c355 if (fprog->len == 0 || fprog->len > BPF_MAXINSNS) in seccomp_prepare_filter()