Searched refs:BPF_MAXINSNS (Results 1 – 12 of 12) sorted by relevance
/linux-4.4.14/include/uapi/linux/ |
D | bpf_common.h | 51 #ifndef BPF_MAXINSNS 52 #define BPF_MAXINSNS 4096 macro
|
/linux-4.4.14/tools/net/ |
D | bpf_exp.y | 593 static struct sock_filter out[BPF_MAXINSNS]; 598 if (curr_instr >= BPF_MAXINSNS) { in bpf_assert_max() 599 fprintf(stderr, "only max %u insns allowed!\n", BPF_MAXINSNS); in bpf_assert_max() 728 labels = calloc(BPF_MAXINSNS, sizeof(*labels)); in bpf_init() 730 labels_jt = calloc(BPF_MAXINSNS, sizeof(*labels_jt)); in bpf_init() 732 labels_jf = calloc(BPF_MAXINSNS, sizeof(*labels_jf)); in bpf_init() 734 labels_k = calloc(BPF_MAXINSNS, sizeof(*labels_k)); in bpf_init()
|
D | bpf_dbg.c | 131 static struct sock_filter bpf_image[BPF_MAXINSNS + 1]; 135 static struct bpf_regs bpf_regs[BPF_MAXINSNS + 1]; 1014 sp != separator || bpf_len > BPF_MAXINSNS || bpf_len == 0) { in cmd_load_bpf()
|
/linux-4.4.14/net/sched/ |
D | act_bpf.c | 173 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 185 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in tcf_bpf_init_from_ops()
|
D | cls_bpf.c | 61 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 235 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in cls_bpf_prog_from_ops()
|
/linux-4.4.14/lib/ |
D | test_bpf.c | 93 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns1() 113 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns2() 132 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns3() 159 unsigned int len = BPF_MAXINSNS + 1; in bpf_fill_maxinsns4() 178 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns5() 201 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns6() 223 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns7() 249 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns8() 272 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns9() 298 unsigned int len = BPF_MAXINSNS, hlen = len - 2; in bpf_fill_maxinsns10() [all …]
|
/linux-4.4.14/tools/lib/bpf/ |
D | libbpf.c | 844 if (insns_cnt >= BPF_MAXINSNS) { in load_program() 846 insns_cnt, BPF_MAXINSNS); in load_program()
|
/linux-4.4.14/kernel/ |
D | seccomp.c | 352 if (fprog->len == 0 || fprog->len > BPF_MAXINSNS) in seccomp_prepare_filter()
|
/linux-4.4.14/kernel/bpf/ |
D | syscall.c | 641 if (attr->insn_cnt >= BPF_MAXINSNS) in bpf_prog_load()
|
D | verifier.c | 2203 if ((*prog)->len <= 0 || (*prog)->len > BPF_MAXINSNS) in bpf_check()
|
/linux-4.4.14/net/core/ |
D | filter.c | 370 if (len <= 0 || len > BPF_MAXINSNS) in bpf_convert_filter() 761 if (flen == 0 || flen > BPF_MAXINSNS) in bpf_check_classic()
|
/linux-4.4.14/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 187 int count = BPF_MAXINSNS + 1; in TEST() 224 int count = BPF_MAXINSNS; in TEST()
|