Searched refs:BPF_MAXINSNS (Results 1 – 17 of 17) sorted by relevance
/Linux-v4.19/tools/include/uapi/linux/ |
D | bpf_common.h | 53 #ifndef BPF_MAXINSNS 54 #define BPF_MAXINSNS 4096 macro
|
/Linux-v4.19/include/uapi/linux/ |
D | bpf_common.h | 53 #ifndef BPF_MAXINSNS 54 #define BPF_MAXINSNS 4096 macro
|
/Linux-v4.19/tools/bpf/ |
D | bpf_exp.y | 468 static struct sock_filter out[BPF_MAXINSNS]; 473 if (curr_instr >= BPF_MAXINSNS) { in bpf_assert_max() 474 fprintf(stderr, "only max %u insns allowed!\n", BPF_MAXINSNS); in bpf_assert_max() 603 labels = calloc(BPF_MAXINSNS, sizeof(*labels)); in bpf_init() 605 labels_jt = calloc(BPF_MAXINSNS, sizeof(*labels_jt)); in bpf_init() 607 labels_jf = calloc(BPF_MAXINSNS, sizeof(*labels_jf)); in bpf_init() 609 labels_k = calloc(BPF_MAXINSNS, sizeof(*labels_k)); in bpf_init()
|
D | bpf_dbg.c | 131 static struct sock_filter bpf_image[BPF_MAXINSNS + 1]; 135 static struct bpf_regs bpf_regs[BPF_MAXINSNS + 1]; 1014 sp != separator || bpf_len > BPF_MAXINSNS || bpf_len == 0) { in cmd_load_bpf()
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_tag.c | 25 static struct bpf_insn prog[BPF_MAXINSNS]; 170 for (i = start_insns; i <= BPF_MAXINSNS; i++) { in do_test()
|
D | test_verifier.c | 48 #define MAX_INSNS BPF_MAXINSNS 104 unsigned int len = BPF_MAXINSNS; in bpf_fill_ld_abs_vlan_push_pop() 144 unsigned int len = BPF_MAXINSNS; in bpf_fill_jump_around_ld_abs()
|
/Linux-v4.19/tools/perf/util/ |
D | bpf-prologue.c | 372 if (cnt_space > BPF_MAXINSNS) in bpf__gen_prologue() 373 cnt_space = BPF_MAXINSNS; in bpf__gen_prologue()
|
D | bpf-loader.c | 462 BPF_MAXINSNS - orig_insns_cnt); in preproc_gen_prologue() 620 priv->insns_buf = malloc(sizeof(struct bpf_insn) * BPF_MAXINSNS); in hook_load_preprocessor()
|
/Linux-v4.19/samples/seccomp/ |
D | bpf-helper.c | 24 if (count < 1 || count > BPF_MAXINSNS) in bpf_resolve_jumps()
|
/Linux-v4.19/net/sched/ |
D | act_bpf.c | 183 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 195 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in tcf_bpf_init_from_ops()
|
D | cls_bpf.c | 65 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 345 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in cls_bpf_prog_from_ops()
|
/Linux-v4.19/lib/ |
D | test_bpf.c | 96 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns1() 116 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns2() 135 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns3() 162 unsigned int len = BPF_MAXINSNS + 1; in bpf_fill_maxinsns4() 181 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns5() 204 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns6() 226 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns7() 252 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns8() 275 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns9() 301 unsigned int len = BPF_MAXINSNS, hlen = len - 2; in bpf_fill_maxinsns10() [all …]
|
/Linux-v4.19/kernel/ |
D | seccomp.c | 374 if (fprog->len == 0 || fprog->len > BPF_MAXINSNS) in seccomp_prepare_filter()
|
/Linux-v4.19/tools/lib/bpf/ |
D | libbpf.c | 1350 } else if (load_attr.insns_cnt >= BPF_MAXINSNS) { in load_program() 1352 load_attr.insns_cnt, BPF_MAXINSNS); in load_program()
|
/Linux-v4.19/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 262 int count = BPF_MAXINSNS + 1; in TEST() 299 int count = BPF_MAXINSNS; in TEST()
|
/Linux-v4.19/kernel/bpf/ |
D | syscall.c | 1356 if (attr->insn_cnt == 0 || attr->insn_cnt > BPF_MAXINSNS) in bpf_prog_load()
|
/Linux-v4.19/net/core/ |
D | filter.c | 547 if (len <= 0 || len > BPF_MAXINSNS) in bpf_convert_filter() 1010 if (flen == 0 || flen > BPF_MAXINSNS) in bpf_check_basics_ok()
|