Searched refs:BPF_MAXINSNS (Results 1 – 18 of 18) sorted by relevance
| /Linux-v5.4/include/uapi/linux/ |
| D | bpf_common.h | 53 #ifndef BPF_MAXINSNS 54 #define BPF_MAXINSNS 4096 macro
|
| /Linux-v5.4/tools/include/uapi/linux/ |
| D | bpf_common.h | 53 #ifndef BPF_MAXINSNS 54 #define BPF_MAXINSNS 4096 macro
|
| /Linux-v5.4/tools/bpf/ |
| D | bpf_exp.y | 468 static struct sock_filter out[BPF_MAXINSNS]; 473 if (curr_instr >= BPF_MAXINSNS) { in bpf_assert_max() 474 fprintf(stderr, "only max %u insns allowed!\n", BPF_MAXINSNS); in bpf_assert_max() 603 labels = calloc(BPF_MAXINSNS, sizeof(*labels)); in bpf_init() 605 labels_jt = calloc(BPF_MAXINSNS, sizeof(*labels_jt)); in bpf_init() 607 labels_jf = calloc(BPF_MAXINSNS, sizeof(*labels_jf)); in bpf_init() 609 labels_k = calloc(BPF_MAXINSNS, sizeof(*labels_k)); in bpf_init()
|
| D | bpf_dbg.c | 131 static struct sock_filter bpf_image[BPF_MAXINSNS + 1]; 135 static struct bpf_regs bpf_regs[BPF_MAXINSNS + 1]; 1014 sp != separator || bpf_len > BPF_MAXINSNS || bpf_len == 0) { in cmd_load_bpf()
|
| /Linux-v5.4/tools/testing/selftests/bpf/ |
| D | test_tag.c | 25 static struct bpf_insn prog[BPF_MAXINSNS]; 170 for (i = start_insns; i <= BPF_MAXINSNS; i++) { in do_test()
|
| D | test_verifier.c | 50 #define MAX_INSNS BPF_MAXINSNS
|
| /Linux-v5.4/tools/perf/util/ |
| D | bpf-prologue.c | 372 if (cnt_space > BPF_MAXINSNS) in bpf__gen_prologue() 373 cnt_space = BPF_MAXINSNS; in bpf__gen_prologue()
|
| D | bpf-loader.c | 453 BPF_MAXINSNS - orig_insns_cnt); in preproc_gen_prologue() 611 priv->insns_buf = malloc(sizeof(struct bpf_insn) * BPF_MAXINSNS); in hook_load_preprocessor()
|
| /Linux-v5.4/samples/seccomp/ |
| D | bpf-helper.c | 24 if (count < 1 || count > BPF_MAXINSNS) in bpf_resolve_jumps()
|
| /Linux-v5.4/net/sched/ |
| D | act_bpf.c | 180 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 192 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in tcf_bpf_init_from_ops()
|
| D | cls_bpf.c | 62 .len = sizeof(struct sock_filter) * BPF_MAXINSNS }, 347 if (bpf_num_ops > BPF_MAXINSNS || bpf_num_ops == 0) in cls_bpf_prog_from_ops()
|
| /Linux-v5.4/lib/ |
| D | test_bpf.c | 89 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns1() 109 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns2() 128 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns3() 155 unsigned int len = BPF_MAXINSNS + 1; in bpf_fill_maxinsns4() 174 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns5() 197 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns6() 219 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns7() 245 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns8() 268 unsigned int len = BPF_MAXINSNS; in bpf_fill_maxinsns9() 294 unsigned int len = BPF_MAXINSNS, hlen = len - 2; in bpf_fill_maxinsns10() [all …]
|
| /Linux-v5.4/Documentation/bpf/ |
| D | bpf_design_QA.rst | 92 A: The only limit known to the user space is BPF_MAXINSNS (4096).
|
| /Linux-v5.4/kernel/ |
| D | seccomp.c | 436 if (fprog->len == 0 || fprog->len > BPF_MAXINSNS) in seccomp_prepare_filter()
|
| /Linux-v5.4/tools/testing/selftests/seccomp/ |
| D | seccomp_bpf.c | 312 int count = BPF_MAXINSNS + 1; in TEST() 349 int count = BPF_MAXINSNS; in TEST()
|
| /Linux-v5.4/tools/lib/bpf/ |
| D | libbpf.c | 3422 } else if (load_attr.insns_cnt >= BPF_MAXINSNS) { in load_program() 3424 load_attr.insns_cnt, BPF_MAXINSNS); in load_program()
|
| /Linux-v5.4/kernel/bpf/ |
| D | syscall.c | 1662 attr->insn_cnt > (capable(CAP_SYS_ADMIN) ? BPF_COMPLEXITY_LIMIT_INSNS : BPF_MAXINSNS)) in bpf_prog_load()
|
| /Linux-v5.4/net/core/ |
| D | filter.c | 549 if (len <= 0 || len > BPF_MAXINSNS) in bpf_convert_filter() 1012 if (flen == 0 || flen > BPF_MAXINSNS) in bpf_check_basics_ok()
|