/external/strace/tests-mx32/ |
D | seccomp-filter-v.c | 102 tail_alloc(sizeof(*big_filter) * (BPF_MAXINSNS + 1)); in main() 130 for (i = 0; i <= BPF_MAXINSNS; ++i) { in main() 137 prog->len = BPF_MAXINSNS + 1; in main() 142 for (i = 0; i < BPF_MAXINSNS; ++i) { in main()
|
D | sock_filter-v.c | 156 *len = BPF_MAXINSNS; in main() 163 BPF_MAXINSNS); in main()
|
/external/strace/tests/ |
D | seccomp-filter-v.c | 102 tail_alloc(sizeof(*big_filter) * (BPF_MAXINSNS + 1)); in main() 130 for (i = 0; i <= BPF_MAXINSNS; ++i) { in main() 137 prog->len = BPF_MAXINSNS + 1; in main() 142 for (i = 0; i < BPF_MAXINSNS; ++i) { in main()
|
D | sock_filter-v.c | 156 *len = BPF_MAXINSNS; in main() 163 BPF_MAXINSNS); in main()
|
/external/strace/tests-m32/ |
D | seccomp-filter-v.c | 102 tail_alloc(sizeof(*big_filter) * (BPF_MAXINSNS + 1)); in main() 130 for (i = 0; i <= BPF_MAXINSNS; ++i) { in main() 137 prog->len = BPF_MAXINSNS + 1; in main() 142 for (i = 0; i < BPF_MAXINSNS; ++i) { in main()
|
D | sock_filter-v.c | 156 *len = BPF_MAXINSNS; in main() 163 BPF_MAXINSNS); in main()
|
/external/kernel-headers/original/uapi/linux/ |
D | bpf_common.h | 53 #ifndef BPF_MAXINSNS 54 #define BPF_MAXINSNS 4096 macro
|
/external/bcc/src/cc/compat/linux/ |
D | bpf_common.h | 51 #ifndef BPF_MAXINSNS 52 #define BPF_MAXINSNS 4096 macro
|
/external/iproute2/include/uapi/linux/ |
D | bpf_common.h | 52 #ifndef BPF_MAXINSNS 53 #define BPF_MAXINSNS 4096 macro
|
/external/iptables/include/linux/ |
D | filter.h | 94 #ifndef BPF_MAXINSNS 95 #define BPF_MAXINSNS 4096 macro
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_tag.c | 25 static struct bpf_insn prog[BPF_MAXINSNS]; 170 for (i = start_insns; i <= BPF_MAXINSNS; i++) { in do_test()
|
/external/strace/ |
D | bpf_filter.c | 162 if (fbd->count++ >= BPF_MAXINSNS) { in print_bpf_filter_block()
|
D | bpf.c | 143 if (eid->count++ >= BPF_MAXINSNS) { in print_ebpf_insn()
|
/external/iproute2/lib/ |
D | bpf.c | 228 tmp_len = sizeof("4096,") + BPF_MAXINSNS * op_len; in bpf_parse_string() 300 if (bpf_len == 0 || bpf_len > BPF_MAXINSNS) { in bpf_ops_parse() 927 struct sock_filter opcodes[BPF_MAXINSNS]; in bpf_parse_opt_tbl() 1463 insns, insns > BPF_MAXINSNS ? insns - BPF_MAXINSNS : 0); in bpf_prog_report()
|
/external/minijail/ |
D | bpf.c | 300 if (len > BPF_MAXINSNS) in bpf_resolve_jumps()
|
D | syscall_filter.c | 755 if (final_filter_len > BPF_MAXINSNS) { in compile_filter()
|
/external/bcc/src/cc/ |
D | libbpf.c | 493 if (attr.insn_cnt > BPF_MAXINSNS) { in bpf_prog_load() 497 strerror(errno), name, attr.insn_cnt, BPF_MAXINSNS); in bpf_prog_load()
|
/external/minijail/tools/ |
D | bpf.py | 63 BPF_MAXINSNS = 4096 variable
|
/external/syzkaller/vendor/golang.org/x/sys/unix/ |
D | zerrors_solaris_amd64.go | 141 BPF_MAXINSNS = 0x200 const
|
D | zerrors_dragonfly_amd64.go | 121 BPF_MAXINSNS = 0x200 const
|
D | zerrors_openbsd_arm.go | 126 BPF_MAXINSNS = 0x200 const
|
D | zerrors_openbsd_amd64.go | 127 BPF_MAXINSNS = 0x200 const
|
D | zerrors_openbsd_386.go | 126 BPF_MAXINSNS = 0x200 const
|
D | zerrors_darwin_386.go | 201 BPF_MAXINSNS = 0x200 const
|
/external/seccomp-tests/linux/ |
D | seccomp_bpf.c | 187 int count = BPF_MAXINSNS + 1; in TEST() 224 int count = BPF_MAXINSNS; in TEST()
|