Home
last modified time | relevance | path

Searched refs:PTR_TO_STACK (Results 1 – 5 of 5) sorted by relevance

/linux/drivers/net/ethernet/netronome/nfp/bpf/
A Dverifier.c130 if (reg->type != PTR_TO_STACK) { in nfp_bpf_stack_arg_ok()
236 NFP_BPF_STACK != PTR_TO_STACK || in nfp_bpf_check_helper_call()
264 reg1->type != PTR_TO_STACK && in nfp_bpf_check_helper_call()
272 if (reg1->type == PTR_TO_STACK && in nfp_bpf_check_helper_call()
458 reg->type != PTR_TO_STACK && in nfp_bpf_check_ptr()
465 if (reg->type == PTR_TO_STACK) { in nfp_bpf_check_ptr()
A Djit.c2876 if (meta->ptr.type == PTR_TO_STACK) in mem_ldx()
2987 if (meta->ptr.type == PTR_TO_STACK) in mem_stx()
/linux/kernel/bpf/
A Dverifier.c550 [PTR_TO_STACK] = "fp",
2712 case PTR_TO_STACK: in is_spillable_regtype()
3767 case PTR_TO_STACK: in check_ptr_alignment()
4794 case PTR_TO_STACK: in check_helper_mem_access()
4807 reg_type_str[PTR_TO_STACK]); in check_helper_mem_access()
5035 PTR_TO_STACK,
5067 PTR_TO_STACK,
5080 PTR_TO_STACK,
6157 if (r0->type == PTR_TO_STACK) { in prepare_func_exit()
6869 case PTR_TO_STACK: in retrieve_ptr_limit()
[all …]
/linux/Documentation/networking/
A Dfilter.rst1153 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.
1176 If R6=PTR_TO_STACK, then access should be aligned and be within
1190 Though R10 is correct read-only register and has type PTR_TO_STACK
1238 PTR_TO_STACK
/linux/include/linux/
A Dbpf.h425 PTR_TO_STACK, /* reg == frame_pointer + offset */ enumerator

Completed in 41 milliseconds