Home
last modified time | relevance | path

Searched refs:PTR_TO_STACK (Results 1 – 6 of 6) sorted by relevance

/linux/drivers/net/ethernet/netronome/nfp/bpf/
H A Dverifier.c130 if (reg->type != PTR_TO_STACK) { in nfp_bpf_stack_arg_ok()
236 NFP_BPF_STACK != PTR_TO_STACK || in nfp_bpf_check_helper_call()
264 reg1->type != PTR_TO_STACK && in nfp_bpf_check_helper_call()
272 if (reg1->type == PTR_TO_STACK && in nfp_bpf_check_helper_call()
458 reg->type != PTR_TO_STACK && in nfp_bpf_check_ptr()
465 if (reg->type == PTR_TO_STACK) { in nfp_bpf_check_ptr()
H A Djit.c2876 if (meta->ptr.type == PTR_TO_STACK) in mem_ldx()
2987 if (meta->ptr.type == PTR_TO_STACK) in mem_stx()
/linux/Documentation/bpf/
H A Dverifier.rst48 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.
71 If R6=PTR_TO_STACK, then access should be aligned and be within
85 Though R10 is correct read-only register and has type PTR_TO_STACK
134 PTR_TO_STACK
/linux/kernel/bpf/
H A Dlog.c449 [PTR_TO_STACK] = "fp", in reg_type_str()
688 if (t == PTR_TO_STACK) { in print_reg_state()
H A Dverifier.c1027 st->type = PTR_TO_STACK; /* we don't have dedicated reg type */ in mark_stack_slots_iter()
1164 st->type = PTR_TO_STACK; /* we don't have dedicated reg type */ in mark_stack_slot_irq_flag()
2873 regs[BPF_REG_FP].type = PTR_TO_STACK; in init_reg_state()
4890 case PTR_TO_STACK: in is_spillable_regtype()
5112 if (state != cur && reg->type == PTR_TO_STACK) { in check_stack_write_fixed_off()
6423 case PTR_TO_STACK: in check_ptr_alignment()
7609 } else if (reg->type == PTR_TO_STACK) { in check_mem_access()
8140 case PTR_TO_STACK: in check_helper_mem_access()
8174 verbose(env, "expected=%s\n", reg_type_str(env, PTR_TO_STACK)); in check_helper_mem_access()
8619 if (reg->type != PTR_TO_STACK && reg->type != CONST_PTR_TO_DYNPTR) { in process_dynptr_func()
[all …]
/linux/include/linux/
H A Dbpf.h966 PTR_TO_STACK, /* reg == frame_pointer + offset */ enumerator