Searched refs:PTR_TO_STACK (Results 1 – 5 of 5) sorted by relevance
130 if (reg->type != PTR_TO_STACK) { in nfp_bpf_stack_arg_ok()236 NFP_BPF_STACK != PTR_TO_STACK || in nfp_bpf_check_helper_call()264 reg1->type != PTR_TO_STACK && in nfp_bpf_check_helper_call()272 if (reg1->type == PTR_TO_STACK && in nfp_bpf_check_helper_call()458 reg->type != PTR_TO_STACK && in nfp_bpf_check_ptr()465 if (reg->type == PTR_TO_STACK) { in nfp_bpf_check_ptr()
2876 if (meta->ptr.type == PTR_TO_STACK) in mem_ldx()2987 if (meta->ptr.type == PTR_TO_STACK) in mem_stx()
48 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.71 If R6=PTR_TO_STACK, then access should be aligned and be within85 Though R10 is correct read-only register and has type PTR_TO_STACK134 PTR_TO_STACK
590 [PTR_TO_STACK] = "fp", in reg_type_str()3391 case PTR_TO_STACK: in is_spillable_regtype()4684 case PTR_TO_STACK: in check_ptr_alignment()5857 case PTR_TO_STACK: in check_helper_mem_access()6392 PTR_TO_STACK,6405 PTR_TO_STACK,6445 PTR_TO_STACK,6635 case PTR_TO_STACK: in check_func_arg_reg_off()10158 case PTR_TO_STACK: in retrieve_ptr_limit()10443 case PTR_TO_STACK: in sanitize_check_bounds()[all …]
782 PTR_TO_STACK, /* reg == frame_pointer + offset */ enumerator
Completed in 49 milliseconds