Home
last modified time | relevance | path

Searched refs:STACK_SPILL (Results 1 – 3 of 3) sorted by relevance

/linux/kernel/bpf/
A Dlog.c535 [STACK_SPILL] = 'r',
797 case STACK_SPILL: in print_verifier_state()
800 if (state->stack[i].slot_type[j] == STACK_SPILL) in print_verifier_state()
A Dverifier.c1147 case STACK_SPILL: in is_stack_slot_special()
1166 return stack->slot_type[BPF_REG_SIZE - 1] == STACK_SPILL; in is_spilled_reg()
1171 return stack->slot_type[BPF_REG_SIZE - 1] == STACK_SPILL && in is_spilled_scalar_reg()
1177 return stack->slot_type[0] == STACK_SPILL && in is_spilled_scalar_reg64()
4568 state->stack[spi].slot_type[i - 1] = STACK_SPILL; in save_register_state()
4824 if (writing_zero && *stype == STACK_SPILL && in check_stack_write_var_off()
4937 for (i = BPF_REG_SIZE - 1; i > 0 && stype[i - 1] == STACK_SPILL; i--) in check_stack_read_fixed_off()
4971 if (type == STACK_SPILL) { in check_stack_read_fixed_off()
12514 u32 clear_mask = (1 << STACK_SPILL) | (1 << STACK_ITER); in check_kfunc_call()
17456 case STACK_SPILL: in stacksafe()
/linux/include/linux/
A Dbpf_verifier.h244 STACK_SPILL, /* register spilled into stack */ enumerator
506 bpf_for_each_reg_in_vstate_mask(__vst, __state, __reg, 1 << STACK_SPILL, __expr)

Completed in 43 milliseconds