Searched refs:frameno (Results 1 - 4 of 4) sorted by relevance
/linux-master/kernel/bpf/ |
H A D | log.c | 700 if (state->frameno != reg->frameno) 701 verbose(env, "[%d]", reg->frameno); 761 if (state->frameno) 762 verbose(env, " frame%d:", state->frameno);
|
H A D | verifier.c | 337 u8 frameno; member in struct:bpf_kfunc_call_arg_meta::__anon267 586 return cur->frame[reg->frameno]; 1338 state->refs[new_ofs].callback_ref = state->in_callback_fn ? state->frameno : 0; 1352 if (state->in_callback_fn && state->refs[i].callback_ref != state->frameno) 2300 reg->frameno = 0; 2381 regs[BPF_REG_FP].frameno = state->frameno; 2392 int callsite, int frameno, int subprogno) 2395 state->frameno = frameno; 2390 init_func_state(struct bpf_verifier_env *env, struct bpf_func_state *state, int callsite, int frameno, int subprogno) argument 3298 insn_stack_access_flags(int frameno, int spi) argument [all...] |
/linux-master/include/linux/ |
H A D | bpf_verifier.h | 215 * while another to the caller's stack. To differentiate them 'frameno' 219 u32 frameno; member in struct:bpf_reg_state 272 * frameno and compare that to callback_ref in check_reference_leak when 294 u32 frameno; member in struct:bpf_func_state
|
/linux-master/drivers/net/ethernet/netronome/nfp/bpf/ |
H A D | verifier.c | 92 state = env->cur_state->frame[reg3->frameno]; 350 if (reg->frameno != env->cur_state->curframe)
|
Completed in 132 milliseconds