Searched refs:PTR_TO_STACK (Results 1 – 5 of 5) sorted by relevance
118 if (reg->type != PTR_TO_STACK) { in nfp_bpf_stack_arg_ok()222 NFP_BPF_STACK != PTR_TO_STACK || in nfp_bpf_check_call()250 reg1->type != PTR_TO_STACK && in nfp_bpf_check_call()258 if (reg1->type == PTR_TO_STACK && in nfp_bpf_check_call()434 reg->type != PTR_TO_STACK && in nfp_bpf_check_ptr()441 if (reg->type == PTR_TO_STACK) { in nfp_bpf_check_ptr()
2723 if (meta->ptr.type == PTR_TO_STACK) in mem_ldx()2834 if (meta->ptr.type == PTR_TO_STACK) in mem_stx()
260 [PTR_TO_STACK] = "fp",302 if ((t == SCALAR_VALUE || t == PTR_TO_STACK) && in print_verifier_state()306 if (t == PTR_TO_STACK) in print_verifier_state()738 regs[BPF_REG_FP].type = PTR_TO_STACK; in init_reg_state()991 case PTR_TO_STACK: in is_spillable_regtype()1044 if (state != cur && type == PTR_TO_STACK) { in check_stack_write()1514 case PTR_TO_STACK: in check_ptr_alignment()1736 } else if (reg->type == PTR_TO_STACK) { in check_mem_access()1853 if (reg->type != PTR_TO_STACK) { in check_stack_boundary()1861 reg_type_str[PTR_TO_STACK]); in check_stack_boundary()[all …]
211 PTR_TO_STACK, /* reg == frame_pointer + offset */ enumerator
1052 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.1071 If R6=PTR_TO_STACK, then access should be aligned and be within1082 Though R10 is correct read-only register and has type PTR_TO_STACK1125 PTR_TO_STACK Frame pointer.