Home
last modified time | relevance | path

Searched refs:STACK_SPILL (Results 1 – 2 of 2) sorted by relevance

/Linux-v4.19/include/linux/
Dbpf_verifier.h93 STACK_SPILL, /* register spilled into stack */ enumerator
/Linux-v4.19/kernel/bpf/
Dverifier.c352 if (state->stack[i].slot_type[0] == STACK_SPILL) { in print_verifier_state()
1028 state->stack[spi].slot_type[0] == STACK_SPILL && in check_stack_write()
1078 state->stack[spi].slot_type[i] = STACK_SPILL; in check_stack_write()
1180 if (stype[0] == STACK_SPILL) { in check_stack_read()
1186 if (stype[(slot - i) % BPF_REG_SIZE] != STACK_SPILL) { in check_stack_read()
2309 if (state->stack[i].slot_type[0] != STACK_SPILL) in __clear_all_pkt_pointers()
3459 if (state->stack[i].slot_type[0] != STACK_SPILL) in find_good_pkt_pointers()
3716 if (state->stack[i].slot_type[0] != STACK_SPILL) in mark_map_regs()
4517 if (old->stack[spi].slot_type[0] != STACK_SPILL) in stacksafe()