/Linux-v5.10/arch/s390/net/ |
D | bpf_jit_comp.c | 416 static void restore_regs(struct bpf_jit *jit, u32 rs, u32 re, u32 stack_depth) in restore_regs() argument 421 off += STK_OFF + stack_depth; in restore_regs() 465 static void save_restore_regs(struct bpf_jit *jit, int op, u32 stack_depth) in save_restore_regs() argument 487 restore_regs(jit, rs, re, stack_depth); in save_restore_regs() 516 static void bpf_jit_prologue(struct bpf_jit *jit, u32 stack_depth) in bpf_jit_prologue() argument 531 save_restore_regs(jit, REGS_SAVE, stack_depth); in bpf_jit_prologue() 553 EMIT4_IMM(0xa70b0000, REG_15, -(STK_OFF + stack_depth)); in bpf_jit_prologue() 564 static void bpf_jit_epilogue(struct bpf_jit *jit, u32 stack_depth) in bpf_jit_epilogue() argument 570 save_restore_regs(jit, REGS_RESTORE, stack_depth); in bpf_jit_epilogue() 695 int i, bool extra_pass, u32 stack_depth) in bpf_jit_insn() argument [all …]
|
/Linux-v5.10/arch/x86/net/ |
D | bpf_jit_comp.c | 264 static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, in emit_prologue() argument 284 if (stack_depth) in emit_prologue() 285 EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8)); in emit_prologue() 406 u32 stack_depth) in emit_bpf_tail_call_indirect() argument 408 int tcc_off = -4 - round_up(stack_depth, 8); in emit_bpf_tail_call_indirect() 425 if (stack_depth) { in emit_bpf_tail_call_indirect() 475 if (stack_depth) in emit_bpf_tail_call_indirect() 477 round_up(stack_depth, 8)); in emit_bpf_tail_call_indirect() 497 bool *callee_regs_used, u32 stack_depth) in emit_bpf_tail_call_direct() argument 499 int tcc_off = -4 - round_up(stack_depth, 8); in emit_bpf_tail_call_direct() [all …]
|
D | bpf_jit_comp32.c | 180 #define _STACK_SIZE (stack_depth + SCRATCH_SIZE) 1199 static void emit_prologue(u8 **pprog, u32 stack_depth) in emit_prologue() argument 1244 static void emit_epilogue(u8 **pprog, u32 stack_depth) in emit_epilogue() argument 1473 emit_prologue(&prog, bpf_prog->aux->stack_depth); in do_jit() 2259 emit_epilogue(&prog, bpf_prog->aux->stack_depth); in do_jit()
|
/Linux-v5.10/drivers/firewire/ |
D | core-topology.c | 176 int i, port_count, child_port_count, phy_id, parent_count, stack_depth; in build_tree() local 183 stack_depth = 0; in build_tree() 205 if (child_port_count > stack_depth) { in build_tree() 281 stack_depth += 1 - child_port_count; in build_tree()
|
/Linux-v5.10/drivers/net/ethernet/netronome/nfp/bpf/ |
D | verifier.c | 709 frame_depths[frame] = nfp_prog->subprog[idx].stack_depth; in nfp_bpf_get_stack_usage() 777 nfp_prog->subprog[i].stack_depth = info[i].stack_depth; in nfp_bpf_finalize() 783 nfp_prog->subprog[i].stack_depth += REG_WIDTH; in nfp_bpf_finalize() 786 nfp_prog->subprog[i].stack_depth += BPF_REG_SIZE * 4; in nfp_bpf_finalize()
|
D | main.h | 484 u16 stack_depth; member
|
D | jit.c | 3258 u32 ret_tgt, stack_depth, offset_br; in bpf_to_bpf_call() local 3261 stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN); in bpf_to_bpf_call() 3265 if (stack_depth) { in bpf_to_bpf_call() 3266 tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, in bpf_to_bpf_call() 3325 if (stack_depth) { in bpf_to_bpf_call() 3326 tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, in bpf_to_bpf_call() 3643 unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth; in nfp_start_subprog() 3831 depth = nfp_prog->subprog[0].stack_depth; in nfp_translate()
|
/Linux-v5.10/lib/ |
D | test_bpf.c | 82 int stack_depth; /* for eBPF only, since tests don't call verifier */ member 449 self->stack_depth = 40; in __bpf_fill_stxdw() 4131 .stack_depth = 40, 4144 .stack_depth = 40, 4158 .stack_depth = 40, 4171 .stack_depth = 40, 4184 .stack_depth = 40, 4198 .stack_depth = 40, 4211 .stack_depth = 40, 4224 .stack_depth = 40, [all …]
|
/Linux-v5.10/kernel/bpf/ |
D | core.c | 1712 void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth) in bpf_patch_call_args() argument 1714 stack_depth = max_t(u32, stack_depth, 1); in bpf_patch_call_args() 1716 insn->imm = interpreters_args[(round_up(stack_depth, 32) / 32) - 1] - in bpf_patch_call_args() 1780 u32 stack_depth = max_t(u32, fp->aux->stack_depth, 1); in bpf_prog_select_func() local 1782 fp->bpf_func = interpreters[(round_up(stack_depth, 32) / 32) - 1]; in bpf_prog_select_func()
|
D | verifier.c | 3004 u16 stack = env->subprog_info[func->subprogno].stack_depth; in update_stack_depth() 3010 env->subprog_info[func->subprogno].stack_depth = -off; in update_stack_depth() 3059 depth += round_up(max_t(u32, subprog[idx].stack_depth, 1), 32); in check_max_stack_depth() 3110 depth -= round_up(max_t(u32, subprog[idx].stack_depth, 1), 32); in check_max_stack_depth() 3129 return env->subprog_info[subprog].stack_depth; in get_callee_stack_depth() 10671 func[i]->aux->stack_depth = env->subprog_info[i].stack_depth; in jit_subprogs() 10988 prog->aux->stack_depth = MAX_BPF_STACK; in fixup_bpf_calls() 11378 env->prog->aux->stack_depth = env->subprog_info[0].stack_depth; in do_check_main() 11392 u32 depth = env->subprog_info[i].stack_depth; in print_verification_stats()
|
/Linux-v5.10/include/linux/ |
D | bpf_verifier.h | 368 u16 stack_depth; /* max. stack depth used by this function */ member
|
D | bpf.h | 763 u32 stack_depth; member 1374 void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth);
|
/Linux-v5.10/arch/sparc/net/ |
D | bpf_jit_comp_64.c | 803 u32 stack_depth; in build_prologue() local 805 stack_depth = prog->aux->stack_depth; in build_prologue() 806 stack_needed += round_up(stack_depth, 16); in build_prologue()
|
/Linux-v5.10/Documentation/bpf/ |
D | drgn.rst | 132 .stack_depth = (u32)8,
|
/Linux-v5.10/fs/overlayfs/ |
D | super.c | 861 struct ovl_fs *ofs, int *stack_depth) in ovl_lower_dir() argument 874 *stack_depth = max(*stack_depth, path->mnt->mnt_sb->s_stack_depth); in ovl_lower_dir()
|
/Linux-v5.10/security/ |
D | Kconfig.hardening | 177 the /proc file system. In particular, /proc/<pid>/stack_depth
|
/Linux-v5.10/arch/arm64/net/ |
D | bpf_jit_comp.c | 258 ctx->stack_size = STACK_ALIGN(prog->aux->stack_depth); in build_prologue()
|
/Linux-v5.10/arch/powerpc/net/ |
D | bpf_jit_comp64.c | 1137 cgctx.stack_size = round_up(fp->aux->stack_depth, 16); in bpf_int_jit_compile()
|
/Linux-v5.10/arch/riscv/net/ |
D | bpf_jit_comp64.c | 1061 bpf_stack_adjust = round_up(ctx->prog->aux->stack_depth, 16); in bpf_jit_build_prologue()
|
D | bpf_jit_comp32.c | 1296 round_up(ctx->prog->aux->stack_depth, STACK_ALIGN); in bpf_jit_build_prologue()
|
/Linux-v5.10/arch/arm/net/ |
D | bpf_jit_32.c | 349 #define _STACK_SIZE (ctx->prog->aux->stack_depth + SCRATCH_SIZE)
|
/Linux-v5.10/net/core/ |
D | filter.c | 820 if (new_prog && new_prog->aux->stack_depth < stack_off) in bpf_convert_filter() 821 new_prog->aux->stack_depth = stack_off; in bpf_convert_filter()
|