Home
last modified time | relevance | path

Searched refs:stack_depth (Results 1 – 20 of 20) sorted by relevance

/Linux-v5.4/arch/s390/net/
Dbpf_jit_comp.c335 static void restore_regs(struct bpf_jit *jit, u32 rs, u32 re, u32 stack_depth) in restore_regs() argument
340 off += STK_OFF + stack_depth; in restore_regs()
384 static void save_restore_regs(struct bpf_jit *jit, int op, u32 stack_depth) in save_restore_regs() argument
397 restore_regs(jit, rs, re, stack_depth); in save_restore_regs()
408 static void bpf_jit_prologue(struct bpf_jit *jit, u32 stack_depth) in bpf_jit_prologue() argument
421 save_restore_regs(jit, REGS_SAVE, stack_depth); in bpf_jit_prologue()
436 EMIT4_IMM(0xa70b0000, REG_15, -(STK_OFF + stack_depth)); in bpf_jit_prologue()
447 static void bpf_jit_epilogue(struct bpf_jit *jit, u32 stack_depth) in bpf_jit_epilogue() argument
459 save_restore_regs(jit, REGS_RESTORE, stack_depth); in bpf_jit_epilogue()
1067 off = STK_OFF_TCCNT + STK_OFF + fp->aux->stack_depth; in bpf_jit_insn()
[all …]
/Linux-v5.4/drivers/firewire/
Dcore-topology.c176 int i, port_count, child_port_count, phy_id, parent_count, stack_depth; in build_tree() local
183 stack_depth = 0; in build_tree()
205 if (child_port_count > stack_depth) { in build_tree()
281 stack_depth += 1 - child_port_count; in build_tree()
/Linux-v5.4/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c709 frame_depths[frame] = nfp_prog->subprog[idx].stack_depth; in nfp_bpf_get_stack_usage()
777 nfp_prog->subprog[i].stack_depth = info[i].stack_depth; in nfp_bpf_finalize()
783 nfp_prog->subprog[i].stack_depth += REG_WIDTH; in nfp_bpf_finalize()
786 nfp_prog->subprog[i].stack_depth += BPF_REG_SIZE * 4; in nfp_bpf_finalize()
Dmain.h484 u16 stack_depth; member
Djit.c3258 u32 ret_tgt, stack_depth, offset_br; in bpf_to_bpf_call() local
3261 stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN); in bpf_to_bpf_call()
3265 if (stack_depth) { in bpf_to_bpf_call()
3266 tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, in bpf_to_bpf_call()
3325 if (stack_depth) { in bpf_to_bpf_call()
3326 tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, in bpf_to_bpf_call()
3643 unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth; in nfp_start_subprog()
3831 depth = nfp_prog->subprog[0].stack_depth; in nfp_translate()
/Linux-v5.4/lib/
Dtest_bpf.c82 int stack_depth; /* for eBPF only, since tests don't call verifier */ member
449 self->stack_depth = 40; in __bpf_fill_stxdw()
4131 .stack_depth = 40,
4144 .stack_depth = 40,
4158 .stack_depth = 40,
4171 .stack_depth = 40,
4184 .stack_depth = 40,
4198 .stack_depth = 40,
4211 .stack_depth = 40,
4224 .stack_depth = 40,
[all …]
/Linux-v5.4/include/linux/
Dbpf_verifier.h344 u16 stack_depth; /* max. stack depth used by this function */ member
Dbpf.h374 u32 stack_depth; member
714 void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth);
/Linux-v5.4/kernel/bpf/
Dcore.c1628 void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth) in bpf_patch_call_args() argument
1630 stack_depth = max_t(u32, stack_depth, 1); in bpf_patch_call_args()
1632 insn->imm = interpreters_args[(round_up(stack_depth, 32) / 32) - 1] - in bpf_patch_call_args()
1692 u32 stack_depth = max_t(u32, fp->aux->stack_depth, 1); in bpf_prog_select_func() local
1694 fp->bpf_func = interpreters[(round_up(stack_depth, 32) / 32) - 1]; in bpf_prog_select_func()
Dverifier.c2580 u16 stack = env->subprog_info[func->subprogno].stack_depth; in update_stack_depth()
2586 env->subprog_info[func->subprogno].stack_depth = -off; in update_stack_depth()
2608 depth += round_up(max_t(u32, subprog[idx].stack_depth, 1), 32); in check_max_stack_depth()
2646 depth -= round_up(max_t(u32, subprog[idx].stack_depth, 1), 32); in check_max_stack_depth()
2665 return env->subprog_info[subprog].stack_depth; in get_callee_stack_depth()
7820 env->prog->aux->stack_depth = env->subprog_info[0].stack_depth; in do_check()
8735 func[i]->aux->stack_depth = env->subprog_info[i].stack_depth; in jit_subprogs()
9014 env->prog->aux->stack_depth = MAX_BPF_STACK; in fixup_bpf_calls()
9196 u32 depth = env->subprog_info[i].stack_depth; in print_verification_stats()
/Linux-v5.4/arch/x86/net/
Dbpf_jit_comp.c195 static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf) in emit_prologue() argument
203 EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8)); in emit_prologue()
391 emit_prologue(&prog, bpf_prog->aux->stack_depth, in do_jit()
Dbpf_jit_comp32.c180 #define _STACK_SIZE (stack_depth + SCRATCH_SIZE)
1199 static void emit_prologue(u8 **pprog, u32 stack_depth) in emit_prologue() argument
1244 static void emit_epilogue(u8 **pprog, u32 stack_depth) in emit_epilogue() argument
1473 emit_prologue(&prog, bpf_prog->aux->stack_depth); in do_jit()
2241 emit_epilogue(&prog, bpf_prog->aux->stack_depth); in do_jit()
/Linux-v5.4/arch/sparc/net/
Dbpf_jit_comp_64.c803 u32 stack_depth; in build_prologue() local
805 stack_depth = prog->aux->stack_depth; in build_prologue()
806 stack_needed += round_up(stack_depth, 16); in build_prologue()
/Linux-v5.4/fs/overlayfs/
Dsuper.c780 struct ovl_fs *ofs, int *stack_depth, bool *remote) in ovl_lower_dir() argument
793 *stack_depth = max(*stack_depth, path->mnt->mnt_sb->s_stack_depth); in ovl_lower_dir()
/Linux-v5.4/security/
DKconfig.hardening156 the /proc file system. In particular, /proc/<pid>/stack_depth
/Linux-v5.4/arch/arm64/net/
Dbpf_jit_comp.c235 ctx->stack_size = STACK_ALIGN(prog->aux->stack_depth); in build_prologue()
/Linux-v5.4/arch/powerpc/net/
Dbpf_jit_comp64.c1135 cgctx.stack_size = round_up(fp->aux->stack_depth, 16); in bpf_int_jit_compile()
/Linux-v5.4/arch/riscv/net/
Dbpf_jit_comp.c1446 bpf_stack_adjust = round_up(ctx->prog->aux->stack_depth, 16); in build_prologue()
/Linux-v5.4/arch/arm/net/
Dbpf_jit_32.c349 #define _STACK_SIZE (ctx->prog->aux->stack_depth + SCRATCH_SIZE)
/Linux-v5.4/net/core/
Dfilter.c801 if (new_prog && new_prog->aux->stack_depth < stack_off) in bpf_convert_filter()
802 new_prog->aux->stack_depth = stack_off; in bpf_convert_filter()