Home
last modified time | relevance | path

Searched refs:MAX_CALL_FRAMES (Results 1 – 4 of 4) sorted by relevance

/Linux-v6.6/include/linux/
Dbpf_verifier.h316 #define MAX_CALL_FRAMES 8 macro
318 #define BPF_ID_MAP_SIZE ((MAX_BPF_REG + MAX_BPF_STACK / BPF_REG_SIZE) * MAX_CALL_FRAMES)
321 struct bpf_func_state *frame[MAX_CALL_FRAMES];
551 u32 reg_masks[MAX_CALL_FRAMES];
552 u64 stack_masks[MAX_CALL_FRAMES];
/Linux-v6.6/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c702 struct nfp_insn_meta *ret_insn[MAX_CALL_FRAMES]; in nfp_bpf_get_stack_usage()
703 unsigned short frame_depths[MAX_CALL_FRAMES]; in nfp_bpf_get_stack_usage()
704 unsigned short ret_prog[MAX_CALL_FRAMES]; in nfp_bpf_get_stack_usage()
/Linux-v6.6/Documentation/bpf/
Dverifier.rst384 struct bpf_func_state *frame[MAX_CALL_FRAMES];
/Linux-v6.6/kernel/bpf/
Dverifier.c3260 if (bt->frame == MAX_CALL_FRAMES - 1) { in bt_subprog_enter()
5605 int ret_insn[MAX_CALL_FRAMES]; in check_max_stack_depth_subprog()
5606 int ret_prog[MAX_CALL_FRAMES]; in check_max_stack_depth_subprog()
5680 if (frame >= MAX_CALL_FRAMES) { in check_max_stack_depth_subprog()
8861 if (state->curframe + 1 >= MAX_CALL_FRAMES) { in __check_func_call()