/linux-5.19.10/arch/s390/net/ |
D | bpf_jit_comp.c | 415 static void restore_regs(struct bpf_jit *jit, u32 rs, u32 re, u32 stack_depth) in restore_regs() argument 420 off += STK_OFF + stack_depth; in restore_regs() 464 static void save_restore_regs(struct bpf_jit *jit, int op, u32 stack_depth) in save_restore_regs() argument 486 restore_regs(jit, rs, re, stack_depth); in save_restore_regs() 515 static void bpf_jit_prologue(struct bpf_jit *jit, u32 stack_depth) in bpf_jit_prologue() argument 530 save_restore_regs(jit, REGS_SAVE, stack_depth); in bpf_jit_prologue() 552 EMIT4_IMM(0xa70b0000, REG_15, -(STK_OFF + stack_depth)); in bpf_jit_prologue() 563 static void bpf_jit_epilogue(struct bpf_jit *jit, u32 stack_depth) in bpf_jit_epilogue() argument 569 save_restore_regs(jit, REGS_RESTORE, stack_depth); in bpf_jit_epilogue() 672 int i, bool extra_pass, u32 stack_depth) in bpf_jit_insn() argument [all …]
|
/linux-5.19.10/lib/ |
D | test_bpf.c | 84 int stack_depth; /* for eBPF only, since tests don't call verifier */ member 452 self->stack_depth = 40; in __bpf_fill_stxdw() 7859 .stack_depth = 8, 7879 .stack_depth = 8, 7896 .stack_depth = 0, 7912 .stack_depth = 0, 7928 .stack_depth = 0, 7948 .stack_depth = 8, 7968 .stack_depth = 8, 7985 .stack_depth = 0, [all …]
|
/linux-5.19.10/drivers/firewire/ |
D | core-topology.c | 177 int i, port_count, child_port_count, phy_id, parent_count, stack_depth; in build_tree() local 184 stack_depth = 0; in build_tree() 206 if (child_port_count > stack_depth) { in build_tree() 282 stack_depth += 1 - child_port_count; in build_tree()
|
/linux-5.19.10/arch/x86/net/ |
D | bpf_jit_comp.c | 292 static void emit_prologue(u8 **pprog, u32 stack_depth, bool ebpf_from_cbpf, in emit_prologue() argument 316 if (stack_depth) in emit_prologue() 317 EMIT3_off32(0x48, 0x81, 0xEC, round_up(stack_depth, 8)); in emit_prologue() 458 u32 stack_depth, u8 *ip, in emit_bpf_tail_call_indirect() argument 461 int tcc_off = -4 - round_up(stack_depth, 8); in emit_bpf_tail_call_indirect() 510 if (stack_depth) in emit_bpf_tail_call_indirect() 512 round_up(stack_depth, 8)); in emit_bpf_tail_call_indirect() 533 bool *callee_regs_used, u32 stack_depth, in emit_bpf_tail_call_direct() argument 536 int tcc_off = -4 - round_up(stack_depth, 8); in emit_bpf_tail_call_direct() 562 if (stack_depth) in emit_bpf_tail_call_direct() [all …]
|
D | bpf_jit_comp32.c | 181 #define _STACK_SIZE (stack_depth + SCRATCH_SIZE) 1200 static void emit_prologue(u8 **pprog, u32 stack_depth) in emit_prologue() argument 1245 static void emit_epilogue(u8 **pprog, u32 stack_depth) in emit_epilogue() argument 1670 emit_prologue(&prog, bpf_prog->aux->stack_depth); in do_jit() 2472 emit_epilogue(&prog, bpf_prog->aux->stack_depth); in do_jit()
|
/linux-5.19.10/drivers/net/ethernet/netronome/nfp/bpf/ |
D | verifier.c | 714 frame_depths[frame] = nfp_prog->subprog[idx].stack_depth; in nfp_bpf_get_stack_usage() 782 nfp_prog->subprog[i].stack_depth = info[i].stack_depth; in nfp_bpf_finalize() 788 nfp_prog->subprog[i].stack_depth += REG_WIDTH; in nfp_bpf_finalize() 791 nfp_prog->subprog[i].stack_depth += BPF_REG_SIZE * 4; in nfp_bpf_finalize()
|
D | main.h | 484 u16 stack_depth; member
|
D | jit.c | 3264 u32 ret_tgt, stack_depth, offset_br; in bpf_to_bpf_call() local 3267 stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN); in bpf_to_bpf_call() 3271 if (stack_depth) { in bpf_to_bpf_call() 3272 tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, in bpf_to_bpf_call() 3331 if (stack_depth) { in bpf_to_bpf_call() 3332 tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, in bpf_to_bpf_call() 3649 unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth; in nfp_start_subprog() 3837 depth = nfp_prog->subprog[0].stack_depth; in nfp_translate()
|
/linux-5.19.10/include/linux/ |
D | kcsan-checks.h | 138 int stack_depth; member
|
D | bpf_verifier.h | 436 u16 stack_depth; /* max. stack depth used by this function */ member
|
D | bpf.h | 1019 u32 stack_depth; member 1710 void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth);
|
/linux-5.19.10/kernel/kcsan/ |
D | core.c | 426 reorder_access->stack_depth = get_kcsan_stack_depth(); in set_reorder_access() 1111 if (get_kcsan_stack_depth() <= reorder_access->stack_depth) { in __tsan_func_exit() 1122 reorder_access->stack_depth = INT_MIN; in __tsan_func_exit()
|
/linux-5.19.10/kernel/bpf/ |
D | core.c | 2096 void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth) in bpf_patch_call_args() argument 2098 stack_depth = max_t(u32, stack_depth, 1); in bpf_patch_call_args() 2100 insn->imm = interpreters_args[(round_up(stack_depth, 32) / 32) - 1] - in bpf_patch_call_args() 2170 u32 stack_depth = max_t(u32, fp->aux->stack_depth, 1); in bpf_prog_select_func() local 2172 fp->bpf_func = interpreters[(round_up(stack_depth, 32) / 32) - 1]; in bpf_prog_select_func()
|
D | verifier.c | 4182 u16 stack = env->subprog_info[func->subprogno].stack_depth; in update_stack_depth() 4188 env->subprog_info[func->subprogno].stack_depth = -off; in update_stack_depth() 4237 depth += round_up(max_t(u32, subprog[idx].stack_depth, 1), 32); in check_max_stack_depth() 4299 depth -= round_up(max_t(u32, subprog[idx].stack_depth, 1), 32); in check_max_stack_depth() 4318 return env->subprog_info[subprog].stack_depth; in get_callee_stack_depth() 13575 func[i]->aux->stack_depth = env->subprog_info[i].stack_depth; in jit_subprogs() 13946 prog->aux->stack_depth = MAX_BPF_STACK; in do_misc_fixups() 14467 env->prog->aux->stack_depth = env->subprog_info[0].stack_depth; in do_check_main() 14481 u32 depth = env->subprog_info[i].stack_depth; in print_verification_stats()
|
/linux-5.19.10/arch/powerpc/net/ |
D | bpf_jit_comp.c | 185 cgctx.stack_size = round_up(fp->aux->stack_depth, 16); in bpf_int_jit_compile()
|
/linux-5.19.10/arch/sparc/net/ |
D | bpf_jit_comp_64.c | 803 u32 stack_depth; in build_prologue() local 805 stack_depth = prog->aux->stack_depth; in build_prologue() 806 stack_needed += round_up(stack_depth, 16); in build_prologue()
|
/linux-5.19.10/Documentation/bpf/ |
D | drgn.rst | 132 .stack_depth = (u32)8,
|
/linux-5.19.10/fs/overlayfs/ |
D | super.c | 924 struct ovl_fs *ofs, int *stack_depth) in ovl_lower_dir() argument 937 *stack_depth = max(*stack_depth, path->mnt->mnt_sb->s_stack_depth); in ovl_lower_dir()
|
/linux-5.19.10/security/ |
D | Kconfig.hardening | 205 the /proc file system. In particular, /proc/<pid>/stack_depth
|
/linux-5.19.10/arch/mips/net/ |
D | bpf_jit_comp64.c | 576 locals = ALIGN(ctx->program->aux->stack_depth, MIPS_STACK_ALIGNMENT); in build_prologue()
|
D | bpf_jit_comp32.c | 1410 locals = ALIGN(ctx->program->aux->stack_depth, MIPS_STACK_ALIGNMENT); in build_prologue()
|
/linux-5.19.10/arch/arm64/net/ |
D | bpf_jit_comp.c | 321 ctx->stack_size = round_up(prog->aux->stack_depth, 16); in build_prologue()
|
/linux-5.19.10/arch/riscv/net/ |
D | bpf_jit_comp64.c | 1248 bpf_stack_adjust = round_up(ctx->prog->aux->stack_depth, 16); in bpf_jit_build_prologue()
|
D | bpf_jit_comp32.c | 1310 round_up(ctx->prog->aux->stack_depth, STACK_ALIGN); in bpf_jit_build_prologue()
|
/linux-5.19.10/arch/arm/net/ |
D | bpf_jit_32.c | 361 #define _STACK_SIZE (ctx->prog->aux->stack_depth + SCRATCH_SIZE)
|