H A D | verifier.c | 2288 struct bpf_func_state *state, int off, int size, int value_regno, int insn_idx)
in check_stack_write_fixed_off() 2308 if (value_regno >= 0) {
in check_stack_write_fixed_off() 2309 reg = &cur->regs[value_regno];
in check_stack_write_fixed_off() 2334 err = mark_chain_precision(env, value_regno);
in check_stack_write_fixed_off() 2379 err = mark_chain_precision(env, value_regno);
in check_stack_write_fixed_off() 2394 /* Write the stack: 'stack[ptr_regno + off] = value_regno'. 'ptr_regno' is
2401 * 'value_regno' can be -1, meaning that an unknown value is being written to
2415 struct bpf_func_state *state, int ptr_regno, int off, int size, int value_regno,
in check_stack_write_var_off() 2432 if (value_regno >= 0) {
in check_stack_write_var_off() 2433 value_reg = &cur->regs[value_regno];
in check_stack_write_var_off() 2286 check_stack_write_fixed_off(struct bpf_verifier_env *env, struct bpf_func_state *state, int off, int size, int value_regno, int insn_idx) check_stack_write_fixed_off() argument 2413 check_stack_write_var_off(struct bpf_verifier_env *env, struct bpf_func_state *state, int ptr_regno, int off, int size, int value_regno, int insn_idx) check_stack_write_var_off() argument 2743 check_stack_write(struct bpf_verifier_env *env, int ptr_regno, int off, int size, int value_regno, int insn_idx) check_stack_write() argument 3505 check_ptr_to_btf_access(struct bpf_verifier_env *env, struct bpf_reg_state *regs, int regno, int off, int size, enum bpf_access_type atype, int value_regno) check_ptr_to_btf_access() argument 3548 check_ptr_to_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *regs, int regno, int off, int size, enum bpf_access_type atype, int value_regno) check_ptr_to_map_access() argument 3689 check_mem_access(struct bpf_verifier_env *env, int insn_idx, u32 regno, int off, int bpf_size, enum bpf_access_type t, int value_regno, bool strict_alignment_once) check_mem_access() argument [all...] |