Symbol: subprog_info
drivers/net/ethernet/netronome/nfp/bpf/verifier.c
780
info = env->subprog_info;
include/linux/bpf_verifier.h
789
struct bpf_subprog_info subprog_info[BPF_MAX_SUBPROGS + 2]; /* max + 2 for the fake and exception subprogs */
include/linux/bpf_verifier.h
863
return &env->subprog_info[subprog];
kernel/bpf/btf.c
7790
struct bpf_subprog_info *sub = subprog_info(env, subprog);
kernel/bpf/liveness.c
142
struct bpf_subprog_info *subprog_info = env->subprog_info;
kernel/bpf/liveness.c
147
callchain->sp_starts[i] = subprog_info[st->frame[i]->subprogno].start;
kernel/bpf/verifier.c
10692
struct bpf_subprog_info *sub = subprog_info(env, subprog);
kernel/bpf/verifier.c
10834
env->subprog_info[subprog].is_cb = true;
kernel/bpf/verifier.c
10851
env->subprog_info[subprog].is_async_cb = true;
kernel/bpf/verifier.c
10852
async_cb = push_async_cb(env, env->subprog_info[subprog].start,
kernel/bpf/verifier.c
10871
callback_state = push_stack(env, env->subprog_info[subprog].start, insn_idx, false);
kernel/bpf/verifier.c
10912
if (env->subprog_info[subprog].might_sleep &&
kernel/bpf/verifier.c
10930
if (env->subprog_info[subprog].changes_pkt_data)
kernel/bpf/verifier.c
10954
*insn_idx = env->subprog_info[subprog].start - 1;
kernel/bpf/verifier.c
1508
if (env->subprog_info[state->subprogno].stack_depth < size)
kernel/bpf/verifier.c
1509
env->subprog_info[state->subprogno].stack_depth = size;
kernel/bpf/verifier.c
18557
struct bpf_subprog_info *subprog = env->subprog_info;
kernel/bpf/verifier.c
18972
? env->subprog_info[env->exception_callback_subprog].start
kernel/bpf/verifier.c
19031
env->prog->aux->changes_pkt_data = env->subprog_info[0].changes_pkt_data;
kernel/bpf/verifier.c
19032
env->prog->aux->might_sleep = env->subprog_info[0].might_sleep;
kernel/bpf/verifier.c
19063
env->subprog_info[i].postorder_start = cur_postorder;
kernel/bpf/verifier.c
19064
stack[0] = env->subprog_info[i].start;
kernel/bpf/verifier.c
19084
env->subprog_info[i].postorder_start = cur_postorder;
kernel/bpf/verifier.c
19097
if (env->subprog_info[i].has_ld_abs) {
kernel/bpf/verifier.c
19101
if (env->subprog_info[i].has_tail_call) {
kernel/bpf/verifier.c
19257
if (env->subprog_info[i].start != krecord[i].insn_off) {
kernel/bpf/verifier.c
19271
if (i && !scalar_return && env->subprog_info[i].has_ld_abs) {
kernel/bpf/verifier.c
19275
if (i && !scalar_return && env->subprog_info[i].has_tail_call) {
kernel/bpf/verifier.c
19301
aux->func_info[i].insn_off = env->subprog_info[i].start;
kernel/bpf/verifier.c
19343
sub = env->subprog_info;
kernel/bpf/verifier.c
22007
if (env->subprog_info[i].start <= off)
kernel/bpf/verifier.c
22009
env->subprog_info[i].start += len - 1;
kernel/bpf/verifier.c
22131
if (env->subprog_info[i].start >= off)
kernel/bpf/verifier.c
22135
if (env->subprog_info[j].start >= off + cnt)
kernel/bpf/verifier.c
22140
if (env->subprog_info[j].start != off + cnt)
kernel/bpf/verifier.c
22150
memmove(env->subprog_info + i,
kernel/bpf/verifier.c
22151
env->subprog_info + j,
kernel/bpf/verifier.c
22152
sizeof(*env->subprog_info) * move);
kernel/bpf/verifier.c
22169
if (env->subprog_info[i].start == off)
kernel/bpf/verifier.c
22175
env->subprog_info[i].start -= cnt;
kernel/bpf/verifier.c
22231
if (env->subprog_info[i].linfo_idx > l_off) {
kernel/bpf/verifier.c
22235
if (env->subprog_info[i].linfo_idx >= l_off + l_cnt)
kernel/bpf/verifier.c
22236
env->subprog_info[i].linfo_idx -= l_cnt;
kernel/bpf/verifier.c
22238
env->subprog_info[i].linfo_idx = l_off;
kernel/bpf/verifier.c
22524
struct bpf_subprog_info *subprogs = env->subprog_info;
kernel/bpf/verifier.c
22883
subprog_end = env->subprog_info[i + 1].start;
kernel/bpf/verifier.c
22922
func[i]->aux->stack_depth = env->subprog_info[i].stack_depth;
kernel/bpf/verifier.c
22923
if (env->subprog_info[i].priv_stack_mode == PRIV_STACK_ADAPTIVE)
kernel/bpf/verifier.c
22933
func[i]->aux->linfo_idx = env->subprog_info[i].linfo_idx;
kernel/bpf/verifier.c
22955
func[i]->aux->tail_call_reachable = env->subprog_info[i].tail_call_reachable;
kernel/bpf/verifier.c
22956
func[i]->aux->exception_cb = env->subprog_info[i].is_exception_cb;
kernel/bpf/verifier.c
22957
func[i]->aux->changes_pkt_data = env->subprog_info[i].changes_pkt_data;
kernel/bpf/verifier.c
22958
func[i]->aux->might_sleep = env->subprog_info[i].might_sleep;
kernel/bpf/verifier.c
23370
struct bpf_subprog_info *info = env->subprog_info;
kernel/bpf/verifier.c
23411
struct bpf_subprog_info *subprogs = env->subprog_info;
kernel/bpf/verifier.c
24425
callback_start = env->subprog_info[callback_subprogno].start;
kernel/bpf/verifier.c
24452
struct bpf_subprog_info *subprogs = env->subprog_info;
kernel/bpf/verifier.c
24490
env->prog->aux->stack_depth = env->subprog_info[0].stack_depth;
kernel/bpf/verifier.c
24500
struct bpf_subprog_info *subprog = env->subprog_info;
kernel/bpf/verifier.c
24575
struct bpf_subprog_info *sub = subprog_info(env, subprog);
kernel/bpf/verifier.c
24601
state->first_insn_idx = env->subprog_info[subprog].start;
kernel/bpf/verifier.c
24745
env->insn_idx = env->subprog_info[i].start;
kernel/bpf/verifier.c
24779
env->prog->aux->stack_depth = env->subprog_info[0].stack_depth;
kernel/bpf/verifier.c
24793
u32 depth = env->subprog_info[i].stack_depth;
kernel/bpf/verifier.c
24910
if (has_refcounted_arg && env->subprog_info[i].has_tail_call) {
kernel/bpf/verifier.c
3063
struct bpf_subprog_info *vals = env->subprog_info;
kernel/bpf/verifier.c
3089
return p - env->subprog_info;
kernel/bpf/verifier.c
3109
env->subprog_info[env->subprog_cnt++].start = off;
kernel/bpf/verifier.c
3110
sort(env->subprog_info, env->subprog_cnt,
kernel/bpf/verifier.c
3111
sizeof(env->subprog_info[0]), cmp_subprogs, NULL);
kernel/bpf/verifier.c
3625
struct bpf_subprog_info *subprog = env->subprog_info;
kernel/bpf/verifier.c
3666
if (env->subprog_info[i].start != ex_cb_insn)
kernel/bpf/verifier.c
3689
struct bpf_subprog_info *subprog = env->subprog_info;
kernel/bpf/verifier.c
460
struct bpf_subprog_info *info = subprog_info(env, subprog);
kernel/bpf/verifier.c
469
return subprog_info(env, subprog)->is_exception_cb;
kernel/bpf/verifier.c
5223
struct bpf_subprog_info *subprog = &env->subprog_info[state->subprogno];
kernel/bpf/verifier.c
6743
struct bpf_subprog_info *subprog = env->subprog_info;
kernel/bpf/verifier.c
6904
struct bpf_subprog_info *si = env->subprog_info;
kernel/bpf/verifier.c
6954
return env->subprog_info[subprog].stack_depth;