Symbol: MAX_CALL_FRAMES
drivers/net/ethernet/netronome/nfp/bpf/verifier.c
702
struct nfp_insn_meta *ret_insn[MAX_CALL_FRAMES];
drivers/net/ethernet/netronome/nfp/bpf/verifier.c
703
unsigned short frame_depths[MAX_CALL_FRAMES];
drivers/net/ethernet/netronome/nfp/bpf/verifier.c
704
unsigned short ret_prog[MAX_CALL_FRAMES];
include/linux/bpf_verifier.h
345
static_assert(INSN_F_FRAMENO_MASK + 1 >= MAX_CALL_FRAMES);
include/linux/bpf_verifier.h
361
#define BPF_ID_MAP_SIZE ((MAX_BPF_REG + MAX_BPF_STACK / BPF_REG_SIZE) * MAX_CALL_FRAMES)
include/linux/bpf_verifier.h
364
struct bpf_func_state *frame[MAX_CALL_FRAMES];
include/linux/bpf_verifier.h
688
u32 reg_masks[MAX_CALL_FRAMES];
include/linux/bpf_verifier.h
689
u64 stack_masks[MAX_CALL_FRAMES];
include/linux/bpf_verifier.h
714
u32 callsites[MAX_CALL_FRAMES - 1];
kernel/bpf/liveness.c
114
struct per_frame_masks *frames[MAX_CALL_FRAMES];
kernel/bpf/liveness.c
120
struct func_instance *instances[MAX_CALL_FRAMES]; /* valid in range [0..curframe] */
kernel/bpf/liveness.c
134
u64 write_masks_acc[MAX_CALL_FRAMES];
kernel/bpf/liveness.c
86
u32 callsites[MAX_CALL_FRAMES]; /* instruction pointer for each frame */
kernel/bpf/liveness.c
91
u32 sp_starts[MAX_CALL_FRAMES];
kernel/bpf/verifier.c
10647
if (state->curframe + 1 >= MAX_CALL_FRAMES) {
kernel/bpf/verifier.c
4223
if (bt->frame == MAX_CALL_FRAMES - 1) {
kernel/bpf/verifier.c
6747
int ret_insn[MAX_CALL_FRAMES];
kernel/bpf/verifier.c
6748
int ret_prog[MAX_CALL_FRAMES];
kernel/bpf/verifier.c
6865
if (frame >= MAX_CALL_FRAMES) {