Lines Matching defs:bpf_verifier_env

416 struct bpf_verifier_env {  struct
417 u32 insn_idx;
418 u32 prev_insn_idx;
419 struct bpf_prog *prog; /* eBPF program being verified */
420 const struct bpf_verifier_ops *ops;
421 struct bpf_verifier_stack_elem *head; /* stack of verifier states to be processed */
422 int stack_size; /* number of states to be processed */
423 bool strict_alignment; /* perform strict pointer alignment checks */
424 bool test_state_freq; /* test verifier with different pruning frequency */
425 struct bpf_verifier_state *cur_state; /* current verifier state */
426 struct bpf_verifier_state_list **explored_states; /* search pruning optimization */
427 struct bpf_verifier_state_list *free_list;
428 struct bpf_map *used_maps[MAX_USED_MAPS]; /* array of map's used by eBPF program */
429 u32 used_map_cnt; /* number of used maps */
430 u32 id_gen; /* used to generate unique reg IDs */
431 bool explore_alu_limits;
432 bool allow_ptr_leaks;
433 bool allow_uninit_stack;
434 bool allow_ptr_to_map_access;
435 bool bpf_capable;
436 bool bypass_spec_v1;
437 bool bypass_spec_v4;
438 bool seen_direct_write;
439 struct bpf_insn_aux_data *insn_aux_data; /* array of per-insn state */
440 const struct bpf_line_info *prev_linfo;
441 struct bpf_verifier_log log;
442 struct bpf_subprog_info subprog_info[BPF_MAX_SUBPROGS + 1];
443 struct bpf_id_pair idmap_scratch[BPF_ID_MAP_SIZE];
444 struct {
448 } cfg;
449 u32 pass_cnt; /* number of times do_check() was called */
450 u32 subprog_cnt;
475 __printf(2, 3) void bpf_verifier_log_write(struct bpf_verifier_env *env, argument