Searched refs:PTR_TO_CTX (Results 1 – 5 of 5) sorted by relevance
433 if (reg->type != PTR_TO_CTX && in nfp_bpf_check_ptr()483 if (reg->type == PTR_TO_CTX) { in nfp_bpf_check_store()
2705 if (meta->ptr.type == PTR_TO_CTX) { in mem_ldx()2853 if (meta->ptr.type == PTR_TO_CTX) in mem_stx4()
256 [PTR_TO_CTX] = "ctx",743 regs[BPF_REG_1].type = PTR_TO_CTX; in init_reg_state()992 case PTR_TO_CTX: in is_spillable_regtype()1425 return reg->type == PTR_TO_CTX; in is_ctx_reg()1511 case PTR_TO_CTX: in check_ptr_alignment()1706 } else if (reg->type == PTR_TO_CTX) { in check_mem_access()1996 expected_type = PTR_TO_CTX; in check_func_arg()4048 if (regs[BPF_REG_6].type != PTR_TO_CTX) { in check_ld_abs()4459 case PTR_TO_CTX: in regsafe()4865 (src_reg_type == PTR_TO_CTX || in do_check()[all …]
1027 and has type PTR_TO_CTX.1029 PTR_TO_CTX as well and can be used on the right hand side of expression.1030 If R1=PTR_TO_CTX and insn is R2=R1+R1, then R2=SCALAR_VALUE,1052 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.1061 At the start R1 type is PTR_TO_CTX (a pointer to generic 'struct bpf_context')1068 If R6=PTR_TO_CTX, via is_valid_access() callback the verifier will know1116 PTR_TO_CTX Pointer to bpf_context.
207 PTR_TO_CTX, /* reg points to bpf_context */ enumerator