Home
last modified time | relevance | path

Searched refs:PTR_TO_CTX (Results 1 – 6 of 6) sorted by relevance

/Linux-v6.1/Documentation/bpf/
Dverifier.rst17 and has type PTR_TO_CTX.
19 PTR_TO_CTX as well and can be used on the right hand side of expression.
20 If R1=PTR_TO_CTX and insn is R2=R1+R1, then R2=SCALAR_VALUE,
48 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.
59 At the start R1 type is PTR_TO_CTX (a pointer to generic ``struct bpf_context``)
68 If R6=PTR_TO_CTX, via is_valid_access() callback the verifier will know
122 PTR_TO_CTX
/Linux-v6.1/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c457 if (reg->type != PTR_TO_CTX && in nfp_bpf_check_ptr()
507 if (reg->type == PTR_TO_CTX) { in nfp_bpf_check_store()
Djit.c2858 if (meta->ptr.type == PTR_TO_CTX) { in mem_ldx()
3006 if (meta->ptr.type == PTR_TO_CTX) in mem_stx4()
/Linux-v6.1/kernel/bpf/
Dverifier.c548 [PTR_TO_CTX] = "ctx", in reg_type_str()
2948 case PTR_TO_CTX: in is_spillable_regtype()
4073 return reg->type == PTR_TO_CTX; in is_ctx_reg()
4180 case PTR_TO_CTX: in check_ptr_alignment()
4819 } else if (reg->type == PTR_TO_CTX) { in check_mem_access()
5258 case PTR_TO_CTX: in check_helper_mem_access()
5699 static const struct bpf_reg_types context_types = { .types = { PTR_TO_CTX } };
10486 if (regs[ctx_reg].type != PTR_TO_CTX) { in check_ld_abs()
11594 case PTR_TO_CTX: in regsafe()
12127 case PTR_TO_CTX: in reg_type_mismatch_ok()
[all …]
Dbtf.c6335 obj_ptr = reg->type == PTR_TO_CTX || reg->type == PTR_TO_BTF_ID || in btf_check_func_arg_match()
6342 if (is_kfunc && trusted_args && (obj_ptr && reg->type != PTR_TO_CTX) && !reg->ref_obj_id) { in btf_check_func_arg_match()
6417 if (reg->type != PTR_TO_CTX) { in btf_check_func_arg_match()
6749 reg->type = PTR_TO_CTX; in btf_prepare_func_args()
/Linux-v6.1/include/linux/
Dbpf.h628 PTR_TO_CTX, /* reg points to bpf_context */ enumerator