Searched refs:PTR_TO_CTX (Results 1 – 6 of 6) sorted by relevance
457 if (reg->type != PTR_TO_CTX && in nfp_bpf_check_ptr()507 if (reg->type == PTR_TO_CTX) { in nfp_bpf_check_store()
2858 if (meta->ptr.type == PTR_TO_CTX) { in mem_ldx()3006 if (meta->ptr.type == PTR_TO_CTX) in mem_stx4()
1072 and has type PTR_TO_CTX.1074 PTR_TO_CTX as well and can be used on the right hand side of expression.1075 If R1=PTR_TO_CTX and insn is R2=R1+R1, then R2=SCALAR_VALUE,1103 are PTR_TO_CTX, PTR_TO_MAP, PTR_TO_STACK. They are bounds and alignment checked.1114 At the start R1 type is PTR_TO_CTX (a pointer to generic ``struct bpf_context``)1123 If R6=PTR_TO_CTX, via is_valid_access() callback the verifier will know1176 PTR_TO_CTX
497 [PTR_TO_CTX] = "ctx", in reg_type_str()2201 case PTR_TO_CTX: in is_spillable_regtype()3095 return reg->type == PTR_TO_CTX; in is_ctx_reg()3199 case PTR_TO_CTX: in check_ptr_alignment()3817 } else if (reg->type == PTR_TO_CTX) { in check_mem_access()4393 static const struct bpf_reg_types context_types = { .types = { PTR_TO_CTX } };8319 if (regs[ctx_reg].type != PTR_TO_CTX) { in check_ld_abs()9268 case PTR_TO_CTX: in regsafe()9785 case PTR_TO_CTX: in reg_type_mismatch_ok()10917 aux[adj_idx].ptr_type == PTR_TO_CTX) in opt_subreg_zext_lo32_rnd_hi32()[all …]
5203 if (reg[i + 1].type != PTR_TO_CTX) { in btf_check_func_arg_match()5316 reg[i + 1].type = PTR_TO_CTX; in btf_prepare_func_args()
427 PTR_TO_CTX, /* reg points to bpf_context */ enumerator