Home
last modified time | relevance | path

Searched refs:PTR_TO_PACKET_END (Results 1 – 5 of 5) sorted by relevance

/linux-6.3-rc2/kernel/bpf/
A Dverifier.c593 [PTR_TO_PACKET_END] = "pkt_end", in reg_type_str()
1664 reg->type == PTR_TO_PACKET_END; in reg_is_pkt_pointer_any()
3395 case PTR_TO_PACKET_END: in is_spillable_regtype()
4066 case PTR_TO_PACKET_END: in __check_mem_access()
10521 case PTR_TO_PACKET_END: in adjust_ptr_min_max_vals()
11971 if (src_reg->type == PTR_TO_PACKET_END) { in is_pkt_ptr_branch_taken()
11973 } else if (dst_reg->type == PTR_TO_PACKET_END) { in is_pkt_ptr_branch_taken()
12303 src_reg->type == PTR_TO_PACKET_END) || in try_match_pkt_pointers()
12324 src_reg->type == PTR_TO_PACKET_END) || in try_match_pkt_pointers()
12345 src_reg->type == PTR_TO_PACKET_END) || in try_match_pkt_pointers()
[all …]
A Dcgroup.c2365 info->reg_type = PTR_TO_PACKET_END; in cg_sockopt_is_valid_access()
/linux-6.3-rc2/net/core/
A Dfilter.c8440 info->reg_type = PTR_TO_PACKET_END; in cg_skb_is_valid_access()
8478 info->reg_type = PTR_TO_PACKET_END; in lwt_is_valid_access()
8707 info->reg_type = PTR_TO_PACKET_END; in tc_cls_act_is_valid_access()
8794 info->reg_type = PTR_TO_PACKET_END; in xdp_is_valid_access()
8990 info->reg_type = PTR_TO_PACKET_END; in sock_ops_is_valid_access()
9047 info->reg_type = PTR_TO_PACKET_END; in sk_skb_is_valid_access()
9072 info->reg_type = PTR_TO_PACKET_END; in sk_msg_is_valid_access()
9120 info->reg_type = PTR_TO_PACKET_END; in flow_dissector_is_valid_access()
11093 info->reg_type = PTR_TO_PACKET_END; in sk_reuseport_is_valid_access()
/linux-6.3-rc2/Documentation/bpf/
A Dverifier.rst138 PTR_TO_PACKET_END
185 bounds-checked and found to be less than a PTR_TO_PACKET_END, the register B is
/linux-6.3-rc2/include/linux/
A Dbpf.h785 PTR_TO_PACKET_END, /* skb->data + headlen */ enumerator

Completed in 63 milliseconds