Home
last modified time | relevance | path

Searched refs:var_off (Results 1 – 7 of 7) sorted by relevance

/linux-6.1.9/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c59 if (reg2->type != SCALAR_VALUE || !tnum_is_const(reg2->var_off)) in nfp_record_adjust_head()
61 imm = reg2->var_off.value; in nfp_record_adjust_head()
74 if (meta->arg2.reg.var_off.value != imm) in nfp_record_adjust_head()
101 off = reg3->off + reg3->var_off.value; in nfp_bpf_map_update_value_ok()
135 if (!tnum_is_const(reg->var_off)) { in nfp_bpf_stack_arg_ok()
140 off = reg->var_off.value + reg->off; in nfp_bpf_stack_arg_ok()
150 old_off = old_arg->reg.var_off.value + old_arg->reg.off; in nfp_bpf_stack_arg_ok()
151 old_arg->var_off |= off != old_off; in nfp_bpf_stack_arg_ok()
247 if (reg3->var_off.mask & BPF_F_INDEX_MASK || in nfp_bpf_check_helper_call()
248 (reg3->var_off.value & BPF_F_INDEX_MASK) != in nfp_bpf_check_helper_call()
[all …]
Dmain.h251 bool var_off; member
Djit.c1734 lm_off += meta->arg2.reg.var_off.value + meta->arg2.reg.off; in map_call_stack_common()
1735 load_lm_ptr = meta->arg2.var_off || lm_off; in map_call_stack_common()
2878 meta->ptr.off + meta->ptr.var_off.value); in mem_ldx()
2989 meta->ptr.off + meta->ptr.var_off.value); in mem_stx()
/linux-6.1.9/kernel/bpf/
Dverifier.c420 if (!tnum_is_unknown(reg->var_off)) { in verbose_invalid_scalar()
421 tnum_strn(tn_buf, sizeof(tn_buf), reg->var_off); in verbose_invalid_scalar()
859 tnum_is_const(reg->var_off)) { in print_verifier_state()
862 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
890 if (tnum_is_const(reg->var_off)) { in print_verifier_state()
895 verbose_a("imm=%llx", reg->var_off.value); in print_verifier_state()
907 if (!tnum_is_unknown(reg->var_off)) { in print_verifier_state()
910 tnum_strn(tn_buf, sizeof(tn_buf), reg->var_off); in print_verifier_state()
955 if (t == SCALAR_VALUE && tnum_is_const(reg->var_off)) in print_verifier_state()
956 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
[all …]
Dbtf.c6313 if (!tnum_is_const(reg->var_off)) { in btf_check_func_arg_match()
6318 kfunc_meta->r0_size = reg->var_off.value; in btf_check_func_arg_match()
6386 if (!tnum_is_const(reg->var_off)) { in btf_check_func_arg_match()
6391 off_desc = bpf_map_kptr_off_contains(reg->map_ptr, reg->off + reg->var_off.value); in btf_check_func_arg_match()
6394 reg->off + reg->var_off.value); in btf_check_func_arg_match()
/linux-6.1.9/Documentation/bpf/
Dverifier.rst252 …id=0,umax_value=255,var_off=(0x0; 0xff)) R1=pkt_end R2=pkt(id=2,off=8,r=8) R3=pkt(id=2,off=0,r=8) …
270 R4=inv(id=0,umax_value=255,var_off=(0x0; 0xff)) which means that upper 56 bits
273 R4=inv(id=0,umax_value=3570,var_off=(0x0; 0xfffe)), since multiplying an 8-bit
276 R2=inv(id=0,umax_value=65535,var_off=(0x0; 0xffff)), since the shift is not sign
/linux-6.1.9/include/linux/
Dbpf_verifier.h153 struct tnum var_off; member