Home
last modified time | relevance | path

Searched refs:NOT_INIT (Results 1 – 6 of 6) sorted by relevance

/linux/net/bpf/
A Dbpf_dummy_struct_ops.c169 return atype == BPF_READ ? err : NOT_INIT; in bpf_dummy_ops_btf_struct_access()
/linux/net/ipv4/
A Dbpf_tcp_ca.c142 return NOT_INIT; in bpf_tcp_ca_btf_struct_access()
/linux/drivers/net/ethernet/netronome/nfp/bpf/
A Dverifier.c358 if (meta->ptr.type == NOT_INIT) in nfp_bpf_check_stack_access()
490 if (meta->ptr.type != NOT_INIT && meta->ptr.type != reg->type) { in nfp_bpf_check_ptr()
/linux/kernel/bpf/
A Dverifier.c544 [NOT_INIT] = "?",
635 if (t == NOT_INIT) in print_verifier_state()
1487 reg->type = NOT_INIT; in __mark_reg_not_init()
2238 if (reg->type == NOT_INIT) { in check_reg_arg()
2962 && *stype != NOT_INIT in check_stack_write_var_off()
5151 if (expected == NOT_INIT) in check_reg_type()
6525 regs[BPF_REG_0].type = NOT_INIT; in check_helper_call()
10448 if (rold->type == NOT_INIT) in regsafe()
10451 if (rcur->type == NOT_INIT) in regsafe()
11216 if (*prev_src_type == NOT_INIT) { in do_check()
[all …]
/linux/Documentation/networking/
A Dfilter.rst1221 register state has a type, which is either NOT_INIT (the register has not been
1455 alignment, then r1 is safe. Similarly, if r2 was NOT_INIT before then it can't
1457 another NOT_INIT) is safe. The implementation is in the function regsafe().
/linux/include/linux/
A Dbpf.h419 NOT_INIT = 0, /* nothing was written into register */ enumerator

Completed in 41 milliseconds