Home
last modified time | relevance | path

Searched refs:NOT_INIT (Results 1 – 5 of 5) sorted by relevance

/linux-6.6.21/net/bpf/
Dbpf_dummy_struct_ops.c199 return NOT_INIT; in bpf_dummy_ops_btf_struct_access()
/linux-6.6.21/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c358 if (meta->ptr.type == NOT_INIT) in nfp_bpf_check_stack_access()
490 if (meta->ptr.type != NOT_INIT && meta->ptr.type != reg->type) { in nfp_bpf_check_ptr()
/linux-6.6.21/Documentation/bpf/
Dverifier.rst117 register state has a type, which is either NOT_INIT (the register has not been
312 alignment, then r1 is safe. Similarly, if r2 was NOT_INIT before then it can't
314 another NOT_INIT) is safe. The implementation is in the function regsafe().
539 without ``REG_LIVE_READ{32,64}`` marks as ``NOT_INIT`` or ``STACK_INVALID``.
566 read mark and all other registers and stack slots are marked as ``NOT_INIT``
/linux-6.6.21/kernel/bpf/
Dverifier.c612 [NOT_INIT] = "?", in reg_type_str()
1368 if (t == NOT_INIT) in print_verifier_state()
2512 reg->type = NOT_INIT; in __mark_reg_not_init()
3354 if (reg->type == NOT_INIT) { in __check_reg_arg()
4628 state->stack[spi].spilled_ptr.type = NOT_INIT; in check_stack_write_fixed_off()
4746 state->stack[spi].spilled_ptr.type = NOT_INIT; in check_stack_write_var_off()
8173 if (expected == NOT_INIT) in check_reg_type()
10215 regs[BPF_REG_0].type = NOT_INIT; in check_helper_call()
15974 if (rold->type == NOT_INIT) in regsafe()
15977 if (rcur->type == NOT_INIT) in regsafe()
[all …]
/linux-6.6.21/include/linux/
Dbpf.h843 NOT_INIT = 0, /* nothing was written into register */ enumerator