Home
last modified time | relevance | path

Searched refs:SCALAR_VALUE (Results 1 – 5 of 5) sorted by relevance

/Linux-v5.10/drivers/net/ethernet/netronome/nfp/bpf/
Dverifier.c59 if (reg2->type != SCALAR_VALUE || !tnum_is_const(reg2->var_off)) in nfp_record_adjust_head()
234 BUILD_BUG_ON(NFP_BPF_SCALAR_VALUE != SCALAR_VALUE || in nfp_bpf_check_helper_call()
263 if (reg1->type != SCALAR_VALUE /* NULL ptr */ && in nfp_bpf_check_helper_call()
320 if (!(reg0->type == SCALAR_VALUE && tnum_is_const(reg0->var_off))) { in nfp_bpf_check_exit()
537 if (sreg->type != SCALAR_VALUE) { in nfp_bpf_check_xadd()
/Linux-v5.10/kernel/bpf/
Dverifier.c502 [SCALAR_VALUE] = "inv",
582 if (t == SCALAR_VALUE && reg->precise) in print_verifier_state()
584 if ((t == SCALAR_VALUE || t == PTR_TO_STACK) && in print_verifier_state()
596 if (t != SCALAR_VALUE) in print_verifier_state()
673 if (t == SCALAR_VALUE && reg->precise) in print_verifier_state()
675 if (t == SCALAR_VALUE && tnum_is_const(reg->var_off)) in print_verifier_state()
1059 reg->type = SCALAR_VALUE; in __mark_reg_const_zero()
1342 reg->type = SCALAR_VALUE; in __mark_reg_unknown()
1386 if (reg_type == SCALAR_VALUE) { in mark_btf_ld_reg()
1654 if (reg->type != SCALAR_VALUE) in is_reg64()
[all …]
Dbtf.c4847 return SCALAR_VALUE; in btf_struct_access()
5176 if (reg[i + 1].type == SCALAR_VALUE) in btf_check_func_arg_match()
5182 if (reg[i + 1].type == SCALAR_VALUE) { in btf_check_func_arg_match()
5298 reg[i + 1].type = SCALAR_VALUE; in btf_prepare_func_args()
/Linux-v5.10/Documentation/networking/
Dfilter.rst1075 If R1=PTR_TO_CTX and insn is R2=R1+R1, then R2=SCALAR_VALUE,
1172 written to), SCALAR_VALUE (some value which is not usable as a pointer), or a
1226 branches. For instance, if a SCALAR_VALUE is compared > 8, in the 'true' branch
1313 operation will set the register state to 'SCALAR_VALUE' and it won't be
/Linux-v5.10/include/linux/
Dbpf.h371 SCALAR_VALUE, /* reg doesn't contain a valid pointer */ enumerator