Searched hist:"51580 e798cb61b0fc63fa3aa6c5c975375aa0550" (Results 1 – 4 of 4) sorted by relevance
/linux/kernel/bpf/ |
H A D | Makefile | diff 51580e798cb61b0fc63fa3aa6c5c975375aa0550 Fri Sep 26 09:17:02 CEST 2014 Alexei Starovoitov <ast@plumgrid.com> bpf: verifier (add docs)
this patch adds all of eBPF verfier documentation and empty bpf_check()
The end goal for the verifier is to statically check safety of the program.
Verifier will catch: - loops - out of range jumps - unreachable instructions - invalid instructions - uninitialized register access - uninitialized stack access - misaligned stack access - out of range stack access - invalid calling convention
More details in Documentation/networking/filter.txt
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | syscall.c | diff 51580e798cb61b0fc63fa3aa6c5c975375aa0550 Fri Sep 26 09:17:02 CEST 2014 Alexei Starovoitov <ast@plumgrid.com> bpf: verifier (add docs)
this patch adds all of eBPF verfier documentation and empty bpf_check()
The end goal for the verifier is to statically check safety of the program.
Verifier will catch: - loops - out of range jumps - unreachable instructions - invalid instructions - uninitialized register access - uninitialized stack access - misaligned stack access - out of range stack access - invalid calling convention
More details in Documentation/networking/filter.txt
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | verifier.c | 51580e798cb61b0fc63fa3aa6c5c975375aa0550 Fri Sep 26 09:17:02 CEST 2014 Alexei Starovoitov <ast@plumgrid.com> bpf: verifier (add docs)
this patch adds all of eBPF verfier documentation and empty bpf_check()
The end goal for the verifier is to statically check safety of the program.
Verifier will catch: - loops - out of range jumps - unreachable instructions - invalid instructions - uninitialized register access - uninitialized stack access - misaligned stack access - out of range stack access - invalid calling convention
More details in Documentation/networking/filter.txt
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/linux/include/linux/ |
H A D | bpf.h | diff 51580e798cb61b0fc63fa3aa6c5c975375aa0550 Fri Sep 26 09:17:02 CEST 2014 Alexei Starovoitov <ast@plumgrid.com> bpf: verifier (add docs)
this patch adds all of eBPF verfier documentation and empty bpf_check()
The end goal for the verifier is to statically check safety of the program.
Verifier will catch: - loops - out of range jumps - unreachable instructions - invalid instructions - uninitialized register access - uninitialized stack access - misaligned stack access - out of range stack access - invalid calling convention
More details in Documentation/networking/filter.txt
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|