Lines Matching defs:NULL

549  *	@new_prog: allocated 'struct bpf_prog' or NULL
558 * bpf_convert_filter(old_prog, old_len, NULL, &new_len, &seen_ld_abs)
569 struct bpf_insn *new_insn, *first_insn = NULL;
571 int *addrs = NULL;
1038 if (filter == NULL)
1273 err = bpf_convert_filter(old_prog, old_len, NULL, &new_len,
1322 fp->bpf_func = NULL;
1386 fp->orig_prog = NULL;
1391 fp = bpf_prepare_filter(fp, NULL);
1432 fp->orig_prog = NULL;
1520 return bpf_prepare_filter(prog, NULL);
1875 return sk_fullsock(sk) ? (unsigned long)sk : (unsigned long)NULL;
2198 struct dst_entry *dst = NULL;
2263 dst = ipv6_stub->ipv6_dst_lookup_flow(net, NULL, &fl6, NULL);
2368 rt = ip_route_output_flow(net, &fl4, NULL);
2482 return NULL;
2511 &ri->nh : NULL) :
4012 return offset + len <= size ? addr + offset : NULL;
4109 __xdp_return(NULL, mem_info, false, zc_frag);
4129 __xdp_return(page_address(page), mem_info, false, NULL);
4302 cmpxchg(&ri->map, map, NULL);
4391 WRITE_ONCE(ri->map, NULL);
4479 WRITE_ONCE(ri->map, NULL);
4876 return NULL;
4877 if (cmpxchg(&md_dst, NULL, tmp))
4887 return NULL;
5133 return __bpf_get_netns_cookie(ctx ? ctx->sk : NULL);
5145 return __bpf_get_netns_cookie(ctx ? ctx->sk : NULL);
5157 return __bpf_get_netns_cookie(ctx ? ctx->sk : NULL);
5280 /* BPF expects NULL-terminated tcp-cc string */
5766 /* ipv6_bpf_stub cannot be NULL, since it's called from
5912 fl4.flowi4_uid = sock_net_uid(net, NULL);
5933 fib_select_path(net, &res, &fl4, NULL);
6055 fl6.flowi6_uid = sock_net_uid(net, NULL);
6079 fl6.flowi6_oif != 0, NULL, strict);
6370 return seg6_lookup_nexthop(skb, NULL, 0);
6443 if (srh == NULL)
6458 if (ipv6_find_hdr(skb, &srhoff, IPPROTO_ROUTING, NULL, NULL) < 0)
6482 if (ipv6_find_hdr(skb, &srhoff, IPPROTO_ROUTING, NULL, NULL) < 0) {
6483 srh_state->srh = NULL;
6511 return seg6_lookup_nexthop(skb, NULL, *(int *)param);
6518 if (ipv6_find_hdr(skb, &hdroff, IPPROTO_IPV6, NULL, NULL) < 0)
6530 return seg6_lookup_nexthop(skb, NULL, *(int *)param);
6575 if (unlikely(srh == NULL))
6606 if (ipv6_find_hdr(skb, &srhoff, IPPROTO_ROUTING, NULL, NULL) < 0)
6630 struct sock *sk = NULL;
6637 sk = __inet_lookup(net, hinfo, NULL, 0,
6644 dif, sdif, net->ipv4.udp_table, NULL);
6651 sk = __inet6_lookup(net, hinfo, NULL, 0,
6660 net->ipv4.udp_table, NULL);
6666 sk = NULL;
6679 struct sock *sk = NULL;
6688 return NULL;
6731 sk2 = NULL;
6737 return NULL;
6779 sk2 = NULL;
6785 return NULL;
6944 return (unsigned long)__bpf_sk_lookup(NULL, tuple, len, caller_net,
6968 return (unsigned long)__bpf_skc_lookup(NULL, tuple, len, caller_net,
6992 return (unsigned long)__bpf_sk_lookup(NULL, tuple, len, caller_net,
7012 return (unsigned long)__bpf_skc_lookup(NULL, tuple, len,
7032 return (unsigned long)__bpf_sk_lookup(NULL, tuple, len,
7051 return (unsigned long)__bpf_sk_lookup(NULL, tuple, len,
7214 return (unsigned long)NULL;
7231 return (unsigned long)NULL;
7559 magic = NULL;
7610 const u8 *op, *new_op, *magic = NULL;
7943 return NULL;
7986 return NULL;
8009 return NULL;
10701 /* Reserve one insn to test skb == NULL */
11101 RCU_INIT_POINTER(sk->sk_filter, NULL);
11162 reuse_kern->selected_sk = NULL;
11204 /* reuseport_array has only sk with non NULL sk_reuseport_cb.
11656 return (unsigned long)NULL;
11672 return (unsigned long)NULL;
11701 return (unsigned long)NULL;
11724 return (unsigned long)NULL;
11745 return (unsigned long)NULL;
11765 return (unsigned long)NULL;
11842 return NULL;
12068 * The function expects a non-NULL pointer to a socket, and invokes the