Searched refs:PTR_TO_SOCKET (Results 1 – 6 of 6) sorted by relevance
555 [PTR_TO_SOCKET] = "sock",1167 reg->type = PTR_TO_SOCKET; in mark_ptr_not_null_reg()2719 case PTR_TO_SOCKET: in is_spillable_regtype()3622 case PTR_TO_SOCKET: in check_sock_access()3775 case PTR_TO_SOCKET: in check_ptr_alignment()5046 PTR_TO_SOCKET,5056 PTR_TO_SOCKET,7231 case PTR_TO_SOCKET: in adjust_ptr_min_max_vals()10527 case PTR_TO_SOCKET: in regsafe()11060 case PTR_TO_SOCKET: in reg_type_mismatch_ok()[all …]
2000 info->reg_type = PTR_TO_SOCKET; in cg_sockopt_is_valid_access()
5560 [PTR_TO_SOCKET] = &btf_sock_ids[BTF_SOCK_TYPE_SOCK],
1244 PTR_TO_SOCKET1248 returns this type, which becomes a PTR_TO_SOCKET when1249 checked != NULL. PTR_TO_SOCKET is reference-counted,1303 The 'id' field is also used on PTR_TO_SOCKET and PTR_TO_SOCKET_OR_NULL, common1306 it also handles reference tracking for the pointer. PTR_TO_SOCKET implicitly
430 PTR_TO_SOCKET, /* reg points to struct bpf_sock */ enumerator
8297 info->reg_type = PTR_TO_SOCKET; in sock_addr_is_valid_access()8440 info->reg_type = PTR_TO_SOCKET; in sk_msg_is_valid_access()10364 info->reg_type = PTR_TO_SOCKET; in sk_reuseport_is_valid_access()
Completed in 63 milliseconds