Home
last modified time | relevance | path

Searched refs:PTR_TO_SOCKET (Results 1 – 6 of 6) sorted by relevance

/linux/kernel/bpf/
A Dverifier.c555 [PTR_TO_SOCKET] = "sock",
1167 reg->type = PTR_TO_SOCKET; in mark_ptr_not_null_reg()
2719 case PTR_TO_SOCKET: in is_spillable_regtype()
3622 case PTR_TO_SOCKET: in check_sock_access()
3775 case PTR_TO_SOCKET: in check_ptr_alignment()
5046 PTR_TO_SOCKET,
5056 PTR_TO_SOCKET,
7231 case PTR_TO_SOCKET: in adjust_ptr_min_max_vals()
10527 case PTR_TO_SOCKET: in regsafe()
11060 case PTR_TO_SOCKET: in reg_type_mismatch_ok()
[all …]
A Dcgroup.c2000 info->reg_type = PTR_TO_SOCKET; in cg_sockopt_is_valid_access()
A Dbtf.c5560 [PTR_TO_SOCKET] = &btf_sock_ids[BTF_SOCK_TYPE_SOCK],
/linux/Documentation/networking/
A Dfilter.rst1244 PTR_TO_SOCKET
1248 returns this type, which becomes a PTR_TO_SOCKET when
1249 checked != NULL. PTR_TO_SOCKET is reference-counted,
1303 The 'id' field is also used on PTR_TO_SOCKET and PTR_TO_SOCKET_OR_NULL, common
1306 it also handles reference tracking for the pointer. PTR_TO_SOCKET implicitly
/linux/include/linux/
A Dbpf.h430 PTR_TO_SOCKET, /* reg points to struct bpf_sock */ enumerator
/linux/net/core/
A Dfilter.c8297 info->reg_type = PTR_TO_SOCKET; in sock_addr_is_valid_access()
8440 info->reg_type = PTR_TO_SOCKET; in sk_msg_is_valid_access()
10364 info->reg_type = PTR_TO_SOCKET; in sk_reuseport_is_valid_access()

Completed in 63 milliseconds