Lines Matching full:reference

2 	"reference tracking: leak potential reference",
5 BPF_MOV64_REG(BPF_REG_6, BPF_REG_0), /* leak reference */
9 .errstr = "Unreleased reference",
13 "reference tracking: leak potential reference to sock_common",
16 BPF_MOV64_REG(BPF_REG_6, BPF_REG_0), /* leak reference */
20 .errstr = "Unreleased reference",
24 "reference tracking: leak potential reference on stack",
34 .errstr = "Unreleased reference",
38 "reference tracking: leak potential reference on stack 2",
49 .errstr = "Unreleased reference",
53 "reference tracking: zero potential reference",
56 BPF_MOV64_IMM(BPF_REG_0, 0), /* leak reference */
60 .errstr = "Unreleased reference",
64 "reference tracking: zero potential reference to sock_common",
67 BPF_MOV64_IMM(BPF_REG_0, 0), /* leak reference */
71 .errstr = "Unreleased reference",
75 "reference tracking: copy and zero potential references",
80 BPF_MOV64_IMM(BPF_REG_7, 0), /* leak reference */
84 .errstr = "Unreleased reference",
88 "reference tracking: release reference without check",
91 /* reference in r0 may be NULL */
102 "reference tracking: release reference to sock_common without check",
105 /* reference in r0 may be NULL */
116 "reference tracking: release reference",
128 "reference tracking: release reference to sock_common",
140 "reference tracking: release reference 2",
153 "reference tracking: release reference twice",
169 "reference tracking: release reference twice inside branch",
185 "reference tracking: alloc, check, free in one subbranch",
200 /* Leak reference in R0 */
208 .errstr = "Unreleased reference",
213 "reference tracking: alloc, check, free in both subbranches",
242 "reference tracking in call: free reference in subprog",
245 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), /* unchecked reference */
260 "reference tracking in call: free reference in subprog and outside",
263 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0), /* unchecked reference */
281 "reference tracking in call: alloc & leak reference in subprog",
299 .errstr = "Unreleased reference",
303 "reference tracking in call: alloc in subprog, release outside",
321 "reference tracking in call: sk_ptr leak into caller stack",
346 .errstr = "Unreleased reference",
350 "reference tracking in call: sk_ptr spill into caller stack",
369 /* now the sk_ptr is verified, free the reference */
382 "reference tracking: allow LD_ABS",
398 "reference tracking: forbid LD_ABS while holding reference",
415 "reference tracking: allow LD_IND",
432 "reference tracking: forbid LD_IND while holding reference",
450 "reference tracking: check reference or tail call",
472 "reference tracking: release reference then tail call",
493 "reference tracking: leak possible reference over tail call",
513 .errstr = "tail_call would lead to reference leak",
517 "reference tracking: leak checked reference over tail call",
537 .errstr = "tail_call would lead to reference leak",
541 "reference tracking: mangle and release sock_or_null",
555 "reference tracking: mangle and release sock",
569 "reference tracking: access member",
583 "reference tracking: write to member",
602 "reference tracking: invalid 64-bit access of member",
617 "reference tracking: access after release",
631 "reference tracking: direct access for lookup",
657 "reference tracking: use ptr from bpf_tcp_sock() after release",
680 "reference tracking: use ptr from bpf_sk_fullsock() after release",
703 "reference tracking: use ptr from bpf_sk_fullsock(tp) after release",
730 "reference tracking: use sk after bpf_sk_release(tp)",
752 "reference tracking: use ptr from bpf_get_listener_sock() after bpf_sk_release(sk)",
774 "reference tracking: bpf_sk_release(listen_sk)",
795 .errstr = "reference has not been acquired before",
799 "reference tracking: tp->snd_cwnd after bpf_sk_fullsock(sk) and bpf_tcp_sock(sk)",
825 "reference tracking: branch tracking valid pointer null comparison",
841 "reference tracking: branch tracking valid pointer value comparison",
854 .errstr = "Unreleased reference",
858 "reference tracking: bpf_sk_release(btf_tcp_sock)",
880 "reference tracking: use ptr from bpf_skc_to_tcp_sock() after release",