Searched refs:PTR_TO_SOCKET (Results 1 – 6 of 6) sorted by relevance
433 return type == PTR_TO_SOCKET || in type_is_sk_pointer()441 return type == PTR_TO_SOCKET || in reg_type_not_null()468 return type == PTR_TO_SOCKET || in reg_type_may_be_refcounted_or_null()561 [PTR_TO_SOCKET] = "sock",1151 reg->type = PTR_TO_SOCKET; in mark_ptr_not_null_reg()1158 reg->type = PTR_TO_SOCKET; in mark_ptr_not_null_reg()2570 case PTR_TO_SOCKET: in is_spillable_regtype()3448 case PTR_TO_SOCKET: in check_sock_access()3601 case PTR_TO_SOCKET: in check_ptr_alignment()4841 PTR_TO_SOCKET,[all …]
1962 info->reg_type = PTR_TO_SOCKET; in cg_sockopt_is_valid_access()
5432 [PTR_TO_SOCKET] = &btf_sock_ids[BTF_SOCK_TYPE_SOCK],
1244 PTR_TO_SOCKET1248 returns this type, which becomes a PTR_TO_SOCKET when1249 checked != NULL. PTR_TO_SOCKET is reference-counted,1303 The 'id' field is also used on PTR_TO_SOCKET and PTR_TO_SOCKET_OR_NULL, common1306 it also handles reference tracking for the pointer. PTR_TO_SOCKET implicitly
427 PTR_TO_SOCKET, /* reg points to struct bpf_sock */ enumerator
8286 info->reg_type = PTR_TO_SOCKET; in sock_addr_is_valid_access()8428 info->reg_type = PTR_TO_SOCKET; in sk_msg_is_valid_access()10293 info->reg_type = PTR_TO_SOCKET; in sk_reuseport_is_valid_access()