Home
last modified time | relevance | path

Searched refs:PTR_TO_SOCKET (Results 1 – 5 of 5) sorted by relevance

/Linux-v5.10/kernel/bpf/
Dverifier.c393 return type == PTR_TO_SOCKET || in type_is_sk_pointer()
401 return type == PTR_TO_SOCKET || in reg_type_not_null()
427 return type == PTR_TO_SOCKET || in reg_type_may_be_refcounted_or_null()
512 [PTR_TO_SOCKET] = "sock",
2203 case PTR_TO_SOCKET: in is_spillable_regtype()
2826 case PTR_TO_SOCKET: in check_sock_access()
2981 case PTR_TO_SOCKET: in check_ptr_alignment()
3999 PTR_TO_SOCKET,
4009 PTR_TO_SOCKET,
4039 static const struct bpf_reg_types fullsock_types = { .types = { PTR_TO_SOCKET } };
[all …]
Dcgroup.c1814 info->reg_type = PTR_TO_SOCKET; in cg_sockopt_is_valid_access()
/Linux-v5.10/Documentation/networking/
Dfilter.rst1194 PTR_TO_SOCKET
1198 returns this type, which becomes a PTR_TO_SOCKET when
1199 checked != NULL. PTR_TO_SOCKET is reference-counted,
1253 The 'id' field is also used on PTR_TO_SOCKET and PTR_TO_SOCKET_OR_NULL, common
1256 it also handles reference tracking for the pointer. PTR_TO_SOCKET implicitly
/Linux-v5.10/include/linux/
Dbpf.h381 PTR_TO_SOCKET, /* reg points to struct bpf_sock */ enumerator
/Linux-v5.10/net/core/
Dfilter.c8031 info->reg_type = PTR_TO_SOCKET; in sock_addr_is_valid_access()
8173 info->reg_type = PTR_TO_SOCKET; in sk_msg_is_valid_access()