Home
last modified time | relevance | path

Searched refs:PTR_TO_SOCKET (Results 1 – 5 of 5) sorted by relevance

/Linux-v5.4/kernel/bpf/
Dverifier.c327 return type == PTR_TO_SOCKET || in type_is_sk_pointer()
349 return type == PTR_TO_SOCKET || in reg_type_may_be_refcounted_or_null()
395 [PTR_TO_SOCKET] = "sock",
1845 case PTR_TO_SOCKET: in is_spillable_regtype()
2393 case PTR_TO_SOCKET: in check_sock_access()
2557 case PTR_TO_SOCKET: in check_ptr_alignment()
3298 expected_type = PTR_TO_SOCKET; in check_func_arg()
4368 case PTR_TO_SOCKET: in adjust_ptr_min_max_vals()
5628 reg->type = PTR_TO_SOCKET; in mark_ptr_or_null_reg()
6909 case PTR_TO_SOCKET: in regsafe()
[all …]
Dcgroup.c1459 info->reg_type = PTR_TO_SOCKET; in cg_sockopt_is_valid_access()
/Linux-v5.4/Documentation/networking/
Dfilter.txt1133 PTR_TO_SOCKET Pointer to struct bpf_sock_ops, implicitly refcounted.
1136 returns this type, which becomes a PTR_TO_SOCKET when
1137 checked != NULL. PTR_TO_SOCKET is reference-counted,
1187 The 'id' field is also used on PTR_TO_SOCKET and PTR_TO_SOCKET_OR_NULL, common
1190 it also handles reference tracking for the pointer. PTR_TO_SOCKET implicitly
/Linux-v5.4/include/linux/
Dbpf.h276 PTR_TO_SOCKET, /* reg points to struct bpf_sock */ enumerator
/Linux-v5.4/net/core/
Dfilter.c7012 info->reg_type = PTR_TO_SOCKET; in sock_addr_is_valid_access()