Searched refs:PTR_TO_BTF_ID (Results 1 – 4 of 4) sorted by relevance
/linux-5.19.10/net/ipv4/ |
D | bpf_tcp_ca.c | 88 if (info->reg_type == PTR_TO_BTF_ID && info->btf_id == sock_id) in bpf_tcp_ca_is_valid_access()
|
/linux-5.19.10/kernel/bpf/ |
D | verifier.c | 462 base_type(type) == PTR_TO_BTF_ID; in reg_type_may_be_refcounted_or_null() 553 [PTR_TO_BTF_ID] = "ptr_", in reg_type_str() 561 if (base_type(type) == PTR_TO_BTF_ID) in reg_type_str() 845 if (base_type(t) == PTR_TO_BTF_ID) in print_verifier_state() 1709 regs[regno].type = PTR_TO_BTF_ID | flag; in mark_btf_ld_reg() 2926 case PTR_TO_BTF_ID: in is_spillable_regtype() 3665 if (base_type(reg->type) != PTR_TO_BTF_ID || (type_flag(reg->type) & ~perm_flags)) in map_kptr_match_type() 3716 verbose(env, "expected=%s%s", reg_type_str(env, PTR_TO_BTF_ID), targ_name); in map_kptr_match_type() 3718 verbose(env, " or %s%s\n", reg_type_str(env, PTR_TO_BTF_ID | PTR_UNTRUSTED), in map_kptr_match_type() 3758 mark_btf_ld_reg(env, cur_regs(env), value_regno, PTR_TO_BTF_ID, off_desc->kptr.btf, in check_map_kptr_access() [all …]
|
D | btf.c | 5360 info->reg_type = PTR_TO_BTF_ID; in btf_ctx_access() 5675 return PTR_TO_BTF_ID; in btf_struct_access() 6190 } else if (is_kfunc && (reg->type == PTR_TO_BTF_ID || in btf_check_func_arg_match() 6204 if (reg->type == PTR_TO_BTF_ID) { in btf_check_func_arg_match()
|
/linux-5.19.10/include/linux/ |
D | bpf.h | 595 PTR_TO_BTF_ID, enumerator 610 PTR_TO_BTF_ID_OR_NULL = PTR_MAYBE_NULL | PTR_TO_BTF_ID,
|