Searched refs:bpf_obj_drop (Results 1 – 19 of 19) sorted by relevance
42 bpf_obj_drop(f); in list_push_pop()51 bpf_obj_drop(f); in list_push_pop()69 bpf_obj_drop(f); in list_push_pop()84 bpf_obj_drop(f); in list_push_pop()87 bpf_obj_drop(f); in list_push_pop()170 bpf_obj_drop(pf); in list_push_pop_multiple()204 bpf_obj_drop(f); in list_in_list()228 bpf_obj_drop(f); in list_in_list()246 bpf_obj_drop(b); in list_in_list()252 bpf_obj_drop(f); in list_in_list()[all …]
105 bpf_obj_drop(inner_local_kptr); in create_and_stash()113 bpf_obj_drop(inner_local_kptr); in create_and_stash()114 bpf_obj_drop(res); in create_and_stash()120 bpf_obj_drop(res); in create_and_stash()148 bpf_obj_drop(res); in stash_plain()171 bpf_obj_drop(res); in stash_local_with_root()181 bpf_obj_drop(res); in stash_local_with_root()204 bpf_obj_drop(res); in unstash_rb_node()210 bpf_obj_drop(res); in unstash_rb_node()255 bpf_obj_drop(p); in refcount_acquire_without_unstash()[all …]
59 bpf_obj_drop(n); in __add_three()119 bpf_obj_drop(n); in rbtree_add_and_remove()124 bpf_obj_drop(n); in rbtree_add_and_remove()126 bpf_obj_drop(m); in rbtree_add_and_remove()162 bpf_obj_drop(n); in rbtree_add_and_remove_array()167 bpf_obj_drop(n); in rbtree_add_and_remove_array()172 bpf_obj_drop(n); in rbtree_add_and_remove_array()235 bpf_obj_drop(o); in rbtree_first_and_remove()251 bpf_obj_drop(n); in rbtree_first_and_remove()253 bpf_obj_drop(m); in rbtree_first_and_remove()[all …]
91 bpf_obj_drop(m); in __insert_in_tree_and_list()125 bpf_obj_drop(n); in __stash_map_insert_tree()126 bpf_obj_drop(m); in __stash_map_insert_tree()169 bpf_obj_drop(n); in __read_from_tree()202 bpf_obj_drop(n); in __read_from_list()221 bpf_obj_drop(n); in __read_from_unstash()388 bpf_obj_drop(m); in rbtree_refcounted_node_ref_escapes()409 bpf_obj_drop(m); in rbtree_refcounted_node_ref_escapes_owning_input()419 bpf_obj_drop(n); in __stash_map_empty_xchg()424 bpf_obj_drop(n); in __stash_map_empty_xchg()[all …]
182 bpf_obj_drop(local); in BPF_PROG()190 bpf_obj_drop(local); in BPF_PROG()198 bpf_obj_drop(local); in BPF_PROG()207 bpf_obj_drop(local); in BPF_PROG()213 bpf_obj_drop(local); in BPF_PROG()
61 bpf_obj_drop(res); in stash_rb_nodes()81 bpf_obj_drop(&res->node); in drop_rb_node_off()
40 bpf_obj_drop(old); in del_array()63 bpf_obj_drop(old); in add_array()
68 bpf_obj_drop(m); in refcount_acquire_maybe_null()70 bpf_obj_drop(n); in refcount_acquire_maybe_null()
37 bpf_obj_drop(f1); \42 bpf_obj_drop(f2); \43 bpf_obj_drop(f1); \242 bpf_obj_drop(f+1); in obj_drop_non_zero_off()267 bpf_obj_drop(f); in use_after_drop()551 bpf_obj_drop(f); in incorrect_head_off1()
84 bpf_obj_drop(n); in rbtree_api_remove_unadded_node()101 bpf_obj_drop(n); in rbtree_api_remove_unadded_node()103 bpf_obj_drop(m); in rbtree_api_remove_unadded_node()
47 bpf_obj_drop(NULL); in __btf_root()
76 bpf_obj_drop(old); in batch_alloc()101 bpf_obj_drop(old); in batch_free()
122 bpf_obj_drop(p); in BPF_PROG()
218 bpf_obj_drop(f); in reject_with_cb_reference()
105 bpf_obj_drop(f1); \
103 ``bpf_obj_drop``, which ``free``'s the object, or by adding it to ``tree`` with110 object was ``free``'d with ``bpf_obj_drop`` the answer is obvious: the verifier111 should reject programs which attempt to access ``n`` after ``bpf_obj_drop`` as116 obvious. The verifier could enforce the same semantics as for ``bpf_obj_drop``,166 kfunc, or via ``bpf_obj_drop``, which ``free``'s the pointee177 ``bpf_obj_drop``187 via bpf_obj_drop. A non-owning ref to some chunk of memory that was remove'd,196 Currently ``bpf_obj_drop`` is not allowed in the critical section, so227 bpf_obj_drop(o);228 bpf_obj_drop(p); /* 6 */
726 bpf_obj_drop(cgv_node); in try_pick_next_cgroup()896 bpf_obj_drop(cgv_node); in BPF_STRUCT_OPS_SLEEPABLE()
40 #define bpf_obj_drop(kptr) bpf_obj_drop_impl(kptr, NULL) macro
252 #define bpf_obj_drop(kptr) bpf_obj_drop_impl(kptr, NULL) macro
Completed in 36 milliseconds