Searched refs:bpf_obj_new (Results 1 – 15 of 15) sorted by relevance
31 f = bpf_obj_new(typeof(*f)); \35 f2 = bpf_obj_new(typeof(*f2)); \40 b = bpf_obj_new(typeof(*b)); \230 bpf_obj_new(union { int data; unsigned udata; }); in obj_new_no_struct()239 f = bpf_obj_new(struct foo); in obj_drop_non_zero_off()249 return bpf_obj_new(struct foo)->data; in new_null_ret()255 bpf_obj_new(struct foo); in obj_new_acq()264 f = bpf_obj_new(typeof(*f)); in use_after_drop()280 p = bpf_obj_new(typeof(*p)); in ptr_walk_scalar()292 f = bpf_obj_new(typeof(*f)); in direct_read_lock()[all …]
40 n = bpf_obj_new(typeof(*n)); in __add_three()45 m = bpf_obj_new(typeof(*m)); in __add_three()57 n = bpf_obj_new(typeof(*n)); in __add_three()80 n = bpf_obj_new(typeof(*n)); in rbtree_add_and_remove()85 m = bpf_obj_new(typeof(*m)); in rbtree_add_and_remove()118 n = bpf_obj_new(typeof(*n)); in rbtree_first_and_remove()124 m = bpf_obj_new(typeof(*m)); in rbtree_first_and_remove()130 o = bpf_obj_new(typeof(*o)); in rbtree_first_and_remove()186 n = bpf_obj_new(typeof(*n)); in rbtree_api_release_aliasing()
37 n = bpf_obj_new(typeof(*n)); in rbtree_api_nolock_add()51 n = bpf_obj_new(typeof(*n)); in rbtree_api_nolock_remove()78 n = bpf_obj_new(typeof(*n)); in rbtree_api_remove_unadded_node()82 m = bpf_obj_new(typeof(*m)); in rbtree_api_remove_unadded_node()141 n = bpf_obj_new(typeof(*n)); in rbtree_api_add_to_multiple_trees()186 n = bpf_obj_new(typeof(*n)); in rbtree_api_add_release_unlock_escape()272 n = bpf_obj_new(typeof(*n)); in add_with_cb()
40 n = bpf_obj_new(typeof(*n)); in rbtree_refcounted_node_ref_escapes()62 n = bpf_obj_new(typeof(*n)); in rbtree_refcounted_node_ref_escapes_owning_input()85 n = bpf_obj_new(typeof(*n)); in BPF_PROG()
79 n = bpf_obj_new(typeof(*n)); in __insert_in_tree_and_list()116 n = bpf_obj_new(typeof(*n)); in __stash_map_insert_tree()376 n = bpf_obj_new(typeof(*n)); in rbtree_refcounted_node_ref_escapes()398 n = bpf_obj_new(typeof(*n)); in rbtree_refcounted_node_ref_escapes_owning_input()435 n = bpf_obj_new(typeof(*n)); in rbtree_wrong_owner_remove_fail_a1()512 n = bpf_obj_new(typeof(*n)); in BPF_PROG()546 n = bpf_obj_new(typeof(*n)); in BPF_PROG()
20 f = bpf_obj_new(typeof(*f)); in list_push_pop()109 f[i] = bpf_obj_new(typeof(**f)); in list_push_pop_multiple()114 f[i + 1] = bpf_obj_new(typeof(**f)); in list_push_pop_multiple()185 f = bpf_obj_new(typeof(*f)); in list_in_list()189 b = bpf_obj_new(typeof(*b)); in list_in_list()
54 res = bpf_obj_new(typeof(*res)); in stash_rb_nodes()77 res = bpf_obj_new(typeof(*res)); in drop_rb_node_off()
39 f = bpf_obj_new(typeof(*f)); in lock_id_kptr_preserve()100 f1 = bpf_obj_new(typeof(*f1)); \103 f2 = bpf_obj_new(typeof(*f2)); \
58 res = bpf_obj_new(typeof(*res)); in create_and_stash()86 res = bpf_obj_new(typeof(*res)); in stash_plain()
28 n = bpf_obj_new(typeof(*n)); in rbtree_api_add__wrong_node_type()
42 n = bpf_obj_new(typeof(*n)); in rbtree_api_add__add_wrong_type()
90 struct node_data *n = bpf_obj_new(typeof(*n)); /* ACQUIRED */98 From the verifier's perspective, the pointer ``n`` returned from ``bpf_obj_new``123 struct node_data *n = bpf_obj_new(typeof(*n)); /* ACQUIRED */141 * Because graph nodes are allocated with ``bpf_obj_new`` and154 returned by ``bpf_obj_new`` is accordingly considered an *owning reference*.188 ``free``'d, and reused via bpf_obj_new would point to an entirely different thing.215 n = bpf_obj_new(typeof(*n)); /* 1 */
89 __bpf_kfunc void *bpf_obj_new(u32 local_type_id__k, ...)94 Here, bpf_obj_new uses local_type_id argument to find out the size of that type
343 bpf_obj_new for user defined types). Will the kernel preserve backwards
26 #define bpf_obj_new(type) ((type *)bpf_obj_new_impl(bpf_core_type_id_local(type), NULL)) macro