Searched refs:PTR_UNTRUSTED (Results 1 – 3 of 3) sorted by relevance
421 (type == PTR_TO_MEM && !(reg->type & PTR_UNTRUSTED)) || in reg_not_null()1068 st->type |= PTR_UNTRUSTED; in mark_stack_slots_iter()1156 if (st->type & PTR_UNTRUSTED) in is_iter_reg_valid_init()5975 perm_flags |= PTR_UNTRUSTED; in map_kptr_match_type()6031 verbose(env, " or %s%s\n", reg_type_str(env, PTR_TO_BTF_ID | PTR_UNTRUSTED), in map_kptr_match_type()6115 ret |= PTR_UNTRUSTED; in btf_ld_kptr_type()7445 } else if (type_flag(reg->type) & PTR_UNTRUSTED) { in check_ptr_to_btf_access()7449 flag = PTR_UNTRUSTED; in check_ptr_to_btf_access()7479 flag & PTR_UNTRUSTED) in check_ptr_to_btf_access()7480 flag &= ~PTR_UNTRUSTED; in check_ptr_to_btf_access()[all …]
7065 if (BTF_INFO_KIND(t->info) == BTF_KIND_UNION && vlen != 1 && !(*flag & PTR_UNTRUSTED)) in btf_struct_walk()7071 *flag |= PTR_UNTRUSTED; in btf_struct_walk()7292 if (off + size > mtrue_end && !(*flag & PTR_UNTRUSTED)) { in btf_struct_walk()7357 *flag = MEM_RDONLY | PTR_UNTRUSTED; in btf_struct_access()7958 sub->args[i].arg_type = ARG_PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED; in btf_prepare_func_args()7975 sub->args[i].arg_type = ARG_PTR_TO_BTF_ID | PTR_UNTRUSTED; in btf_prepare_func_args()
737 PTR_UNTRUSTED = BIT(6 + BPF_BASE_TYPE_BITS), enumerator