Home
last modified time | relevance | path

Searched refs:PTR_UNTRUSTED (Results 1 – 3 of 3) sorted by relevance

/linux/kernel/bpf/
H A Dverifier.c421 (type == PTR_TO_MEM && !(reg->type & PTR_UNTRUSTED)) || in reg_not_null()
1068 st->type |= PTR_UNTRUSTED; in mark_stack_slots_iter()
1156 if (st->type & PTR_UNTRUSTED) in is_iter_reg_valid_init()
5975 perm_flags |= PTR_UNTRUSTED; in map_kptr_match_type()
6031 verbose(env, " or %s%s\n", reg_type_str(env, PTR_TO_BTF_ID | PTR_UNTRUSTED), in map_kptr_match_type()
6115 ret |= PTR_UNTRUSTED; in btf_ld_kptr_type()
7445 } else if (type_flag(reg->type) & PTR_UNTRUSTED) { in check_ptr_to_btf_access()
7449 flag = PTR_UNTRUSTED; in check_ptr_to_btf_access()
7479 flag & PTR_UNTRUSTED) in check_ptr_to_btf_access()
7480 flag &= ~PTR_UNTRUSTED; in check_ptr_to_btf_access()
[all …]
H A Dbtf.c7065 if (BTF_INFO_KIND(t->info) == BTF_KIND_UNION && vlen != 1 && !(*flag & PTR_UNTRUSTED)) in btf_struct_walk()
7071 *flag |= PTR_UNTRUSTED; in btf_struct_walk()
7292 if (off + size > mtrue_end && !(*flag & PTR_UNTRUSTED)) { in btf_struct_walk()
7357 *flag = MEM_RDONLY | PTR_UNTRUSTED; in btf_struct_access()
7958 sub->args[i].arg_type = ARG_PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED; in btf_prepare_func_args()
7975 sub->args[i].arg_type = ARG_PTR_TO_BTF_ID | PTR_UNTRUSTED; in btf_prepare_func_args()
/linux/include/linux/
H A Dbpf.h737 PTR_UNTRUSTED = BIT(6 + BPF_BASE_TYPE_BITS), enumerator