Searched refs:PTR_UNTRUSTED (Results 1 – 4 of 4) sorted by relevance
414 (type == PTR_TO_MEM && !(reg->type & PTR_UNTRUSTED)) || in reg_not_null()1032 st->type |= PTR_UNTRUSTED; in mark_stack_slots_iter()1120 if (st->type & PTR_UNTRUSTED) in is_iter_reg_valid_init()5764 perm_flags |= PTR_UNTRUSTED; in map_kptr_match_type()5820 verbose(env, " or %s%s\n", reg_type_str(env, PTR_TO_BTF_ID | PTR_UNTRUSTED), in map_kptr_match_type()5905 ret |= PTR_UNTRUSTED; in btf_ld_kptr_type()7214 } else if (type_flag(reg->type) & PTR_UNTRUSTED) { in check_ptr_to_btf_access()7218 flag = PTR_UNTRUSTED; in check_ptr_to_btf_access()7248 flag & PTR_UNTRUSTED) in check_ptr_to_btf_access()7249 flag &= ~PTR_UNTRUSTED; in check_ptr_to_btf_access()[all …]
481 type & PTR_UNTRUSTED ? "untrusted_" : "", in reg_type_str()
6937 if (BTF_INFO_KIND(t->info) == BTF_KIND_UNION && vlen != 1 && !(*flag & PTR_UNTRUSTED)) in btf_struct_walk()6943 *flag |= PTR_UNTRUSTED; in btf_struct_walk()7164 if (off + size > mtrue_end && !(*flag & PTR_UNTRUSTED)) { in btf_struct_walk()7229 *flag = MEM_RDONLY | PTR_UNTRUSTED; in btf_struct_access()7829 sub->args[i].arg_type = ARG_PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED; in btf_prepare_func_args()7846 sub->args[i].arg_type = ARG_PTR_TO_BTF_ID | PTR_UNTRUSTED; in btf_prepare_func_args()
710 PTR_UNTRUSTED = BIT(6 + BPF_BASE_TYPE_BITS), enumerator