Home
last modified time | relevance | path

Searched refs:allow_ptr_leaks (Results 1 - 1 of 1) sorted by relevance

/device/soc/rockchip/common/sdk_linux/kernel/bpf/
H A Dverifier.c1815 print_bpf_insn(&cbs, insn, env->allow_ptr_leaks); in backtrack_insn()
2262 static bool __is_pointer_value(bool allow_ptr_leaks, const struct bpf_reg_state *reg) in __is_pointer_value() argument
2264 if (allow_ptr_leaks) { in __is_pointer_value()
2302 if (!env->allow_ptr_leaks && state->stack[spi].slot_type[0] == STACK_SPILL && size != BPF_REG_SIZE) { in check_stack_write_fixed_off()
2453 if (!env->allow_ptr_leaks && *stype != NOT_INIT && *stype != SCALAR_VALUE) { in check_stack_write_var_off()
2599 } else if (__is_pointer_value(env->allow_ptr_leaks, reg)) { in check_stack_read_fixed_off()
3063 return __is_pointer_value(env->allow_ptr_leaks, reg_state(env, regno)); in is_pointer_value()
4042 (state->stack[spi].spilled_ptr.type == SCALAR_VALUE || env->allow_ptr_leaks)) { in check_stack_range_initialized()
5940 * scalar. So we only emit a diagnostic if !env->allow_ptr_leaks.
5970 if (opcode == BPF_SUB && env->allow_ptr_leaks) { in adjust_ptr_min_max_vals()
[all...]

Completed in 18 milliseconds