allow_ptr_leaks 365 include/linux/bpf_verifier.h bool allow_ptr_leaks; allow_ptr_leaks 119 kernel/bpf/disasm.c bool allow_ptr_leaks) allow_ptr_leaks 204 kernel/bpf/disasm.c if (is_ptr && !allow_ptr_leaks) allow_ptr_leaks 39 kernel/bpf/disasm.h bool allow_ptr_leaks); allow_ptr_leaks 1002 kernel/bpf/verifier.c reg->precise = env->subprog_cnt > 1 || !env->allow_ptr_leaks ? allow_ptr_leaks 1139 kernel/bpf/verifier.c if (!env->allow_ptr_leaks) { allow_ptr_leaks 1462 kernel/bpf/verifier.c print_bpf_insn(&cbs, insn, env->allow_ptr_leaks); allow_ptr_leaks 1674 kernel/bpf/verifier.c if (!env->allow_ptr_leaks) allow_ptr_leaks 1869 kernel/bpf/verifier.c static bool __is_pointer_value(bool allow_ptr_leaks, allow_ptr_leaks 1872 kernel/bpf/verifier.c if (allow_ptr_leaks) allow_ptr_leaks 1909 kernel/bpf/verifier.c if (!env->allow_ptr_leaks && allow_ptr_leaks 1921 kernel/bpf/verifier.c !register_is_null(reg) && env->allow_ptr_leaks) { allow_ptr_leaks 1947 kernel/bpf/verifier.c if (!env->allow_ptr_leaks) { allow_ptr_leaks 2068 kernel/bpf/verifier.c } else if (__is_pointer_value(env->allow_ptr_leaks, reg)) { allow_ptr_leaks 2445 kernel/bpf/verifier.c return __is_pointer_value(env->allow_ptr_leaks, reg_state(env, regno)); allow_ptr_leaks 3004 kernel/bpf/verifier.c if (!env->allow_ptr_leaks) { allow_ptr_leaks 4271 kernel/bpf/verifier.c return env->allow_ptr_leaks || BPF_SRC(insn->code) == BPF_K; allow_ptr_leaks 4413 kernel/bpf/verifier.c if (!env->allow_ptr_leaks && !known && (smin_val < 0) != (smax_val < 0)) { allow_ptr_leaks 4578 kernel/bpf/verifier.c if (!env->allow_ptr_leaks) { allow_ptr_leaks 4907 kernel/bpf/verifier.c if (opcode == BPF_SUB && env->allow_ptr_leaks) { allow_ptr_leaks 6337 kernel/bpf/verifier.c if (loop_ok && env->allow_ptr_leaks) allow_ptr_leaks 7439 kernel/bpf/verifier.c if (!env->allow_ptr_leaks && states_cnt > BPF_COMPLEXITY_LIMIT_STATES) allow_ptr_leaks 7643 kernel/bpf/verifier.c print_bpf_insn(&cbs, insn, env->allow_ptr_leaks); allow_ptr_leaks 9351 kernel/bpf/verifier.c env->allow_ptr_leaks = is_priv;