Searched refs:BPF_READ (Results 1 – 5 of 5) sorted by relevance
601 if (type != BPF_READ) in kprobe_prog_is_valid_access()710 if (type != BPF_READ) in tp_prog_is_valid_access()859 if (type != BPF_READ) in raw_tp_prog_is_valid_access()882 if (type != BPF_READ) in pe_prog_is_valid_access()
97 return type == BPF_READ && off == 0 && size == sizeof(u32); in lirc_mode2_is_valid_access()
1703 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()1720 if (!err && t == BPF_READ && value_regno >= 0) { in check_mem_access()1779 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()1787 if (!err && size < BPF_REG_SIZE && value_regno >= 0 && t == BPF_READ && in check_mem_access()1830 BPF_SIZE(insn->code), BPF_READ, -1, true); in check_xadd()1975 !may_access_direct_pkt_data(env, meta, BPF_READ)) { in check_func_arg()4850 BPF_SIZE(insn->code), BPF_READ, in do_check()5370 type = BPF_READ; in convert_ctx_accesses()
190 BPF_READ = 1, enumerator
5334 return access_type == BPF_READ; in __sock_filter_check_attach_type()5600 if (type == BPF_READ) { in sock_addr_is_valid_access()5614 if (type == BPF_READ) { in sock_addr_is_valid_access()7217 off % size || type != BPF_READ) in sk_reuseport_is_valid_access()