Searched refs:BPF_READ (Results 1 – 6 of 6) sorted by relevance
771 if (type != BPF_READ) in kprobe_prog_is_valid_access()880 if (type != BPF_READ) in tp_prog_is_valid_access()1073 if (type != BPF_READ) in raw_tp_prog_is_valid_access()1094 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()1117 if (type != BPF_READ) in pe_prog_is_valid_access()
130 return type == BPF_READ && off == 0 && size == sizeof(u32); in lirc_mode2_is_valid_access()
1315 if (type != BPF_READ) in sysctl_is_valid_access()1320 if (type == BPF_READ) { in sysctl_is_valid_access()
2141 if (type == BPF_READ && !(cap & BPF_MAP_CAN_READ)) { in check_map_access_type()2779 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()2796 if (!err && t == BPF_READ && value_regno >= 0) { in check_mem_access()2847 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()2858 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()2871 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()2879 if (!err && size < BPF_REG_SIZE && value_regno >= 0 && t == BPF_READ && in check_mem_access()2924 BPF_SIZE(insn->code), BPF_READ, -1, true); in check_xadd()3101 BPF_READ)) in check_helper_mem_access()3250 !may_access_direct_pkt_data(env, meta, BPF_READ)) { in check_func_arg()[all …]
250 BPF_READ = 1, enumerator
6676 return access_type == BPF_READ; in __sock_filter_check_attach_type()6973 if (type == BPF_READ) { in sock_addr_is_valid_access()7008 if (type != BPF_READ) in sock_addr_is_valid_access()7015 if (type == BPF_READ) { in sock_addr_is_valid_access()8830 off % size || type != BPF_READ) in sk_reuseport_is_valid_access()