Searched refs:BPF_READ (Results 1 – 6 of 6) sorted by relevance
127 return type == BPF_READ && off == 0 && size == sizeof(u32); in lirc_mode2_is_valid_access()
1602 if (type != BPF_READ) in kprobe_prog_is_valid_access()1713 if (type != BPF_READ) in tp_prog_is_valid_access()2059 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()2082 if (type != BPF_READ) in pe_prog_is_valid_access()
6524 if (atype == BPF_READ && value_regno >= 0) in check_ptr_to_btf_access()6572 if (atype != BPF_READ) { in check_ptr_to_map_access()6633 else if (type == BPF_READ) in check_stack_access_within_bounds()6832 if (t == BPF_READ) in check_mem_access()6850 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()7062 bounds_check_type = BPF_READ; in check_stack_range_initialized()7213 BPF_READ)) in check_helper_mem_access()7250 access_size, BPF_READ, -1); in check_helper_mem_access()17112 BPF_READ, insn->dst_reg, false, in do_check()18307 type = BPF_READ; in convert_ctx_accesses()[all …]
2205 if (type != BPF_READ) in sysctl_is_valid_access()2210 if (type == BPF_READ) { in sysctl_is_valid_access()
830 BPF_READ = 1, enumerator2406 if (type != BPF_READ) in bpf_tracing_ctx_access()
8723 return access_type == BPF_READ; in __sock_filter_check_attach_type()9086 if (type == BPF_READ) { in sock_addr_is_valid_access()9117 if (type != BPF_READ) in sock_addr_is_valid_access()9124 if (type == BPF_READ) { in sock_addr_is_valid_access()11282 off % size || type != BPF_READ) in sk_reuseport_is_valid_access()11464 if (type != BPF_READ) in sk_lookup_is_valid_access()