Searched refs:BPF_READ (Results 1 – 6 of 6) sorted by relevance
127 return type == BPF_READ && off == 0 && size == sizeof(u32); in lirc_mode2_is_valid_access()
5104 if (type == BPF_READ && !(cap & BPF_MAP_CAN_READ)) { in check_map_access_type()6458 if (atype != BPF_READ && !type_is_ptr_alloc_obj(reg->type)) { in check_ptr_to_btf_access()6535 if (atype == BPF_READ && value_regno >= 0) in check_ptr_to_btf_access()6583 if (atype != BPF_READ) { in check_ptr_to_map_access()6644 else if (type == BPF_READ) in check_stack_access_within_bounds()6746 } else if (t == BPF_READ && value_regno >= 0) { in check_mem_access()6790 if (!err && value_regno >= 0 && (t == BPF_READ || rdonly_mem)) in check_mem_access()6811 if (!err && t == BPF_READ && value_regno >= 0) { in check_mem_access()6843 if (t == BPF_READ) in check_mem_access()6861 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()[all …]
2225 if (type != BPF_READ) in sysctl_is_valid_access()2230 if (type == BPF_READ) { in sysctl_is_valid_access()
1605 if (type != BPF_READ) in kprobe_prog_is_valid_access()1716 if (type != BPF_READ) in tp_prog_is_valid_access()2062 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()2085 if (type != BPF_READ) in pe_prog_is_valid_access()
842 BPF_READ = 1, enumerator2415 if (type != BPF_READ) in bpf_tracing_ctx_access()
8747 return access_type == BPF_READ; in __sock_filter_check_attach_type()9110 if (type == BPF_READ) { in sock_addr_is_valid_access()9141 if (type != BPF_READ) in sock_addr_is_valid_access()9148 if (type == BPF_READ) { in sock_addr_is_valid_access()11312 off % size || type != BPF_READ) in sk_reuseport_is_valid_access()11494 if (type != BPF_READ) in sk_lookup_is_valid_access()