Home
last modified time | relevance | path

Searched refs:BPF_READ (Results 1 – 8 of 8) sorted by relevance

/linux-6.1.9/net/bpf/
Dbpf_dummy_struct_ops.c185 return atype == BPF_READ ? err : NOT_INIT; in bpf_dummy_ops_btf_struct_access()
/linux-6.1.9/net/ipv4/
Dbpf_tcp_ca.c80 if (atype == BPF_READ) in bpf_tcp_ca_btf_struct_access()
/linux-6.1.9/drivers/media/rc/
Dbpf-lirc.c127 return type == BPF_READ && off == 0 && size == sizeof(u32); in lirc_mode2_is_valid_access()
/linux-6.1.9/kernel/trace/
Dbpf_trace.c1547 if (type != BPF_READ) in kprobe_prog_is_valid_access()
1658 if (type != BPF_READ) in tp_prog_is_valid_access()
2004 if (size != sizeof(u64) || type != BPF_READ) in raw_tp_writable_prog_is_valid_access()
2027 if (type != BPF_READ) in pe_prog_is_valid_access()
/linux-6.1.9/kernel/bpf/
Dverifier.c3562 if (type == BPF_READ && !(cap & BPF_MAP_CAN_READ)) { in check_map_access_type()
4564 if (atype != BPF_READ) { in check_ptr_to_btf_access()
4582 if (atype == BPF_READ && value_regno >= 0) in check_ptr_to_btf_access()
4629 if (atype != BPF_READ) { in check_ptr_to_map_access()
4686 else if (type == BPF_READ) in check_stack_access_within_bounds()
4789 } else if (t == BPF_READ && value_regno >= 0) { in check_mem_access()
4833 if (!err && value_regno >= 0 && (t == BPF_READ || rdonly_mem)) in check_mem_access()
4854 if (!err && t == BPF_READ && value_regno >= 0) { in check_mem_access()
4891 if (t == BPF_READ) in check_mem_access()
4909 if (!err && t == BPF_READ && value_regno >= 0) in check_mem_access()
[all …]
Dcgroup.c2173 if (type != BPF_READ) in sysctl_is_valid_access()
2178 if (type == BPF_READ) { in sysctl_is_valid_access()
/linux-6.1.9/include/linux/
Dbpf.h611 BPF_READ = 1, enumerator
2020 if (type != BPF_READ) in bpf_tracing_ctx_access()
/linux-6.1.9/net/core/
Dfilter.c8473 return access_type == BPF_READ; in __sock_filter_check_attach_type()
8691 if (atype == BPF_READ) in tc_cls_act_btf_struct_access()
8771 if (atype == BPF_READ) in xdp_btf_struct_access()
8851 if (type == BPF_READ) { in sock_addr_is_valid_access()
8882 if (type != BPF_READ) in sock_addr_is_valid_access()
8889 if (type == BPF_READ) { in sock_addr_is_valid_access()
11020 off % size || type != BPF_READ) in sk_reuseport_is_valid_access()
11202 if (type != BPF_READ) in sk_lookup_is_valid_access()