Symbol: BPF_READ
drivers/media/rc/bpf-lirc.c
127
return type == BPF_READ && off == 0 && size == sizeof(u32);
include/linux/bpf.h
2991
if (type != BPF_READ)
kernel/bpf/cgroup.c
2398
if (type != BPF_READ)
kernel/bpf/cgroup.c
2403
if (type == BPF_READ) {
kernel/bpf/verifier.c
10006
err = check_helper_mem_access(env, regno, key_size, BPF_READ, false, NULL);
kernel/bpf/verifier.c
10034
arg_type & MEM_WRITE ? BPF_WRITE : BPF_READ,
kernel/bpf/verifier.c
10078
arg_type & MEM_WRITE ? BPF_WRITE : BPF_READ,
kernel/bpf/verifier.c
10089
BPF_WRITE : BPF_READ,
kernel/bpf/verifier.c
10095
BPF_WRITE : BPF_READ,
kernel/bpf/verifier.c
22627
type = BPF_READ;
kernel/bpf/verifier.c
22714
if (type == BPF_READ) {
kernel/bpf/verifier.c
5731
false, BPF_READ, NULL);
kernel/bpf/verifier.c
5844
if (type == BPF_READ && !(cap & BPF_MAP_CAN_READ)) {
kernel/bpf/verifier.c
7446
if (atype != BPF_READ && !type_is_ptr_alloc_obj(reg->type)) {
kernel/bpf/verifier.c
7523
if (atype == BPF_READ && value_regno >= 0) {
kernel/bpf/verifier.c
7574
if (atype != BPF_READ) {
kernel/bpf/verifier.c
7637
if (type == BPF_READ)
kernel/bpf/verifier.c
7753
} else if (t == BPF_READ && value_regno >= 0) {
kernel/bpf/verifier.c
7815
if (!err && value_regno >= 0 && (t == BPF_READ || rdonly_mem))
kernel/bpf/verifier.c
7838
if (!err && t == BPF_READ && value_regno >= 0) {
kernel/bpf/verifier.c
7878
if (t == BPF_READ)
kernel/bpf/verifier.c
7896
if (!err && t == BPF_READ && value_regno >= 0)
kernel/bpf/verifier.c
7907
if (!err && t == BPF_READ && value_regno >= 0)
kernel/bpf/verifier.c
7920
if (!err && t == BPF_READ && value_regno >= 0)
kernel/bpf/verifier.c
7948
if (!err && value_regno >= 0 && (rdonly_mem || t == BPF_READ))
kernel/bpf/verifier.c
7951
if (t == BPF_READ && value_regno >= 0)
kernel/bpf/verifier.c
7959
if (!err && size < BPF_REG_SIZE && value_regno >= 0 && t == BPF_READ &&
kernel/bpf/verifier.c
7997
BPF_SIZE(insn->code), BPF_READ, insn->dst_reg,
kernel/bpf/verifier.c
8102
BPF_SIZE(insn->code), BPF_READ, -1, true, false);
kernel/bpf/verifier.c
8106
BPF_READ, load_reg, true, false);
kernel/bpf/verifier.c
8411
access_size, BPF_READ, -1);
kernel/bpf/verifier.c
8518
err = check_helper_mem_access(env, regno, mem_size, BPF_READ, true, NULL);
kernel/bpf/verifier.c
8545
err = check_mem_size_reg(env, reg, regno, BPF_READ, true, &meta);
kernel/bpf/verifier.c
9891
!may_access_direct_pkt_data(env, meta, BPF_READ)) {
kernel/sched/ext.c
5373
if (type != BPF_READ)
kernel/trace/bpf_trace.c
1461
if (type != BPF_READ)
kernel/trace/bpf_trace.c
1818
if (size != sizeof(u64) || type != BPF_READ)
kernel/trace/bpf_trace.c
1841
if (type != BPF_READ)
net/core/filter.c
11578
off % size || type != BPF_READ)
net/core/filter.c
11760
if (type != BPF_READ)
net/core/filter.c
9000
return access_type == BPF_READ;
net/core/filter.c
9372
if (type == BPF_READ) {
net/core/filter.c
9403
if (type != BPF_READ)
net/core/filter.c
9413
if (type != BPF_READ)
net/sched/bpf_qdisc.c
43
if (arg == 2 && type == BPF_READ) {