BPF_READ 130 drivers/media/rc/bpf-lirc.c return type == BPF_READ && off == 0 && size == sizeof(u32); BPF_READ 1325 kernel/bpf/cgroup.c if (type != BPF_READ) BPF_READ 1330 kernel/bpf/cgroup.c if (type == BPF_READ) { BPF_READ 2160 kernel/bpf/verifier.c if (type == BPF_READ && !(cap & BPF_MAP_CAN_READ)) { BPF_READ 2789 kernel/bpf/verifier.c if (!err && t == BPF_READ && value_regno >= 0) BPF_READ 2806 kernel/bpf/verifier.c if (!err && t == BPF_READ && value_regno >= 0) { BPF_READ 2857 kernel/bpf/verifier.c if (!err && t == BPF_READ && value_regno >= 0) BPF_READ 2868 kernel/bpf/verifier.c if (!err && t == BPF_READ && value_regno >= 0) BPF_READ 2881 kernel/bpf/verifier.c if (!err && t == BPF_READ && value_regno >= 0) BPF_READ 2889 kernel/bpf/verifier.c if (!err && size < BPF_REG_SIZE && value_regno >= 0 && t == BPF_READ && BPF_READ 2934 kernel/bpf/verifier.c BPF_SIZE(insn->code), BPF_READ, -1, true); BPF_READ 3111 kernel/bpf/verifier.c BPF_READ)) BPF_READ 3260 kernel/bpf/verifier.c !may_access_direct_pkt_data(env, meta, BPF_READ)) { BPF_READ 7683 kernel/bpf/verifier.c BPF_READ, insn->dst_reg, false); BPF_READ 8613 kernel/bpf/verifier.c type = BPF_READ; BPF_READ 769 kernel/trace/bpf_trace.c if (type != BPF_READ) BPF_READ 878 kernel/trace/bpf_trace.c if (type != BPF_READ) BPF_READ 1071 kernel/trace/bpf_trace.c if (type != BPF_READ) BPF_READ 1092 kernel/trace/bpf_trace.c if (size != sizeof(u64) || type != BPF_READ) BPF_READ 1115 kernel/trace/bpf_trace.c if (type != BPF_READ) BPF_READ 6677 net/core/filter.c return access_type == BPF_READ; BPF_READ 6974 net/core/filter.c if (type == BPF_READ) { BPF_READ 7009 net/core/filter.c if (type != BPF_READ) BPF_READ 7016 net/core/filter.c if (type == BPF_READ) { BPF_READ 8831 net/core/filter.c off % size || type != BPF_READ)