Searched refs:btf_id_set_contains (Results 1 – 5 of 5) sorted by relevance
/linux-6.1.9/kernel/bpf/ |
D | bpf_lsm.c | 79 btf_id_set_contains(&bpf_lsm_current_hooks, in BTF_SET_END() 107 if (!btf_id_set_contains(&bpf_lsm_hooks, prog->aux->attach_btf_id)) { in bpf_lsm_verify_prog() 233 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 236 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 243 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 246 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 348 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
|
D | btf.c | 7053 bool btf_id_set_contains(const struct btf_id_set *set, u32 id) in btf_id_set_contains() function
|
D | verifier.c | 14859 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID() 15176 btf_id_set_contains(&btf_id_deny, btf_id)) { in BTF_SET_START()
|
/linux-6.1.9/kernel/trace/ |
D | bpf_trace.c | 944 return btf_id_set_contains(&btf_allowlist_d_path, in BTF_ID()
|
/linux-6.1.9/include/linux/ |
D | bpf.h | 2686 bool btf_id_set_contains(const struct btf_id_set *set, u32 id);
|