Searched refs:btf_id_set_contains (Results 1 – 6 of 6) sorted by relevance
/linux-6.6.21/kernel/bpf/ |
D | bpf_lsm.c | 78 btf_id_set_contains(&bpf_lsm_current_hooks, in BTF_SET_END() 106 if (!btf_id_set_contains(&bpf_lsm_hooks, prog->aux->attach_btf_id)) { in bpf_lsm_verify_prog() 234 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 237 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 244 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 247 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 362 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID() 367 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); in bpf_lsm_is_trusted()
|
D | verifier.c | 5326 return btf_id_set_contains(&rcu_protected_types, btf_id); in BTF_ID() 11847 if (meta.btf == btf_vmlinux && btf_id_set_contains(&special_kfunc_set, meta.func_id)) { in check_kfunc_call() 12018 if (meta.btf == btf_vmlinux && btf_id_set_contains(&special_kfunc_set, meta.func_id)) { in check_kfunc_call() 19784 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID() 20161 btf_id_set_contains(&btf_id_deny, btf_id)) { in check_attach_btf_id()
|
D | btf.c | 5367 if (btf_id_set_contains(&aof.set, member->type)) in btf_parse_struct_metas()
|
/linux-6.6.21/include/linux/ |
D | btf.h | 475 static inline bool btf_id_set_contains(const struct btf_id_set *set, u32 id) in btf_id_set_contains() function
|
D | bpf.h | 3162 bool btf_id_set_contains(const struct btf_id_set *set, u32 id);
|
/linux-6.6.21/kernel/trace/ |
D | bpf_trace.c | 958 return btf_id_set_contains(&btf_allowlist_d_path, in BTF_ID()
|