Searched refs:btf_id_set_contains (Results 1 – 4 of 4) sorted by relevance
/kernel/bpf/ |
D | bpf_lsm.c | 78 btf_id_set_contains(&bpf_lsm_current_hooks, in BTF_SET_END() 106 if (!btf_id_set_contains(&bpf_lsm_hooks, prog->aux->attach_btf_id)) { in bpf_lsm_verify_prog() 232 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 235 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 242 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 245 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 347 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
|
D | btf.c | 7069 bool btf_id_set_contains(const struct btf_id_set *set, u32 id) in btf_id_set_contains() function
|
D | verifier.c | 15138 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID() 15459 btf_id_set_contains(&btf_id_deny, btf_id)) { in BTF_SET_START()
|
/kernel/trace/ |
D | bpf_trace.c | 963 return btf_id_set_contains(&btf_allowlist_d_path, in BTF_ID()
|