Searched refs:btf_id_set_contains (Results 1 – 6 of 6) sorted by relevance
/linux/kernel/bpf/ |
H A D | bpf_lsm.c | 95 btf_id_set_contains(&bpf_lsm_current_hooks, in BTF_SET_END() 126 if (btf_id_set_contains(&bpf_lsm_disabled_hooks, btf_id)) { in bpf_lsm_verify_prog() 132 if (!btf_id_set_contains(&bpf_lsm_hooks, btf_id)) { in bpf_lsm_verify_prog() 260 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 263 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 270 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto() 273 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto() 398 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID() 403 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); in bpf_lsm_is_trusted() 432 if (btf_id_set_contains(&bool_lsm_hooks, prog->aux->attach_btf_id)) { in BTF_ID()
|
H A D | verifier.c | 5707 return btf_id_set_contains(&rcu_protected_types, btf_id); in BTF_ID() 13252 if (meta.btf == btf_vmlinux && btf_id_set_contains(&special_kfunc_set, meta.func_id)) { in check_kfunc_call() 13485 if (meta.btf == btf_vmlinux && btf_id_set_contains(&special_kfunc_set, meta.func_id)) { in check_kfunc_call() 22516 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID() 22945 btf_id_set_contains(&btf_id_deny, btf_id)) { in check_attach_btf_id()
|
H A D | btf.c | 5623 if (btf_id_set_contains(aof, member->type)) in btf_parse_struct_metas()
|
/linux/include/linux/ |
H A D | btf.h | 507 static inline bool btf_id_set_contains(const struct btf_id_set *set, u32 id) in btf_id_set_contains() function
|
H A D | bpf.h | 3484 bool btf_id_set_contains(const struct btf_id_set *set, u32 id);
|
/linux/kernel/trace/ |
H A D | bpf_trace.c | 952 return btf_id_set_contains(&btf_allowlist_d_path, in BTF_ID()
|