Searched refs:BPF_PROG_TYPE_SYSCALL (Results 1 - 14 of 14) sorted by relevance
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | custom_sec_handlers.c | 114 /* fallback treats everything as BPF_PROG_TYPE_SYSCALL program to test 118 fallback_id = libbpf_register_prog_handler(NULL, BPF_PROG_TYPE_SYSCALL, 0, &opts); 140 ASSERT_EQ(bpf_program__type(skel->progs.xyz), BPF_PROG_TYPE_SYSCALL, "xyz_type");
|
/linux-master/include/linux/ |
H A D | bpf_types.h | 80 BPF_PROG_TYPE(BPF_PROG_TYPE_SYSCALL, bpf_syscall,
|
/linux-master/tools/lib/bpf/ |
H A D | skel_internal.h | 331 attr.prog_type = BPF_PROG_TYPE_SYSCALL;
|
H A D | libbpf_probes.c | 155 case BPF_PROG_TYPE_SYSCALL:
|
H A D | libbpf.c | 223 [BPF_PROG_TYPE_SYSCALL] = "syscall",
|
/linux-master/drivers/hid/bpf/ |
H A D | hid_bpf_dispatch.c | 575 err = register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &hid_bpf_syscall_kfunc_set);
|
/linux-master/tools/testing/selftests/bpf/bpf_testmod/ |
H A D | bpf_testmod.c | 646 ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_testmod_kfunc_set);
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_loader.c | 657 bpf_program__type(tprog) == BPF_PROG_TYPE_SYSCALL ? true : false);
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 1056 BPF_PROG_TYPE_SYSCALL, /* a program that can execute syscalls */ enumerator in enum:bpf_prog_type
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 1056 BPF_PROG_TYPE_SYSCALL, /* a program that can execute syscalls */ enumerator in enum:bpf_prog_type
|
/linux-master/net/bpf/ |
H A D | test_run.c | 1708 ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_prog_test_kfunc_set);
|
/linux-master/kernel/bpf/ |
H A D | syscall.c | 2621 case BPF_PROG_TYPE_SYSCALL: 5793 prog = bpf_prog_get_type(attr->test.prog_fd, BPF_PROG_TYPE_SYSCALL);
|
H A D | btf.c | 5897 case BPF_PROG_TYPE_SYSCALL: 8122 case BPF_PROG_TYPE_SYSCALL:
|
H A D | verifier.c | 21054 if (prog->type == BPF_PROG_TYPE_SYSCALL) {
|
Completed in 368 milliseconds