Searched refs:BPF_TRACE_ITER (Results 1 – 16 of 16) sorted by relevance
/openbmc/linux/kernel/bpf/preload/iterators/ |
H A D | iterators.lskel-big-endian.h | 27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach() 38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach()
|
H A D | iterators.lskel-little-endian.h | 27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach() 38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach()
|
/openbmc/linux/tools/testing/selftests/bpf/verifier/ |
H A D | sleepable.c | 47 .expected_attach_type = BPF_TRACE_ITER,
|
/openbmc/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 168 | | ``BPF_TRACE_ITER`` | ``iter+`` [#…
|
/openbmc/linux/include/linux/ |
H A D | bpf_verifier.h | 771 return prog->expected_attach_type != BPF_TRACE_ITER; in bpf_prog_check_recur()
|
/openbmc/linux/kernel/trace/ |
H A D | bpf_trace.c | 952 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID() 1983 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1987 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1991 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 2006 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
|
/openbmc/linux/net/core/ |
H A D | bpf_sk_storage.c | 367 case BPF_TRACE_ITER: in bpf_sk_storage_tracing_allowed()
|
H A D | filter.c | 11982 prog->expected_attach_type != BPF_TRACE_ITER) in BTF_SET8_START()
|
/openbmc/linux/tools/bpf/bpftool/ |
H A D | gen.c | 555 if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER) in codegen_attach_detach()
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 1039 BPF_TRACE_ITER, enumerator
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf.h | 1039 BPF_TRACE_ITER, enumerator
|
/openbmc/linux/tools/lib/bpf/ |
H A D | bpf.c | 752 case BPF_TRACE_ITER: in bpf_link_create()
|
H A D | libbpf.c | 112 [BPF_TRACE_ITER] = "trace_iter", 8818 SEC_DEF("iter+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF, attach_iter), 8819 SEC_DEF("iter.s+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_iter), 9261 case BPF_TRACE_ITER: in btf_get_kernel_prefix_kind() 12061 link_fd = bpf_link_create(prog_fd, target_fd, BPF_TRACE_ITER, in bpf_program__attach_iter()
|
/openbmc/linux/kernel/bpf/ |
H A D | syscall.c | 3802 case BPF_TRACE_ITER: in attach_type_to_prog_type() 5042 else if (prog->expected_attach_type == BPF_TRACE_ITER) in link_create()
|
H A D | verifier.c | 8741 if (eatype == BPF_TRACE_ITER) in may_update_sockmap() 15036 case BPF_TRACE_ITER: in check_return_code() 19953 case BPF_TRACE_ITER: in bpf_check_attach_target() 20112 case BPF_TRACE_ITER: in BTF_SET_START() 20180 } else if (prog->expected_attach_type == BPF_TRACE_ITER) { in check_attach_btf_id()
|
H A D | btf.c | 5916 return atype == BPF_TRACE_RAW_TP || atype == BPF_TRACE_ITER; in prog_args_trusted()
|