Home
last modified time | relevance | path

Searched refs:btf_id_set_contains (Results 1 – 6 of 6) sorted by relevance

/openbmc/linux/kernel/bpf/
H A Dbpf_lsm.c78 btf_id_set_contains(&bpf_lsm_current_hooks, in BTF_SET_END()
106 if (!btf_id_set_contains(&bpf_lsm_hooks, prog->aux->attach_btf_id)) { in bpf_lsm_verify_prog()
234 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto()
237 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto()
244 if (btf_id_set_contains(&bpf_lsm_locked_sockopt_hooks, in bpf_lsm_func_proto()
247 if (btf_id_set_contains(&bpf_lsm_unlocked_sockopt_hooks, in bpf_lsm_func_proto()
362 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
367 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); in bpf_lsm_is_trusted()
H A Dverifier.c5339 return btf_id_set_contains(&rcu_protected_types, btf_id); in BTF_ID()
11859 if (meta.btf == btf_vmlinux && btf_id_set_contains(&special_kfunc_set, meta.func_id)) { in check_kfunc_call()
12041 if (meta.btf == btf_vmlinux && btf_id_set_contains(&special_kfunc_set, meta.func_id)) { in check_kfunc_call()
19818 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID()
20195 btf_id_set_contains(&btf_id_deny, btf_id)) { in check_attach_btf_id()
H A Dbtf.c5367 if (btf_id_set_contains(&aof.set, member->type)) in btf_parse_struct_metas()
/openbmc/linux/include/linux/
H A Dbtf.h475 static inline bool btf_id_set_contains(const struct btf_id_set *set, u32 id) in btf_id_set_contains() function
H A Dbpf.h3187 bool btf_id_set_contains(const struct btf_id_set *set, u32 id);
/openbmc/linux/kernel/trace/
H A Dbpf_trace.c959 return btf_id_set_contains(&btf_allowlist_d_path, in BTF_ID()