Searched refs:BPF_PROG_TYPE_SYSCALL (Results 1 – 15 of 15) sorted by relevance
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | custom_sec_handlers.c | 118 fallback_id = libbpf_register_prog_handler(NULL, BPF_PROG_TYPE_SYSCALL, 0, &opts); in test_custom_sec_handlers() 140 ASSERT_EQ(bpf_program__type(skel->progs.xyz), BPF_PROG_TYPE_SYSCALL, "xyz_type"); in test_custom_sec_handlers()
|
/openbmc/linux/include/linux/ |
H A D | bpf_types.h | 80 BPF_PROG_TYPE(BPF_PROG_TYPE_SYSCALL, bpf_syscall,
|
/openbmc/linux/tools/lib/bpf/ |
H A D | libbpf_probes.c | 155 case BPF_PROG_TYPE_SYSCALL: in probe_prog_load()
|
H A D | skel_internal.h | 331 attr.prog_type = BPF_PROG_TYPE_SYSCALL; in bpf_load_and_run()
|
H A D | libbpf.c | 211 [BPF_PROG_TYPE_SYSCALL] = "syscall",
|
/openbmc/linux/Documentation/bpf/libbpf/ |
H A D | program_types.rst | 150 | ``BPF_PROG_TYPE_SYSCALL`` | | ``syscall`` …
|
/openbmc/linux/drivers/hid/bpf/ |
H A D | hid_bpf_dispatch.c | 567 err = register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &hid_bpf_syscall_kfunc_set); in hid_bpf_init()
|
/openbmc/linux/tools/testing/selftests/bpf/bpf_testmod/ |
H A D | bpf_testmod.c | 535 ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_testmod_kfunc_set); in bpf_testmod_init()
|
/openbmc/linux/Documentation/bpf/ |
H A D | bpf_prog_run.rst | 41 - ``BPF_PROG_TYPE_SYSCALL``
|
/openbmc/linux/include/uapi/linux/ |
H A D | bpf.h | 1006 BPF_PROG_TYPE_SYSCALL, /* a program that can execute syscalls */ enumerator
|
/openbmc/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 1006 BPF_PROG_TYPE_SYSCALL, /* a program that can execute syscalls */ enumerator
|
/openbmc/linux/net/bpf/ |
H A D | test_run.c | 1702 ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_prog_test_kfunc_set); in BTF_ID()
|
/openbmc/linux/kernel/bpf/ |
H A D | syscall.c | 2524 case BPF_PROG_TYPE_SYSCALL: in bpf_prog_load_check_attach() 5587 prog = bpf_prog_get_type(attr->test.prog_fd, BPF_PROG_TYPE_SYSCALL); in kern_sys_bpf()
|
H A D | btf.c | 7832 case BPF_PROG_TYPE_SYSCALL: in bpf_prog_type_to_kfunc_hook()
|
H A D | verifier.c | 20134 if (prog->type == BPF_PROG_TYPE_SYSCALL) { in check_attach_btf_id()
|