Searched refs:BPF_TRACE_ITER (Results 1 – 16 of 16) sorted by relevance
/Linux-v6.6/kernel/bpf/preload/iterators/ |
D | iterators.lskel-big-endian.h | 27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach() 38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach()
|
D | iterators.lskel-little-endian.h | 27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach() 38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach()
|
/Linux-v6.6/tools/testing/selftests/bpf/verifier/ |
D | sleepable.c | 47 .expected_attach_type = BPF_TRACE_ITER,
|
/Linux-v6.6/Documentation/bpf/libbpf/ |
D | program_types.rst | 168 | | ``BPF_TRACE_ITER`` | ``iter+`` [#…
|
/Linux-v6.6/include/linux/ |
D | bpf_verifier.h | 739 return prog->expected_attach_type != BPF_TRACE_ITER; in bpf_prog_check_recur()
|
/Linux-v6.6/kernel/trace/ |
D | bpf_trace.c | 949 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID() 1978 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1982 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 1986 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto() 2001 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
|
/Linux-v6.6/net/core/ |
D | bpf_sk_storage.c | 367 case BPF_TRACE_ITER: in bpf_sk_storage_tracing_allowed()
|
D | filter.c | 11853 prog->expected_attach_type != BPF_TRACE_ITER) in BTF_SET8_START()
|
/Linux-v6.6/tools/bpf/bpftool/ |
D | gen.c | 555 if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER) in codegen_attach_detach()
|
/Linux-v6.6/tools/include/uapi/linux/ |
D | bpf.h | 1022 BPF_TRACE_ITER, enumerator
|
/Linux-v6.6/include/uapi/linux/ |
D | bpf.h | 1022 BPF_TRACE_ITER, enumerator
|
/Linux-v6.6/tools/lib/bpf/ |
D | bpf.c | 752 case BPF_TRACE_ITER: in bpf_link_create()
|
D | libbpf.c | 111 [BPF_TRACE_ITER] = "trace_iter", 8812 SEC_DEF("iter+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF, attach_iter), 8813 SEC_DEF("iter.s+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_iter), 9255 case BPF_TRACE_ITER: in btf_get_kernel_prefix_kind() 12055 link_fd = bpf_link_create(prog_fd, target_fd, BPF_TRACE_ITER, in bpf_program__attach_iter()
|
/Linux-v6.6/kernel/bpf/ |
D | syscall.c | 3703 case BPF_TRACE_ITER: in attach_type_to_prog_type() 4938 else if (prog->expected_attach_type == BPF_TRACE_ITER) in link_create()
|
D | verifier.c | 8397 if (eatype == BPF_TRACE_ITER) in may_update_sockmap() 14585 case BPF_TRACE_ITER: in check_return_code() 19397 case BPF_TRACE_ITER: in bpf_check_attach_target() 19556 case BPF_TRACE_ITER: in BTF_SET_START() 19624 } else if (prog->expected_attach_type == BPF_TRACE_ITER) { in check_attach_btf_id()
|
D | btf.c | 5916 return atype == BPF_TRACE_RAW_TP || atype == BPF_TRACE_ITER; in prog_args_trusted()
|