Home
last modified time | relevance | path

Searched refs:BPF_TRACE_ITER (Results 1 – 16 of 16) sorted by relevance

/Linux-v6.6/kernel/bpf/preload/iterators/
Diterators.lskel-big-endian.h27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach()
38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach()
Diterators.lskel-little-endian.h27 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_map__attach()
38 int fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER); in iterators_bpf__dump_bpf_prog__attach()
/Linux-v6.6/tools/testing/selftests/bpf/verifier/
Dsleepable.c47 .expected_attach_type = BPF_TRACE_ITER,
/Linux-v6.6/Documentation/bpf/libbpf/
Dprogram_types.rst168 | | ``BPF_TRACE_ITER`` | ``iter+`` [#…
/Linux-v6.6/include/linux/
Dbpf_verifier.h739 return prog->expected_attach_type != BPF_TRACE_ITER; in bpf_prog_check_recur()
/Linux-v6.6/kernel/trace/
Dbpf_trace.c949 prog->expected_attach_type == BPF_TRACE_ITER) in BTF_ID()
1978 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1982 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
1986 return prog->expected_attach_type == BPF_TRACE_ITER ? in tracing_prog_func_proto()
2001 if (!fn && prog->expected_attach_type == BPF_TRACE_ITER) in tracing_prog_func_proto()
/Linux-v6.6/net/core/
Dbpf_sk_storage.c367 case BPF_TRACE_ITER: in bpf_sk_storage_tracing_allowed()
Dfilter.c11853 prog->expected_attach_type != BPF_TRACE_ITER) in BTF_SET8_START()
/Linux-v6.6/tools/bpf/bpftool/
Dgen.c555 if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER) in codegen_attach_detach()
/Linux-v6.6/tools/include/uapi/linux/
Dbpf.h1022 BPF_TRACE_ITER, enumerator
/Linux-v6.6/include/uapi/linux/
Dbpf.h1022 BPF_TRACE_ITER, enumerator
/Linux-v6.6/tools/lib/bpf/
Dbpf.c752 case BPF_TRACE_ITER: in bpf_link_create()
Dlibbpf.c111 [BPF_TRACE_ITER] = "trace_iter",
8812 SEC_DEF("iter+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF, attach_iter),
8813 SEC_DEF("iter.s+", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_iter),
9255 case BPF_TRACE_ITER: in btf_get_kernel_prefix_kind()
12055 link_fd = bpf_link_create(prog_fd, target_fd, BPF_TRACE_ITER, in bpf_program__attach_iter()
/Linux-v6.6/kernel/bpf/
Dsyscall.c3703 case BPF_TRACE_ITER: in attach_type_to_prog_type()
4938 else if (prog->expected_attach_type == BPF_TRACE_ITER) in link_create()
Dverifier.c8397 if (eatype == BPF_TRACE_ITER) in may_update_sockmap()
14585 case BPF_TRACE_ITER: in check_return_code()
19397 case BPF_TRACE_ITER: in bpf_check_attach_target()
19556 case BPF_TRACE_ITER: in BTF_SET_START()
19624 } else if (prog->expected_attach_type == BPF_TRACE_ITER) { in check_attach_btf_id()
Dbtf.c5916 return atype == BPF_TRACE_RAW_TP || atype == BPF_TRACE_ITER; in prog_args_trusted()