Symbol: BPF_PROG_TYPE_SYSCALL
drivers/hid/bpf/hid_bpf_dispatch.c
669
err = register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &hid_bpf_syscall_kfunc_set);
include/linux/bpf_types.h
80
BPF_PROG_TYPE(BPF_PROG_TYPE_SYSCALL, bpf_syscall,
include/linux/bpf_verifier.h
973
case BPF_PROG_TYPE_SYSCALL:
kernel/bpf/btf.c
6248
case BPF_PROG_TYPE_SYSCALL:
kernel/bpf/btf.c
8839
case BPF_PROG_TYPE_SYSCALL:
kernel/bpf/cpumask.c
528
ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &cpumask_kfunc_set);
kernel/bpf/crypto.c
392
ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL,
kernel/bpf/helpers.c
4715
ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &generic_kfunc_set);
kernel/bpf/syscall.c
2749
case BPF_PROG_TYPE_SYSCALL:
kernel/bpf/syscall.c
6417
prog = bpf_prog_get_type(attr->test.prog_fd, BPF_PROG_TYPE_SYSCALL);
kernel/bpf/verifier.c
25371
if (prog->type == BPF_PROG_TYPE_SYSCALL) {
kernel/sched/ext.c
7492
(ret = register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL,
kernel/sched/ext.c
7498
(ret = register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL,
kernel/sched/ext_idle.c
1438
register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &scx_kfunc_set_idle);
net/bpf/test_run.c
1839
ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_prog_test_kfunc_set);
tools/lib/bpf/libbpf.c
229
[BPF_PROG_TYPE_SYSCALL] = "syscall",
tools/lib/bpf/libbpf_probes.c
155
case BPF_PROG_TYPE_SYSCALL:
tools/lib/bpf/skel_internal.h
391
attr.prog_type = BPF_PROG_TYPE_SYSCALL;
tools/testing/selftests/bpf/prog_tests/custom_sec_handlers.c
118
fallback_id = libbpf_register_prog_handler(NULL, BPF_PROG_TYPE_SYSCALL, 0, &opts);
tools/testing/selftests/bpf/prog_tests/custom_sec_handlers.c
140
ASSERT_EQ(bpf_program__type(skel->progs.xyz), BPF_PROG_TYPE_SYSCALL, "xyz_type");
tools/testing/selftests/bpf/test_kmods/bpf_testmod.c
1860
ret = ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_SYSCALL, &bpf_testmod_kfunc_set);
tools/testing/selftests/bpf/test_loader.c
1296
bpf_program__type(tprog) == BPF_PROG_TYPE_SYSCALL ? true : false,