/linux-master/kernel/bpf/ |
H A D | log.c | 509 const char *iter_type_str(const struct btf *btf, u32 btf_id) argument 511 if (!btf || btf_id == 0) 515 return btf_type_name(btf, btf_id) + sizeof(ITER_PREFIX) - 1; 708 verbose(env, "%s", btf_type_name(reg->btf, reg->btf_id)); 832 iter_type_str(reg->iter.btf, reg->iter.btf_id),
|
H A D | btf.c | 579 * positive btf_id or negative error. 3726 field->kptr.btf_id = id; 3938 u32 btf_id; local 3942 btf_id = rec->fields[i].graph_root.value_btf_id; 3943 meta = btf_find_struct_meta(btf, btf_id); 5470 type->btf_id = i; 5487 struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id) argument 5491 BUILD_BUG_ON(offsetof(struct btf_struct_meta, btf_id) != 0); 5495 return bsearch(&btf_id, tab->types, tab->cnt, sizeof(tab->types[0]), btf_id_cmp_func); 6342 if (!ctx_arg_info->btf_id) { 6800 __get_type_size(struct btf *btf, u32 btf_id, const struct btf_type **ret_type) argument 7030 u32 btf_id = 0; local 7160 u32 i, nargs, btf_id; local 8249 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id) argument 8778 btf_nested_type_is_trusted(struct bpf_verifier_log *log, const struct bpf_reg_state *reg, const char *field_name, u32 btf_id, const char *suffix) argument [all...] |
H A D | bpf_lsm.c | 375 bool bpf_lsm_is_sleepable_hook(u32 btf_id) 377 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id);
|
H A D | cgroup_iter.c | 292 bpf_cgroup_reg_info.ctx_arg_info[0].btf_id = bpf_cgroup_btf_id[0];
|
H A D | map_iter.c | 186 bpf_map_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_map_id;
|
H A D | cpumask.c | 469 .btf_id = cpumask_dtor_ids[0],
|
H A D | crypto.c | 370 .btf_id = bpf_crypto_dtor_ids[0],
|
H A D | syscall.c | 705 field->kptr.btf_id); 2540 struct btf *attach_btf, u32 btf_id, 2543 if (btf_id) { 2544 if (btf_id > BTF_MAX_TYPE) 2561 if (attach_btf && (!btf_id || dst_prog)) 3319 u32 btf_id, 3355 if (!!tgt_prog_fd != !!btf_id) { 3379 key = bpf_trampoline_compute_key(tgt_prog, NULL, btf_id); 3433 btf_id = prog->aux->attach_btf_id; 3434 key = bpf_trampoline_compute_key(NULL, prog->aux->attach_btf, btf_id); 2538 bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog) argument 3317 bpf_tracing_prog_attach(struct bpf_prog *prog, int tgt_prog_fd, u32 btf_id, u64 bpf_cookie) argument [all...] |
/linux-master/tools/perf/util/ |
H A D | bpf_counter.c | 77 if (info_linear->info.btf_id == 0) { 82 btf = btf__load_from_kernel_by_id(info_linear->info.btf_id); 92 info_linear->info.btf_id, func_info[0].type_id);
|
/linux-master/include/net/ |
H A D | xdp.h | 478 bool bpf_dev_bound_kfunc_id(u32 btf_id); 484 static inline bool bpf_dev_bound_kfunc_id(u32 btf_id) { return false; } argument
|
/linux-master/net/core/ |
H A D | bpf_sk_storage.c | 358 u32 btf_id; local 377 btf_id = prog->aux->attach_btf_id; 378 t = btf_type_by_id(btf_vmlinux, btf_id); 922 bpf_sk_storage_map_reg_info.ctx_arg_info[0].btf_id =
|
H A D | xdp.c | 797 bool bpf_dev_bound_kfunc_id(u32 btf_id) argument 799 return btf_id_set8_contains(&xdp_metadata_kfunc_ids, btf_id);
|
/linux-master/net/bpf/ |
H A D | bpf_dummy_struct_ops.c | 248 t = btf_type_by_id(reg->btf, reg->btf_id);
|
H A D | test_run.c | 1703 .btf_id = bpf_prog_test_dtor_kfunc_ids[0], 1707 .btf_id = bpf_prog_test_dtor_kfunc_ids[2],
|
/linux-master/net/netfilter/ |
H A D | nf_bpf_link.c | 281 info->btf_id = type_id;
|
H A D | nf_conntrack_bpf.c | 203 t = btf_type_by_id(reg->btf, reg->btf_id);
|
/linux-master/kernel/trace/ |
H A D | bpf_trace.c | 90 s32 *btf_id); 527 s32 btf_id; local 530 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id); 534 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags); 984 s32 *btf_id) 1000 *btf_id = ptr->type_id; 1004 if (*btf_id > 0) 1005 t = btf_type_by_id(*btf, *btf_id); 1006 if (*btf_id <= 0 || !t) 1016 s32 btf_id; local 982 bpf_btf_printf_prepare(struct btf_ptr *ptr, u32 btf_ptr_size, u64 flags, const struct btf **btf, s32 *btf_id) argument [all...] |
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 545 * corresponding to *btf_id*. 1340 * bpf_call->imm == btf_id of a BTF_KIND_FUNC in the running kernel 1630 __u32 btf_id; member in union:bpf_attr::__anon2895::__anon2896 1719 __u32 target_btf_id; /* btf_id of target to attach to */ 5176 * Returns btf_id and btf_obj_fd in lower and upper 32 bits. 6566 __u32 btf_id; member in struct:bpf_prog_info 6598 __u32 btf_id; member in struct:bpf_map_info
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 545 * corresponding to *btf_id*. 1340 * bpf_call->imm == btf_id of a BTF_KIND_FUNC in the running kernel 1630 __u32 btf_id; member in union:bpf_attr::__anon3505::__anon3506 1719 __u32 target_btf_id; /* btf_id of target to attach to */ 5176 * Returns btf_id and btf_obj_fd in lower and upper 32 bits. 6566 __u32 btf_id; member in struct:bpf_prog_info 6598 __u32 btf_id; member in struct:bpf_map_info
|
/linux-master/tools/bpf/bpftool/ |
H A D | btf_dumper.c | 64 if (!info.btf_id || !info.nr_func_info) 77 prog_btf = btf__load_from_kernel_by_id(info.btf_id);
|
H A D | common.c | 422 if (!prog_info->btf_id || prog_info->nr_func_info == 0) 434 prog_btf = btf__load_from_kernel_by_id(info.btf_id);
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf.c | 573 int btf_id; member in struct:extern_desc 590 /* target btf_id of the corresponding kernel var. */ 594 /* local btf_id of the ksym extern's type. */ 4193 ext->btf_id = find_extern_btf_id(obj->btf, ext_name); 4194 if (ext->btf_id <= 0) { 4196 ext_name, ext->btf_id); 4197 return ext->btf_id; 4199 t = btf__type_by_id(obj->btf, ext->btf_id); 4212 ext->sec_btf_id = find_extern_sec_btf_id(obj->btf, ext->btf_id); 4215 ext_name, ext->btf_id, ex 12705 int btf_id; local 13527 int btf_obj_fd = 0, btf_id = 0, err; local [all...] |
H A D | bpf_core_read.h | 329 extern void *bpf_rdonly_cast(const void *obj, __u32 btf_id) __ksym __weak;
|
/linux-master/kernel/ |
H A D | kallsyms.c | 890 ksym_iter_reg_info.ctx_arg_info[0].btf_id = *btf_ksym_iter_id;
|
/linux-master/include/linux/ |
H A D | bpf.h | 217 u32 btf_id; member in struct:btf_field_kptr 780 RET_PTR_TO_MEM_OR_BTF_ID, /* returns a pointer to a valid memory or a btf_id */ 781 RET_PTR_TO_BTF_ID, /* returns a pointer to a btf_id */ 839 int *ret_btf_id; /* return value btf_id */ 926 u32 btf_id; member in struct:bpf_insn_access_aux::__anon300::__anon301 1429 u32 btf_id; member in struct:bpf_ctx_arg_aux 2614 const char *field_name, u32 btf_id, const char *suffix);
|