/linux-master/kernel/bpf/ |
H A D | bpf_lsm.c | 79 prog->aux->attach_btf_id)) { 106 if (!btf_id_set_contains(&bpf_lsm_hooks, prog->aux->attach_btf_id)) { 107 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", 108 prog->aux->attach_btf_id, prog->aux->attach_func_name); 145 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); 235 prog->aux->attach_btf_id)) 238 prog->aux->attach_btf_id)) 245 prog->aux->attach_btf_id)) 248 prog->aux->attach_btf_id)) 382 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); [all...] |
H A D | cgroup.c | 131 u32 attach_btf_id; member in struct:cgroup_lsm_atype 138 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) argument 148 if (cgroup_lsm_atype[i].attach_btf_id == attach_btf_id) 152 if (cgroup_lsm_atype[i].attach_btf_id == 0) 159 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) argument 165 WARN_ON_ONCE(cgroup_lsm_atype[i].attach_btf_id && 166 cgroup_lsm_atype[i].attach_btf_id != attach_btf_id); 168 cgroup_lsm_atype[i].attach_btf_id 184 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) argument 957 u32 attach_btf_id = 0; local [all...] |
H A D | bpf_iter.c | 336 tinfo->btf_id = prog->aux->attach_btf_id; 343 u32 prog_btf_id = prog->aux->attach_btf_id; 380 if (tinfo->btf_id == prog->aux->attach_btf_id) { 425 link->prog->aux->attach_btf_id != new_prog->aux->attach_btf_id) { 538 prog_btf_id = prog->aux->attach_btf_id;
|
H A D | trampoline.c | 659 p->aux->attach_btf_id = prog->aux->attach_btf_id; 667 bpf_cgroup_atype_get(p->aux->attach_btf_id, cgroup_atype); 701 prog->aux->attach_btf_id, 707 prog->aux->attach_btf_id); 764 prog->aux->attach_btf_id);
|
H A D | syscall.c | 2779 } else if (attr->attach_btf_id) { 2794 attach_btf, attr->attach_btf_id, 2818 prog->aux->attach_btf_id = attr->attach_btf_id; 3420 btf_id = prog->aux->attach_btf_id; 4746 info.attach_btf_id = prog->aux->attach_btf_id;
|
H A D | bpf_struct_ops.c | 700 prog->aux->attach_btf_id != st_ops_desc->type_id ||
|
H A D | verifier.c | 15464 if (!env->prog->aux->attach_btf_id) 20654 if (!prog->aux->attach_btf_id) 20668 btf_id = prog->aux->attach_btf_id; 20671 verbose(env, "attach_btf_id %u is not a supported struct\n", 20774 bpf_log(log, "attach_btf_id %u is invalid\n", btf_id); 20779 bpf_log(log, "attach_btf_id %u doesn't have a name\n", btf_id); 20878 bpf_log(log, "attach_btf_id %u is not a typedef\n", 20883 bpf_log(log, "attach_btf_id %u points to wrong type name %s\n", 20900 bpf_log(log, "attach_btf_id %u is not a function\n", 20921 bpf_log(log, "attach_btf_id [all...] |
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | fexit_stress.c | 34 trace_opts.attach_btf_id = err;
|
H A D | module_fentry_shadow.c | 99 load_opts.attach_btf_id = btf_id[i];
|
H A D | fexit_bpf2bpf.c | 459 static int load_fentry(int attach_prog_fd, int attach_btf_id) argument 464 .attach_btf_id = attach_btf_id, 516 ASSERT_EQ(info.attach_btf_id, btf_id, "info.attach_btf_id");
|
H A D | lsm_cgroup.c | 54 if (info.attach_btf_id ==
|
/linux-master/tools/bpf/bpftool/ |
H A D | cgroup.c | 125 info.attach_btf_id < btf__type_cnt(btf_vmlinux)) { 127 btf__type_by_id(btf_vmlinux, info.attach_btf_id); 147 jsonw_uint_field(json_wtr, "attach_btf_id", info.attach_btf_id); 161 else if (info.attach_btf_id) 162 printf(" attach_btf_obj_id=%d attach_btf_id=%d", 163 info.attach_btf_obj_id, info.attach_btf_id);
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf_probes.c | 141 opts.attach_btf_id = 1; 144 exp_msg = "attach_btf_id 1 is not a function"; 150 opts.attach_btf_id = 1;
|
H A D | gen_loader.c | 953 attr.attach_btf_id = load_attr->attach_btf_id; 1011 offsetof(union bpf_attr, attach_btf_id)));
|
H A D | bpf.h | 83 __u32 attach_btf_id; member in struct:bpf_prog_load_opts
|
H A D | bpf.c | 288 attr.attach_btf_id = OPTS_GET(opts, attach_btf_id, 0);
|
H A D | libbpf.c | 460 __u32 attach_btf_id; member in struct:bpf_program 1199 * attach_btf_id and member_idx 1201 if (!prog->attach_btf_id) { 1202 prog->attach_btf_id = kern_type_id; 1211 if (prog->attach_btf_id != kern_type_id) { 1212 pr_warn("struct_ops init_kern %s func ptr %s: invalid reuse of prog %s in sec %s with type %u: attach_btf_id %u != kern_type_id %u\n", 1214 prog->attach_btf_id, kern_type_id); 7273 if ((def & SEC_ATTACH_BTF) && !prog->attach_btf_id) { 7300 prog->attach_btf_id = btf_type_id; 7303 * prog->atach_btf_obj_fd/prog->attach_btf_id anymor [all...] |
/linux-master/net/bpf/ |
H A D | bpf_dummy_struct_ops.c | 104 if (prog->aux->attach_btf_id != type_id)
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 1583 int attach_btf_id; local 1585 attach_btf_id = libbpf_find_vmlinux_btf_id(test->kfunc, 1587 if (attach_btf_id < 0) { 1594 opts.attach_btf_id = attach_btf_id;
|
/linux-master/drivers/hid/bpf/ |
H A D | hid_bpf_jmp_table.c | 356 if (hid_bpf_btf_ids[i] == prog->aux->attach_btf_id) {
|
/linux-master/include/uapi/linux/ |
H A D | bpf.h | 1548 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member in struct:bpf_attr::__anon2593 6575 __u32 attach_btf_id; member in struct:bpf_prog_info
|
/linux-master/tools/include/uapi/linux/ |
H A D | bpf.h | 1548 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member in struct:bpf_attr::__anon3134 6575 __u32 attach_btf_id; member in struct:bpf_prog_info
|
/linux-master/include/linux/ |
H A D | bpf.h | 1441 u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member in struct:bpf_prog_aux 1463 /* BTF_KIND_FUNC_PROTO for valid attach_btf_id */ 1465 /* function name for valid attach_btf_id */ 3378 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype); 3381 static inline void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) {} argument
|
/linux-master/net/core/ |
H A D | bpf_sk_storage.c | 377 btf_id = prog->aux->attach_btf_id;
|
/linux-master/kernel/trace/ |
H A D | bpf_trace.c | 960 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); 963 prog->aux->attach_btf_id);
|