Searched refs:btf_id (Results 1 - 25 of 59) sorted by path

123

/linux-master/include/linux/
H A Dbpf.h216 u32 btf_id; member in struct:btf_field_kptr
770 RET_PTR_TO_MEM_OR_BTF_ID, /* returns a pointer to a valid memory or a btf_id */
771 RET_PTR_TO_BTF_ID, /* returns a pointer to a btf_id */
829 int *ret_btf_id; /* return value btf_id */
916 u32 btf_id; member in struct:bpf_insn_access_aux::__anon211::__anon212
1419 u32 btf_id; member in struct:bpf_ctx_arg_aux
2614 const char *field_name, u32 btf_id, const char *suffix);
H A Dbpf_lsm.h30 bool bpf_lsm_is_sleepable_hook(u32 btf_id);
50 static inline bool bpf_lsm_is_sleepable_hook(u32 btf_id) argument
H A Dbpf_verifier.h8 #include <linux/btf.h> /* for struct btf and btf_id() */
97 u32 btf_id; member in struct:bpf_reg_state::__anon1915::__anon1917
123 u32 btf_id; member in struct:bpf_reg_state::__anon1915::__anon1920
529 u32 btf_id; /* btf_id for struct typed var */ member in struct:bpf_insn_aux_data::__anon1923::__anon1925::__anon1926::__anon1927
615 u32 btf_id; member in union:bpf_subprog_arg_info::__anon1929
795 struct btf *btf, u32 btf_id)
798 return ((u64)tgt_prog->aux->id << 32) | btf_id;
800 return ((u64)btf_obj_id(btf) << 32) | 0x80000000 | btf_id;
804 static inline void bpf_trampoline_unpack_key(u64 key, u32 *obj_id, u32 *btf_id) argument
794 bpf_trampoline_compute_key(const struct bpf_prog *tgt_prog, struct btf *btf, u32 btf_id) argument
[all...]
H A Dbtf.h124 u32 btf_id; member in struct:btf_id_dtor_kfunc
129 u32 btf_id; member in struct:btf_struct_meta
530 s32 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id);
533 struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id);
563 static inline s32 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id) argument
572 static inline struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id) argument
/linux-master/include/net/
H A Dxdp.h478 bool bpf_dev_bound_kfunc_id(u32 btf_id);
484 static inline bool bpf_dev_bound_kfunc_id(u32 btf_id) { return false; } argument
/linux-master/include/uapi/linux/
H A Dbpf.h545 * corresponding to *btf_id*.
1338 * bpf_call->imm == btf_id of a BTF_KIND_FUNC in the running kernel
1628 __u32 btf_id; member in union:bpf_attr::__anon2600::__anon2601
1715 __u32 target_btf_id; /* btf_id of target to attach to */
5168 * Returns btf_id and btf_obj_fd in lower and upper 32 bits.
6558 __u32 btf_id; member in struct:bpf_prog_info
6590 __u32 btf_id; member in struct:bpf_map_info
/linux-master/kernel/bpf/
H A Dbpf_iter.c13 u32 btf_id; /* cached value */ member in struct:bpf_iter_target_info
336 tinfo->btf_id = prog->aux->attach_btf_id;
352 if (iter->btf_id && iter->btf_id == prog_btf_id) {
380 if (tinfo->btf_id == prog->aux->attach_btf_id) {
541 if (iter->btf_id == prog_btf_id) {
H A Dbpf_lsm.c375 bool bpf_lsm_is_sleepable_hook(u32 btf_id)
377 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id);
H A Dbpf_struct_ops.c161 s32 btf_id; local
170 btf_id = btf_find_by_name_kind(btf, stub_func_name, BTF_KIND_FUNC);
171 if (btf_id < 0)
173 func_type = btf_type_by_id(btf, btf_id);
274 info->btf_id = arg_btf_id;
H A Dbtf.c578 * positive btf_id or negative error.
3714 field->kptr.btf_id = id;
3920 u32 btf_id; local
3924 btf_id = rec->fields[i].graph_root.value_btf_id;
3925 meta = btf_find_struct_meta(btf, btf_id);
5452 type->btf_id = i;
5469 struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id) argument
5473 BUILD_BUG_ON(offsetof(struct btf_struct_meta, btf_id) != 0);
5477 return bsearch(&btf_id, tab->types, tab->cnt, sizeof(tab->types[0]), btf_id_cmp_func);
6321 if (!ctx_arg_info->btf_id) {
6779 __get_type_size(struct btf *btf, u32 btf_id, const struct btf_type **ret_type) argument
7009 u32 btf_id = 0; local
7139 u32 i, nargs, btf_id; local
8226 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id) argument
8755 btf_nested_type_is_trusted(struct bpf_verifier_log *log, const struct bpf_reg_state *reg, const char *field_name, u32 btf_id, const char *suffix) argument
[all...]
H A Dcgroup_iter.c292 bpf_cgroup_reg_info.ctx_arg_info[0].btf_id = bpf_cgroup_btf_id[0];
H A Dcpumask.c469 .btf_id = cpumask_dtor_ids[0],
H A Dhelpers.c1424 /* Unlike other PTR_TO_BTF_ID helpers the btf_id in bpf_kptr_xchg()
2636 .btf_id = generic_dtor_ids[0],
2641 .btf_id = generic_dtor_ids[2],
H A Dlink_iter.c103 bpf_link_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_link_id;
H A Dlog.c509 const char *iter_type_str(const struct btf *btf, u32 btf_id) argument
511 if (!btf || btf_id == 0)
515 return btf_type_name(btf, btf_id) + sizeof(ITER_PREFIX) - 1;
708 verbose(env, "%s", btf_type_name(reg->btf, reg->btf_id));
832 iter_type_str(reg->iter.btf, reg->iter.btf_id),
H A Dmap_iter.c186 bpf_map_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_map_id;
H A Dprog_iter.c103 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id;
H A Dsyscall.c693 field->kptr.btf_id);
2527 struct btf *attach_btf, u32 btf_id,
2530 if (btf_id) {
2531 if (btf_id > BTF_MAX_TYPE)
2548 if (attach_btf && (!btf_id || dst_prog))
3306 u32 btf_id,
3342 if (!!tgt_prog_fd != !!btf_id) {
3366 key = bpf_trampoline_compute_key(tgt_prog, NULL, btf_id);
3420 btf_id = prog->aux->attach_btf_id;
3421 key = bpf_trampoline_compute_key(NULL, prog->aux->attach_btf, btf_id);
2525 bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, struct btf *attach_btf, u32 btf_id, struct bpf_prog *dst_prog) argument
3304 bpf_tracing_prog_attach(struct bpf_prog *prog, int tgt_prog_fd, u32 btf_id, u64 bpf_cookie) argument
[all...]
H A Dtask_iter.c1062 task_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK];
1067 task_file_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK];
1068 task_file_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_FILE];
1073 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK];
1074 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_VMA];
H A Dverifier.c284 u32 btf_id; member in struct:bpf_call_arg_meta
310 /* arg_{btf,btf_id,owning_ref} are used by kfunc-specific handling,
417 meta = btf_find_struct_meta(reg->btf, reg->btf_id);
503 static bool is_sync_callback_calling_kfunc(u32 btf_id);
1004 struct btf *btf, u32 btf_id, int nr_slots)
1032 st->iter.btf_id = btf_id;
1104 struct btf *btf, u32 btf_id, int nr_slots)
1124 if (st->iter.btf != btf || st->iter.btf_id != btf_id)
1001 mark_stack_slots_iter(struct bpf_verifier_env *env, struct bpf_kfunc_call_arg_meta *meta, struct bpf_reg_state *reg, int insn_idx, struct btf *btf, u32 btf_id, int nr_slots) argument
1103 is_iter_reg_valid_init(struct bpf_verifier_env *env, struct bpf_reg_state *reg, struct btf *btf, u32 btf_id, int nr_slots) argument
2348 mark_btf_ld_reg(struct bpf_verifier_env *env, struct bpf_reg_state *regs, u32 regno, enum bpf_reg_type reg_type, struct btf *btf, u32 btf_id, enum bpf_type_flag flag) argument
5302 rcu_protected_object(const struct btf *btf, u32 btf_id) argument
5558 check_ctx_access(struct bpf_verifier_env *env, int insn_idx, int off, int size, enum bpf_access_type t, enum bpf_reg_type *reg_type, struct btf **btf, u32 *btf_id) argument
6395 type_is_rcu(struct bpf_verifier_env *env, struct bpf_reg_state *reg, const char *field_name, u32 btf_id) argument
6406 type_is_rcu_or_null(struct bpf_verifier_env *env, struct bpf_reg_state *reg, const char *field_name, u32 btf_id) argument
6417 type_is_trusted(struct bpf_verifier_env *env, struct bpf_reg_state *reg, const char *field_name, u32 btf_id) argument
6442 u32 btf_id = 0; local
6591 u32 btf_id; local
6836 u32 btf_id = 0; local
7772 u32 btf_id; local
8106 u32 *btf_id; member in struct:bpf_reg_types
9445 u32 btf_id; local
11343 is_bpf_list_api_kfunc(u32 btf_id) argument
11351 is_bpf_rbtree_api_kfunc(u32 btf_id) argument
11358 is_bpf_graph_api_kfunc(u32 btf_id) argument
11364 is_sync_callback_calling_kfunc(u32 btf_id) argument
11375 is_rbtree_lock_required_kfunc(u32 btf_id) argument
20645 u32 btf_id, member_idx; local
20740 check_non_sleepable_error_inject(u32 btf_id) argument
20745 bpf_check_attach_target(struct bpf_verifier_log *log, const struct bpf_prog *prog, const struct bpf_prog *tgt_prog, u32 btf_id, struct bpf_attach_target_info *tgt_info) argument
21073 u32 btf_id = prog->aux->attach_btf_id; local
[all...]
/linux-master/kernel/bpf/preload/iterators/
H A Diterators.bpf.c59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) argument
69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id);
/linux-master/kernel/
H A Dkallsyms.c896 ksym_iter_reg_info.ctx_arg_info[0].btf_id = *btf_ksym_iter_id;
/linux-master/kernel/trace/
H A Dbpf_trace.c90 s32 *btf_id);
527 s32 btf_id; local
530 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id);
534 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags);
984 s32 *btf_id)
1000 *btf_id = ptr->type_id;
1004 if (*btf_id > 0)
1005 t = btf_type_by_id(*btf, *btf_id);
1006 if (*btf_id <= 0 || !t)
1016 s32 btf_id; local
982 bpf_btf_printf_prepare(struct btf_ptr *ptr, u32 btf_ptr_size, u64 flags, const struct btf **btf, s32 *btf_id) argument
[all...]
/linux-master/net/bpf/
H A Dbpf_dummy_struct_ops.c197 t = btf_type_by_id(reg->btf, reg->btf_id);
H A Dtest_run.c1695 .btf_id = bpf_prog_test_dtor_kfunc_ids[0],
1699 .btf_id = bpf_prog_test_dtor_kfunc_ids[2],

Completed in 1123 milliseconds

123