Home
last modified time | relevance | path

Searched refs:btf_id (Results 1 – 13 of 13) sorted by relevance

/kernel/bpf/
Dbpf_iter.c13 u32 btf_id; /* cached value */ member
336 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id()
352 if (iter->btf_id && iter->btf_id == prog_btf_id) { in bpf_iter_prog_supported()
380 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto()
541 if (iter->btf_id == prog_btf_id) { in bpf_iter_link_attach()
Dtask_iter.c849 task_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init()
854 task_file_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init()
855 task_file_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_FILE]; in task_iter_init()
860 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init()
861 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_VMA]; in task_iter_init()
Dbtf.c3515 tab->off[i].kptr.btf_id = id; in btf_parse_kptrs()
5510 if (!ctx_arg_info->btf_id) { in btf_ctx_access()
5517 info->btf_id = ctx_arg_info->btf_id; in btf_ctx_access()
5534 info->btf_id = ret; in btf_ctx_access()
5542 info->btf_id = t->type; in btf_ctx_access()
5555 info->btf_id = t->type; in btf_ctx_access()
5565 tname, arg, info->btf_id, btf_type_str(t), in btf_ctx_access()
5915 static int __get_type_size(struct btf *btf, u32 btf_id, in __get_type_size() argument
5921 if (!btf_id) in __get_type_size()
5924 t = btf_type_by_id(btf, btf_id); in __get_type_size()
[all …]
Dverifier.c261 u32 btf_id; member
877 verbose(env, "%s", kernel_type_name(reg->btf, reg->btf_id)); in print_verifier_state()
1746 struct btf *btf, u32 btf_id, in mark_btf_ld_reg() argument
1756 regs[regno].btf_id = btf_id; in mark_btf_ld_reg()
3929 const char *targ_name = kernel_type_name(off_desc->kptr.btf, off_desc->kptr.btf_id); in map_kptr_match_type()
3945 reg_name = kernel_type_name(reg->btf, reg->btf_id); in map_kptr_match_type()
3980 if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off, in map_kptr_match_type()
3981 off_desc->kptr.btf, off_desc->kptr.btf_id, in map_kptr_match_type()
4031 off_desc->kptr.btf_id, PTR_MAYBE_NULL | PTR_UNTRUSTED); in check_map_kptr_access()
4213 struct btf **btf, u32 *btf_id) in check_ctx_access() argument
[all …]
Dbpf_lsm.c345 bool bpf_lsm_is_sleepable_hook(u32 btf_id) in BTF_ID()
347 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
Dlink_iter.c103 bpf_link_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_link_id; in bpf_link_iter_init()
Dprog_iter.c103 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id; in bpf_prog_iter_init()
Dsyscall.c2322 struct btf *attach_btf, u32 btf_id, in bpf_prog_load_check_attach() argument
2325 if (btf_id) { in bpf_prog_load_check_attach()
2326 if (btf_id > BTF_MAX_TYPE) in bpf_prog_load_check_attach()
2343 if (attach_btf && (!btf_id || dst_prog)) in bpf_prog_load_check_attach()
2960 u32 btf_id, in bpf_tracing_prog_attach() argument
2996 if (!!tgt_prog_fd != !!btf_id) { in bpf_tracing_prog_attach()
3015 key = bpf_trampoline_compute_key(tgt_prog, NULL, btf_id); in bpf_tracing_prog_attach()
3069 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach()
3070 key = bpf_trampoline_compute_key(NULL, prog->aux->attach_btf, btf_id); in bpf_tracing_prog_attach()
3081 err = bpf_check_attach_target(NULL, prog, tgt_prog, btf_id, in bpf_tracing_prog_attach()
[all …]
Dmap_iter.c187 bpf_map_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_map_id; in bpf_map_iter_init()
Dcgroup_iter.c292 bpf_cgroup_reg_info.ctx_arg_info[0].btf_id = bpf_cgroup_btf_id[0]; in bpf_cgroup_iter_init()
/kernel/bpf/preload/iterators/
Diterators.bpf.c59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument
69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
/kernel/trace/
Dbpf_trace.c84 s32 *btf_id);
526 s32 btf_id; in BPF_CALL_4() local
529 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id); in BPF_CALL_4()
533 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags); in BPF_CALL_4()
985 s32 *btf_id) in bpf_btf_printf_prepare() argument
1001 *btf_id = ptr->type_id; in bpf_btf_printf_prepare()
1005 if (*btf_id > 0) in bpf_btf_printf_prepare()
1006 t = btf_type_by_id(*btf, *btf_id); in bpf_btf_printf_prepare()
1007 if (*btf_id <= 0 || !t) in bpf_btf_printf_prepare()
1017 s32 btf_id; in BPF_CALL_5() local
[all …]
/kernel/
Dkallsyms.c953 ksym_iter_reg_info.ctx_arg_info[0].btf_id = *btf_ksym_iter_id; in BTF_ID()