• Home
  • Raw
  • Download

Lines Matching defs:bpf_prog_aux

1479 struct bpf_prog_aux {  struct
1480 atomic64_t refcnt;
1481 u32 used_map_cnt;
1482 u32 used_btf_cnt;
1483 u32 max_ctx_offset;
1484 u32 max_pkt_offset;
1485 u32 max_tp_access;
1486 u32 stack_depth;
1487 u32 id;
1488 u32 func_cnt; /* used by non-func prog as the number of func progs */
1489 u32 real_func_cnt; /* includes hidden progs, only used for JIT and freeing progs */
1490 u32 func_idx; /* 0 for non-func prog, the index in func array for func prog */
1491 u32 attach_btf_id; /* in-kernel BTF type id to attach to */
1492 u32 ctx_arg_info_size;
1493 u32 max_rdonly_access;
1494 u32 max_rdwr_access;
1495 struct btf *attach_btf;
1496 const struct bpf_ctx_arg_aux *ctx_arg_info;
1497 struct mutex dst_mutex; /* protects dst_* pointers below, *after* prog becomes visible */
1498 struct bpf_prog *dst_prog;
1499 struct bpf_trampoline *dst_trampoline;
1500 enum bpf_prog_type saved_dst_prog_type;
1501 enum bpf_attach_type saved_dst_attach_type;
1502 bool verifier_zext; /* Zero extensions has been inserted by verifier. */
1503 bool dev_bound; /* Program is bound to the netdev. */
1504 bool offload_requested; /* Program is bound and offloaded to the netdev. */
1505 bool attach_btf_trace; /* true if attaching to BTF-enabled raw tp */
1506 bool attach_tracing_prog; /* true if tracing another tracing program */
1507 bool func_proto_unreliable;
1508 bool tail_call_reachable;
1509 bool xdp_has_frags;
1510 bool exception_cb;
1511 bool exception_boundary;
1512 bool is_extended; /* true if extended by freplace program */
1513 u64 prog_array_member_cnt; /* counts how many times as member of prog_array */
1514 struct mutex ext_mutex; /* mutex for is_extended and prog_array_member_cnt */
1515 struct bpf_arena *arena;
1517 const struct btf_type *attach_func_proto;
1519 const char *attach_func_name;
1520 struct bpf_prog **func;
1521 void *jit_data; /* JIT specific data. arch dependent */
1522 struct bpf_jit_poke_descriptor *poke_tab;
1523 struct bpf_kfunc_desc_tab *kfunc_tab;
1524 struct bpf_kfunc_btf_tab *kfunc_btf_tab;
1525 u32 size_poke_tab;
1527 struct bpf_ksym ksym_prefix;
1529 struct bpf_ksym ksym;
1530 const struct bpf_prog_ops *ops;
1531 struct bpf_map **used_maps;
1532 struct mutex used_maps_mutex; /* mutex for used_maps and used_map_cnt */
1533 struct btf_mod_pair *used_btfs;
1534 struct bpf_prog *prog;
1535 struct user_struct *user;
1536 u64 load_time; /* ns since boottime */
1537 u32 verified_insns;
1538 int cgroup_atype; /* enum cgroup_bpf_attach_type */
1539 struct bpf_map *cgroup_storage[MAX_BPF_CGROUP_STORAGE_TYPE];
1540 char name[BPF_OBJ_NAME_LEN];
1541 u64 (*bpf_exception_cb)(u64 cookie, u64 sp, u64 bp, u64, u64);
1543 void *security;
1545 struct bpf_token *token;
1546 struct bpf_prog_offload *offload;
1547 struct btf *btf;
1548 struct bpf_func_info *func_info;
1549 struct bpf_func_info_aux *func_info_aux;
1556 struct bpf_line_info *linfo;
1564 void **jited_linfo;
1565 u32 func_info_cnt;
1566 u32 nr_linfo;
1571 u32 linfo_idx;
1572 struct module *mod;
1573 u32 num_exentries;
1574 struct exception_table_entry *extable;
1575 union {