| /kernel/bpf/ |
| A D | bpf_lsm.c | 117 u32 btf_id = prog->aux->attach_btf_id; in bpf_lsm_verify_prog() local 126 if (btf_id_set_contains(&bpf_lsm_disabled_hooks, btf_id)) { in bpf_lsm_verify_prog() 128 btf_id, func_name); in bpf_lsm_verify_prog() 132 if (!btf_id_set_contains(&bpf_lsm_hooks, btf_id)) { in bpf_lsm_verify_prog() 134 btf_id, func_name); in bpf_lsm_verify_prog() 398 bool bpf_lsm_is_sleepable_hook(u32 btf_id) in BTF_ID() 400 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
|
| A D | verifier.c | 291 u32 btf_id; member 1058 st->iter.btf_id = btf_id; in mark_stack_slots_iter() 1150 if (st->iter.btf != btf || st->iter.btf_id != btf_id) in is_iter_reg_valid_init() 2852 regs[regno].btf_id = btf_id; in mark_btf_ld_reg() 7376 u32 btf_id; in check_ptr_to_map_access() local 7686 regs[value_regno].btf_id = info.btf_id; in check_mem_access() 10559 u32 btf_id; in btf_check_subprog_call() local 16908 dst_reg->btf_id = aux->btf_var.btf_id; in check_ld_imm() 18832 old_reg->iter.btf_id != cur_reg->iter.btf_id || in stacksafe() 23225 reg->btf_id = arg->btf_id; in do_check_common() [all …]
|
| A D | bpf_iter.c | 13 u32 btf_id; /* cached value */ member 334 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 350 if (iter->btf_id && iter->btf_id == prog_btf_id) { in bpf_iter_prog_supported() 377 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 538 if (iter->btf_id == prog_btf_id) { in bpf_iter_link_attach()
|
| A D | btf.c | 4106 u32 btf_id; in btf_check_and_fixup_fields() local 6816 info->btf_id = ctx_arg_info->btf_id; in btf_ctx_access() 7325 if (!btf_id) in __get_type_size() 7549 u32 btf_id = 0; in btf_check_type_match() local 7557 if (!btf_id) in btf_check_type_match() 7692 if (!btf_id) { in btf_prepare_func_args() 8426 int btf_id; in BTF_ID_LIST_GLOBAL() local 8443 return btf_id; in BTF_ID_LIST_GLOBAL() 8454 int btf_id; in btf_check_iter_kfuncs() local 8466 if (btf_id < 0) in btf_check_iter_kfuncs() [all …]
|
| A D | log.c | 509 const char *iter_type_str(const struct btf *btf, u32 btf_id) in iter_type_str() argument 511 if (!btf || btf_id == 0) in iter_type_str() 515 return btf_type_name(btf, btf_id) + sizeof(ITER_PREFIX) - 1; in iter_type_str() 708 verbose(env, "%s", btf_type_name(reg->btf, reg->btf_id)); in print_reg_state() 835 iter_type_str(reg->iter.btf, reg->iter.btf_id), in print_verifier_state()
|
| A D | task_iter.c | 1055 task_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init() 1060 task_file_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init() 1061 task_file_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_FILE]; in task_iter_init() 1066 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init() 1067 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_VMA]; in task_iter_init()
|
| A D | link_iter.c | 102 bpf_link_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_link_id; in bpf_link_iter_init()
|
| A D | prog_iter.c | 102 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id; in bpf_prog_iter_init()
|
| A D | dmabuf_iter.c | 98 bpf_dmabuf_reg_info.ctx_arg_info[0].btf_id = bpf_dmabuf_btf_id[0]; in DEFINE_BPF_ITER_FUNC()
|
| A D | kmem_cache_iter.c | 234 bpf_kmem_cache_reg_info.ctx_arg_info[0].btf_id = bpf_kmem_cache_btf_id[0]; in bpf_kmem_cache_iter_init()
|
| A D | syscall.c | 821 field->kptr.btf_id); in bpf_obj_free_fields() 2611 struct btf *attach_btf, u32 btf_id, in bpf_prog_load_check_attach() argument 2614 if (btf_id) { in bpf_prog_load_check_attach() 2615 if (btf_id > BTF_MAX_TYPE) in bpf_prog_load_check_attach() 2632 if (attach_btf && (!btf_id || dst_prog)) in bpf_prog_load_check_attach() 3454 u32 btf_id, in bpf_tracing_prog_attach() argument 3491 if (!!tgt_prog_fd != !!btf_id) { in bpf_tracing_prog_attach() 3569 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 4920 info.btf_id = btf_obj_id(prog->aux->btf); in bpf_prog_get_info_by_fd() 5174 info.btf_id = btf_obj_id(map->btf); in bpf_map_get_info_by_fd() [all …]
|
| A D | map_iter.c | 186 bpf_map_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_map_id; in bpf_map_iter_init()
|
| A D | cpumask.c | 520 .btf_id = cpumask_dtor_ids[0], in BTF_ID()
|
| A D | cgroup_iter.c | 292 bpf_cgroup_reg_info.ctx_arg_info[0].btf_id = bpf_cgroup_btf_id[0]; in bpf_cgroup_iter_init()
|
| A D | crypto.c | 378 .btf_id = bpf_crypto_dtor_ids[0], in BTF_ID()
|
| A D | bpf_struct_ops.c | 268 info->btf_id = arg_btf_id; in prepare_arg_info()
|
| A D | helpers.c | 3853 .btf_id = generic_dtor_ids[0], in kfunc_init() 3858 .btf_id = generic_dtor_ids[2], in kfunc_init()
|
| /kernel/bpf/preload/iterators/ |
| A D | iterators.bpf.c | 59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument 69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|
| /kernel/trace/ |
| A D | bpf_trace.c | 89 s32 *btf_id); 516 s32 btf_id; in BPF_CALL_4() local 519 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id); in BPF_CALL_4() 523 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags); in BPF_CALL_4() 979 s32 *btf_id) in bpf_btf_printf_prepare() argument 995 *btf_id = ptr->type_id; in bpf_btf_printf_prepare() 999 if (*btf_id > 0) in bpf_btf_printf_prepare() 1000 t = btf_type_by_id(*btf, *btf_id); in bpf_btf_printf_prepare() 1001 if (*btf_id <= 0 || !t) in bpf_btf_printf_prepare() 1011 s32 btf_id; in BPF_CALL_5() local [all …]
|
| /kernel/ |
| A D | kallsyms.c | 836 ksym_iter_reg_info.ctx_arg_info[0].btf_id = *btf_ksym_iter_id; in BTF_ID_LIST_SINGLE()
|
| /kernel/sched/ |
| A D | ext.c | 5842 t = btf_type_by_id(reg->btf, reg->btf_id); in bpf_scx_btf_struct_access()
|