Home
last modified time | relevance | path

Searched refs:btf_id (Results 1 – 25 of 53) sorted by relevance

123

/linux-6.3-rc2/tools/bpf/resolve_btfids/
A Dmain.c92 struct btf_id { struct
170 struct btf_id *id; in btf_id__find()
174 id = rb_entry(p, struct btf_id, rb_node); in btf_id__find()
186 static struct btf_id *
191 struct btf_id *id; in btf_id__add()
196 id = rb_entry(parent, struct btf_id, rb_node); in btf_id__add()
425 struct btf_id *id; in symbols_collect()
543 struct btf_id *id; in symbols_resolve()
628 struct btf_id *id; in __symbols_patch()
632 id = rb_entry(next, struct btf_id, rb_node); in __symbols_patch()
[all …]
/linux-6.3-rc2/tools/bpf/bpftool/
A Dbtf.c531 btf_fd = bpf_btf_get_fd_by_id(btf_id); in btf_is_kernel_module()
556 __u32 btf_id = -1; in do_dump() local
579 btf_id = info.btf_id; in do_dump()
615 btf_id = info.btf_id; in do_dump()
619 btf_id = strtoul(*argv, &endptr, 0); in do_dump()
742 __u32 btf_id, id = 0; in build_btf_type_table() local
805 btf_id = ((struct bpf_prog_info *)info)->btf_id; in build_btf_type_table()
808 btf_id = ((struct bpf_map_info *)info)->btf_id; in build_btf_type_table()
815 if (!btf_id) in build_btf_type_table()
818 err = hashmap__append(tab, btf_id, id); in build_btf_type_table()
[all …]
A Dmap.c513 if (info->btf_id) in show_map_close_json()
514 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in show_map_close_json()
606 if (info->btf_id || frozen) in show_map_close_plain()
609 if (info->btf_id) in show_map_close_plain()
610 printf("btf_id %d", info->btf_id); in show_map_close_plain()
613 printf("%sfrozen", info->btf_id ? " " : ""); in show_map_close_plain()
773 if (!info.btf_id) in maps_have_btf()
796 *btf = btf__load_from_kernel_by_id(info->btf_id); in get_map_kv_btf()
A Dprog.c324 btf = btf__load_from_kernel_by_id(map_info.btf_id); in show_prog_metadata()
481 if (info->btf_id) in print_prog_json()
482 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in print_prog_json()
567 if (info->btf_id) in print_prog_plain()
568 printf("\n\tbtf_id %d", info->btf_id); in print_prog_plain()
727 if (info->btf_id) { in prog_dump()
728 btf = btf__load_from_kernel_by_id(info->btf_id); in prog_dump()
2179 if (info.btf_id == 0) { in profile_target_name()
2201 btf = btf__load_from_kernel_by_id(info.btf_id); in profile_target_name()
2210 info.btf_id, func_info.type_id); in profile_target_name()
/linux-6.3-rc2/tools/perf/util/
A Dbpf-event.c160 u32 btf_id, in perf_env__fetch_btf() argument
173 node->id = btf_id; in perf_env__fetch_btf()
301 perf_env__fetch_btf(env, info->btf_id, btf); in perf_event__synthesize_one_bpf_prog()
517 u32 btf_id; in perf_env__add_bpf_info() local
538 btf_id = info_linear->info.btf_id; in perf_env__add_bpf_info()
547 if (btf_id == 0) in perf_env__add_bpf_info()
550 btf = btf__load_from_kernel_by_id(btf_id); in perf_env__add_bpf_info()
553 __func__, btf_id); in perf_env__add_bpf_info()
556 perf_env__fetch_btf(env, btf_id, btf); in perf_env__add_bpf_info()
624 if (info->btf_id) { in bpf_event__print_bpf_prog_info()
[all …]
A Denv.c81 __u32 btf_id = btf_node->id; in perf_env__insert_btf() local
92 if (btf_id < node->id) { in perf_env__insert_btf()
94 } else if (btf_id > node->id) { in perf_env__insert_btf()
97 pr_debug("duplicated btf %u\n", btf_id); in perf_env__insert_btf()
111 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id) in perf_env__find_btf() argument
121 if (btf_id < node->id) in perf_env__find_btf()
123 else if (btf_id > node->id) in perf_env__find_btf()
A Denv.h172 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id);
/linux-6.3-rc2/include/linux/
A Dbpf_verifier.h86 u32 btf_id; member
433 u32 btf_id; /* btf_id for struct typed var */ member
625 struct btf *btf, u32 btf_id) in bpf_trampoline_compute_key() argument
628 return ((u64)tgt_prog->aux->id << 32) | btf_id; in bpf_trampoline_compute_key()
630 return ((u64)btf_obj_id(btf) << 32) | 0x80000000 | btf_id; in bpf_trampoline_compute_key()
634 static inline void bpf_trampoline_unpack_key(u64 key, u32 *obj_id, u32 *btf_id) in bpf_trampoline_unpack_key() argument
638 if (btf_id) in bpf_trampoline_unpack_key()
639 *btf_id = key & 0x7FFFFFFF; in bpf_trampoline_unpack_key()
645 u32 btf_id,
A Dbpf_lsm.h30 bool bpf_lsm_is_sleepable_hook(u32 btf_id);
50 static inline bool bpf_lsm_is_sleepable_hook(u32 btf_id) in bpf_lsm_is_sleepable_hook() argument
A Dbtf.h105 u32 btf_id; member
110 u32 btf_id; member
498 s32 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id);
501 struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id);
531 static inline s32 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id) in btf_find_dtor_kfunc() argument
540 static inline struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id) in btf_find_struct_meta() argument
/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/
A Dfexit_bpf2bpf.c115 __s32 btf_id; in test_fexit_bpf2bpf_common() local
120 btf_id = btf__find_by_name_kind(btf, tgt_name + 1, BTF_KIND_FUNC); in test_fexit_bpf2bpf_common()
146 ASSERT_EQ(link_info.tracing.target_btf_id, btf_id, "link_tgt_btf_id"); in test_fexit_bpf2bpf_common()
424 if (!info.btf_id) in find_prog_btf_id()
427 btf = btf__load_from_kernel_by_id(info.btf_id); in find_prog_btf_id()
464 int btf_id; in test_fentry_to_cgroup_bpf() local
478 btf_id = find_prog_btf_id("bind_v4_prog", bpf_program__fd(skel->progs.bind_v4_prog)); in test_fentry_to_cgroup_bpf()
479 if (!ASSERT_GE(btf_id, 0, "find_prog_btf_id")) in test_fentry_to_cgroup_bpf()
482 fentry_fd = load_fentry(bpf_program__fd(skel->progs.bind_v4_prog), btf_id); in test_fentry_to_cgroup_bpf()
493 ASSERT_EQ(info.btf_id, 0, "info.btf_id"); in test_fentry_to_cgroup_bpf()
[all …]
/linux-6.3-rc2/tools/lib/bpf/
A Dlinker.c86 int btf_id; member
1617 if (!glob_sym->btf_id || !btf_id) { in glob_syms_match()
1634 linker->btf, glob_sym->btf_id, obj->btf, btf_id)) in glob_syms_match()
1649 int i, j, n, m, btf_id = 0; in find_glob_sym_btf() local
1672 btf_id = i; in find_glob_sym_btf()
1691 if (btf_id && btf_id != vi->type) { in find_glob_sym_btf()
1705 if (btf_id) { in find_glob_sym_btf()
1707 *out_btf_id = btf_id; in find_glob_sym_btf()
1989 glob_sym->btf_id = 0; in linker_append_elf_sym()
2277 if (glob_sym->btf_id) { in linker_append_btf()
[all …]
/linux-6.3-rc2/kernel/bpf/preload/iterators/
A Diterators.bpf.c59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument
69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
/linux-6.3-rc2/net/ipv4/
A Dbpf_tcp_ca.c66 info->btf_id == sock_id) in bpf_tcp_ca_is_valid_access()
68 info->btf_id = tcp_sock_id; in bpf_tcp_ca_is_valid_access()
84 t = btf_type_by_id(reg->btf, reg->btf_id); in bpf_tcp_ca_btf_struct_access()
/linux-6.3-rc2/kernel/bpf/
A Dbpf_iter.c13 u32 btf_id; /* cached value */ member
336 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id()
352 if (iter->btf_id && iter->btf_id == prog_btf_id) { in bpf_iter_prog_supported()
380 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto()
541 if (iter->btf_id == prog_btf_id) { in bpf_iter_link_attach()
A Dverifier.c266 u32 btf_id; member
1981 regs[regno].btf_id = btf_id; in mark_btf_ld_reg()
4470 *btf_id = info.btf_id; in check_ctx_access()
5031 u32 btf_id; in check_ptr_to_btf_access() local
5159 u32 btf_id; in check_ptr_to_map_access() local
5436 regs[value_regno].btf_id = btf_id; in check_mem_access()
9636 meta->arg_obj_drop.btf_id = reg->btf_id; in check_kfunc_args()
12679 dst_reg->btf_id = aux->btf_var.btf_id; in check_ld_imm()
17201 btf_id); in check_struct_ops_btf_id()
17383 btf_id); in bpf_check_attach_target()
[all …]
A Dtask_iter.c849 task_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init()
854 task_file_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init()
855 task_file_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_FILE]; in task_iter_init()
860 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init()
861 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_VMA]; in task_iter_init()
A Dbtf.c3820 u32 btf_id; in btf_check_and_fixup_fields() local
5407 type->btf_id = i; in btf_parse_struct_metas()
6085 info->btf_id = ctx_arg_info->btf_id; in btf_ctx_access()
6525 if (!btf_id) in __get_type_size()
6749 u32 btf_id = 0; in btf_check_type_match() local
6757 if (!btf_id) in btf_check_type_match()
6882 u32 btf_id; in btf_check_subprog_arg_match() local
6889 if (!btf_id) in btf_check_subprog_arg_match()
6925 u32 btf_id; in btf_check_subprog_call() local
6932 if (!btf_id) in btf_check_subprog_call()
[all …]
A Dprog_iter.c103 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id; in bpf_prog_iter_init()
A Dlink_iter.c103 bpf_link_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_link_id; in bpf_link_iter_init()
A Dbpf_lsm.c360 bool bpf_lsm_is_sleepable_hook(u32 btf_id) in BTF_ID()
362 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
/linux-6.3-rc2/kernel/trace/
A Dbpf_trace.c85 s32 *btf_id);
527 s32 btf_id; in BPF_CALL_4() local
530 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id); in BPF_CALL_4()
534 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags); in BPF_CALL_4()
967 s32 *btf_id) in bpf_btf_printf_prepare() argument
983 *btf_id = ptr->type_id; in bpf_btf_printf_prepare()
987 if (*btf_id > 0) in bpf_btf_printf_prepare()
988 t = btf_type_by_id(*btf, *btf_id); in bpf_btf_printf_prepare()
989 if (*btf_id <= 0 || !t) in bpf_btf_printf_prepare()
999 s32 btf_id; in BPF_CALL_5() local
[all …]
/linux-6.3-rc2/net/core/
A Dbpf_sk_storage.c362 u32 btf_id; in bpf_sk_storage_tracing_allowed() local
381 btf_id = prog->aux->attach_btf_id; in bpf_sk_storage_tracing_allowed()
382 t = btf_type_by_id(btf_vmlinux, btf_id); in bpf_sk_storage_tracing_allowed()
928 bpf_sk_storage_map_reg_info.ctx_arg_info[0].btf_id = in bpf_sk_storage_map_iter_init()
/linux-6.3-rc2/tools/testing/selftests/bpf/
A Dtest_verifier.c1111 int btf_id; in do_test_fixup() local
1114 btf_id = 0; in do_test_fixup()
1117 btf_id = btf__find_by_name_kind(btf, in do_test_fixup()
1120 btf_id = btf_id < 0 ? 0 : btf_id; in do_test_fixup()
1123 prog[fixup_kfunc_btf_id->insn_idx].imm = btf_id; in do_test_fixup()
/linux-6.3-rc2/include/net/
A Dxdp.h430 bool bpf_dev_bound_kfunc_id(u32 btf_id);
435 static inline bool bpf_dev_bound_kfunc_id(u32 btf_id) { return false; } in bpf_dev_bound_kfunc_id() argument

Completed in 108 milliseconds

123