/linux/tools/bpf/resolve_btfids/ |
A D | main.c | 78 struct btf_id { struct 155 struct btf_id *id; in btf_id__find() 159 id = rb_entry(p, struct btf_id, rb_node); in btf_id__find() 171 static struct btf_id* 176 struct btf_id *id; in btf_id__add() 181 id = rb_entry(parent, struct btf_id, rb_node); in btf_id__add() 410 struct btf_id *id; in symbols_collect() 516 struct btf_id *id; in symbols_resolve() 600 struct btf_id *id; in __symbols_patch() 604 id = rb_entry(next, struct btf_id, rb_node); in __symbols_patch() [all …]
|
/linux/include/linux/ |
A D | bpf_verifier.h | 68 u32 btf_id; member 349 u32 btf_id; /* btf_id for struct typed var */ member 508 struct btf *btf, u32 btf_id) in bpf_trampoline_compute_key() argument 511 return ((u64)tgt_prog->aux->id << 32) | btf_id; in bpf_trampoline_compute_key() 513 return ((u64)btf_obj_id(btf) << 32) | 0x80000000 | btf_id; in bpf_trampoline_compute_key() 517 static inline void bpf_trampoline_unpack_key(u64 key, u32 *obj_id, u32 *btf_id) in bpf_trampoline_unpack_key() argument 521 if (btf_id) in bpf_trampoline_unpack_key() 522 *btf_id = key & 0x7FFFFFFF; in bpf_trampoline_unpack_key() 528 u32 btf_id,
|
A D | bpf_lsm.h | 30 bool bpf_lsm_is_sleepable_hook(u32 btf_id); 47 static inline bool bpf_lsm_is_sleepable_hook(u32 btf_id) in bpf_lsm_is_sleepable_hook() argument
|
/linux/tools/perf/util/ |
A D | bpf-event.c | 132 u32 btf_id, in perf_env__fetch_btf() argument 145 node->id = btf_id; in perf_env__fetch_btf() 273 perf_env__fetch_btf(env, info->btf_id, btf); in perf_event__synthesize_one_bpf_prog() 489 u32 btf_id; in perf_env__add_bpf_info() local 510 btf_id = info_linear->info.btf_id; in perf_env__add_bpf_info() 519 if (btf_id == 0) in perf_env__add_bpf_info() 522 btf = btf__load_from_kernel_by_id(btf_id); in perf_env__add_bpf_info() 525 __func__, btf_id); in perf_env__add_bpf_info() 528 perf_env__fetch_btf(env, btf_id, btf); in perf_env__add_bpf_info() 596 if (info->btf_id) { in bpf_event__print_bpf_prog_info() [all …]
|
A D | env.c | 81 __u32 btf_id = btf_node->id; in perf_env__insert_btf() local 92 if (btf_id < node->id) { in perf_env__insert_btf() 94 } else if (btf_id > node->id) { in perf_env__insert_btf() 97 pr_debug("duplicated btf %u\n", btf_id); in perf_env__insert_btf() 111 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id) in perf_env__find_btf() argument 121 if (btf_id < node->id) in perf_env__find_btf() 123 else if (btf_id > node->id) in perf_env__find_btf()
|
A D | bpf_counter.c | 77 if (info_linear->info.btf_id == 0) { in bpf_target_prog_name() 82 btf = btf__load_from_kernel_by_id(info_linear->info.btf_id); in bpf_target_prog_name() 92 info_linear->info.btf_id, func_info[0].type_id); in bpf_target_prog_name()
|
A D | env.h | 171 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id);
|
/linux/tools/bpf/bpftool/ |
A D | btf.c | 46 __u32 btf_id; member 465 __u32 btf_id = -1; in do_dump() local 488 btf_id = info.btf_id; in do_dump() 524 btf_id = info.btf_id; in do_dump() 528 btf_id = strtoul(*argv, &endptr, 0); in do_dump() 653 __u32 btf_id, id = 0; in build_btf_type_table() local 713 btf_id = ((struct bpf_prog_info *)info)->btf_id; in build_btf_type_table() 716 btf_id = ((struct bpf_map_info *)info)->btf_id; in build_btf_type_table() 723 if (!btf_id) in build_btf_type_table() 726 err = hashmap__append(tab, u32_as_hash_field(btf_id), in build_btf_type_table() [all …]
|
A D | map.c | 538 if (info->btf_id) in show_map_close_json() 539 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in show_map_close_json() 629 if (!info->btf_id && !frozen) in show_map_close_plain() 634 if (info->btf_id) in show_map_close_plain() 635 printf("btf_id %d", info->btf_id); in show_map_close_plain() 638 printf("%sfrozen", info->btf_id ? " " : ""); in show_map_close_plain() 798 if (!info.btf_id) in maps_have_btf() 821 btf = btf__load_from_kernel_by_id(info->btf_id); in get_map_kv_btf() 1056 btf = btf__load_from_kernel_by_id(info->btf_id); in print_key_value()
|
A D | prog.c | 268 btf = btf__load_from_kernel_by_id(map_info.btf_id); in show_prog_metadata() 419 if (info->btf_id) in print_prog_json() 420 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in print_prog_json() 501 if (info->btf_id) in print_prog_plain() 502 printf("\n\tbtf_id %d", info->btf_id); in print_prog_plain() 661 if (info->btf_id) { in prog_dump() 662 btf = btf__load_from_kernel_by_id(info->btf_id); in prog_dump() 2032 if (info_linear->info.btf_id == 0) { in profile_target_name() 2037 btf = btf__load_from_kernel_by_id(info_linear->info.btf_id); in profile_target_name() 2047 info_linear->info.btf_id, func_info[0].type_id); in profile_target_name()
|
/linux/tools/lib/bpf/ |
A D | linker.c | 86 int btf_id; member 1619 if (!glob_sym->btf_id || !btf_id) { in glob_syms_match() 1636 linker->btf, glob_sym->btf_id, obj->btf, btf_id)) in glob_syms_match() 1651 int i, j, n, m, btf_id = 0; in find_glob_sym_btf() local 1674 btf_id = i; in find_glob_sym_btf() 1693 if (btf_id && btf_id != vi->type) { in find_glob_sym_btf() 1707 if (btf_id) { in find_glob_sym_btf() 1709 *out_btf_id = btf_id; in find_glob_sym_btf() 1991 glob_sym->btf_id = 0; in linker_append_elf_sym() 2276 if (glob_sym->btf_id) { in linker_append_btf() [all …]
|
/linux/kernel/bpf/ |
A D | task_iter.c | 593 task_reg_info.ctx_arg_info[0].btf_id = btf_task_struct_ids[0]; in task_iter_init() 598 task_file_reg_info.ctx_arg_info[0].btf_id = btf_task_struct_ids[0]; in task_iter_init() 599 task_file_reg_info.ctx_arg_info[1].btf_id = btf_task_file_ids[0]; in task_iter_init() 604 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_task_struct_ids[0]; in task_iter_init() 605 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_task_file_ids[1]; in task_iter_init()
|
A D | bpf_iter.c | 12 u32 btf_id; /* cached value */ member 326 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 343 if (tinfo->btf_id && tinfo->btf_id == prog_btf_id) { in bpf_iter_prog_supported() 371 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 533 if (tinfo->btf_id == prog_btf_id) { in bpf_iter_link_attach()
|
A D | bpf_lsm.c | 217 bool bpf_lsm_is_sleepable_hook(u32 btf_id) in BTF_ID() 219 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
|
A D | btf.c | 4628 int i, btf_id; in btf_vmlinux_map_ids_init() local 4640 if (btf_id < 0) in btf_vmlinux_map_ids_init() 4641 return btf_id; in btf_vmlinux_map_ids_init() 4963 info->btf_id = ctx_arg_info->btf_id; in btf_ctx_access() 4980 info->btf_id = ret; in btf_ctx_access() 5333 if (!btf_id) in __get_type_size() 5540 u32 btf_id = 0; in btf_check_type_match() local 5548 if (!btf_id) in btf_check_type_match() 5712 u32 btf_id; in btf_check_subprog_arg_match() local 5719 if (!btf_id) in btf_check_subprog_arg_match() [all …]
|
A D | verifier.c | 255 u32 btf_id; member 1515 regs[regno].btf_id = btf_id; in mark_btf_ld_reg() 3577 *btf_id = info.btf_id; in check_ctx_access() 4118 u32 btf_id; in check_ptr_to_btf_access() local 4169 u32 btf_id; in check_ptr_to_map_access() local 4419 regs[value_regno].btf_id = btf_id; in check_mem_access() 9402 dst_reg->btf_id = aux->btf_var.btf_id; in check_ld_imm() 13513 btf_id); in check_struct_ops_btf_id() 13689 btf_id); in bpf_check_attach_target() 13711 btf_id); in bpf_check_attach_target() [all …]
|
A D | prog_iter.c | 103 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id; in bpf_prog_iter_init()
|
A D | syscall.c | 2056 struct btf *attach_btf, u32 btf_id, in bpf_prog_load_check_attach() argument 2059 if (btf_id) { in bpf_prog_load_check_attach() 2060 if (btf_id > BTF_MAX_TYPE) in bpf_prog_load_check_attach() 2077 if (attach_btf && (!btf_id || dst_prog)) in bpf_prog_load_check_attach() 2697 u32 btf_id) in bpf_tracing_prog_attach() argument 2732 if (!!tgt_prog_fd != !!btf_id) { in bpf_tracing_prog_attach() 2795 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 3818 info.btf_id = btf_obj_id(prog->aux->btf); in bpf_prog_get_info_by_fd() 3922 info.btf_id = btf_obj_id(map->btf); in bpf_map_get_info_by_fd() 4041 #define BPF_BTF_GET_FD_BY_ID_LAST_FIELD btf_id [all …]
|
A D | map_iter.c | 187 bpf_map_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_map_id; in bpf_map_iter_init()
|
/linux/kernel/bpf/preload/iterators/ |
A D | iterators.bpf.c | 59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument 69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
A D | fexit_bpf2bpf.c | 105 __s32 btf_id; in test_fexit_bpf2bpf_common() local 110 btf_id = btf__find_by_name_kind(btf, tgt_name + 1, BTF_KIND_FUNC); in test_fexit_bpf2bpf_common() 129 ASSERT_EQ(link_info.tracing.target_btf_id, btf_id, "link_tgt_btf_id"); in test_fexit_bpf2bpf_common()
|
/linux/kernel/trace/ |
A D | bpf_trace.c | 79 s32 *btf_id); 520 s32 btf_id; in BPF_CALL_4() local 523 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id); in BPF_CALL_4() 527 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags); in BPF_CALL_4() 958 s32 *btf_id) in bpf_btf_printf_prepare() argument 974 *btf_id = ptr->type_id; in bpf_btf_printf_prepare() 978 if (*btf_id > 0) in bpf_btf_printf_prepare() 979 t = btf_type_by_id(*btf, *btf_id); in bpf_btf_printf_prepare() 980 if (*btf_id <= 0 || !t) in bpf_btf_printf_prepare() 990 s32 btf_id; in BPF_CALL_5() local [all …]
|
/linux/net/ipv4/ |
A D | bpf_tcp_ca.c | 87 if (info->reg_type == PTR_TO_BTF_ID && info->btf_id == sock_id) in bpf_tcp_ca_is_valid_access() 89 info->btf_id = tcp_sock_id; in bpf_tcp_ca_is_valid_access()
|
/linux/net/core/ |
A D | bpf_sk_storage.c | 387 u32 btf_id; in bpf_sk_storage_tracing_allowed() local 404 btf_id = prog->aux->attach_btf_id; in bpf_sk_storage_tracing_allowed() 405 t = btf_type_by_id(btf_vmlinux, btf_id); in bpf_sk_storage_tracing_allowed() 939 bpf_sk_storage_map_reg_info.ctx_arg_info[0].btf_id = in bpf_sk_storage_map_iter_init()
|
/linux/tools/include/uapi/linux/ |
A D | bpf.h | 1394 __u32 btf_id; member 5632 __u32 btf_id; member 5662 __u32 btf_id; member
|