| /linux/kernel/bpf/ |
| H A D | bpf_lsm.c | 98 prog->aux->attach_btf_id)) { in BTF_SET_END() 119 u32 btf_id = prog->aux->attach_btf_id; in bpf_lsm_verify_prog() 129 bpf_log(vlog, "attach_btf_id %u points to disabled hook %s\n", in bpf_lsm_verify_prog() 135 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", in bpf_lsm_verify_prog() 173 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); 263 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 266 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 273 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 276 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 407 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); [all...] |
| H A D | cgroup.c | 160 u32 attach_btf_id; member 167 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) in bpf_cgroup_atype_find() argument 177 if (cgroup_lsm_atype[i].attach_btf_id == attach_btf_id) in bpf_cgroup_atype_find() 181 if (cgroup_lsm_atype[i].attach_btf_id == 0) in bpf_cgroup_atype_find() 188 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) in bpf_cgroup_atype_get() argument 194 WARN_ON_ONCE(cgroup_lsm_atype[i].attach_btf_id && in bpf_cgroup_atype_get() 195 cgroup_lsm_atype[i].attach_btf_id != attach_btf_id); in bpf_cgroup_atype_get() 197 cgroup_lsm_atype[i].attach_btf_id = attach_btf_id; in bpf_cgroup_atype_get() 207 cgroup_lsm_atype[i].attach_btf_id = 0; in bpf_cgroup_atype_put() 213 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) in bpf_cgroup_atype_find() argument [all …]
|
| H A D | bpf_iter.c | 334 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 341 u32 prog_btf_id = prog->aux->attach_btf_id; in bpf_iter_prog_supported() 377 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 422 link->prog->aux->attach_btf_id != new_prog->aux->attach_btf_id) { in bpf_iter_link_replace() 535 prog_btf_id = prog->aux->attach_btf_id; in bpf_iter_link_attach()
|
| H A D | trampoline.c | 946 p->aux->attach_btf_id = prog->aux->attach_btf_id; in cgroup_shim_alloc() 954 bpf_cgroup_atype_get(p->aux->attach_btf_id, cgroup_atype); in cgroup_shim_alloc() 989 prog->aux->attach_btf_id, in bpf_trampoline_link_cgroup_shim() 995 prog->aux->attach_btf_id); in bpf_trampoline_link_cgroup_shim() 1050 prog->aux->attach_btf_id); in bpf_trampoline_unlink_cgroup_shim()
|
| H A D | syscall.c | 2967 } else if (attr->attach_btf_id) { in bpf_prog_load() 2982 attach_btf, attr->attach_btf_id, in bpf_prog_load() 3006 prog->aux->attach_btf_id = attr->attach_btf_id; in bpf_prog_load() 3698 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 5199 info.attach_btf_id = prog->aux->attach_btf_id; in bpf_prog_get_info_by_fd()
|
| H A D | bpf_struct_ops.c | 807 prog->aux->attach_btf_id != st_ops_desc->type_id || in bpf_struct_ops_map_update_elem()
|
| H A D | verifier.c | 18020 if (!env->prog->aux->attach_btf_id) in check_return_code() 24808 if (!prog->aux->attach_btf_id) in check_struct_ops_btf_id() 24822 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id() 25339 u32 btf_id = prog->aux->attach_btf_id; in check_attach_btf_id()
|
| H A D | btf.c | 6952 t = btf_type_by_id(btf, prog->aux->attach_btf_id); in btf_ctx_access()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | fexit_bpf2bpf.c | 459 static int load_fentry(int attach_prog_fd, int attach_btf_id) in load_fentry() argument 464 .attach_btf_id = attach_btf_id, in load_fentry() 516 ASSERT_EQ(info.attach_btf_id, btf_id, "info.attach_btf_id"); in test_fentry_to_cgroup_bpf()
|
| H A D | fexit_stress.c | 35 trace_opts.attach_btf_id = err; in serial_test_fexit_stress()
|
| H A D | module_fentry_shadow.c | 100 load_opts.attach_btf_id = btf_id[i]; in test_module_fentry_shadow()
|
| /linux/tools/lib/bpf/ |
| H A D | libbpf_probes.c | 141 opts.attach_btf_id = 1; in probe_prog_load() 144 exp_msg = "attach_btf_id 1 is not a function"; in probe_prog_load() 150 opts.attach_btf_id = 1; in probe_prog_load()
|
| H A D | libbpf.c | 502 __u32 attach_btf_id; member 1315 if (!prog->attach_btf_id) { in bpf_map__init_kern_struct_ops() 1316 prog->attach_btf_id = kern_type_id; in bpf_map__init_kern_struct_ops() 1325 if (prog->attach_btf_id != kern_type_id) { in bpf_map__init_kern_struct_ops() 1328 prog->attach_btf_id, kern_type_id); in bpf_map__init_kern_struct_ops() 7741 if ((def & SEC_ATTACH_BTF) && !prog->attach_btf_id) { in libbpf_prepare_prog_load() 7768 prog->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7776 opts->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7808 if (prog->attach_btf_id == 0) { in bpf_object_load_prog() 7825 load_attr.attach_btf_id = prog->attach_btf_id; in bpf_object_load_prog() [all …]
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | test_verifier.c | 1574 int attach_btf_id; in do_test_single() local 1576 attach_btf_id = libbpf_find_vmlinux_btf_id(test->kfunc, in do_test_single() 1578 if (attach_btf_id < 0) { in do_test_single() 1585 opts.attach_btf_id = attach_btf_id; in do_test_single()
|
| /linux/net/bpf/ |
| H A D | bpf_dummy_struct_ops.c | 149 if (prog->aux->attach_btf_id != type_id) in bpf_struct_ops_test_run()
|
| /linux/Documentation/bpf/ |
| H A D | drgn.rst | 136 .attach_btf_id = (u32)0,
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 1610 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ 6698 __u32 attach_btf_id; 1584 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ global() member 6665 __u32 attach_btf_id; global() member
|
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 1610 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ 6698 __u32 attach_btf_id; 1584 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ global() member 6665 __u32 attach_btf_id; global() member
|
| /linux/include/linux/ |
| H A D | bpf.h | 1669 u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 3916 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype); 3919 static inline void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) {} in bpf_cgroup_atype_get() argument
|
| /linux/kernel/trace/ |
| H A D | bpf_trace.c | 954 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); in BTF_ID() 957 prog->aux->attach_btf_id); in BTF_ID()
|