/linux/kernel/bpf/ |
H A D | bpf_lsm.c | 96 prog->aux->attach_btf_id)) { 117 u32 btf_id = prog->aux->attach_btf_id; 127 bpf_log(vlog, "attach_btf_id %u points to disabled hook %s\n", 133 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", 171 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); 261 prog->aux->attach_btf_id)) in BTF_ID() 264 prog->aux->attach_btf_id)) in BTF_ID() 271 prog->aux->attach_btf_id)) in BTF_ID() 274 prog->aux->attach_btf_id)) in BTF_ID() 409 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); [all...] |
H A D | cgroup.c | 131 u32 attach_btf_id; member 138 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) in bpf_cgroup_atype_find() argument 148 if (cgroup_lsm_atype[i].attach_btf_id == attach_btf_id) in bpf_cgroup_atype_find() 152 if (cgroup_lsm_atype[i].attach_btf_id == 0) in bpf_cgroup_atype_find() 159 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) in bpf_cgroup_atype_get() argument 165 WARN_ON_ONCE(cgroup_lsm_atype[i].attach_btf_id && in bpf_cgroup_atype_get() 166 cgroup_lsm_atype[i].attach_btf_id != attach_btf_id); in bpf_cgroup_atype_get() 168 cgroup_lsm_atype[i].attach_btf_id in bpf_cgroup_atype_get() 184 bpf_cgroup_atype_find(enum bpf_attach_type attach_type,u32 attach_btf_id) bpf_cgroup_atype_find() argument 957 u32 attach_btf_id = 0; __cgroup_bpf_detach() local [all...] |
H A D | bpf_iter.c | 335 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 342 u32 prog_btf_id = prog->aux->attach_btf_id; in bpf_iter_prog_supported() 379 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 424 link->prog->aux->attach_btf_id != new_prog->aux->attach_btf_id) { in bpf_iter_link_replace() 537 prog_btf_id = prog->aux->attach_btf_id; in bpf_iter_link_attach()
|
H A D | trampoline.c | 661 p->aux->attach_btf_id = prog->aux->attach_btf_id; in cgroup_shim_alloc() 669 bpf_cgroup_atype_get(p->aux->attach_btf_id, cgroup_atype); in cgroup_shim_alloc() 703 prog->aux->attach_btf_id, in bpf_trampoline_link_cgroup_shim() 709 prog->aux->attach_btf_id); in bpf_trampoline_link_cgroup_shim() 766 prog->aux->attach_btf_id); in bpf_trampoline_unlink_cgroup_shim()
|
H A D | syscall.c | 2730 } else if (attr->attach_btf_id) { in bpf_prog_load() 2745 attach_btf, attr->attach_btf_id, in bpf_prog_load() 2769 prog->aux->attach_btf_id = attr->attach_btf_id; in bpf_prog_load() 3389 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 4724 info.attach_btf_id = prog->aux->attach_btf_id; in bpf_prog_get_info_by_fd()
|
H A D | bpf_struct_ops.c | 702 prog->aux->attach_btf_id != st_ops_desc->type_id || in bpf_struct_ops_map_update_elem()
|
H A D | verifier.c | 15894 if (!env->prog->aux->attach_btf_id) in check_return_code() 21752 if (!prog->aux->attach_btf_id) in check_struct_ops_btf_id() 21766 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id() 22208 u32 btf_id = prog->aux->attach_btf_id; in check_attach_btf_id()
|
/linux/tools/bpf/bpftool/ |
H A D | cgroup.c | 157 info.attach_btf_id < btf__type_cnt(btf_vmlinux)) { in show_bpf_prog() 159 btf__type_by_id(btf_vmlinux, info.attach_btf_id); in show_bpf_prog() 179 jsonw_uint_field(json_wtr, "attach_btf_id", info.attach_btf_id); in show_bpf_prog() 193 else if (info.attach_btf_id) in show_bpf_prog() 195 info.attach_btf_obj_id, info.attach_btf_id); in show_bpf_prog()
|
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | fexit_bpf2bpf.c | 459 static int load_fentry(int attach_prog_fd, int attach_btf_id) in load_fentry() argument 464 .attach_btf_id = attach_btf_id, in load_fentry() 516 ASSERT_EQ(info.attach_btf_id, btf_id, "info.attach_btf_id"); in test_fentry_to_cgroup_bpf()
|
H A D | fexit_stress.c | 35 trace_opts.attach_btf_id = err; in serial_test_fexit_stress()
|
H A D | module_fentry_shadow.c | 100 load_opts.attach_btf_id = btf_id[i]; in test_module_fentry_shadow()
|
H A D | lsm_cgroup.c | 54 if (info.attach_btf_id == in query_prog_cnt()
|
/linux/tools/lib/bpf/ |
H A D | libbpf_probes.c | 141 opts.attach_btf_id = 1; in probe_prog_load() 150 opts.attach_btf_id = 1; in probe_prog_load()
|
H A D | gen_loader.c | 953 attr.attach_btf_id = load_attr->attach_btf_id; in bpf_gen__prog_load() 1011 offsetof(union bpf_attr, attach_btf_id))); in bpf_gen__prog_load()
|
H A D | bpf.h | 83 __u32 attach_btf_id; member
|
H A D | bpf.c | 288 attr.attach_btf_id = OPTS_GET(opts, attach_btf_id, 0); in bpf_prog_load()
|
H A D | libbpf.c | 485 __u32 attach_btf_id; member 1258 * attach_btf_id and member_idx in bpf_map__init_kern_struct_ops() 1260 if (!prog->attach_btf_id) { in bpf_map__init_kern_struct_ops() 1261 prog->attach_btf_id = kern_type_id; in bpf_map__init_kern_struct_ops() 1270 if (prog->attach_btf_id != kern_type_id) { in bpf_map__init_kern_struct_ops() 1271 pr_warn("struct_ops init_kern %s func ptr %s: invalid reuse of prog %s in sec %s with type %u: attach_btf_id %u != kern_type_id %u\n", in bpf_map__init_kern_struct_ops() 1273 prog->attach_btf_id, kern_type_id); in bpf_map__init_kern_struct_ops() 7358 if ((def & SEC_ATTACH_BTF) && !prog->attach_btf_id) { in libbpf_prepare_prog_load() 7385 prog->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7388 * prog->atach_btf_obj_fd/prog->attach_btf_id anymor in libbpf_prepare_prog_load() [all...] |
/linux/tools/testing/selftests/bpf/ |
H A D | test_verifier.c | 1578 int attach_btf_id; in do_test_single() local 1580 attach_btf_id = libbpf_find_vmlinux_btf_id(test->kfunc, in do_test_single() 1582 if (attach_btf_id < 0) { in do_test_single() 1589 opts.attach_btf_id = attach_btf_id; in do_test_single()
|
/linux/net/bpf/ |
H A D | bpf_dummy_struct_ops.c | 149 if (prog->aux->attach_btf_id != type_id) in bpf_struct_ops_test_run()
|
/linux/Documentation/bpf/ |
H A D | drgn.rst | 136 .attach_btf_id = (u32)0,
|
/linux/include/uapi/linux/ |
H A D | bpf.h | 1552 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 6591 __u32 attach_btf_id; 6590 __u32 attach_btf_id; global() member
|
/linux/tools/include/uapi/linux/ |
H A D | bpf.h | 1552 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 6590 __u32 attach_btf_id; member
|
/linux/net/core/ |
H A D | bpf_sk_storage.c | 377 btf_id = prog->aux->attach_btf_id; in bpf_sk_storage_tracing_allowed()
|
/linux/kernel/trace/ |
H A D | bpf_trace.c | 936 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); 939 prog->aux->attach_btf_id); in BTF_ID()
|