| /linux/kernel/bpf/ |
| H A D | bpf_lsm.c | 97 prog->aux->attach_btf_id)) { in BTF_SET_END() 118 u32 btf_id = prog->aux->attach_btf_id; in bpf_lsm_verify_prog() 128 bpf_log(vlog, "attach_btf_id %u points to disabled hook %s\n", in bpf_lsm_verify_prog() 134 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", in bpf_lsm_verify_prog() 172 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); in bpf_ima_inode_hash_allowed() 262 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 265 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 272 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 275 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 406 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); [all...] |
| H A D | trampoline.c | 744 p->aux->attach_btf_id = prog->aux->attach_btf_id; in cgroup_shim_alloc() 752 bpf_cgroup_atype_get(p->aux->attach_btf_id, cgroup_atype); in cgroup_shim_alloc() 787 prog->aux->attach_btf_id, in bpf_trampoline_link_cgroup_shim() 793 prog->aux->attach_btf_id); in bpf_trampoline_link_cgroup_shim() 850 prog->aux->attach_btf_id); in bpf_trampoline_unlink_cgroup_shim()
|
| H A D | syscall.c | 2966 } else if (attr->attach_btf_id) { in bpf_prog_load() 2981 attach_btf, attr->attach_btf_id, in bpf_prog_load() 3005 prog->aux->attach_btf_id = attr->attach_btf_id; in bpf_prog_load() 3682 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 5180 info.attach_btf_id = prog->aux->attach_btf_id; in bpf_prog_get_info_by_fd()
|
| H A D | verifier.c | 17406 if (!env->prog->aux->attach_btf_id) in check_return_code() 24011 if (!prog->aux->attach_btf_id) in check_struct_ops_btf_id() 24025 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id() 24535 u32 btf_id = prog->aux->attach_btf_id; in check_attach_btf_id()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | fexit_bpf2bpf.c | 459 static int load_fentry(int attach_prog_fd, int attach_btf_id) in load_fentry() argument 464 .attach_btf_id = attach_btf_id, in load_fentry() 516 ASSERT_EQ(info.attach_btf_id, btf_id, "info.attach_btf_id"); in test_fentry_to_cgroup_bpf()
|
| H A D | fexit_stress.c | 35 trace_opts.attach_btf_id = err; in serial_test_fexit_stress()
|
| H A D | module_fentry_shadow.c | 100 load_opts.attach_btf_id = btf_id[i]; in test_module_fentry_shadow()
|
| /linux/tools/lib/bpf/ |
| H A D | libbpf_probes.c | 141 opts.attach_btf_id = 1; in probe_prog_load() 144 exp_msg = "attach_btf_id 1 is not a function"; in probe_prog_load() 150 opts.attach_btf_id = 1; in probe_prog_load()
|
| H A D | libbpf.c | 501 __u32 attach_btf_id; member 1313 if (!prog->attach_btf_id) { in bpf_map__init_kern_struct_ops() 1314 prog->attach_btf_id = kern_type_id; in bpf_map__init_kern_struct_ops() 1323 if (prog->attach_btf_id != kern_type_id) { in bpf_map__init_kern_struct_ops() 1326 prog->attach_btf_id, kern_type_id); in bpf_map__init_kern_struct_ops() 7725 if ((def & SEC_ATTACH_BTF) && !prog->attach_btf_id) { in libbpf_prepare_prog_load() 7752 prog->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7760 opts->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7792 if (prog->attach_btf_id == 0) { in bpf_object_load_prog() 7809 load_attr.attach_btf_id = prog->attach_btf_id; in bpf_object_load_prog() [all …]
|
| /linux/fs/ |
| H A D | bpf_fs_kfuncs.c | 408 return btf_id_set_contains(&d_inode_locked_hooks, prog->aux->attach_btf_id); in BTF_ID()
|
| /linux/net/bpf/ |
| H A D | bpf_dummy_struct_ops.c | 149 if (prog->aux->attach_btf_id != type_id) in bpf_struct_ops_test_run()
|
| /linux/Documentation/bpf/ |
| H A D | drgn.rst | 136 .attach_btf_id = (u32)0,
|
| /linux/include/uapi/linux/ |
| H A D | bpf.h | 1588 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ 6670 __u32 attach_btf_id; 1584 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ global() member 6665 __u32 attach_btf_id; global() member
|
| /linux/tools/include/uapi/linux/ |
| H A D | bpf.h | 1588 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ 6670 __u32 attach_btf_id; 1584 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ global() member 6665 __u32 attach_btf_id; global() member
|
| /linux/include/linux/ |
| H A D | bpf.h | 1645 u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 3783 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype); 3786 static inline void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) {} in bpf_cgroup_atype_get() argument
|
| /linux/kernel/trace/ |
| H A D | bpf_trace.c | 954 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); in BTF_ID() 957 prog->aux->attach_btf_id); in BTF_ID()
|