/linux-6.12.1/kernel/bpf/ |
D | bpf_lsm.c | 96 prog->aux->attach_btf_id)) { in BTF_SET_END() 117 u32 btf_id = prog->aux->attach_btf_id; in bpf_lsm_verify_prog() 171 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); in bpf_ima_inode_hash_allowed() 261 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 264 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 271 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 274 prog->aux->attach_btf_id)) in bpf_lsm_func_proto() 405 return !btf_id_set_contains(&untrusted_lsm_hooks, prog->aux->attach_btf_id); in bpf_lsm_is_trusted() 434 if (btf_id_set_contains(&bool_lsm_hooks, prog->aux->attach_btf_id)) { in BTF_ID()
|
D | cgroup.c | 148 u32 attach_btf_id; member 155 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) in bpf_cgroup_atype_find() argument 165 if (cgroup_lsm_atype[i].attach_btf_id == attach_btf_id) in bpf_cgroup_atype_find() 169 if (cgroup_lsm_atype[i].attach_btf_id == 0) in bpf_cgroup_atype_find() 176 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) in bpf_cgroup_atype_get() argument 182 WARN_ON_ONCE(cgroup_lsm_atype[i].attach_btf_id && in bpf_cgroup_atype_get() 183 cgroup_lsm_atype[i].attach_btf_id != attach_btf_id); in bpf_cgroup_atype_get() 185 cgroup_lsm_atype[i].attach_btf_id = attach_btf_id; in bpf_cgroup_atype_get() 195 cgroup_lsm_atype[i].attach_btf_id = 0; in bpf_cgroup_atype_put() 201 bpf_cgroup_atype_find(enum bpf_attach_type attach_type, u32 attach_btf_id) in bpf_cgroup_atype_find() argument [all …]
|
D | bpf_iter.c | 335 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 342 u32 prog_btf_id = prog->aux->attach_btf_id; in bpf_iter_prog_supported() 379 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 424 link->prog->aux->attach_btf_id != new_prog->aux->attach_btf_id) { in bpf_iter_link_replace() 537 prog_btf_id = prog->aux->attach_btf_id; in bpf_iter_link_attach()
|
D | trampoline.c | 661 p->aux->attach_btf_id = prog->aux->attach_btf_id; in cgroup_shim_alloc() 669 bpf_cgroup_atype_get(p->aux->attach_btf_id, cgroup_atype); in cgroup_shim_alloc() 703 prog->aux->attach_btf_id, in bpf_trampoline_link_cgroup_shim() 709 prog->aux->attach_btf_id); in bpf_trampoline_link_cgroup_shim() 766 prog->aux->attach_btf_id); in bpf_trampoline_unlink_cgroup_shim()
|
D | syscall.c | 2730 } else if (attr->attach_btf_id) { in bpf_prog_load() 2745 attach_btf, attr->attach_btf_id, in bpf_prog_load() 2769 prog->aux->attach_btf_id = attr->attach_btf_id; in bpf_prog_load() 3393 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 4743 info.attach_btf_id = prog->aux->attach_btf_id; in bpf_prog_get_info_by_fd()
|
D | bpf_struct_ops.c | 702 prog->aux->attach_btf_id != st_ops_desc->type_id || in bpf_struct_ops_map_update_elem()
|
D | verifier.c | 15893 if (!env->prog->aux->attach_btf_id) in check_return_code() 21754 if (!prog->aux->attach_btf_id) in check_struct_ops_btf_id() 21768 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id() 22210 u32 btf_id = prog->aux->attach_btf_id; in check_attach_btf_id()
|
/linux-6.12.1/tools/bpf/bpftool/ |
D | cgroup.c | 157 info.attach_btf_id < btf__type_cnt(btf_vmlinux)) { in show_bpf_prog() 159 btf__type_by_id(btf_vmlinux, info.attach_btf_id); in show_bpf_prog() 179 jsonw_uint_field(json_wtr, "attach_btf_id", info.attach_btf_id); in show_bpf_prog() 193 else if (info.attach_btf_id) in show_bpf_prog() 195 info.attach_btf_obj_id, info.attach_btf_id); in show_bpf_prog()
|
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | fexit_bpf2bpf.c | 459 static int load_fentry(int attach_prog_fd, int attach_btf_id) in load_fentry() argument 464 .attach_btf_id = attach_btf_id, in load_fentry() 516 ASSERT_EQ(info.attach_btf_id, btf_id, "info.attach_btf_id"); in test_fentry_to_cgroup_bpf()
|
D | fexit_stress.c | 35 trace_opts.attach_btf_id = err; in serial_test_fexit_stress()
|
D | module_fentry_shadow.c | 100 load_opts.attach_btf_id = btf_id[i]; in test_module_fentry_shadow()
|
D | lsm_cgroup.c | 54 if (info.attach_btf_id == in query_prog_cnt()
|
/linux-6.12.1/tools/lib/bpf/ |
D | libbpf_probes.c | 141 opts.attach_btf_id = 1; in probe_prog_load() 150 opts.attach_btf_id = 1; in probe_prog_load()
|
D | gen_loader.c | 953 attr.attach_btf_id = load_attr->attach_btf_id; in bpf_gen__prog_load() 1011 offsetof(union bpf_attr, attach_btf_id))); in bpf_gen__prog_load()
|
D | bpf.h | 83 __u32 attach_btf_id; member
|
D | bpf.c | 288 attr.attach_btf_id = OPTS_GET(opts, attach_btf_id, 0); in bpf_prog_load()
|
D | libbpf.c | 485 __u32 attach_btf_id; member 1260 if (!prog->attach_btf_id) { in bpf_map__init_kern_struct_ops() 1261 prog->attach_btf_id = kern_type_id; in bpf_map__init_kern_struct_ops() 1270 if (prog->attach_btf_id != kern_type_id) { in bpf_map__init_kern_struct_ops() 1273 prog->attach_btf_id, kern_type_id); in bpf_map__init_kern_struct_ops() 7358 if ((def & SEC_ATTACH_BTF) && !prog->attach_btf_id) { in libbpf_prepare_prog_load() 7385 prog->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7393 opts->attach_btf_id = btf_type_id; in libbpf_prepare_prog_load() 7426 if (prog->attach_btf_id == 0) { in bpf_object_load_prog() 7443 load_attr.attach_btf_id = prog->attach_btf_id; in bpf_object_load_prog() [all …]
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | test_verifier.c | 1578 int attach_btf_id; in do_test_single() local 1580 attach_btf_id = libbpf_find_vmlinux_btf_id(test->kfunc, in do_test_single() 1582 if (attach_btf_id < 0) { in do_test_single() 1589 opts.attach_btf_id = attach_btf_id; in do_test_single()
|
/linux-6.12.1/net/bpf/ |
D | bpf_dummy_struct_ops.c | 149 if (prog->aux->attach_btf_id != type_id) in bpf_struct_ops_test_run()
|
/linux-6.12.1/Documentation/bpf/ |
D | drgn.rst | 136 .attach_btf_id = (u32)0,
|
/linux-6.12.1/include/uapi/linux/ |
D | bpf.h | 1555 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 6591 __u32 attach_btf_id; member
|
/linux-6.12.1/tools/include/uapi/linux/ |
D | bpf.h | 1555 __u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 6591 __u32 attach_btf_id; member
|
/linux-6.12.1/net/core/ |
D | bpf_sk_storage.c | 377 btf_id = prog->aux->attach_btf_id; in bpf_sk_storage_tracing_allowed()
|
/linux-6.12.1/include/linux/ |
D | bpf.h | 1473 u32 attach_btf_id; /* in-kernel BTF type id to attach to */ member 3431 void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype); 3434 static inline void bpf_cgroup_atype_get(u32 attach_btf_id, int cgroup_atype) {} in bpf_cgroup_atype_get() argument
|
/linux-6.12.1/kernel/trace/ |
D | bpf_trace.c | 936 return bpf_lsm_is_sleepable_hook(prog->aux->attach_btf_id); in BTF_ID() 939 prog->aux->attach_btf_id); in BTF_ID()
|