/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/ |
D | module_fentry_shadow.c | 63 __s32 btf_id[2] = {}; in test_module_fentry_shadow() local 91 btf_id[0] = btf__find_by_name_kind(vmlinux_btf, symbol_name, BTF_KIND_FUNC); in test_module_fentry_shadow() 92 if (!ASSERT_GT(btf_id[0], 0, "btf_find_by_name")) in test_module_fentry_shadow() 95 btf_id[1] = btf__find_by_name_kind(mod_btf, symbol_name, BTF_KIND_FUNC); in test_module_fentry_shadow() 96 if (!ASSERT_GT(btf_id[1], 0, "btf_find_by_name")) in test_module_fentry_shadow() 100 load_opts.attach_btf_id = btf_id[i]; in test_module_fentry_shadow()
|
D | fexit_bpf2bpf.c | 115 __s32 btf_id; in test_fexit_bpf2bpf_common() local 120 btf_id = btf__find_by_name_kind(btf, tgt_name + 1, BTF_KIND_FUNC); in test_fexit_bpf2bpf_common() 146 ASSERT_EQ(link_info.tracing.target_btf_id, btf_id, "link_tgt_btf_id"); in test_fexit_bpf2bpf_common() 446 if (!info.btf_id) in find_prog_btf_id() 449 btf = btf__load_from_kernel_by_id(info.btf_id); in find_prog_btf_id() 486 int btf_id; in test_fentry_to_cgroup_bpf() local 500 btf_id = find_prog_btf_id("bind_v4_prog", bpf_program__fd(skel->progs.bind_v4_prog)); in test_fentry_to_cgroup_bpf() 501 if (!ASSERT_GE(btf_id, 0, "find_prog_btf_id")) in test_fentry_to_cgroup_bpf() 504 fentry_fd = load_fentry(bpf_program__fd(skel->progs.bind_v4_prog), btf_id); in test_fentry_to_cgroup_bpf() 515 ASSERT_EQ(info.btf_id, 0, "info.btf_id"); in test_fentry_to_cgroup_bpf() [all …]
|
D | ctx_rewrite.c | 252 static int find_field_offset_aux(struct btf *btf, int btf_id, char *field_name, int off) in find_field_offset_aux() argument 254 const struct btf_type *type = btf__type_by_id(btf, btf_id); in find_field_offset_aux() 260 PRINT_FAIL("Can't find btf_type for id %d\n", btf_id); in find_field_offset_aux() 265 PRINT_FAIL("BTF id %d is not struct or union\n", btf_id); in find_field_offset_aux() 299 int btf_id, field_offset; in find_field_offset() local 313 btf_id = btf__find_by_name(btf, type_str); in find_field_offset() 314 if (btf_id < 0) { in find_field_offset() 319 field_offset = find_field_offset_aux(btf, btf_id, field_str, 0); in find_field_offset()
|
/linux-6.12.1/tools/perf/util/ |
D | bpf-event.c | 97 u32 btf_id, in perf_env__fetch_btf() argument 110 node->id = btf_id; in perf_env__fetch_btf() 225 if (info->btf_id && info->nr_func_info && info->func_info_rec_size) { in perf_event__synthesize_one_bpf_prog() 232 btf = btf__load_from_kernel_by_id(info->btf_id); in perf_event__synthesize_one_bpf_prog() 234 pr_debug("%s: failed to get BTF of id %u, aborting\n", __func__, info->btf_id); in perf_event__synthesize_one_bpf_prog() 238 perf_env__fetch_btf(env, info->btf_id, btf); in perf_event__synthesize_one_bpf_prog() 457 u32 btf_id; in perf_env__add_bpf_info() local 478 btf_id = info_linear->info.btf_id; in perf_env__add_bpf_info() 487 if (btf_id == 0) in perf_env__add_bpf_info() 490 btf = btf__load_from_kernel_by_id(btf_id); in perf_env__add_bpf_info() [all …]
|
D | env.c | 98 __u32 btf_id = btf_node->id; in __perf_env__insert_btf() local 107 if (btf_id < node->id) { in __perf_env__insert_btf() 109 } else if (btf_id > node->id) { in __perf_env__insert_btf() 112 pr_debug("duplicated btf %u\n", btf_id); in __perf_env__insert_btf() 123 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id) in perf_env__find_btf() argument 128 res = __perf_env__find_btf(env, btf_id); in perf_env__find_btf() 133 struct btf_node *__perf_env__find_btf(struct perf_env *env, __u32 btf_id) in __perf_env__find_btf() argument 142 if (btf_id < node->id) in __perf_env__find_btf() 144 else if (btf_id > node->id) in __perf_env__find_btf()
|
D | env.h | 187 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id); 188 struct btf_node *__perf_env__find_btf(struct perf_env *env, __u32 btf_id);
|
D | disasm_bpf.c | 91 if (info_linear->info.btf_id) { in symbol__disassemble_bpf() 95 info_linear->info.btf_id); in symbol__disassemble_bpf()
|
/linux-6.12.1/tools/bpf/resolve_btfids/ |
D | main.c | 101 struct btf_id { struct 177 static struct btf_id *btf_id__find(struct rb_root *root, const char *name) in btf_id__find() 180 struct btf_id *id; in btf_id__find() 184 id = rb_entry(p, struct btf_id, rb_node); in btf_id__find() 196 static struct btf_id * 201 struct btf_id *id; in btf_id__add() 206 id = rb_entry(parent, struct btf_id, rb_node); in btf_id__add() 259 static struct btf_id *add_set(struct object *obj, char *name, bool is_set8) in add_set() 277 static struct btf_id *add_symbol(struct rb_root *root, char *name, size_t size) in add_symbol() 451 struct btf_id *id; in symbols_collect() [all …]
|
/linux-6.12.1/include/linux/ |
D | bpf_verifier.h | 102 u32 btf_id; member 128 u32 btf_id; member 554 u32 btf_id; /* btf_id for struct typed var */ member 648 u32 btf_id; member 838 struct btf *btf, u32 btf_id) in bpf_trampoline_compute_key() argument 841 return ((u64)tgt_prog->aux->id << 32) | btf_id; in bpf_trampoline_compute_key() 843 return ((u64)btf_obj_id(btf) << 32) | 0x80000000 | btf_id; in bpf_trampoline_compute_key() 847 static inline void bpf_trampoline_unpack_key(u64 key, u32 *obj_id, u32 *btf_id) in bpf_trampoline_unpack_key() argument 851 if (btf_id) in bpf_trampoline_unpack_key() 852 *btf_id = key & 0x7FFFFFFF; in bpf_trampoline_unpack_key() [all …]
|
D | bpf_lsm.h | 31 bool bpf_lsm_is_sleepable_hook(u32 btf_id); 53 static inline bool bpf_lsm_is_sleepable_hook(u32 btf_id) in bpf_lsm_is_sleepable_hook() argument
|
D | btf.h | 124 u32 btf_id; member 129 u32 btf_id; member 572 s32 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id); 575 struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id); 629 static inline s32 btf_find_dtor_kfunc(struct btf *btf, u32 btf_id) in btf_find_dtor_kfunc() argument 638 static inline struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id) in btf_find_struct_meta() argument
|
/linux-6.12.1/tools/bpf/bpftool/ |
D | btf.c | 774 static bool btf_is_kernel_module(__u32 btf_id) in btf_is_kernel_module() argument 782 btf_fd = bpf_btf_get_fd_by_id(btf_id); in btf_is_kernel_module() 784 p_err("can't get BTF object by id (%u): %s", btf_id, strerror(errno)); in btf_is_kernel_module() 794 p_err("can't get BTF (ID %u) object info: %s", btf_id, strerror(errno)); in btf_is_kernel_module() 807 __u32 btf_id = -1; in do_dump() local 830 btf_id = info.btf_id; in do_dump() 866 btf_id = info.btf_id; in do_dump() 870 btf_id = strtoul(*argv, &endptr, 0); in do_dump() 928 if (!base_btf && btf_is_kernel_module(btf_id)) { in do_dump() 934 btf = btf__load_from_kernel_by_id_split(btf_id, base_btf); in do_dump() [all …]
|
D | map.c | 521 if (info->btf_id) in show_map_close_json() 522 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in show_map_close_json() 614 if (info->btf_id || frozen) in show_map_close_plain() 617 if (info->btf_id) in show_map_close_plain() 618 printf("btf_id %d", info->btf_id); in show_map_close_plain() 621 printf("%sfrozen", info->btf_id ? " " : ""); in show_map_close_plain() 781 if (!info.btf_id) in maps_have_btf() 804 *btf = btf__load_from_kernel_by_id(info->btf_id); in get_map_kv_btf()
|
D | prog.c | 324 btf = btf__load_from_kernel_by_id(map_info.btf_id); in show_prog_metadata() 482 if (info->btf_id) in print_prog_json() 483 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in print_prog_json() 571 if (info->btf_id) in print_prog_plain() 572 printf("\n\tbtf_id %d", info->btf_id); in print_prog_plain() 731 if (info->btf_id) { in prog_dump() 732 btf = btf__load_from_kernel_by_id(info->btf_id); in prog_dump() 2217 if (info.btf_id == 0) { in profile_target_name() 2239 btf = btf__load_from_kernel_by_id(info.btf_id); in profile_target_name() 2248 info.btf_id, func_info.type_id); in profile_target_name()
|
/linux-6.12.1/kernel/bpf/ |
D | bpf_lsm.c | 117 u32 btf_id = prog->aux->attach_btf_id; in bpf_lsm_verify_prog() local 126 if (btf_id_set_contains(&bpf_lsm_disabled_hooks, btf_id)) { in bpf_lsm_verify_prog() 128 btf_id, func_name); in bpf_lsm_verify_prog() 132 if (!btf_id_set_contains(&bpf_lsm_hooks, btf_id)) { in bpf_lsm_verify_prog() 134 btf_id, func_name); in bpf_lsm_verify_prog() 398 bool bpf_lsm_is_sleepable_hook(u32 btf_id) in BTF_ID() 400 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
|
D | verifier.c | 282 u32 btf_id; member 414 meta = btf_find_struct_meta(reg->btf, reg->btf_id); in reg_btf_record() 500 static bool is_sync_callback_calling_kfunc(u32 btf_id); 501 static bool is_async_callback_calling_kfunc(u32 btf_id); 502 static bool is_callback_calling_kfunc(u32 btf_id); 505 static bool is_bpf_wq_set_callback_impl_kfunc(u32 btf_id); 1006 struct btf *btf, u32 btf_id, int nr_slots) in mark_stack_slots_iter() argument 1034 st->iter.btf_id = btf_id; in mark_stack_slots_iter() 1106 struct btf *btf, u32 btf_id, int nr_slots) in is_iter_reg_valid_init() argument 1126 if (st->iter.btf != btf || st->iter.btf_id != btf_id) in is_iter_reg_valid_init() [all …]
|
D | bpf_iter.c | 13 u32 btf_id; /* cached value */ member 335 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 351 if (iter->btf_id && iter->btf_id == prog_btf_id) { in bpf_iter_prog_supported() 379 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 540 if (iter->btf_id == prog_btf_id) { in bpf_iter_link_attach()
|
D | log.c | 509 const char *iter_type_str(const struct btf *btf, u32 btf_id) in iter_type_str() argument 511 if (!btf || btf_id == 0) in iter_type_str() 515 return btf_type_name(btf, btf_id) + sizeof(ITER_PREFIX) - 1; in iter_type_str() 707 verbose(env, "%s", btf_type_name(reg->btf, reg->btf_id)); in print_reg_state() 833 iter_type_str(reg->iter.btf, reg->iter.btf_id), in print_verifier_state()
|
D | btf.c | 3845 field->kptr.btf_id = id; in btf_parse_kptr() 4057 u32 btf_id; in btf_check_and_fixup_fields() local 4061 btf_id = rec->fields[i].graph_root.value_btf_id; in btf_check_and_fixup_fields() 4062 meta = btf_find_struct_meta(btf, btf_id); in btf_check_and_fixup_fields() 5621 type->btf_id = i; in btf_parse_struct_metas() 5642 struct btf_struct_meta *btf_find_struct_meta(const struct btf *btf, u32 btf_id) in btf_find_struct_meta() argument 5646 BUILD_BUG_ON(offsetof(struct btf_struct_meta, btf_id) != 0); in btf_find_struct_meta() 5650 return bsearch(&btf_id, tab->types, tab->cnt, sizeof(tab->types[0]), btf_id_cmp_func); in btf_find_struct_meta() 6551 if (!ctx_arg_info->btf_id) { in btf_ctx_access() 6558 info->btf_id = ctx_arg_info->btf_id; in btf_ctx_access() [all …]
|
D | task_iter.c | 1059 task_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init() 1064 task_file_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init() 1065 task_file_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_FILE]; in task_iter_init() 1070 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_TASK]; in task_iter_init() 1071 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_tracing_ids[BTF_TRACING_TYPE_VMA]; in task_iter_init()
|
D | prog_iter.c | 103 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id; in bpf_prog_iter_init()
|
/linux-6.12.1/tools/lib/bpf/ |
D | linker.c | 86 int btf_id; member 1615 struct src_obj *obj, Elf64_Sym *sym, int btf_id) in glob_map_defs_match() argument 1622 t = btf__type_by_id(obj->btf, btf_id); in glob_map_defs_match() 1624 pr_warn("global '%s': invalid map definition type [%d]\n", sym_name, btf_id); in glob_map_defs_match() 1636 t = btf__type_by_id(linker->btf, glob_sym->btf_id); in glob_map_defs_match() 1655 struct src_obj *obj, Elf64_Sym *sym, size_t sym_idx, int btf_id) in glob_syms_match() argument 1662 if (!glob_sym->btf_id || !btf_id) { in glob_syms_match() 1667 src_t = btf__type_by_id(obj->btf, btf_id); in glob_syms_match() 1676 return glob_map_defs_match(sym_name, linker, glob_sym, obj, sym, btf_id); in glob_syms_match() 1679 linker->btf, glob_sym->btf_id, obj->btf, btf_id)) in glob_syms_match() [all …]
|
/linux-6.12.1/kernel/bpf/preload/iterators/ |
D | iterators.bpf.c | 59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument 69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|
/linux-6.12.1/tools/testing/selftests/bpf/ |
D | test_verifier.c | 977 int btf_id = 0; in fixup_prog_kfuncs() local 982 btf_id = btf__find_by_name_kind(vmlinux_btf, in fixup_prog_kfuncs() 985 btf_id = btf_id < 0 ? 0 : btf_id; in fixup_prog_kfuncs() 989 if (!btf_id) { in fixup_prog_kfuncs() 992 btf_id = btf__find_by_name_kind(testmod_btf, in fixup_prog_kfuncs() 995 btf_id = btf_id < 0 ? 0 : btf_id; in fixup_prog_kfuncs() 996 if (btf_id) { in fixup_prog_kfuncs() 1006 prog[fixup_kfunc_btf_id->insn_idx].imm = btf_id; in fixup_prog_kfuncs()
|
/linux-6.12.1/net/ipv4/ |
D | bpf_tcp_ca.c | 54 info->btf_id == sock_id) in bpf_tcp_ca_is_valid_access() 56 info->btf_id = tcp_sock_id; in bpf_tcp_ca_is_valid_access() 68 t = btf_type_by_id(reg->btf, reg->btf_id); in bpf_tcp_ca_btf_struct_access()
|