Lines Matching refs:btf_id

241 	u32 btf_id;  member
592 verbose(env, "%s", kernel_type_name(reg->btf_id)); in print_verifier_state()
1384 enum bpf_reg_type reg_type, u32 btf_id) in mark_btf_ld_reg() argument
1392 regs[regno].btf_id = btf_id; in mark_btf_ld_reg()
2763 u32 *btf_id) in check_ctx_access() argument
2782 *btf_id = info.btf_id; in check_ctx_access()
3296 const struct btf_type *t = btf_type_by_id(btf_vmlinux, reg->btf_id); in check_ptr_to_btf_access()
3298 u32 btf_id; in check_ptr_to_btf_access() local
3319 atype, &btf_id); in check_ptr_to_btf_access()
3327 &btf_id); in check_ptr_to_btf_access()
3334 mark_btf_ld_reg(env, regs, value_regno, ret, btf_id); in check_ptr_to_btf_access()
3349 u32 btf_id; in check_ptr_to_map_access() local
3384 ret = btf_struct_access(&env->log, t, off, size, atype, &btf_id); in check_ptr_to_map_access()
3389 mark_btf_ld_reg(env, regs, value_regno, ret, btf_id); in check_ptr_to_map_access()
3465 u32 btf_id = 0; in check_mem_access() local
3477 err = check_ctx_access(env, insn_idx, off, size, t, &reg_type, &btf_id); in check_mem_access()
3500 regs[value_regno].btf_id = btf_id; in check_mem_access()
3984 u32 *btf_id; member
4014 .btf_id = &btf_sock_ids[BTF_SOCK_TYPE_SOCK_COMMON],
4110 if (!compatible->btf_id) { in check_reg_type()
4114 arg_btf_id = compatible->btf_id; in check_reg_type()
4117 if (!btf_struct_ids_match(&env->log, reg->off, reg->btf_id, in check_reg_type()
4120 regno, kernel_type_name(reg->btf_id), in check_reg_type()
4239 if (!reg->btf_id) { in check_func_arg()
4243 meta->ret_btf_id = reg->btf_id; in check_func_arg()
5177 regs[BPF_REG_0].btf_id = meta.ret_btf_id; in check_helper_call()
5190 regs[BPF_REG_0].btf_id = ret_btf_id; in check_helper_call()
7649 dst_reg->btf_id = aux->btf_var.btf_id; in check_ld_imm()
9645 aux->btf_var.btf_id = type; in check_pseudo_btf_id()
9663 aux->btf_var.btf_id = type; in check_pseudo_btf_id()
11413 u32 btf_id, member_idx; in check_struct_ops_btf_id() local
11416 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id()
11417 st_ops = bpf_struct_ops_find(btf_id); in check_struct_ops_btf_id()
11420 btf_id); in check_struct_ops_btf_id()
11478 static int check_sleepable_lsm_hook(u32 btf_id) in BTF_ID()
11480 return btf_id_set_contains(&btf_sleepable_lsm_hooks, btf_id); in BTF_ID()
11495 static int check_non_sleepable_error_inject(u32 btf_id) in BTF_ID()
11497 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID()
11503 u32 btf_id, in bpf_check_attach_target() argument
11515 if (!btf_id) { in bpf_check_attach_target()
11525 t = btf_type_by_id(btf, btf_id); in bpf_check_attach_target()
11527 bpf_log(log, "attach_btf_id %u is invalid\n", btf_id); in bpf_check_attach_target()
11532 bpf_log(log, "attach_btf_id %u doesn't have a name\n", btf_id); in bpf_check_attach_target()
11539 if (aux->func_info[i].type_id == btf_id) { in bpf_check_attach_target()
11610 btf_id); in bpf_check_attach_target()
11615 btf_id, tname); in bpf_check_attach_target()
11632 btf_id); in bpf_check_attach_target()
11652 btf_id); in bpf_check_attach_target()
11696 if (!check_non_sleepable_error_inject(btf_id) && in bpf_check_attach_target()
11704 if (check_sleepable_lsm_hook(btf_id)) in bpf_check_attach_target()
11739 u32 btf_id = prog->aux->attach_btf_id; in check_attach_btf_id() local
11758 ret = bpf_check_attach_target(&env->log, prog, tgt_prog, btf_id, &tgt_info); in check_attach_btf_id()
11795 key = bpf_trampoline_compute_key(tgt_prog, btf_id); in check_attach_btf_id()