Lines Matching refs:btf_id

261 	u32 btf_id;  member
642 verbose(env, "%s", kernel_type_name(reg->btf, reg->btf_id)); in print_verifier_state()
1491 struct btf *btf, u32 btf_id) in mark_btf_ld_reg() argument
1500 regs[regno].btf_id = btf_id; in mark_btf_ld_reg()
3383 struct btf **btf, u32 *btf_id) in check_ctx_access() argument
3403 *btf_id = info.btf_id; in check_ctx_access()
3927 const struct btf_type *t = btf_type_by_id(reg->btf, reg->btf_id); in check_ptr_to_btf_access()
3929 u32 btf_id; in check_ptr_to_btf_access() local
3950 off, size, atype, &btf_id); in check_ptr_to_btf_access()
3958 atype, &btf_id); in check_ptr_to_btf_access()
3965 mark_btf_ld_reg(env, regs, value_regno, ret, reg->btf, btf_id); in check_ptr_to_btf_access()
3980 u32 btf_id; in check_ptr_to_map_access() local
4015 ret = btf_struct_access(&env->log, btf_vmlinux, t, off, size, atype, &btf_id); in check_ptr_to_map_access()
4020 mark_btf_ld_reg(env, regs, value_regno, ret, btf_vmlinux, btf_id); in check_ptr_to_map_access()
4194 u32 btf_id = 0; in check_mem_access() local
4206 err = check_ctx_access(env, insn_idx, off, size, t, &reg_type, &btf, &btf_id); in check_mem_access()
4230 regs[value_regno].btf_id = btf_id; in check_mem_access()
4825 u32 *btf_id; member
4856 .btf_id = &btf_sock_ids[BTF_SOCK_TYPE_SOCK_COMMON],
4962 if (!compatible->btf_id) { in check_reg_type()
4966 arg_btf_id = compatible->btf_id; in check_reg_type()
4969 if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off, in check_reg_type()
4972 regno, kernel_type_name(reg->btf, reg->btf_id), in check_reg_type()
5113 if (!reg->btf_id) { in check_func_arg()
5118 meta->ret_btf_id = reg->btf_id; in check_func_arg()
6374 regs[BPF_REG_0].btf_id = meta.ret_btf_id; in check_helper_call()
6394 regs[BPF_REG_0].btf_id = ret_btf_id; in check_helper_call()
6530 regs[BPF_REG_0].btf_id = ptr_type_id; in check_kfunc_call()
9173 dst_reg->btf_id = aux->btf_var.btf_id; in check_ld_imm()
11298 aux->btf_var.btf_id = type; in check_pseudo_btf_id()
11318 aux->btf_var.btf_id = type; in check_pseudo_btf_id()
13254 u32 btf_id, member_idx; in check_struct_ops_btf_id() local
13262 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id()
13263 st_ops = bpf_struct_ops_find(btf_id); in check_struct_ops_btf_id()
13266 btf_id); in check_struct_ops_btf_id()
13327 static int check_non_sleepable_error_inject(u32 btf_id) in BTF_ID()
13329 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID()
13335 u32 btf_id, in bpf_check_attach_target() argument
13347 if (!btf_id) { in bpf_check_attach_target()
13357 t = btf_type_by_id(btf, btf_id); in bpf_check_attach_target()
13359 bpf_log(log, "attach_btf_id %u is invalid\n", btf_id); in bpf_check_attach_target()
13364 bpf_log(log, "attach_btf_id %u doesn't have a name\n", btf_id); in bpf_check_attach_target()
13371 if (aux->func_info[i].type_id == btf_id) { in bpf_check_attach_target()
13442 btf_id); in bpf_check_attach_target()
13447 btf_id, tname); in bpf_check_attach_target()
13464 btf_id); in bpf_check_attach_target()
13484 btf_id); in bpf_check_attach_target()
13528 if (!check_non_sleepable_error_inject(btf_id) && in bpf_check_attach_target()
13536 if (bpf_lsm_is_sleepable_hook(btf_id)) in bpf_check_attach_target()
13582 u32 btf_id = prog->aux->attach_btf_id; in BTF_SET_START() local
13609 ret = bpf_check_attach_target(&env->log, prog, tgt_prog, btf_id, &tgt_info); in BTF_SET_START()
13645 btf_id_set_contains(&btf_id_deny, btf_id)) { in BTF_SET_START()
13649 key = bpf_trampoline_compute_key(tgt_prog, prog->aux->attach_btf, btf_id); in BTF_SET_START()