/Linux-v5.15/tools/bpf/bpftool/ |
D | btf.c | 48 __u32 btf_id; member 457 __u32 btf_id = -1; in do_dump() local 480 btf_id = info.btf_id; in do_dump() 516 btf_id = info.btf_id; in do_dump() 520 btf_id = strtoul(*argv, &endptr, 0); in do_dump() 583 btf = btf__load_from_kernel_by_id_split(btf_id, base_btf); in do_dump() 586 p_err("get btf by id (%u): %s", btf_id, strerror(err)); in do_dump() 659 __u32 btf_id, id = 0; in build_btf_type_table() local 719 btf_id = ((struct bpf_prog_info *)info)->btf_id; in build_btf_type_table() 722 btf_id = ((struct bpf_map_info *)info)->btf_id; in build_btf_type_table() [all …]
|
D | map.c | 535 if (info->btf_id) in show_map_close_json() 536 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in show_map_close_json() 628 if (!info->btf_id && !frozen) in show_map_close_plain() 633 if (info->btf_id) in show_map_close_plain() 634 printf("btf_id %d", info->btf_id); in show_map_close_plain() 637 printf("%sfrozen", info->btf_id ? " " : ""); in show_map_close_plain() 787 if (!info.btf_id) in maps_have_btf() 810 btf = btf__load_from_kernel_by_id(info->btf_id); in get_map_kv_btf() 1045 btf = btf__load_from_kernel_by_id(info->btf_id); in print_key_value()
|
D | prog.c | 266 btf = btf__load_from_kernel_by_id(map_info.btf_id); in show_prog_metadata() 415 if (info->btf_id) in print_prog_json() 416 jsonw_int_field(json_wtr, "btf_id", info->btf_id); in print_prog_json() 499 if (info->btf_id) in print_prog_plain() 500 printf("\n\tbtf_id %d", info->btf_id); in print_prog_plain() 649 if (info->btf_id) { in prog_dump() 650 btf = btf__load_from_kernel_by_id(info->btf_id); in prog_dump() 2020 if (info_linear->info.btf_id == 0) { in profile_target_name() 2025 btf = btf__load_from_kernel_by_id(info_linear->info.btf_id); in profile_target_name() 2035 info_linear->info.btf_id, func_info[0].type_id); in profile_target_name()
|
/Linux-v5.15/tools/bpf/resolve_btfids/ |
D | main.c | 78 struct btf_id { struct 150 static struct btf_id *btf_id__find(struct rb_root *root, const char *name) in btf_id__find() 153 struct btf_id *id; in btf_id__find() 157 id = rb_entry(p, struct btf_id, rb_node); in btf_id__find() 169 static struct btf_id* 174 struct btf_id *id; in btf_id__add() 179 id = rb_entry(parent, struct btf_id, rb_node); in btf_id__add() 232 static struct btf_id *add_set(struct object *obj, char *name) in add_set() 250 static struct btf_id *add_symbol(struct rb_root *root, char *name, size_t size) in add_symbol() 408 struct btf_id *id; in symbols_collect() [all …]
|
/Linux-v5.15/tools/perf/util/ |
D | bpf-event.c | 106 u32 btf_id, in perf_env__fetch_btf() argument 119 node->id = btf_id; in perf_env__fetch_btf() 230 if (info->btf_id && info->nr_func_info && info->func_info_rec_size) { in perf_event__synthesize_one_bpf_prog() 237 btf = btf__load_from_kernel_by_id(info->btf_id); in perf_event__synthesize_one_bpf_prog() 239 pr_debug("%s: failed to get BTF of id %u, aborting\n", __func__, info->btf_id); in perf_event__synthesize_one_bpf_prog() 243 perf_env__fetch_btf(env, info->btf_id, btf); in perf_event__synthesize_one_bpf_prog() 459 u32 btf_id; in perf_env__add_bpf_info() local 480 btf_id = info_linear->info.btf_id; in perf_env__add_bpf_info() 489 if (btf_id == 0) in perf_env__add_bpf_info() 492 btf = btf__load_from_kernel_by_id(btf_id); in perf_env__add_bpf_info() [all …]
|
D | env.c | 80 __u32 btf_id = btf_node->id; in perf_env__insert_btf() local 90 if (btf_id < node->id) { in perf_env__insert_btf() 92 } else if (btf_id > node->id) { in perf_env__insert_btf() 95 pr_debug("duplicated btf %u\n", btf_id); in perf_env__insert_btf() 107 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id) in perf_env__find_btf() argument 117 if (btf_id < node->id) in perf_env__find_btf() 119 else if (btf_id > node->id) in perf_env__find_btf()
|
D | env.h | 171 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id);
|
D | bpf_counter.c | 77 if (info_linear->info.btf_id == 0) { in bpf_target_prog_name() 82 btf = btf__load_from_kernel_by_id(info_linear->info.btf_id); in bpf_target_prog_name() 92 info_linear->info.btf_id, func_info[0].type_id); in bpf_target_prog_name()
|
/Linux-v5.15/include/linux/ |
D | bpf_verifier.h | 68 u32 btf_id; member 349 u32 btf_id; /* btf_id for struct typed var */ member 508 struct btf *btf, u32 btf_id) in bpf_trampoline_compute_key() argument 511 return ((u64)tgt_prog->aux->id << 32) | btf_id; in bpf_trampoline_compute_key() 513 return ((u64)btf_obj_id(btf) << 32) | 0x80000000 | btf_id; in bpf_trampoline_compute_key() 517 static inline void bpf_trampoline_unpack_key(u64 key, u32 *obj_id, u32 *btf_id) in bpf_trampoline_unpack_key() argument 521 if (btf_id) in bpf_trampoline_unpack_key() 522 *btf_id = key & 0x7FFFFFFF; in bpf_trampoline_unpack_key() 528 u32 btf_id,
|
D | bpf_lsm.h | 30 bool bpf_lsm_is_sleepable_hook(u32 btf_id); 47 static inline bool bpf_lsm_is_sleepable_hook(u32 btf_id) in bpf_lsm_is_sleepable_hook() argument
|
/Linux-v5.15/tools/lib/bpf/ |
D | linker.c | 87 int btf_id; member 1573 struct src_obj *obj, Elf64_Sym *sym, int btf_id) in glob_map_defs_match() argument 1580 t = btf__type_by_id(obj->btf, btf_id); in glob_map_defs_match() 1582 pr_warn("global '%s': invalid map definition type [%d]\n", sym_name, btf_id); in glob_map_defs_match() 1594 t = btf__type_by_id(linker->btf, glob_sym->btf_id); in glob_map_defs_match() 1613 struct src_obj *obj, Elf64_Sym *sym, size_t sym_idx, int btf_id) in glob_syms_match() argument 1620 if (!glob_sym->btf_id || !btf_id) { in glob_syms_match() 1625 src_t = btf__type_by_id(obj->btf, btf_id); in glob_syms_match() 1634 return glob_map_defs_match(sym_name, linker, glob_sym, obj, sym, btf_id); in glob_syms_match() 1637 linker->btf, glob_sym->btf_id, obj->btf, btf_id)) in glob_syms_match() [all …]
|
/Linux-v5.15/kernel/bpf/preload/iterators/ |
D | iterators.bpf.c | 59 static const char *get_name(struct btf *btf, long btf_id, const char *fallback) in get_name() argument 69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|
/Linux-v5.15/kernel/bpf/ |
D | task_iter.c | 593 task_reg_info.ctx_arg_info[0].btf_id = btf_task_struct_ids[0]; in task_iter_init() 598 task_file_reg_info.ctx_arg_info[0].btf_id = btf_task_struct_ids[0]; in task_iter_init() 599 task_file_reg_info.ctx_arg_info[1].btf_id = btf_task_file_ids[0]; in task_iter_init() 604 task_vma_reg_info.ctx_arg_info[0].btf_id = btf_task_struct_ids[0]; in task_iter_init() 605 task_vma_reg_info.ctx_arg_info[1].btf_id = btf_task_file_ids[1]; in task_iter_init()
|
D | bpf_iter.c | 12 u32 btf_id; /* cached value */ member 326 tinfo->btf_id = prog->aux->attach_btf_id; in cache_btf_id() 343 if (tinfo->btf_id && tinfo->btf_id == prog_btf_id) { in bpf_iter_prog_supported() 371 if (tinfo->btf_id == prog->aux->attach_btf_id) { in bpf_iter_get_func_proto() 533 if (tinfo->btf_id == prog_btf_id) { in bpf_iter_link_attach()
|
D | bpf_lsm.c | 217 bool bpf_lsm_is_sleepable_hook(u32 btf_id) in BTF_ID() 219 return btf_id_set_contains(&sleepable_lsm_hooks, btf_id); in BTF_ID()
|
D | btf.c | 4500 int i, btf_id; in btf_vmlinux_map_ids_init() local 4510 btf_id = btf_find_by_name_kind(btf, ops->map_btf_name, in btf_vmlinux_map_ids_init() 4512 if (btf_id < 0) in btf_vmlinux_map_ids_init() 4513 return btf_id; in btf_vmlinux_map_ids_init() 4514 *ops->map_btf_id = btf_id; in btf_vmlinux_map_ids_init() 4828 if (!ctx_arg_info->btf_id) { in btf_ctx_access() 4835 info->btf_id = ctx_arg_info->btf_id; in btf_ctx_access() 4852 info->btf_id = ret; in btf_ctx_access() 4860 info->btf_id = t->type; in btf_ctx_access() 4864 info->btf_id = t->type; in btf_ctx_access() [all …]
|
D | verifier.c | 261 u32 btf_id; member 642 verbose(env, "%s", kernel_type_name(reg->btf, reg->btf_id)); in print_verifier_state() 1491 struct btf *btf, u32 btf_id) in mark_btf_ld_reg() argument 1500 regs[regno].btf_id = btf_id; in mark_btf_ld_reg() 3383 struct btf **btf, u32 *btf_id) in check_ctx_access() argument 3403 *btf_id = info.btf_id; in check_ctx_access() 3927 const struct btf_type *t = btf_type_by_id(reg->btf, reg->btf_id); in check_ptr_to_btf_access() 3929 u32 btf_id; in check_ptr_to_btf_access() local 3950 off, size, atype, &btf_id); in check_ptr_to_btf_access() 3958 atype, &btf_id); in check_ptr_to_btf_access() [all …]
|
D | prog_iter.c | 103 bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id; in bpf_prog_iter_init()
|
D | map_iter.c | 187 bpf_map_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_map_id; in bpf_map_iter_init()
|
D | syscall.c | 2017 struct btf *attach_btf, u32 btf_id, in bpf_prog_load_check_attach() argument 2020 if (btf_id) { in bpf_prog_load_check_attach() 2021 if (btf_id > BTF_MAX_TYPE) in bpf_prog_load_check_attach() 2038 if (attach_btf && (!btf_id || dst_prog)) in bpf_prog_load_check_attach() 2658 u32 btf_id) in bpf_tracing_prog_attach() argument 2693 if (!!tgt_prog_fd != !!btf_id) { in bpf_tracing_prog_attach() 2712 key = bpf_trampoline_compute_key(tgt_prog, NULL, btf_id); in bpf_tracing_prog_attach() 2756 btf_id = prog->aux->attach_btf_id; in bpf_tracing_prog_attach() 2757 key = bpf_trampoline_compute_key(NULL, prog->aux->attach_btf, btf_id); in bpf_tracing_prog_attach() 2768 err = bpf_check_attach_target(NULL, prog, tgt_prog, btf_id, in bpf_tracing_prog_attach() [all …]
|
/Linux-v5.15/tools/testing/selftests/bpf/prog_tests/ |
D | fexit_bpf2bpf.c | 103 __s32 btf_id; in test_fexit_bpf2bpf_common() local 108 btf_id = btf__find_by_name_kind(btf, tgt_name + 1, BTF_KIND_FUNC); in test_fexit_bpf2bpf_common() 127 ASSERT_EQ(link_info.tracing.target_btf_id, btf_id, "link_tgt_btf_id"); in test_fexit_bpf2bpf_common()
|
/Linux-v5.15/kernel/trace/ |
D | bpf_trace.c | 79 s32 *btf_id); 474 s32 btf_id; in BPF_CALL_4() local 477 ret = bpf_btf_printf_prepare(ptr, btf_ptr_size, flags, &btf, &btf_id); in BPF_CALL_4() 481 return btf_type_seq_show_flags(btf, btf_id, ptr->ptr, m, flags); in BPF_CALL_4() 912 s32 *btf_id) in bpf_btf_printf_prepare() argument 928 *btf_id = ptr->type_id; in bpf_btf_printf_prepare() 932 if (*btf_id > 0) in bpf_btf_printf_prepare() 933 t = btf_type_by_id(*btf, *btf_id); in bpf_btf_printf_prepare() 934 if (*btf_id <= 0 || !t) in bpf_btf_printf_prepare() 944 s32 btf_id; in BPF_CALL_5() local [all …]
|
/Linux-v5.15/net/ipv4/ |
D | bpf_tcp_ca.c | 94 if (info->reg_type == PTR_TO_BTF_ID && info->btf_id == sock_id) in bpf_tcp_ca_is_valid_access() 96 info->btf_id = tcp_sock_id; in bpf_tcp_ca_is_valid_access()
|
/Linux-v5.15/net/core/ |
D | bpf_sk_storage.c | 387 u32 btf_id; in bpf_sk_storage_tracing_allowed() local 404 btf_id = prog->aux->attach_btf_id; in bpf_sk_storage_tracing_allowed() 405 t = btf_type_by_id(btf_vmlinux, btf_id); in bpf_sk_storage_tracing_allowed() 939 bpf_sk_storage_map_reg_info.ctx_arg_info[0].btf_id = in bpf_sk_storage_map_iter_init()
|
/Linux-v5.15/include/uapi/linux/ |
D | bpf.h | 1386 __u32 btf_id; member 5565 __u32 btf_id; member 5594 __u32 btf_id; member
|