Home
last modified time | relevance | path

Searched refs:btf_id (Results 1 - 3 of 3) sorted by relevance

/device/soc/rockchip/common/sdk_linux/kernel/bpf/
H A Dverifier.c249 u32 btf_id; member
586 verbose(env, "%s", kernel_type_name(reg->btf_id)); in print_verifier_state()
1365 enum bpf_reg_type reg_type, u32 btf_id) in mark_btf_ld_reg()
1373 regs[regno].btf_id = btf_id; in mark_btf_ld_reg()
2979 enum bpf_reg_type *reg_type, u32 *btf_id) in check_ctx_access()
2997 *btf_id = info.btf_id; in check_ctx_access()
3509 const struct btf_type *t = btf_type_by_id(btf_vmlinux, reg->btf_id); in check_ptr_to_btf_access()
3511 u32 btf_id; in check_ptr_to_btf_access() local
1364 mark_btf_ld_reg(struct bpf_verifier_env *env, struct bpf_reg_state *regs, u32 regno, enum bpf_reg_type reg_type, u32 btf_id) mark_btf_ld_reg() argument
2978 check_ctx_access(struct bpf_verifier_env *env, int insn_idx, int off, int size, enum bpf_access_type t, enum bpf_reg_type *reg_type, u32 *btf_id) check_ctx_access() argument
3555 u32 btf_id; check_ptr_to_map_access() local
3764 u32 btf_id = 0; check_mem_access() local
4248 u32 *btf_id; global() member
11746 u32 btf_id, member_idx; check_struct_ops_btf_id() local
11809 check_sleepable_lsm_hook(u32 btf_id) check_sleepable_lsm_hook() argument
11826 check_non_sleepable_error_inject(u32 btf_id) check_non_sleepable_error_inject() argument
11831 bpf_check_attach_target(struct bpf_verifier_log *log, const struct bpf_prog *prog, const struct bpf_prog *tgt_prog, u32 btf_id, struct bpf_attach_target_info *tgt_info) bpf_check_attach_target() argument
12067 u32 btf_id = prog->aux->attach_btf_id; check_attach_btf_id() local
[all...]
H A Dsyscall.c2013 u32 btf_id, u32 prog_fd) in bpf_prog_load_check_attach()
2015 if (btf_id) { in bpf_prog_load_check_attach()
2016 if (btf_id > BTF_MAX_TYPE) { in bpf_prog_load_check_attach()
2607 static int bpf_tracing_prog_attach(struct bpf_prog *prog, int tgt_prog_fd, u32 btf_id) in bpf_tracing_prog_attach() argument
2641 if (!!tgt_prog_fd != !!btf_id) { in bpf_tracing_prog_attach()
2660 key = bpf_trampoline_compute_key(tgt_prog, btf_id); in bpf_tracing_prog_attach()
2703 err = bpf_check_attach_target(NULL, prog, tgt_prog, btf_id, &tgt_info); in bpf_tracing_prog_attach()
2869 * should be specified via btf_id during program load. in bpf_raw_tracepoint_open()
3670 info.btf_id = btf_id(pro in bpf_prog_get_info_by_fd()
2012 bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, u32 btf_id, u32 prog_fd) bpf_prog_load_check_attach() argument
[all...]
/device/soc/rockchip/common/sdk_linux/include/linux/
H A Dbpf.h327 RET_PTR_TO_MEM_OR_BTF_ID, /* returns a pointer to a valid memory or a btf_id */
328 RET_PTR_TO_BTF_ID, /* returns a pointer to a btf_id */
375 int *ret_btf_id; /* return value btf_id */
454 u32 btf_id; member
774 u32 btf_id; member

Completed in 19 milliseconds