Searched refs:btf_id (Results 1 - 3 of 3) sorted by relevance
/device/soc/rockchip/common/sdk_linux/kernel/bpf/ |
H A D | verifier.c | 249 u32 btf_id;
member 586 verbose(env, "%s", kernel_type_name(reg->btf_id));
in print_verifier_state() 1365 enum bpf_reg_type reg_type, u32 btf_id)
in mark_btf_ld_reg() 1373 regs[regno].btf_id = btf_id;
in mark_btf_ld_reg() 2979 enum bpf_reg_type *reg_type, u32 *btf_id)
in check_ctx_access() 2997 *btf_id = info.btf_id;
in check_ctx_access() 3509 const struct btf_type *t = btf_type_by_id(btf_vmlinux, reg->btf_id);
in check_ptr_to_btf_access() 3511 u32 btf_id;
in check_ptr_to_btf_access() local 1364 mark_btf_ld_reg(struct bpf_verifier_env *env, struct bpf_reg_state *regs, u32 regno, enum bpf_reg_type reg_type, u32 btf_id) mark_btf_ld_reg() argument 2978 check_ctx_access(struct bpf_verifier_env *env, int insn_idx, int off, int size, enum bpf_access_type t, enum bpf_reg_type *reg_type, u32 *btf_id) check_ctx_access() argument 3555 u32 btf_id; check_ptr_to_map_access() local 3764 u32 btf_id = 0; check_mem_access() local 4248 u32 *btf_id; global() member 11746 u32 btf_id, member_idx; check_struct_ops_btf_id() local 11809 check_sleepable_lsm_hook(u32 btf_id) check_sleepable_lsm_hook() argument 11826 check_non_sleepable_error_inject(u32 btf_id) check_non_sleepable_error_inject() argument 11831 bpf_check_attach_target(struct bpf_verifier_log *log, const struct bpf_prog *prog, const struct bpf_prog *tgt_prog, u32 btf_id, struct bpf_attach_target_info *tgt_info) bpf_check_attach_target() argument 12067 u32 btf_id = prog->aux->attach_btf_id; check_attach_btf_id() local [all...] |
H A D | syscall.c | 2013 u32 btf_id, u32 prog_fd) in bpf_prog_load_check_attach() 2015 if (btf_id) { in bpf_prog_load_check_attach() 2016 if (btf_id > BTF_MAX_TYPE) { in bpf_prog_load_check_attach() 2607 static int bpf_tracing_prog_attach(struct bpf_prog *prog, int tgt_prog_fd, u32 btf_id) in bpf_tracing_prog_attach() argument 2641 if (!!tgt_prog_fd != !!btf_id) { in bpf_tracing_prog_attach() 2660 key = bpf_trampoline_compute_key(tgt_prog, btf_id); in bpf_tracing_prog_attach() 2703 err = bpf_check_attach_target(NULL, prog, tgt_prog, btf_id, &tgt_info); in bpf_tracing_prog_attach() 2869 * should be specified via btf_id during program load. in bpf_raw_tracepoint_open() 3670 info.btf_id = btf_id(pro in bpf_prog_get_info_by_fd() 2012 bpf_prog_load_check_attach(enum bpf_prog_type prog_type, enum bpf_attach_type expected_attach_type, u32 btf_id, u32 prog_fd) bpf_prog_load_check_attach() argument [all...] |
/device/soc/rockchip/common/sdk_linux/include/linux/ |
H A D | bpf.h | 327 RET_PTR_TO_MEM_OR_BTF_ID, /* returns a pointer to a valid memory or a btf_id */ 328 RET_PTR_TO_BTF_ID, /* returns a pointer to a btf_id */ 375 int *ret_btf_id; /* return value btf_id */ 454 u32 btf_id; member 774 u32 btf_id; member
|
Completed in 19 milliseconds