Lines Matching refs:btf_id
255 u32 btf_id; member
650 verbose(env, "%s", kernel_type_name(reg->btf, reg->btf_id)); in print_verifier_state()
1506 struct btf *btf, u32 btf_id) in mark_btf_ld_reg() argument
1515 regs[regno].btf_id = btf_id; in mark_btf_ld_reg()
3557 struct btf **btf, u32 *btf_id) in check_ctx_access() argument
3577 *btf_id = info.btf_id; in check_ctx_access()
4116 const struct btf_type *t = btf_type_by_id(reg->btf, reg->btf_id); in check_ptr_to_btf_access()
4118 u32 btf_id; in check_ptr_to_btf_access() local
4139 off, size, atype, &btf_id); in check_ptr_to_btf_access()
4147 atype, &btf_id); in check_ptr_to_btf_access()
4154 mark_btf_ld_reg(env, regs, value_regno, ret, reg->btf, btf_id); in check_ptr_to_btf_access()
4169 u32 btf_id; in check_ptr_to_map_access() local
4204 ret = btf_struct_access(&env->log, btf_vmlinux, t, off, size, atype, &btf_id); in check_ptr_to_map_access()
4209 mark_btf_ld_reg(env, regs, value_regno, ret, btf_vmlinux, btf_id); in check_ptr_to_map_access()
4383 u32 btf_id = 0; in check_mem_access() local
4395 err = check_ctx_access(env, insn_idx, off, size, t, ®_type, &btf, &btf_id); in check_mem_access()
4419 regs[value_regno].btf_id = btf_id; in check_mem_access()
5030 u32 *btf_id; member
5061 .btf_id = &btf_sock_ids[BTF_SOCK_TYPE_SOCK_COMMON],
5167 if (!compatible->btf_id) { in check_reg_type()
5171 arg_btf_id = compatible->btf_id; in check_reg_type()
5174 if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->off, in check_reg_type()
5177 regno, kernel_type_name(reg->btf, reg->btf_id), in check_reg_type()
5318 if (!reg->btf_id) { in check_func_arg()
5323 meta->ret_btf_id = reg->btf_id; in check_func_arg()
6589 regs[BPF_REG_0].btf_id = meta.ret_btf_id; in check_helper_call()
6609 regs[BPF_REG_0].btf_id = ret_btf_id; in check_helper_call()
6755 regs[BPF_REG_0].btf_id = ptr_type_id; in check_kfunc_call()
9402 dst_reg->btf_id = aux->btf_var.btf_id; in check_ld_imm()
11529 aux->btf_var.btf_id = type; in check_pseudo_btf_id()
11549 aux->btf_var.btf_id = type; in check_pseudo_btf_id()
13501 u32 btf_id, member_idx; in check_struct_ops_btf_id() local
13509 btf_id = prog->aux->attach_btf_id; in check_struct_ops_btf_id()
13510 st_ops = bpf_struct_ops_find(btf_id); in check_struct_ops_btf_id()
13513 btf_id); in check_struct_ops_btf_id()
13574 static int check_non_sleepable_error_inject(u32 btf_id) in BTF_ID()
13576 return btf_id_set_contains(&btf_non_sleepable_error_inject, btf_id); in BTF_ID()
13582 u32 btf_id, in bpf_check_attach_target() argument
13594 if (!btf_id) { in bpf_check_attach_target()
13604 t = btf_type_by_id(btf, btf_id); in bpf_check_attach_target()
13606 bpf_log(log, "attach_btf_id %u is invalid\n", btf_id); in bpf_check_attach_target()
13611 bpf_log(log, "attach_btf_id %u doesn't have a name\n", btf_id); in bpf_check_attach_target()
13618 if (aux->func_info[i].type_id == btf_id) { in bpf_check_attach_target()
13689 btf_id); in bpf_check_attach_target()
13694 btf_id, tname); in bpf_check_attach_target()
13711 btf_id); in bpf_check_attach_target()
13731 btf_id); in bpf_check_attach_target()
13775 if (!check_non_sleepable_error_inject(btf_id) && in bpf_check_attach_target()
13783 if (bpf_lsm_is_sleepable_hook(btf_id)) in bpf_check_attach_target()
13829 u32 btf_id = prog->aux->attach_btf_id; in BTF_SET_START() local
13856 ret = bpf_check_attach_target(&env->log, prog, tgt_prog, btf_id, &tgt_info); in BTF_SET_START()
13892 btf_id_set_contains(&btf_id_deny, btf_id)) { in BTF_SET_START()
13896 key = bpf_trampoline_compute_key(tgt_prog, prog->aux->attach_btf, btf_id); in BTF_SET_START()