Home
last modified time | relevance | path

Searched refs:kind_flag (Results 1 – 5 of 5) sorted by relevance

/linux-5.19.10/tools/testing/selftests/bpf/
Dtest_btf.h7 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ argument
8 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
19 #define BTF_FWD_ENC(name, kind_flag) \ argument
20 BTF_TYPE_ENC(name, BTF_INFO_ENC(BTF_KIND_FWD, kind_flag, 0), 0)
/linux-5.19.10/Documentation/bpf/
Dbtf.rst103 * bit 31: kind_flag, currently used by
129 * ``info.kind_flag``: 0
181 * ``info.kind_flag``: 0
193 * ``info.kind_flag``: 0
238 * ``info.kind_flag``: 0 or 1
256 If the type info ``kind_flag`` is not set, the offset contains only bit offset
262 If the ``kind_flag`` is set, the ``btf_member.offset`` contains both member
274 The following kernel patch introduced ``kind_flag`` and explained why both
284 * ``info.kind_flag``: 0
305 * ``info.kind_flag``: 0 for struct, 1 for union
[all …]
/linux-5.19.10/tools/testing/selftests/bpf/progs/
Dsyscall.c21 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ argument
22 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
/linux-5.19.10/tools/bpf/bpftool/
Dbtf_dumper.c445 int kind_flag; in btf_dumper_struct() local
453 kind_flag = BTF_INFO_KFLAG(t->info); in btf_dumper_struct()
462 if (kind_flag) { in btf_dumper_struct()
/linux-5.19.10/tools/lib/bpf/
Dlibbpf_internal.h61 #define BTF_INFO_ENC(kind, kind_flag, vlen) \ argument
62 ((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))