Home
last modified time | relevance | path

Searched refs:insn_idx (Results 1 – 3 of 3) sorted by relevance

/linux-4.4.14/kernel/bpf/
Dverifier.c184 int insn_idx; member
416 int insn_idx; in pop_stack() local
422 insn_idx = env->head->insn_idx; in pop_stack()
429 return insn_idx; in pop_stack()
432 static struct verifier_state *push_stack(struct verifier_env *env, int insn_idx, in push_stack() argument
442 elem->insn_idx = insn_idx; in push_stack()
1176 struct bpf_insn *insn, int *insn_idx) in check_cond_jmp_op() argument
1225 *insn_idx += insn->off; in check_cond_jmp_op()
1236 other_branch = push_stack(env, *insn_idx + insn->off + 1, *insn_idx); in check_cond_jmp_op()
1668 static int is_state_visited(struct verifier_env *env, int insn_idx) in is_state_visited() argument
[all …]
/linux-4.4.14/samples/bpf/
Dbpf_load.c203 unsigned int insn_idx; in parse_relo_and_apply() local
207 insn_idx = rel.r_offset / sizeof(struct bpf_insn); in parse_relo_and_apply()
211 if (insn[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in parse_relo_and_apply()
213 insn_idx, insn[insn_idx].code); in parse_relo_and_apply()
216 insn[insn_idx].src_reg = BPF_PSEUDO_MAP_FD; in parse_relo_and_apply()
217 insn[insn_idx].imm = map_fd[sym.st_value / sizeof(struct bpf_map_def)]; in parse_relo_and_apply()
/linux-4.4.14/tools/lib/bpf/
Dlibbpf.c150 int insn_idx; member
628 unsigned int insn_idx; in bpf_program__collect_reloc() local
637 insn_idx = rel.r_offset / sizeof(struct bpf_insn); in bpf_program__collect_reloc()
638 pr_debug("relocation: insn_idx=%u\n", insn_idx); in bpf_program__collect_reloc()
648 if (insns[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in bpf_program__collect_reloc()
650 insn_idx, insns[insn_idx].code); in bpf_program__collect_reloc()
661 prog->reloc_desc[i].insn_idx = insn_idx; in bpf_program__collect_reloc()
732 int insn_idx, map_idx; in bpf_program__relocate() local
735 insn_idx = prog->reloc_desc[i].insn_idx; in bpf_program__relocate()
738 if (insn_idx >= (int)prog->insns_cnt) { in bpf_program__relocate()
[all …]