Searched refs:insn_idx (Results 1 – 3 of 3) sorted by relevance
/linux-4.4.14/kernel/bpf/ |
D | verifier.c | 184 int insn_idx; member 416 int insn_idx; in pop_stack() local 422 insn_idx = env->head->insn_idx; in pop_stack() 429 return insn_idx; in pop_stack() 432 static struct verifier_state *push_stack(struct verifier_env *env, int insn_idx, in push_stack() argument 442 elem->insn_idx = insn_idx; in push_stack() 1176 struct bpf_insn *insn, int *insn_idx) in check_cond_jmp_op() argument 1225 *insn_idx += insn->off; in check_cond_jmp_op() 1236 other_branch = push_stack(env, *insn_idx + insn->off + 1, *insn_idx); in check_cond_jmp_op() 1668 static int is_state_visited(struct verifier_env *env, int insn_idx) in is_state_visited() argument [all …]
|
/linux-4.4.14/samples/bpf/ |
D | bpf_load.c | 203 unsigned int insn_idx; in parse_relo_and_apply() local 207 insn_idx = rel.r_offset / sizeof(struct bpf_insn); in parse_relo_and_apply() 211 if (insn[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in parse_relo_and_apply() 213 insn_idx, insn[insn_idx].code); in parse_relo_and_apply() 216 insn[insn_idx].src_reg = BPF_PSEUDO_MAP_FD; in parse_relo_and_apply() 217 insn[insn_idx].imm = map_fd[sym.st_value / sizeof(struct bpf_map_def)]; in parse_relo_and_apply()
|
/linux-4.4.14/tools/lib/bpf/ |
D | libbpf.c | 150 int insn_idx; member 628 unsigned int insn_idx; in bpf_program__collect_reloc() local 637 insn_idx = rel.r_offset / sizeof(struct bpf_insn); in bpf_program__collect_reloc() 638 pr_debug("relocation: insn_idx=%u\n", insn_idx); in bpf_program__collect_reloc() 648 if (insns[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in bpf_program__collect_reloc() 650 insn_idx, insns[insn_idx].code); in bpf_program__collect_reloc() 661 prog->reloc_desc[i].insn_idx = insn_idx; in bpf_program__collect_reloc() 732 int insn_idx, map_idx; in bpf_program__relocate() local 735 insn_idx = prog->reloc_desc[i].insn_idx; in bpf_program__relocate() 738 if (insn_idx >= (int)prog->insns_cnt) { in bpf_program__relocate() [all …]
|