Lines Matching refs:idx

1768     p[cnt - 1].idx = env->insn_idx;

1775 /* Backtrack one insn at a time. If idx is not at the top of recorded
1782 if (cnt && st->jmp_history[cnt - 1].idx == i) {
1795 static int backtrack_insn(struct bpf_verifier_env *env, int idx, u32 *reg_mask, u64 *stack_mask)
1801 struct bpf_insn *insn = env->prog->insnsi + idx;
1814 verbose(env, "%d: ", idx);
2124 verbose(env, "BUG backtracking idx %d\n", i);
3219 int depth = 0, frame = 0, idx = 0, i = 0, subprog_end;
3250 if (idx && subprog[idx].has_tail_call && depth >= VERIFIER_TWOHUNDREDFIFTYSIX) {
3258 depth += round_up(max_t(u32, subprog[idx].stack_depth, 1), VERIFIER_THIRTYTWO);
3266 subprog_end = subprog[idx + 1].start;
3276 ret_prog[frame] = idx;
3280 idx = find_subprog(env, i);
3281 if (idx < 0) {
3286 if (subprog[idx].has_tail_call) {
3326 depth -= round_up(max_t(u32, subprog[idx].stack_depth, 1), VERIFIER_THIRTYTWO);
3329 idx = ret_prog[frame];
3336 static int get_callee_stack_depth(struct bpf_verifier_env *env, const struct bpf_insn *insn, int idx)
3338 int start = idx + insn->imm + 1, subprog;
8328 static struct bpf_verifier_state_list **explored_state(struct bpf_verifier_env *env, int idx)
8333 return &env->explored_states[(idx ^ state->callsite) % state_htab_size(env)];
8336 static void init_explored_state(struct bpf_verifier_env *env, int idx)
8338 env->insn_aux_data[idx].prune_point = true;
9669 verbose(env, "invalid insn idx %d insn_cnt %d\n", env->insn_idx, insn_cnt);
11764 verbose(env, "attach to invalid member idx %u of struct %s\n", member_idx, st_ops->name);
11772 verbose(env, "attach to invalid member %s(@idx %u) of struct %s\n", mname, member_idx, st_ops->name);