Lines Matching defs:array

1501 		pr_warn("extern (kcfg) %s=%s should be char array\n", ext->name, value);
1774 * TODO: Detect array of map and report error.
1907 case BTF_KIND_ARRAY: return "array";
1926 * represented using a pointer to an array, in which dimensionality of array
2136 pr_warn("map '%s': map-in-map inner spec is not a zero-sized array.\n",
3822 pr_warn("Error in %s():%s(%d). Couldn't create simple array map.\n",
3985 pr_warn("Error in %s():%s(%d). Couldn't create simple array map.\n",
4373 /* represents BPF CO-RE field or array element accessor */
4375 __u32 type_id; /* struct/union type or array element type */
4376 __u32 idx; /* field index or array index */
4377 const char *name; /* field name or NULL for array accessor */
4382 /* high-level spec: named fields and array indices only */
4409 /* not a flexible array, if not inside a struct or has non-zero size */
4482 * "turning points": named fields and array indicies.
4504 * - array element #3 access (corresponds to '3' in low-level spec).
4541 /* parse spec_str="0:1:2:3:4" into array raw_spec=[0, 1, 2, 3, 4] */
4855 /* too deep struct/union/array nesting */
5064 /* for i=0, targ_id is already treated as array element
5066 * we should find array element type first
5084 /* too deep struct/union/array nesting */
5148 pr_warn("prog '%s': relo %d at insn #%d can't be applied to array access\n",
5702 * as well as all array accesses should be within the actual bounds. Also,
6333 * instruction array. Then main program is "put on hold" while we recursively
6341 * positions within finalized instructions array are known, so it's easy to
10473 __u32 *array = (__u32 *)info;
10476 return array[offset / sizeof(__u32)];
10483 __u64 *array = (__u64 *)info;
10486 return array[offset / sizeof(__u64)];
10493 __u32 *array = (__u32 *)info;
10496 array[offset / sizeof(__u32)] = val;
10502 __u64 *array = (__u64 *)info;
10505 array[offset / sizeof(__u64)] = val;
10521 /* step 1: get array dimensions */