Lines Matching defs:index
417 * when mapping ELF file instruction index to the local instruction,
578 /* BTF fd index to be patched in for insn->off, this is
579 * 0 for vmlinux BTF, index in obj->fd_array for module
618 size_t shstrndx; /* section index for section name strings */
1368 pr_warn("elf: failed to get section names section index for %s: %s\n",
2879 /* preventively increment index to avoid doing
4226 /* matching program could be at index l, but it still might be the
5329 * out with program name and relocation index logged.
5923 * where lower 123 is map index into obj->maps[] array
5950 * where lower 123 is extern index into obj->externs[] array
6274 /* sub-program instruction index is a combination of
7113 * "123" is the index of the instruction that was poisoned. We extract
7114 * instruction index to find corresponding CO-RE relocation and
7152 * "123" is the index of the instruction that was poisoned.
7153 * "345" in "2001000345" is a map index in obj->maps to fetch map name.
7185 * "123" is the index of the instruction that was poisoned.
7186 * "345" in "2002000345" is an extern index in obj->externs to fetch kfunc name.
7714 /* set index for module BTF fd in fd_array, if unset */
7718 pr_warn("extern (func ksym) '%s': module BTF fd index %d too big to fit in bpf_insn offset\n",
7722 /* Cannot use index 0 for module BTF fd */
10365 static int index = 0;
10369 __sync_fetch_and_add(&index, 1));
11117 * https://en.wikipedia.org/w/index.php?title=Apk_(file_format)&oldid=1139099120#Package_contents