Searched refs:insns (Results 1 – 3 of 3) sorted by relevance
/kernel/bpf/ |
D | syscall.c | 1693 if (copy_from_user(prog->insns, u64_to_user_ptr(attr->insns), in bpf_prog_load() 2251 struct bpf_insn *insns; in bpf_insn_prepare_dump() local 2256 insns = kmemdup(prog->insnsi, bpf_prog_insn_size(prog), in bpf_insn_prepare_dump() 2258 if (!insns) in bpf_insn_prepare_dump() 2259 return insns; in bpf_insn_prepare_dump() 2262 if (insns[i].code == (BPF_JMP | BPF_TAIL_CALL)) { in bpf_insn_prepare_dump() 2263 insns[i].code = BPF_JMP | BPF_CALL; in bpf_insn_prepare_dump() 2264 insns[i].imm = BPF_FUNC_tail_call; in bpf_insn_prepare_dump() 2267 if (insns[i].code == (BPF_JMP | BPF_CALL) || in bpf_insn_prepare_dump() 2268 insns[i].code == (BPF_JMP | BPF_CALL_ARGS)) { in bpf_insn_prepare_dump() [all …]
|
D | verifier.c | 6308 struct bpf_insn *insns = env->prog->insnsi; in check_cfg() local 6333 if (BPF_CLASS(insns[t].code) == BPF_JMP || in check_cfg() 6334 BPF_CLASS(insns[t].code) == BPF_JMP32) { in check_cfg() 6335 u8 opcode = BPF_OP(insns[t].code); in check_cfg() 6347 if (insns[t].src_reg == BPF_PSEUDO_CALL) { in check_cfg() 6349 ret = push_insn(t, t + insns[t].imm + 1, BRANCH, in check_cfg() 6357 if (BPF_SRC(insns[t].code) != BPF_K) { in check_cfg() 6362 ret = push_insn(t, t + insns[t].off + 1, in check_cfg() 6372 init_explored_state(env, t + insns[t].off + 1); in check_cfg() 6387 ret = push_insn(t, t + insns[t].off + 1, BRANCH, env, true); in check_cfg() [all …]
|
/kernel/ |
D | kprobes.c | 85 kprobe_opcode_t *insns; /* Page of instruction slots */ member 147 slot = kip->insns + (i * c->insn_size); in __get_insn_slot() 173 kip->insns = c->alloc(); in __get_insn_slot() 174 if (!kip->insns) { in __get_insn_slot() 185 slot = kip->insns; in __get_insn_slot() 206 kip->cache->free(kip->insns); in collect_one_slot() 244 idx = ((long)slot - (long)kip->insns) / in __free_insn_slot() 282 if (addr >= (unsigned long)kip->insns && in __is_insn_slot_addr() 283 addr < (unsigned long)kip->insns + PAGE_SIZE) { in __is_insn_slot_addr()
|