Lines Matching defs:map_ptr
144 * Now verifier knows that this map has key of R1->map_ptr->key_size bytes
222 aux->map_ptr_state.map_ptr = map;
331 rec = reg->map_ptr->record;
1778 /* Clear off and union(map_ptr, range) */
1837 const struct bpf_map *map = reg->map_ptr;
1841 reg->map_ptr = map->inner_map_meta;
2463 * Clear type, off, and union(map_ptr, range) and
4392 struct bpf_map *map = reg->map_ptr;
4806 struct bpf_map *map = reg->map_ptr;
5242 if (reg->map_ptr->map_type == BPF_MAP_TYPE_INSN_ARRAY)
6143 struct bpf_map *map = reg->map_ptr;
6152 verbose(env, "map_ptr access not supported without CONFIG_DEBUG_INFO_BTF\n");
6157 verbose(env, "map_ptr access not supported for map type %d\n",
6346 reg->map_ptr->key_size, false);
6366 kptr_field = btf_record_find(reg->map_ptr->record,
6371 struct bpf_map *map = reg->map_ptr;
6983 reg->map_ptr->key_size, false);
7211 map = reg->map_ptr;
7312 struct bpf_map *map = reg->map_ptr;
7387 struct bpf_map *map_ptr;
7394 map_ptr = reg->map_ptr;
7395 if (!map_ptr->btf) {
7397 map_ptr->name);
7400 rec = map_ptr->record;
7401 meta->map.ptr = map_ptr;
7907 verifier_bug(env, "invalid map_ptr to access map->type");
8364 struct bpf_map *map = reg->map_ptr;
8582 /* bpf_map_xxx(map_ptr) call: remember that map_ptr */
8594 * Comparing map_ptr is enough to distinguish normal and outer maps.
8596 if (meta->map.ptr != reg->map_ptr ||
8604 meta->map.ptr = reg->map_ptr;
8608 /* bpf_map_xxx(..., map_ptr, ..., key) call:
8613 /* in function declaration map_ptr must come before
8618 verifier_bug(env, "invalid map_ptr to access map->key");
8640 /* bpf_map_xxx(..., map_ptr, ..., value) call:
8645 verifier_bug(env, "invalid map_ptr to access map->value");
9594 callee->regs[BPF_REG_2].map_ptr = caller->regs[BPF_REG_1].map_ptr;
9598 callee->regs[BPF_REG_3].map_ptr = caller->regs[BPF_REG_1].map_ptr;
9631 /* valid map_ptr and poison value does not matter */
9632 map = insn_aux->map_ptr_state.map_ptr;
9675 struct bpf_map *map_ptr = caller->regs[BPF_REG_1].map_ptr;
9682 callee->regs[BPF_REG_1].map_ptr = map_ptr;
9686 callee->regs[BPF_REG_2].map_ptr = map_ptr;
9690 callee->regs[BPF_REG_3].map_ptr = map_ptr;
9789 struct bpf_map *map_ptr = caller->regs[BPF_REG_3].map_ptr;
9796 callee->regs[BPF_REG_1].map_ptr = map_ptr;
9800 callee->regs[BPF_REG_2].map_ptr = map_ptr;
9804 callee->regs[BPF_REG_3].map_ptr = map_ptr;
10012 if (!aux->map_ptr_state.map_ptr)
10015 else if (aux->map_ptr_state.map_ptr != meta->map.ptr)
10123 struct bpf_map *fmt_map = fmt_reg->map_ptr;
10569 /* remember map_ptr, so that check_map_access()
10574 verifier_bug(env, "unexpected null map_ptr");
10584 regs[BPF_REG_0].map_ptr = meta.map.ptr;
11657 * The active_lock.ptr in case of map values is the reg->map_ptr, and in case of
11666 * hence their active_lock.ptr becomes map_ptr and id = 0 (since they all point
11669 * In case of inner map lookups, the inner map pointer has same map_ptr as the
11672 * maps from the same outer map share the same map_ptr as active_lock.ptr, they
11688 ptr = reg->map_ptr;
12153 if (!reg->map_ptr) {
12157 if (meta->map.ptr && (reg->map_ptr->record->wq_off >= 0 ||
12158 reg->map_ptr->record->task_work_off >= 0)) {
12169 * Comparing map_ptr is enough to distinguish normal and outer maps.
12171 if (meta->map.ptr != reg->map_ptr ||
12173 if (reg->map_ptr->record->task_work_off >= 0) {
12185 meta->map.ptr = reg->map_ptr;
13435 max = ptr_reg->map_ptr->value_size;
16598 dst_reg->map_ptr = map;
16603 dst_reg->map_ptr = map;
16610 dst_reg->map_ptr = map;
17526 map = dst_reg->map_ptr;