Home
last modified time | relevance | path

Searched refs:BPF_DW (Results 1 – 14 of 14) sorted by relevance

/linux-4.4.14/samples/bpf/
Dtest_verifier.c127 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
140 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
149 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
237 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0),
287 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -8),
297 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
300 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8),
315 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
321 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
423 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -4),
[all …]
Dsock_example.c53 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_0, BPF_REG_1, 0, 0), /* xadd r0 += r1 */ in test_sock()
Dlibbpf.h94 .code = BPF_LD | BPF_DW | BPF_IMM, \
Dbpf_load.c211 if (insn[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in parse_relo_and_apply()
/linux-4.4.14/arch/arm64/net/
Dbpf_jit_comp.c545 case BPF_LD | BPF_IMM | BPF_DW: in build_insn()
569 case BPF_LDX | BPF_MEM | BPF_DW: in build_insn()
582 case BPF_DW: in build_insn()
592 case BPF_ST | BPF_MEM | BPF_DW: in build_insn()
607 case BPF_DW: in build_insn()
617 case BPF_STX | BPF_MEM | BPF_DW: in build_insn()
630 case BPF_DW: in build_insn()
638 case BPF_STX | BPF_XADD | BPF_DW: in build_insn()
/linux-4.4.14/arch/x86/net/
Dbpf_jit_comp.c81 else if (bpf_size == BPF_DW) in bpf_size_to_x86_bytes()
464 case BPF_LD | BPF_IMM | BPF_DW: in do_jit()
720 case BPF_ST | BPF_MEM | BPF_DW: in do_jit()
753 case BPF_STX | BPF_MEM | BPF_DW: in do_jit()
778 case BPF_LDX | BPF_MEM | BPF_DW: in do_jit()
800 case BPF_STX | BPF_XADD | BPF_DW: in do_jit()
/linux-4.4.14/kernel/bpf/
Dcore.c279 [BPF_STX | BPF_MEM | BPF_DW] = &&STX_MEM_DW, in __bpf_prog_run()
281 [BPF_STX | BPF_XADD | BPF_DW] = &&STX_XADD_DW, in __bpf_prog_run()
285 [BPF_ST | BPF_MEM | BPF_DW] = &&ST_MEM_DW, in __bpf_prog_run()
290 [BPF_LDX | BPF_MEM | BPF_DW] = &&LDX_MEM_DW, in __bpf_prog_run()
297 [BPF_LD | BPF_IMM | BPF_DW] = &&LD_IMM_DW, in __bpf_prog_run()
Dverifier.c300 [BPF_DW >> 3] = "u64",
528 else if (bpf_size == BPF_DW) in bpf_size_to_bytes()
741 if ((BPF_SIZE(insn->code) != BPF_W && BPF_SIZE(insn->code) != BPF_DW) || in check_xadd()
1297 if (BPF_SIZE(insn->code) != BPF_DW) { in check_ld_imm()
1362 BPF_SIZE(insn->code) == BPF_DW || in check_ld_abs()
1993 if (insn[0].code == (BPF_LD | BPF_IMM | BPF_DW)) { in replace_map_fd_with_map_ptr()
2080 if (insn->code == (BPF_LD | BPF_IMM | BPF_DW)) in convert_pseudo_ld_imm64()
/linux-4.4.14/include/uapi/linux/
Dbpf.h19 #define BPF_DW 0x18 /* double word */ macro
/linux-4.4.14/arch/s390/net/
Dbpf_jit_comp.c522 case BPF_LD | BPF_IMM | BPF_DW: /* dst = (u64) imm */ in bpf_jit_insn()
897 case BPF_STX | BPF_MEM | BPF_DW: /* (u64 *)(dst + off) = src */ in bpf_jit_insn()
923 case BPF_ST | BPF_MEM | BPF_DW: /* *(u64 *)(dst + off) = imm */ in bpf_jit_insn()
939 case BPF_STX | BPF_XADD | BPF_DW: /* *(u64 *)(dst + off) += src */ in bpf_jit_insn()
963 case BPF_LDX | BPF_MEM | BPF_DW: /* dst = *(u64 *)(ul) (src + off) */ in bpf_jit_insn()
/linux-4.4.14/Documentation/networking/
Dfilter.txt944 BPF_DW 0x18 /* eBPF only, double word */
994 BPF_XADD | BPF_DW | BPF_STX: lock xadd *(u64 *)(dst_reg + off16) += src_reg
996 Where size is one of: BPF_B or BPF_H or BPF_W or BPF_DW. Note that 1 and
999 eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM which consists
1167 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0),
1187 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1203 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1208 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
1221 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1227 BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0),
[all …]
/linux-4.4.14/include/linux/
Dfilter.h138 .code = BPF_LD | BPF_DW | BPF_IMM, \
301 bpf_size = BPF_DW; \
/linux-4.4.14/lib/
Dtest_bpf.c3929 BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff),
3930 BPF_LDX_MEM(BPF_DW, R0, R10, -40),
3942 BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff),
3943 BPF_LDX_MEM(BPF_DW, R2, R10, -40),
3958 BPF_ST_MEM(BPF_DW, R10, -40, 0x7fffffff),
3959 BPF_LDX_MEM(BPF_DW, R0, R10, -40),
3997 BPF_ST_MEM(BPF_DW, R10, -40, 0x10),
3998 BPF_STX_XADD(BPF_DW, R10, R0, -40),
3999 BPF_LDX_MEM(BPF_DW, R0, R10, -40),
/linux-4.4.14/tools/lib/bpf/
Dlibbpf.c648 if (insns[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in bpf_program__collect_reloc()