| /linux-4.4.14/samples/bpf/ |
| D | test_verifier.c | 127 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0), 140 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0), 149 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0), 237 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0), 287 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -8), 297 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8), 300 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8), 315 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8), 321 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8), 423 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -4), [all …]
|
| D | sock_example.c | 53 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_0, BPF_REG_1, 0, 0), /* xadd r0 += r1 */ in test_sock()
|
| D | libbpf.h | 94 .code = BPF_LD | BPF_DW | BPF_IMM, \
|
| D | bpf_load.c | 211 if (insn[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in parse_relo_and_apply()
|
| /linux-4.4.14/arch/arm64/net/ |
| D | bpf_jit_comp.c | 545 case BPF_LD | BPF_IMM | BPF_DW: in build_insn() 569 case BPF_LDX | BPF_MEM | BPF_DW: in build_insn() 582 case BPF_DW: in build_insn() 592 case BPF_ST | BPF_MEM | BPF_DW: in build_insn() 607 case BPF_DW: in build_insn() 617 case BPF_STX | BPF_MEM | BPF_DW: in build_insn() 630 case BPF_DW: in build_insn() 638 case BPF_STX | BPF_XADD | BPF_DW: in build_insn()
|
| /linux-4.4.14/arch/x86/net/ |
| D | bpf_jit_comp.c | 81 else if (bpf_size == BPF_DW) in bpf_size_to_x86_bytes() 464 case BPF_LD | BPF_IMM | BPF_DW: in do_jit() 720 case BPF_ST | BPF_MEM | BPF_DW: in do_jit() 753 case BPF_STX | BPF_MEM | BPF_DW: in do_jit() 778 case BPF_LDX | BPF_MEM | BPF_DW: in do_jit() 800 case BPF_STX | BPF_XADD | BPF_DW: in do_jit()
|
| /linux-4.4.14/kernel/bpf/ |
| D | core.c | 279 [BPF_STX | BPF_MEM | BPF_DW] = &&STX_MEM_DW, in __bpf_prog_run() 281 [BPF_STX | BPF_XADD | BPF_DW] = &&STX_XADD_DW, in __bpf_prog_run() 285 [BPF_ST | BPF_MEM | BPF_DW] = &&ST_MEM_DW, in __bpf_prog_run() 290 [BPF_LDX | BPF_MEM | BPF_DW] = &&LDX_MEM_DW, in __bpf_prog_run() 297 [BPF_LD | BPF_IMM | BPF_DW] = &&LD_IMM_DW, in __bpf_prog_run()
|
| D | verifier.c | 300 [BPF_DW >> 3] = "u64", 528 else if (bpf_size == BPF_DW) in bpf_size_to_bytes() 741 if ((BPF_SIZE(insn->code) != BPF_W && BPF_SIZE(insn->code) != BPF_DW) || in check_xadd() 1297 if (BPF_SIZE(insn->code) != BPF_DW) { in check_ld_imm() 1362 BPF_SIZE(insn->code) == BPF_DW || in check_ld_abs() 1993 if (insn[0].code == (BPF_LD | BPF_IMM | BPF_DW)) { in replace_map_fd_with_map_ptr() 2080 if (insn->code == (BPF_LD | BPF_IMM | BPF_DW)) in convert_pseudo_ld_imm64()
|
| /linux-4.4.14/include/uapi/linux/ |
| D | bpf.h | 19 #define BPF_DW 0x18 /* double word */ macro
|
| /linux-4.4.14/arch/s390/net/ |
| D | bpf_jit_comp.c | 522 case BPF_LD | BPF_IMM | BPF_DW: /* dst = (u64) imm */ in bpf_jit_insn() 897 case BPF_STX | BPF_MEM | BPF_DW: /* (u64 *)(dst + off) = src */ in bpf_jit_insn() 923 case BPF_ST | BPF_MEM | BPF_DW: /* *(u64 *)(dst + off) = imm */ in bpf_jit_insn() 939 case BPF_STX | BPF_XADD | BPF_DW: /* *(u64 *)(dst + off) += src */ in bpf_jit_insn() 963 case BPF_LDX | BPF_MEM | BPF_DW: /* dst = *(u64 *)(ul) (src + off) */ in bpf_jit_insn()
|
| /linux-4.4.14/Documentation/networking/ |
| D | filter.txt | 944 BPF_DW 0x18 /* eBPF only, double word */ 994 BPF_XADD | BPF_DW | BPF_STX: lock xadd *(u64 *)(dst_reg + off16) += src_reg 996 Where size is one of: BPF_B or BPF_H or BPF_W or BPF_DW. Note that 1 and 999 eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM which consists 1167 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0), 1187 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 1203 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 1208 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0), 1221 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 1227 BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0), [all …]
|
| /linux-4.4.14/include/linux/ |
| D | filter.h | 138 .code = BPF_LD | BPF_DW | BPF_IMM, \ 301 bpf_size = BPF_DW; \
|
| /linux-4.4.14/lib/ |
| D | test_bpf.c | 3929 BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff), 3930 BPF_LDX_MEM(BPF_DW, R0, R10, -40), 3942 BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff), 3943 BPF_LDX_MEM(BPF_DW, R2, R10, -40), 3958 BPF_ST_MEM(BPF_DW, R10, -40, 0x7fffffff), 3959 BPF_LDX_MEM(BPF_DW, R0, R10, -40), 3997 BPF_ST_MEM(BPF_DW, R10, -40, 0x10), 3998 BPF_STX_XADD(BPF_DW, R10, R0, -40), 3999 BPF_LDX_MEM(BPF_DW, R0, R10, -40),
|
| /linux-4.4.14/tools/lib/bpf/ |
| D | libbpf.c | 648 if (insns[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in bpf_program__collect_reloc()
|