Home
last modified time | relevance | path

Searched refs:BPF_XADD (Results 1 – 8 of 8) sorted by relevance

/linux-4.1.27/samples/bpf/
Dsock_example.c53 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_0, BPF_REG_1, 0, 0), /* xadd r0 += r1 */ in test_sock()
/linux-4.1.27/include/uapi/linux/
Dbpf.h20 #define BPF_XADD 0xc0 /* exclusive add */ macro
/linux-4.1.27/kernel/bpf/
Dcore.c270 [BPF_STX | BPF_XADD | BPF_W] = &&STX_XADD_W, in __bpf_prog_run()
271 [BPF_STX | BPF_XADD | BPF_DW] = &&STX_XADD_DW, in __bpf_prog_run()
Dverifier.c341 else if (BPF_MODE(insn->code) == BPF_XADD) in print_bpf_insn()
1688 if (BPF_MODE(insn->code) == BPF_XADD) { in do_check()
/linux-4.1.27/arch/x86/net/
Dbpf_jit_comp.c702 case BPF_STX | BPF_XADD | BPF_W: in do_jit()
709 case BPF_STX | BPF_XADD | BPF_DW: in do_jit()
/linux-4.1.27/arch/arm64/net/
Dbpf_jit_comp.c585 case BPF_STX | BPF_XADD | BPF_W: in build_insn()
587 case BPF_STX | BPF_XADD | BPF_DW: in build_insn()
/linux-4.1.27/arch/s390/net/
Dbpf_jit_comp.c898 case BPF_STX | BPF_XADD | BPF_W: /* *(u32 *)(dst + off) += src */ in bpf_jit_insn()
904 case BPF_STX | BPF_XADD | BPF_DW: /* *(u64 *)(dst + off) += src */ in bpf_jit_insn()
/linux-4.1.27/Documentation/networking/
Dfilter.txt961 BPF_XADD 0xc0 /* eBPF only, exclusive add */
993 BPF_XADD | BPF_W | BPF_STX: lock xadd *(u32 *)(dst_reg + off16) += src_reg
994 BPF_XADD | BPF_DW | BPF_STX: lock xadd *(u64 *)(dst_reg + off16) += src_reg