Searched refs:BPF_XADD (Results 1 – 9 of 9) sorted by relevance
53 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_0, BPF_REG_1, 0, 0), /* xadd r0 += r1 */ in test_sock()
20 #define BPF_XADD 0xc0 /* exclusive add */ macro
280 [BPF_STX | BPF_XADD | BPF_W] = &&STX_XADD_W, in __bpf_prog_run()281 [BPF_STX | BPF_XADD | BPF_DW] = &&STX_XADD_DW, in __bpf_prog_run()
342 else if (BPF_MODE(insn->code) == BPF_XADD) in print_bpf_insn()1823 if (BPF_MODE(insn->code) == BPF_XADD) { in do_check()1988 BPF_MODE(insn->code) != BPF_XADD) || insn->imm != 0)) { in replace_map_fd_with_map_ptr()
636 case BPF_STX | BPF_XADD | BPF_W: in build_insn()638 case BPF_STX | BPF_XADD | BPF_DW: in build_insn()
793 case BPF_STX | BPF_XADD | BPF_W: in do_jit()800 case BPF_STX | BPF_XADD | BPF_DW: in do_jit()
933 case BPF_STX | BPF_XADD | BPF_W: /* *(u32 *)(dst + off) += src */ in bpf_jit_insn()939 case BPF_STX | BPF_XADD | BPF_DW: /* *(u64 *)(dst + off) += src */ in bpf_jit_insn()
216 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_XADD, \
961 BPF_XADD 0xc0 /* eBPF only, exclusive add */993 BPF_XADD | BPF_W | BPF_STX: lock xadd *(u32 *)(dst_reg + off16) += src_reg994 BPF_XADD | BPF_DW | BPF_STX: lock xadd *(u64 *)(dst_reg + off16) += src_reg