Home
last modified time | relevance | path

Searched refs:BPF_DW (Results 1 – 12 of 12) sorted by relevance

/linux-4.1.27/samples/bpf/
Dtest_verifier.c117 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
130 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
139 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
226 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0),
276 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -8),
286 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
289 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8),
302 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
308 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
409 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -4),
[all …]
Dsock_example.c53 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_0, BPF_REG_1, 0, 0), /* xadd r0 += r1 */ in test_sock()
Dlibbpf.h83 .code = BPF_LD | BPF_DW | BPF_IMM, \
Dbpf_load.c178 if (insn[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in parse_relo_and_apply()
/linux-4.1.27/arch/arm64/net/
Dbpf_jit_comp.c512 case BPF_LD | BPF_IMM | BPF_DW: in build_insn()
536 case BPF_LDX | BPF_MEM | BPF_DW: in build_insn()
549 case BPF_DW: in build_insn()
559 case BPF_ST | BPF_MEM | BPF_DW: in build_insn()
566 case BPF_STX | BPF_MEM | BPF_DW: in build_insn()
579 case BPF_DW: in build_insn()
587 case BPF_STX | BPF_XADD | BPF_DW: in build_insn()
/linux-4.1.27/arch/x86/net/
Dbpf_jit_comp.c79 else if (bpf_size == BPF_DW) in bpf_size_to_x86_bytes()
373 case BPF_LD | BPF_IMM | BPF_DW: in do_jit()
629 case BPF_ST | BPF_MEM | BPF_DW: in do_jit()
662 case BPF_STX | BPF_MEM | BPF_DW: in do_jit()
687 case BPF_LDX | BPF_MEM | BPF_DW: in do_jit()
709 case BPF_STX | BPF_XADD | BPF_DW: in do_jit()
/linux-4.1.27/kernel/bpf/
Dcore.c269 [BPF_STX | BPF_MEM | BPF_DW] = &&STX_MEM_DW, in __bpf_prog_run()
271 [BPF_STX | BPF_XADD | BPF_DW] = &&STX_XADD_DW, in __bpf_prog_run()
275 [BPF_ST | BPF_MEM | BPF_DW] = &&ST_MEM_DW, in __bpf_prog_run()
280 [BPF_LDX | BPF_MEM | BPF_DW] = &&LDX_MEM_DW, in __bpf_prog_run()
287 [BPF_LD | BPF_IMM | BPF_DW] = &&LD_IMM_DW, in __bpf_prog_run()
Dverifier.c299 [BPF_DW >> 3] = "u64",
527 else if (bpf_size == BPF_DW) in bpf_size_to_bytes()
692 if ((BPF_SIZE(insn->code) != BPF_W && BPF_SIZE(insn->code) != BPF_DW) || in check_xadd()
1165 if (BPF_SIZE(insn->code) != BPF_DW) { in check_ld_imm()
1841 if (insn[0].code == (BPF_LD | BPF_IMM | BPF_DW)) { in replace_map_fd_with_map_ptr()
1928 if (insn->code == (BPF_LD | BPF_IMM | BPF_DW)) in convert_pseudo_ld_imm64()
/linux-4.1.27/include/uapi/linux/
Dbpf.h19 #define BPF_DW 0x18 /* double word */ macro
/linux-4.1.27/arch/s390/net/
Dbpf_jit_comp.c487 case BPF_LD | BPF_IMM | BPF_DW: /* dst = (u64) imm */ in bpf_jit_insn()
862 case BPF_STX | BPF_MEM | BPF_DW: /* (u64 *)(dst + off) = src */ in bpf_jit_insn()
888 case BPF_ST | BPF_MEM | BPF_DW: /* *(u64 *)(dst + off) = imm */ in bpf_jit_insn()
904 case BPF_STX | BPF_XADD | BPF_DW: /* *(u64 *)(dst + off) += src */ in bpf_jit_insn()
928 case BPF_LDX | BPF_MEM | BPF_DW: /* dst = *(u64 *)(ul) (src + off) */ in bpf_jit_insn()
/linux-4.1.27/include/linux/
Dfilter.h136 .code = BPF_LD | BPF_DW | BPF_IMM, \
281 bpf_size = BPF_DW; \
/linux-4.1.27/Documentation/networking/
Dfilter.txt944 BPF_DW 0x18 /* eBPF only, double word */
994 BPF_XADD | BPF_DW | BPF_STX: lock xadd *(u64 *)(dst_reg + off16) += src_reg
996 Where size is one of: BPF_B or BPF_H or BPF_W or BPF_DW. Note that 1 and
999 eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM which consists
1167 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0),
1187 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1203 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1208 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
1221 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1227 BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0),
[all …]