/linux-4.1.27/samples/bpf/ |
D | test_verifier.c | 117 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0), 130 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0), 139 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0), 226 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0), 276 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -8), 286 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8), 289 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8), 302 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8), 308 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8), 409 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -4), [all …]
|
D | sock_example.c | 53 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_0, BPF_REG_1, 0, 0), /* xadd r0 += r1 */ in test_sock()
|
D | libbpf.h | 83 .code = BPF_LD | BPF_DW | BPF_IMM, \
|
D | bpf_load.c | 178 if (insn[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in parse_relo_and_apply()
|
/linux-4.1.27/arch/arm64/net/ |
D | bpf_jit_comp.c | 512 case BPF_LD | BPF_IMM | BPF_DW: in build_insn() 536 case BPF_LDX | BPF_MEM | BPF_DW: in build_insn() 549 case BPF_DW: in build_insn() 559 case BPF_ST | BPF_MEM | BPF_DW: in build_insn() 566 case BPF_STX | BPF_MEM | BPF_DW: in build_insn() 579 case BPF_DW: in build_insn() 587 case BPF_STX | BPF_XADD | BPF_DW: in build_insn()
|
/linux-4.1.27/arch/x86/net/ |
D | bpf_jit_comp.c | 79 else if (bpf_size == BPF_DW) in bpf_size_to_x86_bytes() 373 case BPF_LD | BPF_IMM | BPF_DW: in do_jit() 629 case BPF_ST | BPF_MEM | BPF_DW: in do_jit() 662 case BPF_STX | BPF_MEM | BPF_DW: in do_jit() 687 case BPF_LDX | BPF_MEM | BPF_DW: in do_jit() 709 case BPF_STX | BPF_XADD | BPF_DW: in do_jit()
|
/linux-4.1.27/kernel/bpf/ |
D | core.c | 269 [BPF_STX | BPF_MEM | BPF_DW] = &&STX_MEM_DW, in __bpf_prog_run() 271 [BPF_STX | BPF_XADD | BPF_DW] = &&STX_XADD_DW, in __bpf_prog_run() 275 [BPF_ST | BPF_MEM | BPF_DW] = &&ST_MEM_DW, in __bpf_prog_run() 280 [BPF_LDX | BPF_MEM | BPF_DW] = &&LDX_MEM_DW, in __bpf_prog_run() 287 [BPF_LD | BPF_IMM | BPF_DW] = &&LD_IMM_DW, in __bpf_prog_run()
|
D | verifier.c | 299 [BPF_DW >> 3] = "u64", 527 else if (bpf_size == BPF_DW) in bpf_size_to_bytes() 692 if ((BPF_SIZE(insn->code) != BPF_W && BPF_SIZE(insn->code) != BPF_DW) || in check_xadd() 1165 if (BPF_SIZE(insn->code) != BPF_DW) { in check_ld_imm() 1841 if (insn[0].code == (BPF_LD | BPF_IMM | BPF_DW)) { in replace_map_fd_with_map_ptr() 1928 if (insn->code == (BPF_LD | BPF_IMM | BPF_DW)) in convert_pseudo_ld_imm64()
|
/linux-4.1.27/include/uapi/linux/ |
D | bpf.h | 19 #define BPF_DW 0x18 /* double word */ macro
|
/linux-4.1.27/arch/s390/net/ |
D | bpf_jit_comp.c | 487 case BPF_LD | BPF_IMM | BPF_DW: /* dst = (u64) imm */ in bpf_jit_insn() 862 case BPF_STX | BPF_MEM | BPF_DW: /* (u64 *)(dst + off) = src */ in bpf_jit_insn() 888 case BPF_ST | BPF_MEM | BPF_DW: /* *(u64 *)(dst + off) = imm */ in bpf_jit_insn() 904 case BPF_STX | BPF_XADD | BPF_DW: /* *(u64 *)(dst + off) += src */ in bpf_jit_insn() 928 case BPF_LDX | BPF_MEM | BPF_DW: /* dst = *(u64 *)(ul) (src + off) */ in bpf_jit_insn()
|
/linux-4.1.27/include/linux/ |
D | filter.h | 136 .code = BPF_LD | BPF_DW | BPF_IMM, \ 281 bpf_size = BPF_DW; \
|
/linux-4.1.27/Documentation/networking/ |
D | filter.txt | 944 BPF_DW 0x18 /* eBPF only, double word */ 994 BPF_XADD | BPF_DW | BPF_STX: lock xadd *(u64 *)(dst_reg + off16) += src_reg 996 Where size is one of: BPF_B or BPF_H or BPF_W or BPF_DW. Note that 1 and 999 eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM which consists 1167 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0), 1187 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 1203 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 1208 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0), 1221 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 1227 BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0), [all …]
|