| /Linux-v4.19/tools/testing/selftests/bpf/ |
| D | test_align.c | 269 LOAD_UNKNOWN(BPF_REG_6), 270 BPF_ALU64_IMM(BPF_LSH, BPF_REG_6, 2), 277 BPF_ALU64_REG(BPF_ADD, BPF_REG_5, BPF_REG_6), 288 BPF_ALU64_REG(BPF_ADD, BPF_REG_5, BPF_REG_6), 301 BPF_ALU64_REG(BPF_ADD, BPF_REG_5, BPF_REG_6), 303 BPF_ALU64_REG(BPF_ADD, BPF_REG_5, BPF_REG_6), 377 LOAD_UNKNOWN(BPF_REG_6), 378 BPF_ALU64_IMM(BPF_LSH, BPF_REG_6, 2), 379 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 14), 382 BPF_ALU64_REG(BPF_ADD, BPF_REG_5, BPF_REG_6), [all …]
|
| D | test_sock.c | 49 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), 50 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, 66 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), 67 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, 83 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), 84 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, 100 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), 101 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, 229 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), 232 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, [all …]
|
| D | test_verifier.c | 108 insn[i++] = BPF_MOV64_REG(BPF_REG_6, BPF_REG_1); in bpf_fill_ld_abs_vlan_push_pop() 114 insn[i++] = BPF_MOV64_REG(BPF_REG_1, BPF_REG_6); in bpf_fill_ld_abs_vlan_push_pop() 127 insn[i++] = BPF_MOV64_REG(BPF_REG_1, BPF_REG_6); in bpf_fill_ld_abs_vlan_push_pop() 147 insn[i++] = BPF_MOV64_REG(BPF_REG_6, BPF_REG_1); in bpf_fill_jump_around_ld_abs() 911 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1), 914 BPF_ALU64_REG(BPF_MOV, BPF_REG_1, BPF_REG_6), 942 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1), 943 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8), 2629 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10), 2630 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8), [all …]
|
| D | test_sock_addr.c | 572 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), in bind4_prog_load() 575 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, in bind4_prog_load() 580 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, in bind4_prog_load() 587 BPF_LDX_MEM(BPF_B, BPF_REG_7, BPF_REG_6, in bind4_prog_load() 592 BPF_LDX_MEM(BPF_H, BPF_REG_7, BPF_REG_6, in bind4_prog_load() 597 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, in bind4_prog_load() 604 BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_7, in bind4_prog_load() 609 BPF_STX_MEM(BPF_W, BPF_REG_6, BPF_REG_7, in bind4_prog_load() 637 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), in bind6_prog_load() 640 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, in bind6_prog_load() [all …]
|
| /Linux-v4.19/samples/bpf/ |
| D | cookie_uid_helper_example.c | 85 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), in prog_load() 110 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), in prog_load() 126 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_6, in prog_load() 152 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_6, in prog_load() 156 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6, in prog_load()
|
| D | test_cgrp2_sock.c | 34 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), in prog_load() 61 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), in prog_load() 68 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), in prog_load()
|
| D | test_cgrp2_attach.c | 45 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), /* save r6 so it's not clobbered by BPF_CALL */ in prog_load() 66 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_6, offsetof(struct __sk_buff, len)), /* r1 = skb->len */ in prog_load()
|
| D | sock_example.c | 48 BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), in test_sock()
|
| /Linux-v4.19/arch/powerpc/net/ |
| D | bpf_jit64.h | 56 [BPF_REG_6] = 27,
|
| D | bpf_jit_comp64.c | 130 for (i = BPF_REG_6; i <= BPF_REG_10; i++) in bpf_jit_build_prologue() 145 for (i = BPF_REG_6; i <= BPF_REG_10; i++) in bpf_jit_emit_common_epilogue()
|
| /Linux-v4.19/tools/include/linux/ |
| D | filter.h | 19 #define BPF_REG_CTX BPF_REG_6
|
| /Linux-v4.19/arch/arm64/net/ |
| D | bpf_jit_comp.c | 49 [BPF_REG_6] = A64_R(19), 191 const u8 r6 = bpf2a64[BPF_REG_6]; in build_prologue() 323 const u8 r6 = bpf2a64[BPF_REG_6]; in build_epilogue()
|
| /Linux-v4.19/tools/include/uapi/linux/ |
| D | bpf.h | 53 BPF_REG_6, enumerator
|
| /Linux-v4.19/include/uapi/linux/ |
| D | bpf.h | 53 BPF_REG_6, enumerator
|
| /Linux-v4.19/tools/testing/selftests/net/ |
| D | reuseport_bpf.c | 102 { BPF_ALU64 | BPF_MOV | BPF_X, BPF_REG_6, BPF_REG_1, 0, 0 }, in attach_ebpf()
|
| /Linux-v4.19/arch/x86/net/ |
| D | bpf_jit_comp.c | 121 [BPF_REG_6] = 3, /* RBX callee saved */
|
| D | bpf_jit_comp32.c | 149 [BPF_REG_6] = {STACK_OFFSET(48), STACK_OFFSET(52)},
|
| /Linux-v4.19/include/linux/ |
| D | filter.h | 46 #define BPF_REG_CTX BPF_REG_6
|
| /Linux-v4.19/arch/arm/net/ |
| D | bpf_jit_32.c | 150 [BPF_REG_6] = {ARM_R5, ARM_R4}, 1252 const s8 r4 = bpf2a32[BPF_REG_6][1]; in build_prologue()
|
| /Linux-v4.19/arch/s390/net/ |
| D | bpf_jit_comp.c | 87 [BPF_REG_6] = 7,
|
| /Linux-v4.19/net/core/ |
| D | filter.c | 5385 *insn++ = BPF_LDX_MEM(BPF_B, BPF_REG_6, BPF_REG_1, CLONED_OFFSET()); in bpf_unclone_prologue() 5386 *insn++ = BPF_ALU32_IMM(BPF_AND, BPF_REG_6, CLONED_MASK); in bpf_unclone_prologue() 5387 *insn++ = BPF_JMP_IMM(BPF_JEQ, BPF_REG_6, 0, 7); in bpf_unclone_prologue() 5390 *insn++ = BPF_MOV64_REG(BPF_REG_6, BPF_REG_1); in bpf_unclone_prologue() 5403 *insn++ = BPF_MOV64_REG(BPF_REG_1, BPF_REG_6); in bpf_unclone_prologue()
|
| /Linux-v4.19/arch/sparc/net/ |
| D | bpf_jit_comp_64.c | 220 [BPF_REG_6] = L0,
|
| /Linux-v4.19/kernel/bpf/ |
| D | verifier.c | 904 regno >= BPF_REG_6) { in skip_callee() 4044 err = check_reg_arg(env, BPF_REG_6, SRC_OP); in check_ld_abs() 4048 if (regs[BPF_REG_6].type != PTR_TO_CTX) { in check_ld_abs()
|
| D | core.c | 45 #define BPF_R6 regs[BPF_REG_6]
|
| /Linux-v4.19/arch/mips/net/ |
| D | ebpf_jit.c | 210 case BPF_REG_6: in ebpf_to_mips_reg()
|