/Linux-v4.19/arch/arm/crypto/ |
D | sha256-armv4.pl | 309 my @insns = (&$body,&$body,&$body,&$body); 313 eval(shift(@insns)); 314 eval(shift(@insns)); 315 eval(shift(@insns)); 317 eval(shift(@insns)); 318 eval(shift(@insns)); 319 eval(shift(@insns)); 321 eval(shift(@insns)); 322 eval(shift(@insns)); 324 eval(shift(@insns)); [all …]
|
/Linux-v4.19/arch/arm64/crypto/ |
D | sha512-armv8.pl | 480 my @insns = (&$body,&$body,&$body,&$body); 484 eval(shift(@insns)); 485 eval(shift(@insns)); 486 eval(shift(@insns)); 488 eval(shift(@insns)); 489 eval(shift(@insns)); 491 eval(shift(@insns)); 492 eval(shift(@insns)); 494 eval(shift(@insns)); 496 eval(shift(@insns)); [all …]
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_tag.c | 27 static void bpf_gen_imm_prog(unsigned int insns, int fd_map) in bpf_gen_imm_prog() argument 32 for (i = 0; i < insns; i++) in bpf_gen_imm_prog() 37 static void bpf_gen_map_prog(unsigned int insns, int fd_map) in bpf_gen_map_prog() argument 41 for (i = 0; i + 1 < insns; i += 2) { in bpf_gen_map_prog() 48 if (insns % 2 == 0) in bpf_gen_map_prog() 49 prog[insns - 2] = BPF_ALU64_IMM(BPF_MOV, i % BPF_REG_10, 42); in bpf_gen_map_prog() 50 prog[insns - 1] = BPF_EXIT_INSN(); in bpf_gen_map_prog() 53 static int bpf_try_load_prog(int insns, int fd_map, in bpf_try_load_prog() argument 54 void (*bpf_filler)(unsigned int insns, in bpf_try_load_prog() argument 59 bpf_filler(insns, fd_map); in bpf_try_load_prog() [all …]
|
D | test_sock.c | 27 struct bpf_insn insns[MAX_INSNS]; member 48 .insns = { 65 .insns = { 82 .insns = { 99 .insns = { 116 .insns = { 130 .insns = { 144 .insns = { 158 .insns = { 172 .insns = { [all …]
|
D | test_verifier.c | 62 struct bpf_insn insns[MAX_INSNS]; member 105 struct bpf_insn *insn = self->insns; in bpf_fill_ld_abs_vlan_push_pop() 143 struct bpf_insn *insn = self->insns; in bpf_fill_jump_around_ld_abs() 158 struct bpf_insn *insn = self->insns; in bpf_fill_rand_ld_dw() 183 .insns = { 198 .insns = { 210 .insns = { 222 .insns = { 234 .insns = { 246 .insns = { [all …]
|
D | test_align.c | 33 struct bpf_insn insns[MAX_INSNS]; member 50 .insns = { 72 .insns = { 106 .insns = { 130 .insns = { 166 .insns = { 200 .insns = { 230 .insns = { 268 .insns = { 375 .insns = { [all …]
|
D | test_sock_addr.c | 520 const struct bpf_insn *insns, size_t insns_cnt) in load_insns() argument 528 load_attr.insns = insns; in load_insns() 571 struct bpf_insn insns[] = { in bind4_prog_load() local 618 return load_insns(test, insns, sizeof(insns) / sizeof(struct bpf_insn)); in bind4_prog_load() 636 struct bpf_insn insns[] = { in bind6_prog_load() local 684 return load_insns(test, insns, sizeof(insns) / sizeof(struct bpf_insn)); in bind6_prog_load() 719 struct bpf_insn insns[] = { in sendmsg_deny_prog_load() local 724 return load_insns(test, insns, sizeof(insns) / sizeof(struct bpf_insn)); in sendmsg_deny_prog_load() 742 struct bpf_insn insns[] = { in sendmsg4_rw_asm_prog_load() local 776 return load_insns(test, insns, sizeof(insns) / sizeof(struct bpf_insn)); in sendmsg4_rw_asm_prog_load() [all …]
|
/Linux-v4.19/arch/s390/kernel/ |
D | alternative.c | 36 static void __init_or_module add_jump_padding(void *insns, unsigned int len) in add_jump_padding() argument 43 memcpy(insns, &brcl, sizeof(brcl)); in add_jump_padding() 44 insns += sizeof(brcl); in add_jump_padding() 48 memcpy(insns, &nop16, 2); in add_jump_padding() 49 insns += 2; in add_jump_padding() 54 static void __init_or_module add_padding(void *insns, unsigned int len) in add_padding() argument 57 add_jump_padding(insns, len); in add_padding() 59 memcpy(insns, nops[len / 2 - 1], len); in add_padding()
|
/Linux-v4.19/arch/sparc/kernel/ |
D | setup_64.c | 189 unsigned int *insns; in per_cpu_patch() local 193 insns = &p->starfire[0]; in per_cpu_patch() 198 insns = &p->cheetah_jbus[0]; in per_cpu_patch() 200 insns = &p->cheetah_safari[0]; in per_cpu_patch() 203 insns = &p->sun4v[0]; in per_cpu_patch() 210 *(unsigned int *) (addr + 0) = insns[0]; in per_cpu_patch() 214 *(unsigned int *) (addr + 4) = insns[1]; in per_cpu_patch() 218 *(unsigned int *) (addr + 8) = insns[2]; in per_cpu_patch() 222 *(unsigned int *) (addr + 12) = insns[3]; in per_cpu_patch() 250 *(unsigned int *) (addr + 0) = start->insns[0]; in sun4v_patch_2insn_range() [all …]
|
D | setup_32.c | 216 unsigned int *insns; in per_cpu_patch() local 220 insns = &p->sun4d[0]; in per_cpu_patch() 224 insns = &p->leon[0]; in per_cpu_patch() 230 *(unsigned int *) (addr + 0) = insns[0]; in per_cpu_patch() 232 *(unsigned int *) (addr + 4) = insns[1]; in per_cpu_patch() 234 *(unsigned int *) (addr + 8) = insns[2]; in per_cpu_patch()
|
D | signal_32.c | 42 unsigned long insns[2] __attribute__ ((aligned (8))); member 54 unsigned int insns[2]; member 306 regs->u_regs[UREG_I7] = (unsigned long)(&(sf->insns[0]) - 2); in setup_frame() 309 err |= __put_user(0x821020d8, &sf->insns[0]); in setup_frame() 312 err |= __put_user(0x91d02010, &sf->insns[1]); in setup_frame() 317 flush_sig_insns(current->mm, (unsigned long) &(sf->insns[0])); in setup_frame() 403 regs->u_regs[UREG_I7] = (unsigned long)(&(sf->insns[0]) - 2); in setup_rt_frame() 406 err |= __put_user(0x821020d8, &sf->insns[0]); in setup_rt_frame() 409 err |= __put_user(0x91d02010, &sf->insns[1]); in setup_rt_frame() 414 flush_sig_insns(current->mm, (unsigned long) &(sf->insns[0])); in setup_rt_frame()
|
D | signal32.c | 51 unsigned int insns[2]; member 65 unsigned int insns[2]; member 466 unsigned long address = ((unsigned long)&(sf->insns[0])); in setup_frame32() 468 regs->u_regs[UREG_I7] = (unsigned long) (&(sf->insns[0]) - 2); in setup_frame32() 470 err = __put_user(0x821020d8, &sf->insns[0]); /*mov __NR_sigreturn, %g1*/ in setup_frame32() 471 err |= __put_user(0x91d02010, &sf->insns[1]); /*t 0x10*/ in setup_frame32() 594 unsigned long address = ((unsigned long)&(sf->insns[0])); in setup_rt_frame32() 596 regs->u_regs[UREG_I7] = (unsigned long) (&(sf->insns[0]) - 2); in setup_rt_frame32() 599 err |= __put_user(0x82102065, &sf->insns[0]); in setup_rt_frame32() 602 err |= __put_user(0x91d02010, &sf->insns[1]); in setup_rt_frame32()
|
D | entry.h | 50 unsigned int insns[3]; member 57 unsigned int insns[6]; member 64 unsigned int insns[3]; member
|
/Linux-v4.19/arch/parisc/kernel/ |
D | module.c | 125 Elf32_Word insns[2]; /* each stub entry has two insns */ member 133 Elf64_Word insns[4]; /* each stub entry has four insns */ member 472 stub->insns[0] = 0x20200000; /* ldil L'XXX,%r1 */ in get_stub() 473 stub->insns[1] = 0xe0202002; /* be,n R'XXX(%sr4,%r1) */ in get_stub() 475 stub->insns[0] |= reassemble_21(lrsel(value, addend)); in get_stub() 476 stub->insns[1] |= reassemble_17(rrsel(value, addend) / 4); in get_stub() 503 stub->insns[0] = 0x0f6010db; /* ldd 0(%dp),%dp */ in get_stub() 504 stub->insns[0] |= low_sign_unext(d, 5) << 16; in get_stub() 507 stub->insns[0] = 0x537b0000; /* ldd 0(%dp),%dp */ in get_stub() 508 stub->insns[0] |= reassemble_16a(d); in get_stub() [all …]
|
/Linux-v4.19/arch/x86/tools/ |
D | insn_decoder_test.c | 124 int insns = 0; in main() local 140 insns++; in main() 145 malformed_line(line, insns); in main() 150 malformed_line(line, insns); in main() 175 "failures\n", insns, warnings); in main() 178 " instructions\n", prog, insns); in main()
|
D | insn_sanity.c | 239 int insns = 0; in main() local 269 insns++; in main() 276 insns, in main()
|
/Linux-v4.19/lib/ |
D | test_bpf.c | 73 struct sock_filter insns[MAX_INSNS]; member 76 void *insns; member 108 self->u.ptr.insns = insn; in bpf_fill_maxinsns1() 127 self->u.ptr.insns = insn; in bpf_fill_maxinsns2() 154 self->u.ptr.insns = insn; in bpf_fill_maxinsns3() 173 self->u.ptr.insns = insn; in bpf_fill_maxinsns4() 196 self->u.ptr.insns = insn; in bpf_fill_maxinsns5() 218 self->u.ptr.insns = insn; in bpf_fill_maxinsns6() 244 self->u.ptr.insns = insn; in bpf_fill_maxinsns7() 267 self->u.ptr.insns = insn; in bpf_fill_maxinsns8() [all …]
|
/Linux-v4.19/tools/lib/bpf/ |
D | libbpf.c | 139 struct bpf_insn *insns; member 268 zfree(&prog->insns); in bpf_program__exit() 294 prog->insns = malloc(size); in bpf_program__init() 295 if (!prog->insns) { in bpf_program__init() 301 memcpy(prog->insns, data, in bpf_program__init() 918 struct bpf_insn *insns = prog->insns; in bpf_program__collect_reloc() local 946 if (insns[insn_idx].code == (BPF_JMP | BPF_CALL)) { in bpf_program__collect_reloc() 947 if (insns[insn_idx].src_reg != BPF_PSEUDO_CALL) { in bpf_program__collect_reloc() 958 if (insns[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) { in bpf_program__collect_reloc() 960 insn_idx, insns[insn_idx].code); in bpf_program__collect_reloc() [all …]
|
D | bpf.h | 65 const struct bpf_insn *insns; member 76 int bpf_load_program(enum bpf_prog_type type, const struct bpf_insn *insns, 80 int bpf_verify_program(enum bpf_prog_type type, const struct bpf_insn *insns,
|
D | bpf.c | 200 attr.insns = ptr_to_u64(load_attr->insns); in bpf_load_program_xattr() 222 int bpf_load_program(enum bpf_prog_type type, const struct bpf_insn *insns, in bpf_load_program() argument 233 load_attr.insns = insns; in bpf_load_program() 241 int bpf_verify_program(enum bpf_prog_type type, const struct bpf_insn *insns, in bpf_verify_program() argument 251 attr.insns = ptr_to_u64(insns); in bpf_verify_program()
|
/Linux-v4.19/samples/bpf/ |
D | fds_example.c | 55 static struct bpf_insn insns[] = { in bpf_prog_create() local 59 size_t insns_cnt = sizeof(insns) / sizeof(struct bpf_insn); in bpf_prog_create() 66 insns, insns_cnt, "GPL", 0, in bpf_prog_create()
|
/Linux-v4.19/tools/perf/tests/ |
D | bpf.c | 302 struct bpf_insn insns[] = { in check_env() local 313 err = bpf_load_program(BPF_PROG_TYPE_KPROBE, insns, in check_env() 314 sizeof(insns) / sizeof(insns[0]), in check_env()
|
/Linux-v4.19/kernel/bpf/ |
D | syscall.c | 1392 if (copy_from_user(prog->insns, u64_to_user_ptr(attr->insns), in bpf_prog_load() 1871 struct bpf_insn *insns; in bpf_insn_prepare_dump() local 1875 insns = kmemdup(prog->insnsi, bpf_prog_insn_size(prog), in bpf_insn_prepare_dump() 1877 if (!insns) in bpf_insn_prepare_dump() 1878 return insns; in bpf_insn_prepare_dump() 1881 if (insns[i].code == (BPF_JMP | BPF_TAIL_CALL)) { in bpf_insn_prepare_dump() 1882 insns[i].code = BPF_JMP | BPF_CALL; in bpf_insn_prepare_dump() 1883 insns[i].imm = BPF_FUNC_tail_call; in bpf_insn_prepare_dump() 1886 if (insns[i].code == (BPF_JMP | BPF_CALL) || in bpf_insn_prepare_dump() 1887 insns[i].code == (BPF_JMP | BPF_CALL_ARGS)) { in bpf_insn_prepare_dump() [all …]
|
/Linux-v4.19/arch/mips/kernel/ |
D | ftrace.c | 328 int faulted, insns; in prepare_ftrace_return() local 384 insns = core_kernel_text(self_ra) ? 2 : MCOUNT_OFFSET_INSNS + 1; in prepare_ftrace_return() 385 trace.func = self_ra - (MCOUNT_INSN_SIZE * insns); in prepare_ftrace_return()
|
/Linux-v4.19/net/netfilter/ |
D | xt_bpf.c | 27 static int __bpf_mt_check_bytecode(struct sock_filter *insns, __u16 len, in __bpf_mt_check_bytecode() argument 36 program.filter = insns; in __bpf_mt_check_bytecode()
|