/Linux-v5.4/kernel/bpf/ |
D | disasm.c | 153 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 159 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 171 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 181 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 187 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 192 bpf_ldst_string[BPF_SIZE(insn->code) >> 3], in print_bpf_insn() 195 BPF_SIZE(insn->code) == BPF_DW) { in print_bpf_insn()
|
D | cgroup.c | 1342 BPF_SIZE(si->code), si->dst_reg, si->src_reg, in sysctl_convert_ctx_access() 1380 read_size = bpf_size_to_bytes(BPF_SIZE(si->code)); in sysctl_convert_ctx_access() 1382 BPF_SIZE(si->code), si->dst_reg, si->dst_reg, in sysctl_convert_ctx_access()
|
D | verifier.c | 1289 return BPF_SIZE(code) == BPF_DW; in is_reg64() 1297 return BPF_SIZE(code) == BPF_DW; in is_reg64() 1509 if (BPF_SIZE(insn->code) != BPF_DW) in backtrack_insn() 1533 if (BPF_SIZE(insn->code) != BPF_DW) in backtrack_insn() 2891 if ((BPF_SIZE(insn->code) != BPF_W && BPF_SIZE(insn->code) != BPF_DW) || in check_xadd() 2924 BPF_SIZE(insn->code), BPF_READ, -1, true); in check_xadd() 2930 BPF_SIZE(insn->code), BPF_WRITE, -1, true); in check_xadd() 5952 if (BPF_SIZE(insn->code) != BPF_DW) { in check_ld_imm() 6048 BPF_SIZE(insn->code) == BPF_DW || in check_ld_abs() 7600 insn->off, BPF_SIZE(insn->code), in do_check() [all …]
|
/Linux-v5.4/samples/bpf/ |
D | bpf_insn.h | 111 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_ABS, \ 121 .code = BPF_LDX | BPF_SIZE(SIZE) | BPF_MEM, \ 131 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_MEM, \ 141 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_XADD, \ 151 .code = BPF_ST | BPF_SIZE(SIZE) | BPF_MEM, \
|
/Linux-v5.4/tools/include/linux/ |
D | filter.h | 136 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_ABS, \ 146 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_IND, \ 156 .code = BPF_LDX | BPF_SIZE(SIZE) | BPF_MEM, \ 166 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_MEM, \ 176 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_XADD, \ 186 .code = BPF_ST | BPF_SIZE(SIZE) | BPF_MEM, \
|
/Linux-v5.4/include/uapi/linux/ |
D | bpf_common.h | 17 #define BPF_SIZE(code) ((code) & 0x18) macro
|
/Linux-v5.4/tools/include/uapi/linux/ |
D | bpf_common.h | 17 #define BPF_SIZE(code) ((code) & 0x18) macro
|
/Linux-v5.4/include/linux/ |
D | filter.h | 222 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_ABS, \ 232 .code = BPF_LD | BPF_SIZE(SIZE) | BPF_IND, \ 242 .code = BPF_LDX | BPF_SIZE(SIZE) | BPF_MEM, \ 252 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_MEM, \ 262 .code = BPF_STX | BPF_SIZE(SIZE) | BPF_XADD, \ 272 .code = BPF_ST | BPF_SIZE(SIZE) | BPF_MEM, \ 427 const int __size = bpf_size_to_bytes(BPF_SIZE((insn)->code)); \
|
/Linux-v5.4/arch/arm64/net/ |
D | bpf_jit_comp.c | 356 const bool isdw = BPF_SIZE(code) == BPF_DW; in build_insn() 685 switch (BPF_SIZE(code)) { in build_insn() 709 switch (BPF_SIZE(code)) { in build_insn() 731 switch (BPF_SIZE(code)) { in build_insn()
|
/Linux-v5.4/arch/x86/net/ |
D | bpf_jit_comp32.c | 1721 switch (BPF_SIZE(code)) { in do_jit() 1736 EMIT(imm32, bpf_size_to_x86_bytes(BPF_SIZE(code))); in do_jit() 1738 if (BPF_SIZE(code) == BPF_DW) { in do_jit() 1769 switch (BPF_SIZE(code)) { in do_jit() 1786 if (BPF_SIZE(code) == BPF_DW) { in do_jit() 1822 switch (BPF_SIZE(code)) { in do_jit() 1846 switch (BPF_SIZE(code)) { in do_jit()
|
D | bpf_jit_comp.c | 745 EMIT(imm32, bpf_size_to_x86_bytes(BPF_SIZE(insn->code))); in do_jit()
|
/Linux-v5.4/arch/mips/net/ |
D | ebpf_jit.c | 1372 switch (BPF_SIZE(insn->code)) { in build_one_insn() 1405 switch (BPF_SIZE(insn->code)) { in build_one_insn() 1452 switch (BPF_SIZE(insn->code)) { in build_one_insn() 1482 switch (BPF_SIZE(insn->code)) { in build_one_insn() 1629 switch (BPF_SIZE(insn->code)) { in reg_val_propagate_range() 1662 switch (BPF_SIZE(insn->code)) { in reg_val_propagate_range()
|
/Linux-v5.4/net/core/ |
D | filter.c | 450 int size = bpf_size_to_bytes(BPF_SIZE(fp->code)); in convert_bpf_ld_abs() 451 bool endian = BPF_SIZE(fp->code) == BPF_H || in convert_bpf_ld_abs() 452 BPF_SIZE(fp->code) == BPF_W; in convert_bpf_ld_abs() 471 *insn++ = BPF_LDX_MEM(BPF_SIZE(fp->code), BPF_REG_A, in convert_bpf_ld_abs() 476 *insn++ = BPF_LDX_MEM(BPF_SIZE(fp->code), BPF_REG_A, in convert_bpf_ld_abs() 495 switch (BPF_SIZE(fp->code)) { in convert_bpf_ld_abs() 6796 switch (BPF_SIZE(orig->code)) { in bpf_gen_ld_abs() 7345 *insn++ = BPF_STX_MEM(BPF_SIZE(si->code), si->dst_reg, in bpf_convert_ctx_access() 7348 *insn++ = BPF_LDX_MEM(BPF_SIZE(si->code), si->dst_reg, in bpf_convert_ctx_access() 7656 BPF_SIZE(si->code), si->dst_reg, si->src_reg, in bpf_sock_convert_ctx_access() [all …]
|
/Linux-v5.4/arch/arm/net/ |
D | bpf_jit_32.c | 1587 emit_ldx_r(dst, rn, off, ctx, BPF_SIZE(code)); in build_insn() 1594 switch (BPF_SIZE(code)) { in build_insn() 1605 emit_str_r(dst_lo, tmp2, off, ctx, BPF_SIZE(code)); in build_insn() 1618 emit_str_r(dst_lo, rs, off, ctx, BPF_SIZE(code)); in build_insn()
|
/Linux-v5.4/drivers/net/ethernet/netronome/nfp/bpf/ |
D | jit.c | 834 else if (BPF_SIZE(meta->insn.code) != BPF_DW) in nfp_cpp_memcpy() 839 switch (BPF_SIZE(meta->insn.code)) { in nfp_cpp_memcpy() 861 if (BPF_SIZE(meta->insn.code) != BPF_DW) in nfp_cpp_memcpy() 3976 if (!exp_mask[BPF_SIZE(insn.code)]) in nfp_bpf_opt_ld_mask() 3978 if (exp_mask[BPF_SIZE(insn.code)] != next.imm) in nfp_bpf_opt_ld_mask() 4007 if (BPF_SIZE(insn.code) != BPF_W) in nfp_bpf_opt_ld_shift() 4059 if (BPF_SIZE(ld->code) != BPF_SIZE(st->code)) in curr_pair_is_memcpy()
|
/Linux-v5.4/arch/sparc/net/ |
D | bpf_jit_comp_64.c | 1263 switch (BPF_SIZE(code)) { in build_insn() 1305 switch (BPF_SIZE(code)) { in build_insn() 1343 switch (BPF_SIZE(code)) { in build_insn()
|
/Linux-v5.4/arch/riscv/net/ |
D | bpf_jit_comp.c | 1413 emit(BPF_SIZE(code) == BPF_W ? in emit_insn()
|