2
0
mirror of https://github.com/edk2-porting/linux-next.git synced 2024-12-15 16:53:54 +08:00
linux-next/tools/bpf/bpftool
Quentin Monnet 9e2308c133 tools: bpftool: print all relevant byte opcodes for "load double word"
The eBPF instruction permitting to load double words (8 bytes) into a
register need 8-byte long "immediate" field, and thus occupy twice the
space of other instructions. bpftool was aware of this and would
increment the instruction counter only once on meeting such instruction,
but it would only print the first four bytes of the immediate value to
load. Make it able to dump the whole 16 byte-long double instruction
instead (as would `llvm-objdump -d <program>`).

Signed-off-by: Quentin Monnet <quentin.monnet@netronome.com>
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-22 02:11:32 +01:00
..
Documentation tools: bpftool: use more common tag format 2017-10-18 13:19:39 +01:00
common.c tools: bpf: add bpftool 2017-10-04 21:45:06 -07:00
jit_disasm.c tools: bpf: add bpftool 2017-10-04 21:45:06 -07:00
main.c tools: bpftool: add pointer to file argument to print_hex() 2017-10-22 02:11:31 +01:00
main.h tools: bpftool: add pointer to file argument to print_hex() 2017-10-22 02:11:31 +01:00
Makefile tools: bpftool: use the kernel's instruction printer 2017-10-10 12:30:16 -07:00
map.c tools: bpftool: print only one error message on byte parsing failure 2017-10-22 02:11:32 +01:00
prog.c tools: bpftool: print all relevant byte opcodes for "load double word" 2017-10-22 02:11:32 +01:00