diff options
author | Brendan Jackman <jackmanb@google.com> | 2021-01-14 19:17:44 +0100 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2021-01-15 03:34:29 +0100 |
commit | 91c960b0056672e74627776655c926388350fa30 (patch) | |
tree | b15d68c17ead28b128791f8e710d9efa2a711267 /crypto/sha3_generic.c | |
parent | bpf: x86: Factor out a lookup table for some ALU opcodes (diff) | |
download | linux-91c960b0056672e74627776655c926388350fa30.tar.xz linux-91c960b0056672e74627776655c926388350fa30.zip |
bpf: Rename BPF_XADD and prepare to encode other atomics in .imm
A subsequent patch will add additional atomic operations. These new
operations will use the same opcode field as the existing XADD, with
the immediate discriminating different operations.
In preparation, rename the instruction mode BPF_ATOMIC and start
calling the zero immediate BPF_ADD.
This is possible (doesn't break existing valid BPF progs) because the
immediate field is currently reserved MBZ and BPF_ADD is zero.
All uses are removed from the tree but the BPF_XADD definition is
kept around to avoid breaking builds for people including kernel
headers.
Signed-off-by: Brendan Jackman <jackmanb@google.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Björn Töpel <bjorn.topel@gmail.com>
Link: https://lore.kernel.org/bpf/20210114181751.768687-5-jackmanb@google.com
Diffstat (limited to 'crypto/sha3_generic.c')
0 files changed, 0 insertions, 0 deletions