f2fs: Provide a splice-read wrapper
[linux-block.git] / Documentation / bpf / instruction-set.rst
CommitLineData
5a8921ba
DT
1.. contents::
2.. sectnum::
3
4========================================
5eBPF Instruction Set Specification, v1.0
6========================================
7
8This document specifies version 1.0 of the eBPF instruction set.
88691e9e 9
d00d5b82
DT
10Documentation conventions
11=========================
12
13For brevity, this document uses the type notion "u64", "u32", etc.
b9fe8e8d
DT
14to mean an unsigned integer whose width is the specified number of bits,
15and "s32", etc. to mean a signed integer of the specified number of bits.
88691e9e 16
41db511a
CH
17Registers and calling convention
18================================
19
20eBPF has 10 general purpose registers and a read-only frame pointer register,
21all of which are 64-bits wide.
22
23The eBPF calling convention is defined as:
24
5a8921ba
DT
25* R0: return value from function calls, and exit value for eBPF programs
26* R1 - R5: arguments for function calls
27* R6 - R9: callee saved registers that function calls will preserve
28* R10: read-only frame pointer to access stack
41db511a
CH
29
30R0 - R5 are scratch registers and eBPF programs needs to spill/fill them if
31necessary across calls.
88691e9e 32
62e46838
CH
33Instruction encoding
34====================
35
5ca15b8a
CH
36eBPF has two instruction encodings:
37
5a8921ba 38* the basic instruction encoding, which uses 64 bits to encode an instruction
a92adde8
DT
39* the wide instruction encoding, which appends a second 64-bit immediate (i.e.,
40 constant) value after the basic instruction for a total of 128 bits.
5ca15b8a 41
ae256f95
JM
42The fields conforming an encoded basic instruction are stored in the
43following order::
62e46838 44
ae256f95
JM
45 opcode:8 src_reg:4 dst_reg:4 offset:16 imm:32 // In little-endian BPF.
46 opcode:8 dst_reg:4 src_reg:4 offset:16 imm:32 // In big-endian BPF.
a92adde8
DT
47
48**imm**
49 signed integer immediate value
50
51**offset**
52 signed integer offset used with pointer arithmetic
53
54**src_reg**
55 the source register number (0-10), except where otherwise specified
56 (`64-bit immediate instructions`_ reuse this field for other purposes)
57
58**dst_reg**
59 destination register number (0-10)
60
61**opcode**
62 operation to perform
62e46838 63
ae256f95
JM
64Note that the contents of multi-byte fields ('imm' and 'offset') are
65stored using big-endian byte ordering in big-endian BPF and
66little-endian byte ordering in little-endian BPF.
746ce767 67
ae256f95 68For example::
746ce767 69
ae256f95
JM
70 opcode offset imm assembly
71 src_reg dst_reg
72 07 0 1 00 00 44 33 22 11 r1 += 0x11223344 // little
73 dst_reg src_reg
74 07 1 0 00 00 11 22 33 44 r1 += 0x11223344 // big
746ce767 75
62e46838
CH
76Note that most instructions do not use all of the fields.
77Unused fields shall be cleared to zero.
78
a92adde8
DT
79As discussed below in `64-bit immediate instructions`_, a 64-bit immediate
80instruction uses a 64-bit immediate value that is constructed as follows.
81The 64 bits following the basic instruction contain a pseudo instruction
82using the same format but with opcode, dst_reg, src_reg, and offset all set to zero,
83and imm containing the high 32 bits of the immediate value.
84
ae256f95
JM
85This is depicted in the following figure::
86
87 basic_instruction
88 .-----------------------------.
89 | |
90 code:8 regs:8 offset:16 imm:32 unused:32 imm:32
91 | |
92 '--------------'
93 pseudo instruction
a92adde8
DT
94
95Thus the 64-bit immediate value is constructed as follows:
96
97 imm64 = (next_imm << 32) | imm
98
99where 'next_imm' refers to the imm value of the pseudo instruction
ae256f95
JM
100following the basic instruction. The unused bytes in the pseudo
101instruction are reserved and shall be cleared to zero.
a92adde8 102
5e4dd19f 103Instruction classes
62e46838 104-------------------
88691e9e 105
5e4dd19f 106The three LSB bits of the 'opcode' field store the instruction class:
88691e9e 107
5a8921ba
DT
108========= ===== =============================== ===================================
109class value description reference
110========= ===== =============================== ===================================
111BPF_LD 0x00 non-standard load operations `Load and store instructions`_
112BPF_LDX 0x01 load into register operations `Load and store instructions`_
113BPF_ST 0x02 store from immediate operations `Load and store instructions`_
114BPF_STX 0x03 store from register operations `Load and store instructions`_
115BPF_ALU 0x04 32-bit arithmetic operations `Arithmetic and jump instructions`_
116BPF_JMP 0x05 64-bit jump operations `Arithmetic and jump instructions`_
117BPF_JMP32 0x06 32-bit jump operations `Arithmetic and jump instructions`_
118BPF_ALU64 0x07 64-bit arithmetic operations `Arithmetic and jump instructions`_
119========= ===== =============================== ===================================
88691e9e 120
5e4dd19f
CH
121Arithmetic and jump instructions
122================================
123
5a8921ba
DT
124For arithmetic and jump instructions (``BPF_ALU``, ``BPF_ALU64``, ``BPF_JMP`` and
125``BPF_JMP32``), the 8-bit 'opcode' field is divided into three parts:
88691e9e 126
5a8921ba
DT
127============== ====== =================
1284 bits (MSB) 1 bit 3 bits (LSB)
129============== ====== =================
a92adde8 130code source instruction class
5a8921ba 131============== ====== =================
88691e9e 132
a92adde8
DT
133**code**
134 the operation code, whose meaning varies by instruction class
88691e9e 135
a92adde8
DT
136**source**
137 the source operand location, which unless otherwise specified is one of:
88691e9e 138
a92adde8
DT
139 ====== ===== ==============================================
140 source value description
141 ====== ===== ==============================================
142 BPF_K 0x00 use 32-bit 'imm' value as source operand
143 BPF_X 0x08 use 'src_reg' register value as source operand
144 ====== ===== ==============================================
88691e9e 145
a92adde8
DT
146**instruction class**
147 the instruction class (see `Instruction classes`_)
be3193cd
CH
148
149Arithmetic instructions
150-----------------------
151
5a8921ba 152``BPF_ALU`` uses 32-bit wide operands while ``BPF_ALU64`` uses 64-bit wide operands for
be3193cd 153otherwise identical operations.
a92adde8
DT
154The 'code' field encodes the operation as below, where 'src' and 'dst' refer
155to the values of the source and destination registers, respectively.
5a8921ba
DT
156
157======== ===== ==========================================================
158code value description
159======== ===== ==========================================================
160BPF_ADD 0x00 dst += src
161BPF_SUB 0x10 dst -= src
162BPF_MUL 0x20 dst \*= src
0eb9d19e 163BPF_DIV 0x30 dst = (src != 0) ? (dst / src) : 0
5a8921ba
DT
164BPF_OR 0x40 dst \|= src
165BPF_AND 0x50 dst &= src
166BPF_LSH 0x60 dst <<= src
167BPF_RSH 0x70 dst >>= src
168BPF_NEG 0x80 dst = ~src
0eb9d19e 169BPF_MOD 0x90 dst = (src != 0) ? (dst % src) : dst
5a8921ba
DT
170BPF_XOR 0xa0 dst ^= src
171BPF_MOV 0xb0 dst = src
172BPF_ARSH 0xc0 sign extending shift right
173BPF_END 0xd0 byte swap operations (see `Byte swap instructions`_ below)
174======== ===== ==========================================================
175
0eb9d19e
DT
176Underflow and overflow are allowed during arithmetic operations, meaning
177the 64-bit or 32-bit value will wrap. If eBPF program execution would
178result in division by zero, the destination register is instead set to zero.
179If execution would result in modulo by zero, for ``BPF_ALU64`` the value of
180the destination register is unchanged whereas for ``BPF_ALU`` the upper
18132 bits of the destination register are zeroed.
182
5a8921ba 183``BPF_ADD | BPF_X | BPF_ALU`` means::
be3193cd 184
a92adde8 185 dst = (u32) ((u32) dst + (u32) src)
be3193cd 186
d00d5b82
DT
187where '(u32)' indicates that the upper 32 bits are zeroed.
188
5a8921ba 189``BPF_ADD | BPF_X | BPF_ALU64`` means::
be3193cd 190
a92adde8 191 dst = dst + src
be3193cd 192
5a8921ba 193``BPF_XOR | BPF_K | BPF_ALU`` means::
be3193cd 194
a92adde8 195 dst = (u32) dst ^ (u32) imm32
be3193cd 196
5a8921ba 197``BPF_XOR | BPF_K | BPF_ALU64`` means::
be3193cd 198
a92adde8 199 dst = dst ^ imm32
be3193cd 200
0eb9d19e
DT
201Also note that the division and modulo operations are unsigned. Thus, for
202``BPF_ALU``, 'imm' is first interpreted as an unsigned 32-bit value, whereas
203for ``BPF_ALU64``, 'imm' is first sign extended to 64 bits and the result
204interpreted as an unsigned 64-bit value. There are no instructions for
205signed division or modulo.
be3193cd 206
dd33fb57 207Byte swap instructions
5a8921ba 208~~~~~~~~~~~~~~~~~~~~~~
dd33fb57 209
492f99e4 210The byte swap instructions use an instruction class of ``BPF_ALU`` and a 4-bit
5a8921ba 211'code' field of ``BPF_END``.
dd33fb57 212
67b97e58 213The byte swap instructions operate on the destination register
dd33fb57
CH
214only and do not use a separate source register or immediate value.
215
7f77ebbf 216The 1-bit source operand field in the opcode is used to select what byte
dd33fb57
CH
217order the operation convert from or to:
218
5a8921ba
DT
219========= ===== =================================================
220source value description
221========= ===== =================================================
222BPF_TO_LE 0x00 convert between host byte order and little endian
223BPF_TO_BE 0x08 convert between host byte order and big endian
224========= ===== =================================================
dd33fb57 225
5a8921ba 226The 'imm' field encodes the width of the swap operations. The following widths
dd33fb57
CH
227are supported: 16, 32 and 64.
228
229Examples:
230
231``BPF_ALU | BPF_TO_LE | BPF_END`` with imm = 16 means::
232
a92adde8 233 dst = htole16(dst)
dd33fb57
CH
234
235``BPF_ALU | BPF_TO_BE | BPF_END`` with imm = 64 means::
236
a92adde8 237 dst = htobe64(dst)
dd33fb57 238
be3193cd
CH
239Jump instructions
240-----------------
241
5a8921ba 242``BPF_JMP32`` uses 32-bit wide operands while ``BPF_JMP`` uses 64-bit wide operands for
be3193cd 243otherwise identical operations.
5a8921ba
DT
244The 'code' field encodes the operation as below:
245
8cfee110
DT
246======== ===== === =========================================== =========================================
247code value src description notes
248======== ===== === =========================================== =========================================
249BPF_JA 0x0 0x0 PC += offset BPF_JMP only
250BPF_JEQ 0x1 any PC += offset if dst == src
251BPF_JGT 0x2 any PC += offset if dst > src unsigned
252BPF_JGE 0x3 any PC += offset if dst >= src unsigned
253BPF_JSET 0x4 any PC += offset if dst & src
254BPF_JNE 0x5 any PC += offset if dst != src
255BPF_JSGT 0x6 any PC += offset if dst > src signed
256BPF_JSGE 0x7 any PC += offset if dst >= src signed
257BPF_CALL 0x8 0x0 call helper function by address see `Helper functions`_
258BPF_CALL 0x8 0x1 call PC += offset see `Program-local functions`_
259BPF_CALL 0x8 0x2 call helper function by BTF ID see `Helper functions`_
260BPF_EXIT 0x9 0x0 return BPF_JMP only
261BPF_JLT 0xa any PC += offset if dst < src unsigned
262BPF_JLE 0xb any PC += offset if dst <= src unsigned
263BPF_JSLT 0xc any PC += offset if dst < src signed
264BPF_JSLE 0xd any PC += offset if dst <= src signed
265======== ===== === =========================================== =========================================
41db511a 266
be3193cd 267The eBPF program needs to store the return value into register R0 before doing a
8cfee110 268``BPF_EXIT``.
88691e9e 269
b9fe8e8d
DT
270Example:
271
272``BPF_JSGE | BPF_X | BPF_JMP32`` (0x7e) means::
273
274 if (s32)dst s>= (s32)src goto +offset
275
276where 's>=' indicates a signed '>=' comparison.
277
c1f9e14e
DT
278Helper functions
279~~~~~~~~~~~~~~~~
280
281Helper functions are a concept whereby BPF programs can call into a
8cfee110
DT
282set of function calls exposed by the underlying platform.
283
284Historically, each helper function was identified by an address
285encoded in the imm field. The available helper functions may differ
286for each program type, but address values are unique across all program types.
287
288Platforms that support the BPF Type Format (BTF) support identifying
289a helper function by a BTF ID encoded in the imm field, where the BTF ID
290identifies the helper name and type.
291
292Program-local functions
293~~~~~~~~~~~~~~~~~~~~~~~
294Program-local functions are functions exposed by the same BPF program as the
295caller, and are referenced by offset from the call instruction, similar to
296``BPF_JA``. A ``BPF_EXIT`` within the program-local function will return to
297the caller.
88691e9e 298
5e4dd19f
CH
299Load and store instructions
300===========================
301
5a8921ba 302For load and store instructions (``BPF_LD``, ``BPF_LDX``, ``BPF_ST``, and ``BPF_STX``), the
5e4dd19f
CH
3038-bit 'opcode' field is divided as:
304
5a8921ba
DT
305============ ====== =================
3063 bits (MSB) 2 bits 3 bits (LSB)
307============ ====== =================
308mode size instruction class
309============ ====== =================
310
311The mode modifier is one of:
312
313 ============= ===== ==================================== =============
314 mode modifier value description reference
315 ============= ===== ==================================== =============
316 BPF_IMM 0x00 64-bit immediate instructions `64-bit immediate instructions`_
317 BPF_ABS 0x20 legacy BPF packet access (absolute) `Legacy BPF Packet access instructions`_
318 BPF_IND 0x40 legacy BPF packet access (indirect) `Legacy BPF Packet access instructions`_
319 BPF_MEM 0x60 regular load and store operations `Regular load and store operations`_
320 BPF_ATOMIC 0xc0 atomic operations `Atomic operations`_
321 ============= ===== ==================================== =============
5e4dd19f
CH
322
323The size modifier is one of:
88691e9e 324
5e4dd19f
CH
325 ============= ===== =====================
326 size modifier value description
327 ============= ===== =====================
328 BPF_W 0x00 word (4 bytes)
329 BPF_H 0x08 half word (2 bytes)
330 BPF_B 0x10 byte
331 BPF_DW 0x18 double word (8 bytes)
332 ============= ===== =====================
88691e9e 333
63d8c242
CH
334Regular load and store operations
335---------------------------------
336
337The ``BPF_MEM`` mode modifier is used to encode regular load and store
338instructions that transfer data between a register and memory.
339
340``BPF_MEM | <size> | BPF_STX`` means::
88691e9e 341
a92adde8 342 *(size *) (dst + offset) = src
88691e9e 343
63d8c242 344``BPF_MEM | <size> | BPF_ST`` means::
88691e9e 345
a92adde8 346 *(size *) (dst + offset) = imm32
5e4dd19f 347
63d8c242 348``BPF_MEM | <size> | BPF_LDX`` means::
5e4dd19f 349
a92adde8 350 dst = *(size *) (src + offset)
5e4dd19f 351
63d8c242 352Where size is one of: ``BPF_B``, ``BPF_H``, ``BPF_W``, or ``BPF_DW``.
5e4dd19f 353
5e4dd19f
CH
354Atomic operations
355-----------------
88691e9e 356
594d3234
CH
357Atomic operations are operations that operate on memory and can not be
358interrupted or corrupted by other access to the same memory region
359by other eBPF programs or means outside of this specification.
88691e9e 360
594d3234
CH
361All atomic operations supported by eBPF are encoded as store operations
362that use the ``BPF_ATOMIC`` mode modifier as follows:
88691e9e 363
5a8921ba
DT
364* ``BPF_ATOMIC | BPF_W | BPF_STX`` for 32-bit operations
365* ``BPF_ATOMIC | BPF_DW | BPF_STX`` for 64-bit operations
366* 8-bit and 16-bit wide atomic operations are not supported.
88691e9e 367
5a8921ba 368The 'imm' field is used to encode the actual atomic operation.
594d3234 369Simple atomic operation use a subset of the values defined to encode
5a8921ba 370arithmetic operations in the 'imm' field to encode the atomic operation:
88691e9e 371
5a8921ba
DT
372======== ===== ===========
373imm value description
374======== ===== ===========
375BPF_ADD 0x00 atomic add
376BPF_OR 0x40 atomic or
377BPF_AND 0x50 atomic and
378BPF_XOR 0xa0 atomic xor
379======== ===== ===========
88691e9e 380
88691e9e 381
5a8921ba 382``BPF_ATOMIC | BPF_W | BPF_STX`` with 'imm' = BPF_ADD means::
88691e9e 383
a92adde8 384 *(u32 *)(dst + offset) += src
88691e9e 385
5a8921ba 386``BPF_ATOMIC | BPF_DW | BPF_STX`` with 'imm' = BPF ADD means::
88691e9e 387
a92adde8 388 *(u64 *)(dst + offset) += src
88691e9e 389
594d3234
CH
390In addition to the simple atomic operations, there also is a modifier and
391two complex atomic operations:
392
5a8921ba
DT
393=========== ================ ===========================
394imm value description
395=========== ================ ===========================
396BPF_FETCH 0x01 modifier: return old value
397BPF_XCHG 0xe0 | BPF_FETCH atomic exchange
398BPF_CMPXCHG 0xf0 | BPF_FETCH atomic compare and exchange
399=========== ================ ===========================
594d3234
CH
400
401The ``BPF_FETCH`` modifier is optional for simple atomic operations, and
402always set for the complex atomic operations. If the ``BPF_FETCH`` flag
a92adde8 403is set, then the operation also overwrites ``src`` with the value that
594d3234
CH
404was in memory before it was modified.
405
a92adde8
DT
406The ``BPF_XCHG`` operation atomically exchanges ``src`` with the value
407addressed by ``dst + offset``.
594d3234
CH
408
409The ``BPF_CMPXCHG`` operation atomically compares the value addressed by
a92adde8
DT
410``dst + offset`` with ``R0``. If they match, the value addressed by
411``dst + offset`` is replaced with ``src``. In either case, the
412value that was at ``dst + offset`` before the operation is zero-extended
594d3234 413and loaded back to ``R0``.
88691e9e 414
5ca15b8a
CH
41564-bit immediate instructions
416-----------------------------
417
5a8921ba 418Instructions with the ``BPF_IMM`` 'mode' modifier use the wide instruction
16b7c970
DT
419encoding defined in `Instruction encoding`_, and use the 'src' field of the
420basic instruction to hold an opcode subtype.
421
422The following table defines a set of ``BPF_IMM | BPF_DW | BPF_LD`` instructions
423with opcode subtypes in the 'src' field, using new terms such as "map"
424defined further below:
425
426========================= ====== === ========================================= =========== ==============
427opcode construction opcode src pseudocode imm type dst type
428========================= ====== === ========================================= =========== ==============
429BPF_IMM | BPF_DW | BPF_LD 0x18 0x0 dst = imm64 integer integer
430BPF_IMM | BPF_DW | BPF_LD 0x18 0x1 dst = map_by_fd(imm) map fd map
431BPF_IMM | BPF_DW | BPF_LD 0x18 0x2 dst = map_val(map_by_fd(imm)) + next_imm map fd data pointer
432BPF_IMM | BPF_DW | BPF_LD 0x18 0x3 dst = var_addr(imm) variable id data pointer
433BPF_IMM | BPF_DW | BPF_LD 0x18 0x4 dst = code_addr(imm) integer code pointer
434BPF_IMM | BPF_DW | BPF_LD 0x18 0x5 dst = map_by_idx(imm) map index map
435BPF_IMM | BPF_DW | BPF_LD 0x18 0x6 dst = map_val(map_by_idx(imm)) + next_imm map index data pointer
436========================= ====== === ========================================= =========== ==============
437
438where
439
440* map_by_fd(imm) means to convert a 32-bit file descriptor into an address of a map (see `Maps`_)
441* map_by_idx(imm) means to convert a 32-bit index into an address of a map
442* map_val(map) gets the address of the first value in a given map
443* var_addr(imm) gets the address of a platform variable (see `Platform Variables`_) with a given id
444* code_addr(imm) gets the address of the instruction at a specified relative offset in number of (64-bit) instructions
445* the 'imm type' can be used by disassemblers for display
446* the 'dst type' can be used for verification and JIT compilation purposes
447
448Maps
449~~~~
450
451Maps are shared memory regions accessible by eBPF programs on some platforms.
452A map can have various semantics as defined in a separate document, and may or
453may not have a single contiguous memory region, but the 'map_val(map)' is
454currently only defined for maps that do have a single contiguous memory region.
455
456Each map can have a file descriptor (fd) if supported by the platform, where
457'map_by_fd(imm)' means to get the map with the specified file descriptor. Each
458BPF program can also be defined to use a set of maps associated with the
459program at load time, and 'map_by_idx(imm)' means to get the map with the given
460index in the set associated with the BPF program containing the instruction.
461
462Platform Variables
463~~~~~~~~~~~~~~~~~~
464
465Platform variables are memory regions, identified by integer ids, exposed by
466the runtime and accessible by BPF programs on some platforms. The
467'var_addr(imm)' operation means to get the address of the memory region
468identified by the given id.
63d000c3 469
15175336
CH
470Legacy BPF Packet access instructions
471-------------------------------------
63d000c3 472
6166da0a
DT
473eBPF previously introduced special instructions for access to packet data that were
474carried over from classic BPF. However, these instructions are
475deprecated and should no longer be used.