Skip to content

Commit 1342bd9

Browse files
committed
Fix asterisk escaping
Signed-off-by: Dave Thaler <[email protected]>
1 parent 0f1e8cf commit 1342bd9

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

isa/kernel.org/instruction-set.rst

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -364,22 +364,22 @@ Regular load and store operations
364364
The ``BPF_MEM`` mode modifier is used to encode regular load and store
365365
instructions that transfer data between a register and memory.
366366

367-
============================= ========= ==================================
367+
============================= ========= ====================================
368368
opcode construction opcode pseudocode
369-
============================= ========= ==================================
370-
BPF_MEM | BPF_B | BPF_LDX 0x71 dst = *(uint8_t *) (src + offset)
371-
BPF_MEM | BPF_H | BPF_LDX 0x69 dst = *(uint16_t *) (src + offset)
372-
BPF_MEM | BPF_W | BPF_LDX 0x61 dst = *(uint32_t *) (src + offset)
373-
BPF_MEM | BPF_DW | BPF_LDX 0x79 dst = *(uint64_t *) (src + offset)
374-
BPF_MEM | BPF_B | BPF_ST 0x72 *(uint8_t *) (dst + offset) = imm
375-
BPF_MEM | BPF_H | BPF_ST 0x6a *(uint16_t *) (dst + offset) = imm
376-
BPF_MEM | BPF_W | BPF_ST 0x62 *(uint32_t *) (dst + offset) = imm
377-
BPF_MEM | BPF_DW | BPF_ST 0x7a *(uint64_t *) (dst + offset) = imm
378-
BPF_MEM | BPF_B | BPF_STX 0x73 *(uint8_t *) (dst + offset) = src
379-
BPF_MEM | BPF_H | BPF_STX 0x6b *(uint16_t *) (dst + offset) = src
380-
BPF_MEM | BPF_W | BPF_STX 0x63 *(uint32_t *) (dst + offset) = src
381-
BPF_MEM | BPF_DW | BPF_STX 0x7b *(uint64_t *) (dst + offset) = src
382-
============================= ========= ==================================
369+
============================= ========= ====================================
370+
BPF_MEM | BPF_B | BPF_LDX 0x71 dst = \*(uint8_t \*) (src + offset)
371+
BPF_MEM | BPF_H | BPF_LDX 0x69 dst = \*(uint16_t \*) (src + offset)
372+
BPF_MEM | BPF_W | BPF_LDX 0x61 dst = \*(uint32_t \*) (src + offset)
373+
BPF_MEM | BPF_DW | BPF_LDX 0x79 dst = \*(uint64_t \*) (src + offset)
374+
BPF_MEM | BPF_B | BPF_ST 0x72 \*(uint8_t \*) (dst + offset) = imm
375+
BPF_MEM | BPF_H | BPF_ST 0x6a \*(uint16_t \*) (dst + offset) = imm
376+
BPF_MEM | BPF_W | BPF_ST 0x62 \*(uint32_t \*) (dst + offset) = imm
377+
BPF_MEM | BPF_DW | BPF_ST 0x7a \*(uint64_t \*) (dst + offset) = imm
378+
BPF_MEM | BPF_B | BPF_STX 0x73 \*(uint8_t \*) (dst + offset) = src
379+
BPF_MEM | BPF_H | BPF_STX 0x6b \*(uint16_t \*) (dst + offset) = src
380+
BPF_MEM | BPF_W | BPF_STX 0x63 \*(uint32_t \*) (dst + offset) = src
381+
BPF_MEM | BPF_DW | BPF_STX 0x7b \*(uint64_t \*) (dst + offset) = src
382+
============================= ========= ====================================
383383

384384
Atomic operations
385385
-----------------

0 commit comments

Comments
 (0)