Searched refs:BPF_ARSH (Results 1 – 8 of 8) sorted by relevance
/linux-4.4.14/arch/x86/net/ |
D | bpf_jit_comp.c | 586 case BPF_ALU | BPF_ARSH | BPF_K: in do_jit() 589 case BPF_ALU64 | BPF_ARSH | BPF_K: in do_jit() 598 case BPF_ARSH: b3 = 0xF8; break; in do_jit() 605 case BPF_ALU | BPF_ARSH | BPF_X: in do_jit() 608 case BPF_ALU64 | BPF_ARSH | BPF_X: in do_jit() 633 case BPF_ARSH: b3 = 0xF8; break; in do_jit()
|
/linux-4.4.14/include/uapi/linux/ |
D | bpf.h | 24 #define BPF_ARSH 0xc0 /* sign extending arithmetic shift right */ macro
|
/linux-4.4.14/arch/arm64/net/ |
D | bpf_jit_comp.c | 340 case BPF_ALU | BPF_ARSH | BPF_X: in build_insn() 341 case BPF_ALU64 | BPF_ARSH | BPF_X: in build_insn() 453 case BPF_ALU | BPF_ARSH | BPF_K: in build_insn() 454 case BPF_ALU64 | BPF_ARSH | BPF_K: in build_insn()
|
/linux-4.4.14/kernel/bpf/ |
D | core.c | 247 [BPF_ALU64 | BPF_ARSH | BPF_X] = &&ALU64_ARSH_X, in __bpf_prog_run() 248 [BPF_ALU64 | BPF_ARSH | BPF_K] = &&ALU64_ARSH_K, in __bpf_prog_run()
|
D | verifier.c | 292 [BPF_ARSH >> 4] = "s>>=", 1136 opcode == BPF_ARSH) && BPF_SRC(insn->code) == BPF_K) { in check_alu_op()
|
/linux-4.4.14/arch/s390/net/ |
D | bpf_jit_comp.c | 817 case BPF_ALU64 | BPF_ARSH | BPF_X: /* ((s64) dst) >>= src */ in bpf_jit_insn() 821 case BPF_ALU64 | BPF_ARSH | BPF_K: /* ((s64) dst) >>= imm */ in bpf_jit_insn()
|
/linux-4.4.14/lib/ |
D | test_bpf.c | 1667 BPF_ALU64_IMM(BPF_ARSH, R1, 32), 1724 BPF_ALU64_REG(BPF_ARSH, R0, R3), 3675 BPF_ALU64_REG(BPF_ARSH, R0, R1), 3687 BPF_ALU64_IMM(BPF_ARSH, R0, 40),
|
/linux-4.4.14/Documentation/networking/ |
D | filter.txt | 895 BPF_ARSH 0xc0 /* eBPF only: sign extending shift right */
|