Searched refs:BPF_MOD_CALL (Results 1 – 5 of 5) sorted by relevance
/linux-6.3-rc2/kernel/bpf/ |
A D | trampoline.c | 203 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, NULL); in unregister_fentry() 222 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, new_addr); in modify_fentry() 248 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, NULL, new_addr); in register_fentry()
|
/linux-6.3-rc2/arch/x86/net/ |
A D | bpf_jit_comp.c | 368 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke() 378 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
|
/linux-6.3-rc2/arch/riscv/net/ |
A D | bpf_jit_comp64.c | 668 bool is_call = poke_type == BPF_MOD_CALL; in bpf_arch_text_poke()
|
/linux-6.3-rc2/arch/arm64/net/ |
A D | bpf_jit_comp.c | 2147 if (poke_type == BPF_MOD_CALL) in bpf_arch_text_poke()
|
/linux-6.3-rc2/include/linux/ |
A D | bpf.h | 2889 BPF_MOD_CALL, enumerator
|
Completed in 24 milliseconds