Home
last modified time | relevance | path

Searched refs:BPF_MOD_CALL (Results 1 – 5 of 5) sorted by relevance

/linux-6.3-rc2/kernel/bpf/
A Dtrampoline.c203 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, NULL); in unregister_fentry()
222 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, new_addr); in modify_fentry()
248 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, NULL, new_addr); in register_fentry()
/linux-6.3-rc2/arch/x86/net/
A Dbpf_jit_comp.c368 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
378 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
/linux-6.3-rc2/arch/riscv/net/
A Dbpf_jit_comp64.c668 bool is_call = poke_type == BPF_MOD_CALL; in bpf_arch_text_poke()
/linux-6.3-rc2/arch/arm64/net/
A Dbpf_jit_comp.c2147 if (poke_type == BPF_MOD_CALL) in bpf_arch_text_poke()
/linux-6.3-rc2/include/linux/
A Dbpf.h2889 BPF_MOD_CALL, enumerator

Completed in 24 milliseconds