Searched refs:BPF_MOD_JUMP (Results 1 – 5 of 5) sorted by relevance
/linux-6.3-rc2/kernel/bpf/ |
A D | trampoline.c | 356 int err = bpf_arch_text_poke(im->ip_after_call, BPF_MOD_JUMP, in bpf_tramp_image_put() 557 return bpf_arch_text_poke(tr->func.addr, BPF_MOD_JUMP, NULL, in __bpf_trampoline_link_prog() 600 err = bpf_arch_text_poke(tr->func.addr, BPF_MOD_JUMP, in __bpf_trampoline_unlink_prog()
|
A D | arraymap.c | 1053 BPF_MOD_JUMP, in prog_array_map_poke_run() 1058 BPF_MOD_JUMP, in prog_array_map_poke_run() 1065 BPF_MOD_JUMP, in prog_array_map_poke_run() 1076 BPF_MOD_JUMP, in prog_array_map_poke_run()
|
/linux-6.3-rc2/arch/x86/net/ |
A D | bpf_jit_comp.c | 609 BPF_MOD_JUMP, NULL, in bpf_tail_call_direct_fixup() 614 BPF_MOD_JUMP, in bpf_tail_call_direct_fixup()
|
/linux-6.3-rc2/arch/s390/net/ |
A D | bpf_jit_comp.c | 2023 if (t == BPF_MOD_JUMP && in bpf_arch_text_poke()
|
/linux-6.3-rc2/include/linux/ |
A D | bpf.h | 2890 BPF_MOD_JUMP, enumerator
|
Completed in 24 milliseconds