Home
last modified time | relevance | path

Searched refs:BPF_MOD_JUMP (Results 1 – 5 of 5) sorted by relevance

/linux-6.3-rc2/kernel/bpf/
A Dtrampoline.c356 int err = bpf_arch_text_poke(im->ip_after_call, BPF_MOD_JUMP, in bpf_tramp_image_put()
557 return bpf_arch_text_poke(tr->func.addr, BPF_MOD_JUMP, NULL, in __bpf_trampoline_link_prog()
600 err = bpf_arch_text_poke(tr->func.addr, BPF_MOD_JUMP, in __bpf_trampoline_unlink_prog()
A Darraymap.c1053 BPF_MOD_JUMP, in prog_array_map_poke_run()
1058 BPF_MOD_JUMP, in prog_array_map_poke_run()
1065 BPF_MOD_JUMP, in prog_array_map_poke_run()
1076 BPF_MOD_JUMP, in prog_array_map_poke_run()
/linux-6.3-rc2/arch/x86/net/
A Dbpf_jit_comp.c609 BPF_MOD_JUMP, NULL, in bpf_tail_call_direct_fixup()
614 BPF_MOD_JUMP, in bpf_tail_call_direct_fixup()
/linux-6.3-rc2/arch/s390/net/
A Dbpf_jit_comp.c2023 if (t == BPF_MOD_JUMP && in bpf_arch_text_poke()
/linux-6.3-rc2/include/linux/
A Dbpf.h2890 BPF_MOD_JUMP, enumerator

Completed in 24 milliseconds