Searched refs:BPF_MOD_CALL (Results 1 – 5 of 5) sorted by relevance
| /Linux-v6.6/kernel/bpf/ |
| D | trampoline.c | 182 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, NULL); in unregister_fentry() 199 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, new_addr); in modify_fentry() 222 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, NULL, new_addr); in register_fentry()
|
| /Linux-v6.6/arch/x86/net/ |
| D | bpf_jit_comp.c | 368 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke() 378 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
|
| /Linux-v6.6/arch/riscv/net/ |
| D | bpf_jit_comp64.c | 673 bool is_call = poke_type == BPF_MOD_CALL; in bpf_arch_text_poke()
|
| /Linux-v6.6/arch/arm64/net/ |
| D | bpf_jit_comp.c | 2214 if (poke_type == BPF_MOD_CALL) in bpf_arch_text_poke()
|
| /Linux-v6.6/include/linux/ |
| D | bpf.h | 3130 BPF_MOD_CALL, enumerator
|