Home
last modified time | relevance | path

Searched refs:BPF_MOD_CALL (Results 1 – 5 of 5) sorted by relevance

/Linux-v6.6/kernel/bpf/
Dtrampoline.c182 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, NULL); in unregister_fentry()
199 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, old_addr, new_addr); in modify_fentry()
222 ret = bpf_arch_text_poke(ip, BPF_MOD_CALL, NULL, new_addr); in register_fentry()
/Linux-v6.6/arch/x86/net/
Dbpf_jit_comp.c368 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
378 ret = t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
/Linux-v6.6/arch/riscv/net/
Dbpf_jit_comp64.c673 bool is_call = poke_type == BPF_MOD_CALL; in bpf_arch_text_poke()
/Linux-v6.6/arch/arm64/net/
Dbpf_jit_comp.c2214 if (poke_type == BPF_MOD_CALL) in bpf_arch_text_poke()
/Linux-v6.6/include/linux/
Dbpf.h3130 BPF_MOD_CALL, enumerator