Home
last modified time | relevance | path

Searched refs:BPF_MOD_CALL (Results 1 – 7 of 7) sorted by relevance

/linux/arch/powerpc/net/
H A Dbpf_jit_comp.c1321 if (old_t == BPF_MOD_CALL || new_t == BPF_MOD_CALL) { in bpf_arch_text_poke()
1355 branch_flags = old_t == BPF_MOD_CALL ? BRANCH_SET_LINK : 0; in bpf_arch_text_poke()
1364 branch_flags = new_t == BPF_MOD_CALL ? BRANCH_SET_LINK : 0; in bpf_arch_text_poke()
/linux/kernel/bpf/
H A Dtrampoline.c373 enum bpf_text_poke_type new_t = BPF_MOD_CALL, old_t = BPF_MOD_CALL; in bpf_trampoline_update_fentry()
/linux/arch/riscv/net/
H A Dbpf_jit_comp64.c867 is_call = old_t == BPF_MOD_CALL; in bpf_arch_text_poke()
875 is_call = new_t == BPF_MOD_CALL; in bpf_arch_text_poke()
/linux/arch/loongarch/net/
H A Dbpf_jit.c1589 is_call = old_t == BPF_MOD_CALL; in bpf_arch_text_poke()
1597 is_call = new_t == BPF_MOD_CALL; in bpf_arch_text_poke()
/linux/arch/arm64/net/
H A Dbpf_jit_comp.c2988 branch_type = old_t == BPF_MOD_CALL ? AARCH64_INSN_BRANCH_LINK : in bpf_arch_text_poke()
2993 branch_type = new_t == BPF_MOD_CALL ? AARCH64_INSN_BRANCH_LINK : in bpf_arch_text_poke()
/linux/arch/x86/net/
H A Dbpf_jit_comp.c604 ret = old_t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
614 ret = new_t == BPF_MOD_CALL ? in __bpf_arch_text_poke()
/linux/include/linux/
H A Dbpf.h3851 BPF_MOD_CALL, enumerator