Home
last modified time | relevance | path

Searched refs:ip_after_call (Results 1 – 6 of 6) sorted by relevance

/linux-6.6.21/kernel/bpf/ !
Dtrampoline.c296 if (im->ip_after_call) in __bpf_tramp_image_put_rcu_tasks()
332 if (im->ip_after_call) { in bpf_tramp_image_put()
333 int err = bpf_arch_text_poke(im->ip_after_call, BPF_MOD_JUMP, in bpf_tramp_image_put()
/linux-6.6.21/arch/s390/net/ !
Dbpf_jit_comp.c2433 im->ip_after_call = jit->prg_buf + jit->prg; in __arch_prepare_bpf_trampoline()
/linux-6.6.21/arch/riscv/net/ !
Dbpf_jit_comp64.c963 im->ip_after_call = ctx->insns + ctx->ninsns; in __arch_prepare_bpf_trampoline()
/linux-6.6.21/arch/arm64/net/ !
Dbpf_jit_comp.c1973 im->ip_after_call = ctx->image + ctx->idx; in prepare_trampoline()
/linux-6.6.21/arch/x86/net/ !
Dbpf_jit_comp.c2542 im->ip_after_call = prog; in arch_prepare_bpf_trampoline()
/linux-6.6.21/include/linux/ !
Dbpf.h1127 void *ip_after_call; member