Home
last modified time | relevance | path

Searched refs:tailcall_target (Results 1 – 3 of 3) sorted by relevance

/linux-6.6.21/arch/x86/net/
Dbpf_jit_comp.c567 poke->tailcall_target = ip + ctx->tail_call_direct_label - X86_PATCH_SIZE; in emit_bpf_tail_call_direct()
568 poke->bypass_addr = (u8 *)poke->tailcall_target + X86_PATCH_SIZE; in emit_bpf_tail_call_direct()
570 emit_jump(&prog, (u8 *)poke->tailcall_target + X86_PATCH_SIZE, in emit_bpf_tail_call_direct()
608 ret = __bpf_arch_text_poke(poke->tailcall_target, in bpf_tail_call_direct_fixup()
615 (u8 *)poke->tailcall_target + in bpf_tail_call_direct_fixup()
2949 ret = __bpf_arch_text_poke(poke->tailcall_target, in bpf_arch_poke_desc_update()
2972 ret = __bpf_arch_text_poke(poke->tailcall_target, in bpf_arch_poke_desc_update()
/linux-6.6.21/include/linux/
Dbpf.h1359 void *tailcall_target; member
/linux-6.6.21/kernel/bpf/
Dcore.c809 if (poke->tailcall_target || poke->tailcall_target_stable || in bpf_jit_add_poke_descriptor()