angler-fishThe Vulnerability History Project

bpf: free up BPF_JMP | BPF_CALL | BPF_X opcode

      free up BPF_JMP | BPF_CALL | BPF_X opcode to be used by actual
indirect call by register and use kernel internal opcode to
mark call instruction into bpf_tail_call() helper.

Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
    
commit 71189fa9b092ef125ee741eccb2f5fa916798afd
+1 -1
+1 -1
+1 -1
+1 -1
+1 -1
+3
+1 -1
+1 -1
expand_less