Home
last modified time | relevance | path

Searched refs:BPF_MODIFY_RETURN (Results 1 – 12 of 12) sorted by relevance

/Linux-v6.1/tools/lib/bpf/
Dlibbpf_probes.c57 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load()
Dbpf.c728 case BPF_MODIFY_RETURN: in bpf_link_create()
767 case BPF_MODIFY_RETURN: in bpf_link_create()
Dlibbpf.c107 [BPF_MODIFY_RETURN] = "modify_return",
8487 SEC_DEF("fmod_ret+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF, attach_trace),
8490 SEC_DEF("fmod_ret.s+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
/Linux-v6.1/kernel/bpf/
Dtrampoline.c115 eatype == BPF_MODIFY_RETURN)) || in bpf_prog_has_trampoline()
515 case BPF_MODIFY_RETURN: in bpf_attach_type_to_tramp()
Dsyscall.c2968 prog->expected_attach_type != BPF_MODIFY_RETURN) { in bpf_tracing_prog_attach()
3441 case BPF_MODIFY_RETURN: in attach_type_to_prog_type()
Dverifier.c10625 case BPF_MODIFY_RETURN: in check_return_code()
14337 eatype == BPF_MODIFY_RETURN) { in do_misc_fixups()
14980 case BPF_MODIFY_RETURN: in bpf_check_attach_target()
15049 } else if (prog->expected_attach_type == BPF_MODIFY_RETURN) { in bpf_check_attach_target()
Dbtf.c5418 case BPF_MODIFY_RETURN: in btf_ctx_access()
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/
Dbpf_cookie.c444 fmod_ret_fd = bpf_link_create(prog_fd, 0, BPF_MODIFY_RETURN, &link_opts); in tracing_subtest()
/Linux-v6.1/tools/bpf/bpftool/
Dcommon.c1082 case BPF_MODIFY_RETURN: return "mod_ret"; in bpf_attach_type_input_str()
/Linux-v6.1/tools/include/uapi/linux/
Dbpf.h1010 BPF_MODIFY_RETURN, enumerator
/Linux-v6.1/include/uapi/linux/
Dbpf.h1010 BPF_MODIFY_RETURN, enumerator
/Linux-v6.1/net/bpf/
Dtest_run.c815 case BPF_MODIFY_RETURN: in bpf_prog_test_run_tracing()