Searched refs:BPF_MODIFY_RETURN (Results 1 – 12 of 12) sorted by relevance
/Linux-v6.1/tools/lib/bpf/ |
D | libbpf_probes.c | 57 opts.expected_attach_type = BPF_MODIFY_RETURN; in probe_prog_load()
|
D | bpf.c | 728 case BPF_MODIFY_RETURN: in bpf_link_create() 767 case BPF_MODIFY_RETURN: in bpf_link_create()
|
D | libbpf.c | 107 [BPF_MODIFY_RETURN] = "modify_return", 8487 SEC_DEF("fmod_ret+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF, attach_trace), 8490 SEC_DEF("fmod_ret.s+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
|
/Linux-v6.1/kernel/bpf/ |
D | trampoline.c | 115 eatype == BPF_MODIFY_RETURN)) || in bpf_prog_has_trampoline() 515 case BPF_MODIFY_RETURN: in bpf_attach_type_to_tramp()
|
D | syscall.c | 2968 prog->expected_attach_type != BPF_MODIFY_RETURN) { in bpf_tracing_prog_attach() 3441 case BPF_MODIFY_RETURN: in attach_type_to_prog_type()
|
D | verifier.c | 10625 case BPF_MODIFY_RETURN: in check_return_code() 14337 eatype == BPF_MODIFY_RETURN) { in do_misc_fixups() 14980 case BPF_MODIFY_RETURN: in bpf_check_attach_target() 15049 } else if (prog->expected_attach_type == BPF_MODIFY_RETURN) { in bpf_check_attach_target()
|
D | btf.c | 5418 case BPF_MODIFY_RETURN: in btf_ctx_access()
|
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
D | bpf_cookie.c | 444 fmod_ret_fd = bpf_link_create(prog_fd, 0, BPF_MODIFY_RETURN, &link_opts); in tracing_subtest()
|
/Linux-v6.1/tools/bpf/bpftool/ |
D | common.c | 1082 case BPF_MODIFY_RETURN: return "mod_ret"; in bpf_attach_type_input_str()
|
/Linux-v6.1/tools/include/uapi/linux/ |
D | bpf.h | 1010 BPF_MODIFY_RETURN, enumerator
|
/Linux-v6.1/include/uapi/linux/ |
D | bpf.h | 1010 BPF_MODIFY_RETURN, enumerator
|
/Linux-v6.1/net/bpf/ |
D | test_run.c | 815 case BPF_MODIFY_RETURN: in bpf_prog_test_run_tracing()
|