Home
last modified time | relevance | path

Searched refs:BPF_MODIFY_RETURN (Results 1 – 9 of 9) sorted by relevance

/Linux-v5.15/kernel/bpf/
Dtrampoline.c396 case BPF_MODIFY_RETURN: in bpf_attach_type_to_tramp()
Dverifier.c6154 eatype != BPF_MODIFY_RETURN) { in check_get_func_ip()
9421 case BPF_MODIFY_RETURN: in check_return_code()
13478 case BPF_MODIFY_RETURN: in bpf_check_attach_target()
13546 } else if (prog->expected_attach_type == BPF_MODIFY_RETURN) { in bpf_check_attach_target()
Dsyscall.c2671 prog->expected_attach_type != BPF_MODIFY_RETURN) { in bpf_tracing_prog_attach()
Dbtf.c4759 case BPF_MODIFY_RETURN: in btf_ctx_access()
/Linux-v5.15/tools/bpf/bpftool/
Dcommon.c67 [BPF_MODIFY_RETURN] = "mod_ret",
/Linux-v5.15/include/uapi/linux/
Dbpf.h981 BPF_MODIFY_RETURN, enumerator
/Linux-v5.15/tools/include/uapi/linux/
Dbpf.h981 BPF_MODIFY_RETURN, enumerator
/Linux-v5.15/net/bpf/
Dtest_run.c299 case BPF_MODIFY_RETURN: in bpf_prog_test_run_tracing()
/Linux-v5.15/tools/lib/bpf/
Dlibbpf.c7955 .expected_attach_type = BPF_MODIFY_RETURN,
7968 .expected_attach_type = BPF_MODIFY_RETURN,