Searched refs:BPF_MODIFY_RETURN (Results 1 - 13 of 13) sorted by relevance

/linux-master/tools/testing/selftests/bpf/verifier/
H A Dsleepable.c34 .expected_attach_type = BPF_MODIFY_RETURN,
/linux-master/tools/lib/bpf/
H A Dlibbpf_probes.c140 opts.expected_attach_type = BPF_MODIFY_RETURN;
H A Dbpf.c790 case BPF_MODIFY_RETURN:
869 case BPF_MODIFY_RETURN:
H A Dlibbpf.c116 [BPF_MODIFY_RETURN] = "modify_return",
9275 SEC_DEF("fmod_ret+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF, attach_trace),
9278 SEC_DEF("fmod_ret.s+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
/linux-master/kernel/bpf/
H A Dtrampoline.c114 eatype == BPF_MODIFY_RETURN)) ||
507 case BPF_MODIFY_RETURN:
H A Dsyscall.c3320 prog->expected_attach_type != BPF_MODIFY_RETURN) {
3951 case BPF_MODIFY_RETURN:
H A Dbtf.c5881 case BPF_MODIFY_RETURN:
6237 * While the LSM programs are BPF_MODIFY_RETURN-like
6250 case BPF_MODIFY_RETURN:
6251 /* For now the BPF_MODIFY_RETURN can only be attached to
H A Dverifier.c15475 case BPF_MODIFY_RETURN:
20098 eatype == BPF_MODIFY_RETURN) {
20915 case BPF_MODIFY_RETURN:
21005 } else if (prog->expected_attach_type == BPF_MODIFY_RETURN) {
21056 case BPF_MODIFY_RETURN:
/linux-master/tools/testing/selftests/bpf/prog_tests/
H A Dbpf_cookie.c520 fmod_ret_fd = bpf_link_create(prog_fd, 0, BPF_MODIFY_RETURN, &link_opts);
/linux-master/tools/bpf/bpftool/
H A Dcommon.c1091 case BPF_MODIFY_RETURN: return "mod_ret";
/linux-master/include/uapi/linux/
H A Dbpf.h1088 BPF_MODIFY_RETURN, enumerator in enum:bpf_attach_type
5402 * **-EOPNOTSUPP** for tracing programs other than BPF_TRACE_FEXIT or BPF_MODIFY_RETURN.
/linux-master/tools/include/uapi/linux/
H A Dbpf.h1088 BPF_MODIFY_RETURN, enumerator in enum:bpf_attach_type
5402 * **-EOPNOTSUPP** for tracing programs other than BPF_TRACE_FEXIT or BPF_MODIFY_RETURN.
/linux-master/net/bpf/
H A Dtest_run.c689 case BPF_MODIFY_RETURN:

Completed in 475 milliseconds