Symbol: BPF_MODIFY_RETURN
kernel/bpf/btf.c
6231
case BPF_MODIFY_RETURN:
kernel/bpf/btf.c
6852
case BPF_MODIFY_RETURN:
kernel/bpf/syscall.c
3605
prog->expected_attach_type != BPF_MODIFY_RETURN) {
kernel/bpf/syscall.c
4393
case BPF_MODIFY_RETURN:
kernel/bpf/trampoline.c
145
eatype == BPF_MODIFY_RETURN || eatype == BPF_TRACE_FSESSION)
kernel/bpf/trampoline.c
730
case BPF_MODIFY_RETURN:
kernel/bpf/verifier.c
18054
case BPF_MODIFY_RETURN:
kernel/bpf/verifier.c
24123
eatype == BPF_MODIFY_RETURN) {
kernel/bpf/verifier.c
25174
case BPF_MODIFY_RETURN:
kernel/bpf/verifier.c
25270
} else if (prog->expected_attach_type == BPF_MODIFY_RETURN) {
kernel/bpf/verifier.c
25348
case BPF_MODIFY_RETURN:
kernel/bpf/verifier.c
25433
prog->expected_attach_type == BPF_MODIFY_RETURN) &&
net/bpf/test_run.c
701
case BPF_MODIFY_RETURN:
tools/bpf/bpftool/common.c
1193
case BPF_MODIFY_RETURN: return "mod_ret";
tools/lib/bpf/bpf.c
796
case BPF_MODIFY_RETURN:
tools/lib/bpf/bpf.c
920
case BPF_MODIFY_RETURN:
tools/lib/bpf/libbpf.c
117
[BPF_MODIFY_RETURN] = "modify_return",
tools/lib/bpf/libbpf.c
9867
SEC_DEF("fmod_ret+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF, attach_trace),
tools/lib/bpf/libbpf.c
9870
SEC_DEF("fmod_ret.s+", TRACING, BPF_MODIFY_RETURN, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_trace),
tools/lib/bpf/libbpf_probes.c
140
opts.expected_attach_type = BPF_MODIFY_RETURN;
tools/testing/selftests/bpf/prog_tests/bpf_cookie.c
541
fmod_ret_fd = bpf_link_create(prog_fd, 0, BPF_MODIFY_RETURN, &link_opts);
tools/testing/selftests/bpf/verifier/sleepable.c
34
.expected_attach_type = BPF_MODIFY_RETURN,