Searched refs:bpf_prog_detach (Results 1 – 13 of 13) sorted by relevance
/linux-6.6.21/tools/testing/selftests/bpf/prog_tests/ |
D | cgroup_attach_override.c | 72 if (CHECK(bpf_prog_detach(bar, BPF_CGROUP_INET_EGRESS), in serial_test_cgroup_attach_override() 87 if (CHECK(bpf_prog_detach(foo, BPF_CGROUP_INET_EGRESS), in serial_test_cgroup_attach_override() 106 if (CHECK(bpf_prog_detach(bar, BPF_CGROUP_INET_EGRESS), in serial_test_cgroup_attach_override() 111 if (CHECK(!bpf_prog_detach(foo, BPF_CGROUP_INET_EGRESS), in serial_test_cgroup_attach_override()
|
/linux-6.6.21/tools/testing/selftests/bpf/ |
D | flow_dissector_load.c | 49 ret = bpf_prog_detach(0, BPF_FLOW_DISSECTOR); in detach_program()
|
D | test_tcpnotify_user.c | 163 bpf_prog_detach(cg_fd, BPF_CGROUP_SOCK_OPS); in main()
|
D | test_maps.c | 801 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_PARSER); in test_sockmap() 807 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_VERDICT); in test_sockmap() 813 err = bpf_prog_detach(fd, BPF_SK_MSG_VERDICT); in test_sockmap() 819 err = bpf_prog_detach(fd, __MAX_BPF_ATTACH_TYPE); in test_sockmap()
|
D | test_sock.c | 512 bpf_prog_detach(cgfd, test->attach_type); in run_test_case()
|
D | test_sock_addr.c | 1382 bpf_prog_detach(cgfd, test->attach_type); in run_test_case()
|
D | test_sysctl.c | 1589 bpf_prog_detach(cgfd, atype); in run_test_case()
|
/linux-6.6.21/samples/bpf/ |
D | test_cgrp2_attach.c | 170 ret = bpf_prog_detach(cg_fd, type); in main()
|
D | test_cgrp2_sock.c | 284 ret = bpf_prog_detach(cg_fd, BPF_CGROUP_INET_SOCK_CREATE); in main()
|
/linux-6.6.21/tools/lib/bpf/ |
D | libbpf.map | 36 bpf_prog_detach;
|
D | bpf.h | 317 LIBBPF_API int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type);
|
D | bpf.c | 707 int bpf_prog_detach(int target_fd, enum bpf_attach_type type) in bpf_prog_detach() function
|
/linux-6.6.21/kernel/bpf/ |
D | syscall.c | 3907 static int bpf_prog_detach(const union bpf_attr *attr) in bpf_prog_detach() function 5397 err = bpf_prog_detach(&attr); in __sys_bpf()
|