Searched refs:bpf_prog_detach (Results 1 – 11 of 11) sorted by relevance
/Linux-v4.19/samples/bpf/ |
D | test_cgrp2_attach2.c | 115 if (bpf_prog_detach(bar, BPF_CGROUP_INET_EGRESS)) { in test_foo_bar() 130 if (bpf_prog_detach(foo, BPF_CGROUP_INET_EGRESS)) { in test_foo_bar() 151 if (bpf_prog_detach(bar, BPF_CGROUP_INET_EGRESS)) { in test_foo_bar() 156 if (!bpf_prog_detach(foo, BPF_CGROUP_INET_EGRESS)) { in test_foo_bar()
|
D | load_sock_ops.c | 50 error = bpf_prog_detach(cg_fd, BPF_CGROUP_SOCK_OPS); in main()
|
D | test_cgrp2_attach.c | 165 ret = bpf_prog_detach(cg_fd, type); in main()
|
D | test_cgrp2_sock.c | 280 ret = bpf_prog_detach(cg_fd, BPF_CGROUP_INET_SOCK_CREATE); in main()
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_tcpbpf_user.c | 127 bpf_prog_detach(cg_fd, BPF_CGROUP_SOCK_OPS); in main()
|
D | test_maps.c | 619 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_PARSER); in test_sockmap() 625 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_VERDICT); in test_sockmap() 631 err = bpf_prog_detach(fd, BPF_SK_MSG_VERDICT); in test_sockmap() 637 err = bpf_prog_detach(fd, __MAX_BPF_ATTACH_TYPE); in test_sockmap() 921 err = bpf_prog_detach(map_fd_rx, __MAX_BPF_ATTACH_TYPE); in test_sockmap() 927 err = bpf_prog_detach(map_fd_rx, BPF_SK_SKB_STREAM_PARSER); in test_sockmap() 933 err = bpf_prog_detach(map_fd_rx, BPF_SK_SKB_STREAM_VERDICT); in test_sockmap()
|
D | test_sock.c | 430 bpf_prog_detach(cgfd, test->attach_type); in run_test_case()
|
D | test_sock_addr.c | 1340 bpf_prog_detach(cgfd, test->attach_type); in run_test_case()
|
/Linux-v4.19/tools/lib/bpf/ |
D | bpf.h | 95 int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type);
|
D | bpf.c | 347 int bpf_prog_detach(int target_fd, enum bpf_attach_type type) in bpf_prog_detach() function
|
/Linux-v4.19/kernel/bpf/ |
D | syscall.c | 1651 static int bpf_prog_detach(const union bpf_attr *attr) in bpf_prog_detach() function 2384 err = bpf_prog_detach(&attr); in SYSCALL_DEFINE3()
|