/Linux-v6.1/LICENSES/preferred/ |
D | GPL-2.0 | 35 Foundation's software and to any other program whose authors commit to 52 For example, if you distribute copies of such a program, whether 69 Finally, any free program is threatened constantly by software 71 program will individually obtain patent licenses, in effect making the 72 program proprietary. To prevent this, we have made it clear that any 81 0. This License applies to any program or other work which contains 83 under the terms of this General Public License. The "Program", below, 84 refers to any such program or work, and a "work based on the Program" 85 means either the Program or any derivative work under copyright law: 86 that is to say, a work containing the Program or a portion of it, [all …]
|
/Linux-v6.1/tools/usb/usbip/ |
D | COPYING | 16 Foundation's software and to any other program whose authors commit to 33 For example, if you distribute copies of such a program, whether 50 Finally, any free program is threatened constantly by software 52 program will individually obtain patent licenses, in effect making the 53 program proprietary. To prevent this, we have made it clear that any 62 0. This License applies to any program or other work which contains 64 under the terms of this General Public License. The "Program", below, 65 refers to any such program or work, and a "work based on the Program" 66 means either the Program or any derivative work under copyright law: 67 that is to say, a work containing the Program or a portion of it, [all …]
|
/Linux-v6.1/LICENSES/deprecated/ |
D | GPL-1.0 | 28 software and to any other program whose authors commit to using it. 43 For example, if you distribute copies of a such a program, whether 65 0. This License Agreement applies to any program or other work which 68 "Program", below, refers to any such program or work, and a "work based 69 on the Program" means either the Program or any work containing the 70 Program or a portion of it, either verbatim or with modifications. Each 73 1. You may copy and distribute verbatim copies of the Program's source 78 other recipients of the Program a copy of this General Public License 79 along with the Program. You may charge a fee for the physical act of 82 2. You may modify your copy or copies of the Program or any portion of [all …]
|
/Linux-v6.1/Documentation/bpf/ |
D | bpf_prog_run.rst | 19 execute a BPF program in the kernel and return the results to userspace. This 44 object and (for program types operating on network packets) a buffer containing 45 the packet data that the BPF program will operate on. The kernel will then 46 execute the program and return the results to userspace. Note that programs will 48 will not actually be redirected or dropped, the program return code will just be 57 be processed by the kernel after the execution of the XDP program as if they 59 ``BPF_F_TEST_XDP_LIVE_FRAMES`` flag when supplying an XDP program to 63 XDP program many times (suitable for, e.g., running as a traffic generator), 67 - When executing an XDP program in live frame mode, the result of the execution 69 operation indicated by the program's return code (drop the packet, redirect [all …]
|
D | map_cgroup_storage.rst | 11 storage is identified by the cgroup the program is attached to. 13 The map provide a local storage at the cgroup that the BPF program is attached 34 ``attach_type`` is the program's attach type. 42 To access the storage in a program, use ``bpf_get_local_storage``:: 67 int program(struct __sk_buff *skb) 102 int program(struct __sk_buff *skb) 131 for a single ``CGROUP_STORAGE`` map, there can be at most one program loaded 132 that uses the map. A program may be attached to multiple cgroups or have 137 non-per-CPU) and the BPF program during load verification time. As a result, 138 each map can only be used by one BPF program and each BPF program can only use [all …]
|
D | prog_sk_lookup.rst | 4 BPF sk_lookup program 7 BPF sk_lookup program type (``BPF_PROG_TYPE_SK_LOOKUP``) introduces programmability 11 When invoked BPF sk_lookup program can select a socket that will receive the 19 BPF sk_lookup program type was introduced to address setup scenarios where 36 BPF sk_lookup program can be attached to a network namespace with 53 verdict code. As for other BPF program types that are network filters, 58 A BPF sk_lookup program can also select a socket to receive the packet by 59 calling ``bpf_sk_assign()`` BPF helper. Typically, the program looks up a socket 62 selection. Selecting a socket only takes effect if the program has terminated 68 1. If any program returned ``SK_PASS`` and selected a valid socket, the socket [all …]
|
D | prog_cgroup_sockopt.rst | 7 ``BPF_PROG_TYPE_CGROUP_SOCKOPT`` program type can be attached to two 26 If BPF program sets ``optlen`` to -1, the control will be returned 38 * ``1`` - success, continue with next BPF program in the cgroup chain. 62 the BPF program from the parent cgroup). 76 the programs are executed from the bottom up: B, A. First program 79 control will be passed to the second (A) program which will see the 82 Same for ``BPF_CGROUP_SETSOCKOPT``: if the program is attached to 85 then the next program in the chain (A) will see those changes, 91 When the ``optval`` is greater than the ``PAGE_SIZE``, the BPF program 96 done by the BPF program to the ``optval`` are ignored. [all …]
|
D | prog_cgroup_sysctl.rst | 7 This document describes ``BPF_PROG_TYPE_CGROUP_SYSCTL`` program type that 17 ``BPF_PROG_TYPE_CGROUP_SYSCTL`` program to a cgroup. 23 BPF program:: 49 ``BPF_PROG_TYPE_CGROUP_SYSCTL`` program must return one of the following 55 If program returns ``0`` user space will get ``-1`` from ``read(2)`` or 65 ``/proc/sys`` into provided by BPF program buffer; 68 sysctl into provided by BPF program buffer. This helper is available on both 78 has to be overridden BPF program can set ``file_pos`` to zero before calling 83 BPF program sees sysctl value same way as user space does in proc filesystem, 98 See `test_sysctl_prog.c`_ for an example of BPF program in C that access [all …]
|
D | prog_lsm.rst | 15 The example shows an eBPF program that can be attached to the ``file_mprotect`` 24 headers for accessing information from the attached eBPF program's context. 25 They can simply declare the structures in the eBPF program and only specify 61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must 63 * ``mprotect_audit`` is the name of the eBPF program 71 /* ret is the return value from the previous BPF program 93 eBPF program. 114 and the program can be loaded by including ``my_prog.skel.h`` and using 124 The program can be detached from the LSM hook by *destroying* the ``link`` 133 An example eBPF program can be found in
|
D | verifier.rst | 6 The safety of the eBPF program is determined in two steps. 16 At the start of the program the register R1 contains a pointer to context 30 will be rejected, since R2 is unreadable at the start of the program. 44 is a correct program. If there was R1 instead of R6, it would have 60 A callback is used to customize verifier to restrict eBPF program access to only 70 the verifier will reject the program. 75 The verifier will allow eBPF program to read data from stack only after 84 is invalid program. 99 If a function made accessible to eBPF program, it needs to be thought through 113 In order to determine the safety of an eBPF program, the verifier must track [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
D | xdp_devmap_attach.c | 30 if (!ASSERT_OK(err, "Generic attach of program with 8-byte devmap")) in test_xdp_with_devmap_helpers() 34 ASSERT_OK(err, "XDP program detach"); in test_xdp_with_devmap_helpers() 44 ASSERT_OK(err, "Add program to devmap entry"); in test_xdp_with_devmap_helpers() 48 ASSERT_EQ(info.id, val.bpf_prog.id, "Match program id to devmap entry prog_id"); in test_xdp_with_devmap_helpers() 50 /* can not attach BPF_XDP_DEVMAP program to a device */ in test_xdp_with_devmap_helpers() 52 if (!ASSERT_NEQ(err, 0, "Attach of BPF_XDP_DEVMAP program")) in test_xdp_with_devmap_helpers() 58 ASSERT_NEQ(err, 0, "Add non-BPF_XDP_DEVMAP program to devmap entry"); in test_xdp_with_devmap_helpers() 60 /* Try to attach BPF_XDP program with frags to devmap when we have in test_xdp_with_devmap_helpers() 61 * already loaded a BPF_XDP program on the map in test_xdp_with_devmap_helpers() 67 ASSERT_NEQ(err, 0, "Add BPF_XDP program with frags to devmap entry"); in test_xdp_with_devmap_helpers() [all …]
|
D | xdp_cpumap_attach.c | 28 if (!ASSERT_OK(err, "Generic attach of program with 8-byte CPUMAP")) in test_xdp_with_cpumap_helpers() 32 ASSERT_OK(err, "XDP program detach"); in test_xdp_with_cpumap_helpers() 42 ASSERT_OK(err, "Add program to cpumap entry"); in test_xdp_with_cpumap_helpers() 46 ASSERT_EQ(info.id, val.bpf_prog.id, "Match program id to cpumap entry prog_id"); in test_xdp_with_cpumap_helpers() 48 /* can not attach BPF_XDP_CPUMAP program to a device */ in test_xdp_with_cpumap_helpers() 50 if (!ASSERT_NEQ(err, 0, "Attach of BPF_XDP_CPUMAP program")) in test_xdp_with_cpumap_helpers() 56 ASSERT_NEQ(err, 0, "Add non-BPF_XDP_CPUMAP program to cpumap entry"); in test_xdp_with_cpumap_helpers() 58 /* Try to attach BPF_XDP program with frags to cpumap when we have in test_xdp_with_cpumap_helpers() 59 * already loaded a BPF_XDP program on the map in test_xdp_with_cpumap_helpers() 65 ASSERT_NEQ(err, 0, "Add BPF_XDP program with frags to cpumap entry"); in test_xdp_with_cpumap_helpers() [all …]
|
D | xdp_bonding.c | 7 * and verifies that XDP_TX program loaded on a bond device 111 if (!ASSERT_OK_PTR(link, "attach xdp program")) in xdp_attach() 180 /* Load a dummy program on sending side as with veth peer needs to have a in bonding_setup() 181 * XDP program loaded as well. in bonding_setup() 405 /* enslaving with a XDP program loaded is allowed */ in test_xdp_bonding_attach() 407 if (!ASSERT_OK_PTR(link, "attach program to veth")) in test_xdp_bonding_attach() 417 /* attaching to slave when master has no program is allowed */ in test_xdp_bonding_attach() 419 if (!ASSERT_OK_PTR(link, "attach program to slave when enslaved")) in test_xdp_bonding_attach() 422 /* attaching to master not allowed when slave has program loaded */ in test_xdp_bonding_attach() 424 if (!ASSERT_ERR_PTR(link2, "attach program to master when slave has program")) in test_xdp_bonding_attach() [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/ |
D | DENYLIST.s390x | 10 d_path # failed to auto-attach program 'prog_stat': -524 … 41 task_local_storage # failed to auto-attach program 'trace_exit_creds': -524 … 43 test_bprm_opts # failed to auto-attach program 'secure_exec': -524 … 44 test_ima # failed to auto-attach program 'ima': -524 … 45 test_local_storage # failed to auto-attach program 'unlink_hook': -524 … 49 timer # failed to auto-attach program 'test1': -524 … 51 timer_mim # failed to auto-attach program 'test1': -524 … 52 trace_ext # failed to auto-attach program 'test_pkt_md_access_new': … 57 vmlinux # failed to auto-attach program 'handle__fentry': -524 … 59 xdp_bonding # failed to auto-attach program 'trace_on_entry': -524 … [all …]
|
D | test_offload.py | 10 # THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" 14 # OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME 200 …raise Exception("Time out waiting for program counts to stabilize want %d, have %d" % (expected, n… 466 …raise Exception("Time out waiting for program counts to stabilize want %d/%d, have %d bound, %d lo… 498 "XDP program not reporting in iplink (reported %s, expected %s)" % 648 fail(dev != m["dev"], "Map's device different than program's") 673 fail("prog" in two_xdps, "Base program reported in multi program mode") 675 "Wrong attached program count with two programs") 697 fail("prog" not in xdp, "Base program not reported in single program mode") 699 "Wrong attached program count with one program") [all …]
|
/Linux-v6.1/include/uapi/linux/ |
D | auxvec.h | 11 #define AT_EXECFD 2 /* file descriptor of program */ 12 #define AT_PHDR 3 /* program headers for program */ 13 #define AT_PHENT 4 /* size of program header entry */ 14 #define AT_PHNUM 5 /* number of program headers */ 18 #define AT_ENTRY 9 /* entry point of program */ 19 #define AT_NOTELF 10 /* program is not ELF */ 34 #define AT_EXECFN 31 /* filename of program */
|
/Linux-v6.1/drivers/pwm/ |
D | pwm-stmpe.c | 104 u16 program[3] = { in stmpe_24xx_pwm_config() local 157 program[0] = SMAX; /* off all the time */ in stmpe_24xx_pwm_config() 160 program[0] = LOAD | 0xff; /* LOAD 0xff */ in stmpe_24xx_pwm_config() 165 program[0] = SMIN; /* on all the time */ in stmpe_24xx_pwm_config() 168 program[0] = LOAD | 0x00; /* LOAD 0x00 */ in stmpe_24xx_pwm_config() 191 /* Run the old program */ in stmpe_24xx_pwm_config() 198 program[0] = LOAD | value; in stmpe_24xx_pwm_config() 199 program[1] = 0x0000; in stmpe_24xx_pwm_config() 201 /* STMPE2401 need a complex program */ in stmpe_24xx_pwm_config() 212 program[0] = PRESCALE_512 | STEPTIME_1 | incdec; in stmpe_24xx_pwm_config() [all …]
|
/Linux-v6.1/drivers/comedi/drivers/ |
D | dt2815.c | 28 * [4] - Firmware program configuration 29 * 0 == program 1 (see manual table 5-4) 30 * 1 == program 2 (see manual table 5-4) 31 * 2 == program 3 (see manual table 5-4) 32 * 3 == program 4 (see manual table 5-4) 124 * options[4] Firmware program configuration 125 * 0 == program 1 (see manual table 5-4) 126 * 1 == program 2 (see manual table 5-4) 127 * 2 == program 3 (see manual table 5-4) 128 * 3 == program 4 (see manual table 5-4) [all …]
|
/Linux-v6.1/tools/lib/bpf/ |
D | libbpf.h | 41 LIBBPF_ERRNO__LOAD, /* Load program failure for unknown reason */ 42 LIBBPF_ERRNO__VERIFY, /* Kernel verifier blocks program loading */ 43 LIBBPF_ERRNO__PROG2BIG, /* Program too big */ 45 LIBBPF_ERRNO__PROGTYPE, /* Kernel doesn't support this program type */ 82 * @brief **libbpf_bpf_prog_type_str()** converts the provided program type 84 * @param t The program type. 85 * @return Pointer to a static string identifying the program type. NULL is 145 * with bpf_program__set_log() on per-program level, to get 152 * per-program buffer with bpf_program__set_log_buf() to preserve each 153 * individual program's verification log. Keep using kernel_log_buf [all …]
|
/Linux-v6.1/Documentation/admin-guide/nfs/ |
D | nfs-idmapper.rst | 29 ``#OP TYPE DESCRIPTION CALLOUT INFO PROGRAM ARG1 ARG2 ARG3 ...`` 34 This will direct all id_resolver requests to the program /usr/sbin/nfs.idmap. 47 program. If you would like to use your own program for a uid lookup then you 50 ``#OP TYPE DESCRIPTION CALLOUT INFO PROGRAM ARG1 ARG2 ARG3 ...`` 52 ``create id_resolver uid:* * /some/other/program %k %d 600`` 56 Notice that the new line was added above the line for the generic program. 57 request-key will find the first matching line and corresponding program. In 58 this case, /some/other/program will handle all uid lookups and 69 hand". This program takes two arguments, a serialized key and a key
|
/Linux-v6.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-cgroup.rst | 52 Output will start with program ID followed by attach type, 53 attach flags and program name. 66 program ID, attach type, attach flags and program name. 73 Attach program *PROG* to the cgroup *CGROUP* with attach type 77 some bpf program, the program in this cgroup yields to sub-cgroup 78 program; **multi** if a sub-cgroup installs some bpf program, 79 that cgroup program gets run in addition to the program in this 82 Only one program is allowed to be attached to a cgroup with 84 program will release old program and attach the new one.
|
/Linux-v6.1/include/trace/events/ |
D | sunrpc.h | 146 const char *program, 150 TP_ARGS(clnt, xprt, program, server), 156 __string(program, program) 164 __assign_str(program, program); 169 " peer=[%s]:%s program=%s server=%s", 171 __get_str(program), __get_str(server)) 176 const char *program, 181 TP_ARGS(program, server, error), 185 __string(program, program) 191 __assign_str(program, program); [all …]
|
/Linux-v6.1/drivers/char/mwave/ |
D | smapi.h | 10 * This program is free software; you can redistribute it and/or modify 15 * This program is distributed in the hope that it will be useful, 21 * THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR 26 * distributing the Program and assumes all risks associated with its 28 * the risks and costs of program errors, damage to or loss of data, 37 * USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED 41 * along with this program; if not, write to the Free Software
|
/Linux-v6.1/samples/bpf/ |
D | test_cgrp2_sock2.c | 2 /* eBPF example program: 4 * - Loads eBPF program 6 * The eBPF program loads a filter from file and attaches the 7 * program to a cgroup using BPF_PROG_ATTACH 66 printf("Invalid program id; program not found in file\n"); in main() 70 /* load BPF program */ in main()
|
/Linux-v6.1/tools/testing/selftests/kvm/lib/ |
D | elf.c | 107 * Loads the program image of the ELF file specified by filename, 128 /* For each program header. in kvm_vm_elf_load() 130 * and size of the program headers: in kvm_vm_elf_load() 132 * e_phoff - File offset to start of program headers in kvm_vm_elf_load() 133 * e_phentsize - Size of each program header in kvm_vm_elf_load() 134 * e_phnum - Number of program header entries in kvm_vm_elf_load() 137 /* Seek to the beginning of the program header. */ in kvm_vm_elf_load() 141 "Failed to seek to begining of program header %u,\n" in kvm_vm_elf_load() 146 /* Read in the program header. */ in kvm_vm_elf_load() 182 "Seek to program segment offset failed,\n" in kvm_vm_elf_load() [all …]
|