Home
last modified time | relevance | path

Searched refs:SEC (Results 1 – 25 of 126) sorted by relevance

123456

/Linux-v4.19/samples/bpf/
Dspintest_kern.c14 struct bpf_map_def SEC("maps") my_map = {
20 struct bpf_map_def SEC("maps") my_map2 = {
27 struct bpf_map_def SEC("maps") stackmap = {
48 SEC("kprobe/spin_unlock")PROG(p1)
49 SEC("kprobe/spin_lock")PROG(p2)
50 SEC("kprobe/mutex_spin_on_owner")PROG(p3)
51 SEC("kprobe/rwsem_spin_on_owner")PROG(p4)
52 SEC("kprobe/spin_unlock_irqrestore")PROG(p5)
53 SEC("kprobe/_raw_spin_unlock_irqrestore")PROG(p6)
54 SEC("kprobe/_raw_spin_unlock_bh")PROG(p7)
[all …]
Dmap_perf_test_kern.c16 struct bpf_map_def SEC("maps") hash_map = {
23 struct bpf_map_def SEC("maps") lru_hash_map = {
30 struct bpf_map_def SEC("maps") nocommon_lru_hash_map = {
38 struct bpf_map_def SEC("maps") inner_lru_hash_map = {
47 struct bpf_map_def SEC("maps") array_of_lru_hashs = {
53 struct bpf_map_def SEC("maps") percpu_hash_map = {
60 struct bpf_map_def SEC("maps") hash_map_alloc = {
68 struct bpf_map_def SEC("maps") percpu_hash_map_alloc = {
76 struct bpf_map_def SEC("maps") lpm_trie_map_alloc = {
84 struct bpf_map_def SEC("maps") array_map = {
[all …]
Dxdp_monitor_kern.c9 struct bpf_map_def SEC("maps") redirect_err_cnt = {
18 struct bpf_map_def SEC("maps") exception_cnt = {
68 SEC("tracepoint/xdp/xdp_redirect_err")
75 SEC("tracepoint/xdp/xdp_redirect_map_err")
82 SEC("tracepoint/xdp/xdp_redirect")
89 SEC("tracepoint/xdp/xdp_redirect_map")
105 SEC("tracepoint/xdp/xdp_exception")
132 struct bpf_map_def SEC("maps") cpumap_enqueue_cnt = {
139 struct bpf_map_def SEC("maps") cpumap_kthread_cnt = {
159 SEC("tracepoint/xdp/xdp_cpumap_enqueue")
[all …]
Dtest_map_in_map_kern.c18 struct bpf_map_def SEC("maps") port_a = {
26 struct bpf_map_def SEC("maps") port_h = {
34 struct bpf_map_def SEC("maps") reg_result_h = {
42 struct bpf_map_def SEC("maps") inline_result_h = {
50 struct bpf_map_def SEC("maps") a_of_port_a = {
58 struct bpf_map_def SEC("maps") h_of_port_a = {
66 struct bpf_map_def SEC("maps") h_of_port_h = {
103 SEC("kprobe/sys_connect")
172 char _license[] SEC("license") = "GPL";
173 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtracex6_kern.c6 struct bpf_map_def SEC("maps") counters = {
12 struct bpf_map_def SEC("maps") values = {
18 struct bpf_map_def SEC("maps") values2 = {
25 SEC("kprobe/htab_map_get_next_key")
46 SEC("kprobe/htab_map_lookup_elem")
66 char _license[] SEC("license") = "GPL";
67 u32 _version SEC("version") = LINUX_VERSION_CODE;
Doffwaketime_kern.c25 struct bpf_map_def SEC("maps") counts = {
32 struct bpf_map_def SEC("maps") start = {
44 struct bpf_map_def SEC("maps") wokeby = {
51 struct bpf_map_def SEC("maps") stackmap = {
60 SEC("kprobe/try_to_wake_up")
117 SEC("tracepoint/sched/sched_switch")
123 SEC("kprobe/finish_task_switch")
150 char _license[] SEC("license") = "GPL";
151 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtest_current_task_under_cgroup_kern.c14 struct bpf_map_def SEC("maps") cgroup_map = {
21 struct bpf_map_def SEC("maps") perf_map = {
29 SEC("kprobe/sys_sync")
42 char _license[] SEC("license") = "GPL";
43 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtest_lwt_bpf.c36 SEC("nop")
43 SEC("test_ctx")
56 SEC("test_cb")
67 SEC("test_data")
148 SEC("test_rewrite")
192 SEC("push_ll_and_redirect_silent")
198 SEC("push_ll_and_redirect")
228 SEC("fill_garbage")
236 SEC("fill_garbage_and_redirect")
246 SEC("drop_all")
[all …]
Dtracex3_kern.c13 struct bpf_map_def SEC("maps") my_map = {
23 SEC("kprobe/blk_start_request")
44 struct bpf_map_def SEC("maps") lat_map = {
51 SEC("kprobe/blk_account_io_completion")
88 char _license[] SEC("license") = "GPL";
89 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtracex4_kern.c17 struct bpf_map_def SEC("maps") my_map = {
27 SEC("kprobe/kmem_cache_free")
36 SEC("kretprobe/kmem_cache_alloc_node")
53 char _license[] SEC("license") = "GPL";
54 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dlathist_kern.c21 struct bpf_map_def SEC("maps") my_map = {
28 SEC("kprobe/trace_preempt_off")
64 struct bpf_map_def SEC("maps") my_lat = {
71 SEC("kprobe/trace_preempt_on")
98 char _license[] SEC("license") = "GPL";
99 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dxdp_redirect_cpu_kern.c21 struct bpf_map_def SEC("maps") cpu_map = {
38 struct bpf_map_def SEC("maps") rx_cnt = {
46 struct bpf_map_def SEC("maps") redirect_err_cnt = {
55 struct bpf_map_def SEC("maps") cpumap_enqueue_cnt = {
63 struct bpf_map_def SEC("maps") cpumap_kthread_cnt = {
73 struct bpf_map_def SEC("maps") cpus_available = {
79 struct bpf_map_def SEC("maps") cpus_count = {
85 struct bpf_map_def SEC("maps") cpus_iterator = {
93 struct bpf_map_def SEC("maps") exception_cnt = {
200 SEC("xdp_cpu_map0")
[all …]
Dxdpsock_kern.c8 struct bpf_map_def SEC("maps") qidconf_map = {
15 struct bpf_map_def SEC("maps") xsks_map = {
22 struct bpf_map_def SEC("maps") rr_map = {
29 SEC("xdp_sock")
56 char _license[] SEC("license") = "GPL";
/Linux-v4.19/Documentation/devicetree/bindings/crypto/
Dfsl-sec2.txt1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x
6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3)
10 - interrupts : the SEC's interrupt number
17 should be encoded following the SEC's Descriptor Header Dword
21 bit 1 = set if SEC has the ARC4 EU (AFEU)
22 bit 2 = set if SEC has the DES/3DES EU (DEU)
23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A)
24 bit 4 = set if SEC has the random number generator EU (RNG)
25 bit 5 = set if SEC has the public key EU (PKEU)
26 bit 6 = set if SEC has the AES EU (AESU)
[all …]
Dfsl-sec6.txt1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM).
2 Currently Freescale powerpc chip C29X is embedded with SEC 6.
3 SEC 6 device tree binding include:
4 -SEC 6 Node
9 SEC 6 Node
13 Node defines the base address of the SEC 6 block.
15 configuration registers for the SEC 6 block.
16 For example, In C293, we could see three SEC 6 node.
28 Definition: A standard property. Define the 'ERA' of the SEC
48 address and length of the SEC 6 configuration registers.
[all …]
/Linux-v4.19/tools/testing/selftests/bpf/
Dtest_sockmap_kern.h38 struct bpf_map_def SEC("maps") sock_map = {
45 struct bpf_map_def SEC("maps") sock_map_txmsg = {
52 struct bpf_map_def SEC("maps") sock_map_redir = {
59 struct bpf_map_def SEC("maps") sock_apply_bytes = {
66 struct bpf_map_def SEC("maps") sock_cork_bytes = {
73 struct bpf_map_def SEC("maps") sock_pull_bytes = {
80 struct bpf_map_def SEC("maps") sock_redir_flags = {
87 struct bpf_map_def SEC("maps") sock_skb_opts = {
94 SEC("sk_skb1")
100 SEC("sk_skb2")
[all …]
Dtest_stacktrace_map.c11 struct bpf_map_def SEC("maps") control_map = {
18 struct bpf_map_def SEC("maps") stackid_hmap = {
25 struct bpf_map_def SEC("maps") stackmap = {
32 struct bpf_map_def SEC("maps") stack_amap = {
51 SEC("tracepoint/sched/sched_switch")
74 char _license[] SEC("license") = "GPL";
75 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
Dsockmap_verdict_prog.c6 int _version SEC("version") = 1;
15 struct bpf_map_def SEC("maps") sock_map_rx = {
22 struct bpf_map_def SEC("maps") sock_map_tx = {
29 struct bpf_map_def SEC("maps") sock_map_msg = {
36 struct bpf_map_def SEC("maps") sock_map_break = {
43 SEC("sk_skb2")
73 char _license[] SEC("license") = "GPL";
Dtest_stacktrace_build_id.c11 struct bpf_map_def SEC("maps") control_map = {
18 struct bpf_map_def SEC("maps") stackid_hmap = {
25 struct bpf_map_def SEC("maps") stackmap = {
34 struct bpf_map_def SEC("maps") stack_amap = {
50 SEC("tracepoint/random/urandom_read")
75 char _license[] SEC("license") = "GPL";
76 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
Dtest_tunnel_kern.c30 int _version SEC("version") = 1;
46 SEC("gre_set_tunnel")
68 SEC("gre_get_tunnel")
85 SEC("ip6gretap_set_tunnel")
109 SEC("ip6gretap_get_tunnel")
129 SEC("erspan_set_tunnel")
172 SEC("erspan_get_tunnel")
213 SEC("ip4ip6erspan_set_tunnel")
257 SEC("ip4ip6erspan_get_tunnel")
299 SEC("vxlan_set_tunnel")
[all …]
Dget_cgroup_id_kern.c7 struct bpf_map_def SEC("maps") cg_ids = {
14 struct bpf_map_def SEC("maps") pidmap = {
21 SEC("tracepoint/syscalls/sys_enter_nanosleep")
39 char _license[] SEC("license") = "GPL";
40 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
Dsocket_cookie_prog.c10 struct bpf_map_def SEC("maps") socket_cookies = {
17 SEC("cgroup/connect6")
33 SEC("sockops")
58 int _version SEC("version") = 1;
60 char _license[] SEC("license") = "GPL";
/Linux-v4.19/tools/perf/include/bpf/
Dbpf.h21 #define SEC(NAME) __attribute__((section(NAME), used)) macro
24 SEC(#function "=" #function " " #vars) function
27 SEC("syscalls:sys_enter_" #name) syscall_enter_ ## name
30 char _license[] SEC("license") = #name; \
31 int _version SEC("version") = LINUX_VERSION_CODE;
/Linux-v4.19/tools/perf/tests/
Dbpf-script-test-relocation.c26 #define SEC(NAME) __attribute__((section(NAME), used)) macro
27 struct bpf_map_def SEC("maps") my_table = {
36 SEC("func=sys_write")
49 char _license[] SEC("license") = "GPL";
50 int _version SEC("version") = LINUX_VERSION_CODE;
Dbpf-script-example.c26 #define SEC(NAME) __attribute__((section(NAME), used)) macro
27 struct bpf_map_def SEC("maps") flip_table = {
34 SEC("func=do_epoll_wait")
47 char _license[] SEC("license") = "GPL";
48 int _version SEC("version") = LINUX_VERSION_CODE;

123456