Searched refs:SEC (Results 1 – 25 of 126) sorted by relevance
123456
/Linux-v4.19/samples/bpf/ |
D | spintest_kern.c | 14 struct bpf_map_def SEC("maps") my_map = { 20 struct bpf_map_def SEC("maps") my_map2 = { 27 struct bpf_map_def SEC("maps") stackmap = { 48 SEC("kprobe/spin_unlock")PROG(p1) 49 SEC("kprobe/spin_lock")PROG(p2) 50 SEC("kprobe/mutex_spin_on_owner")PROG(p3) 51 SEC("kprobe/rwsem_spin_on_owner")PROG(p4) 52 SEC("kprobe/spin_unlock_irqrestore")PROG(p5) 53 SEC("kprobe/_raw_spin_unlock_irqrestore")PROG(p6) 54 SEC("kprobe/_raw_spin_unlock_bh")PROG(p7) [all …]
|
D | map_perf_test_kern.c | 16 struct bpf_map_def SEC("maps") hash_map = { 23 struct bpf_map_def SEC("maps") lru_hash_map = { 30 struct bpf_map_def SEC("maps") nocommon_lru_hash_map = { 38 struct bpf_map_def SEC("maps") inner_lru_hash_map = { 47 struct bpf_map_def SEC("maps") array_of_lru_hashs = { 53 struct bpf_map_def SEC("maps") percpu_hash_map = { 60 struct bpf_map_def SEC("maps") hash_map_alloc = { 68 struct bpf_map_def SEC("maps") percpu_hash_map_alloc = { 76 struct bpf_map_def SEC("maps") lpm_trie_map_alloc = { 84 struct bpf_map_def SEC("maps") array_map = { [all …]
|
D | xdp_monitor_kern.c | 9 struct bpf_map_def SEC("maps") redirect_err_cnt = { 18 struct bpf_map_def SEC("maps") exception_cnt = { 68 SEC("tracepoint/xdp/xdp_redirect_err") 75 SEC("tracepoint/xdp/xdp_redirect_map_err") 82 SEC("tracepoint/xdp/xdp_redirect") 89 SEC("tracepoint/xdp/xdp_redirect_map") 105 SEC("tracepoint/xdp/xdp_exception") 132 struct bpf_map_def SEC("maps") cpumap_enqueue_cnt = { 139 struct bpf_map_def SEC("maps") cpumap_kthread_cnt = { 159 SEC("tracepoint/xdp/xdp_cpumap_enqueue") [all …]
|
D | test_map_in_map_kern.c | 18 struct bpf_map_def SEC("maps") port_a = { 26 struct bpf_map_def SEC("maps") port_h = { 34 struct bpf_map_def SEC("maps") reg_result_h = { 42 struct bpf_map_def SEC("maps") inline_result_h = { 50 struct bpf_map_def SEC("maps") a_of_port_a = { 58 struct bpf_map_def SEC("maps") h_of_port_a = { 66 struct bpf_map_def SEC("maps") h_of_port_h = { 103 SEC("kprobe/sys_connect") 172 char _license[] SEC("license") = "GPL"; 173 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | tracex6_kern.c | 6 struct bpf_map_def SEC("maps") counters = { 12 struct bpf_map_def SEC("maps") values = { 18 struct bpf_map_def SEC("maps") values2 = { 25 SEC("kprobe/htab_map_get_next_key") 46 SEC("kprobe/htab_map_lookup_elem") 66 char _license[] SEC("license") = "GPL"; 67 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | offwaketime_kern.c | 25 struct bpf_map_def SEC("maps") counts = { 32 struct bpf_map_def SEC("maps") start = { 44 struct bpf_map_def SEC("maps") wokeby = { 51 struct bpf_map_def SEC("maps") stackmap = { 60 SEC("kprobe/try_to_wake_up") 117 SEC("tracepoint/sched/sched_switch") 123 SEC("kprobe/finish_task_switch") 150 char _license[] SEC("license") = "GPL"; 151 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | test_current_task_under_cgroup_kern.c | 14 struct bpf_map_def SEC("maps") cgroup_map = { 21 struct bpf_map_def SEC("maps") perf_map = { 29 SEC("kprobe/sys_sync") 42 char _license[] SEC("license") = "GPL"; 43 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | test_lwt_bpf.c | 36 SEC("nop") 43 SEC("test_ctx") 56 SEC("test_cb") 67 SEC("test_data") 148 SEC("test_rewrite") 192 SEC("push_ll_and_redirect_silent") 198 SEC("push_ll_and_redirect") 228 SEC("fill_garbage") 236 SEC("fill_garbage_and_redirect") 246 SEC("drop_all") [all …]
|
D | tracex3_kern.c | 13 struct bpf_map_def SEC("maps") my_map = { 23 SEC("kprobe/blk_start_request") 44 struct bpf_map_def SEC("maps") lat_map = { 51 SEC("kprobe/blk_account_io_completion") 88 char _license[] SEC("license") = "GPL"; 89 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | tracex4_kern.c | 17 struct bpf_map_def SEC("maps") my_map = { 27 SEC("kprobe/kmem_cache_free") 36 SEC("kretprobe/kmem_cache_alloc_node") 53 char _license[] SEC("license") = "GPL"; 54 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | lathist_kern.c | 21 struct bpf_map_def SEC("maps") my_map = { 28 SEC("kprobe/trace_preempt_off") 64 struct bpf_map_def SEC("maps") my_lat = { 71 SEC("kprobe/trace_preempt_on") 98 char _license[] SEC("license") = "GPL"; 99 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
D | xdp_redirect_cpu_kern.c | 21 struct bpf_map_def SEC("maps") cpu_map = { 38 struct bpf_map_def SEC("maps") rx_cnt = { 46 struct bpf_map_def SEC("maps") redirect_err_cnt = { 55 struct bpf_map_def SEC("maps") cpumap_enqueue_cnt = { 63 struct bpf_map_def SEC("maps") cpumap_kthread_cnt = { 73 struct bpf_map_def SEC("maps") cpus_available = { 79 struct bpf_map_def SEC("maps") cpus_count = { 85 struct bpf_map_def SEC("maps") cpus_iterator = { 93 struct bpf_map_def SEC("maps") exception_cnt = { 200 SEC("xdp_cpu_map0") [all …]
|
D | xdpsock_kern.c | 8 struct bpf_map_def SEC("maps") qidconf_map = { 15 struct bpf_map_def SEC("maps") xsks_map = { 22 struct bpf_map_def SEC("maps") rr_map = { 29 SEC("xdp_sock") 56 char _license[] SEC("license") = "GPL";
|
/Linux-v4.19/Documentation/devicetree/bindings/crypto/ |
D | fsl-sec2.txt | 1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x 6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3) 10 - interrupts : the SEC's interrupt number 17 should be encoded following the SEC's Descriptor Header Dword 21 bit 1 = set if SEC has the ARC4 EU (AFEU) 22 bit 2 = set if SEC has the DES/3DES EU (DEU) 23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A) 24 bit 4 = set if SEC has the random number generator EU (RNG) 25 bit 5 = set if SEC has the public key EU (PKEU) 26 bit 6 = set if SEC has the AES EU (AESU) [all …]
|
D | fsl-sec6.txt | 1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM). 2 Currently Freescale powerpc chip C29X is embedded with SEC 6. 3 SEC 6 device tree binding include: 4 -SEC 6 Node 9 SEC 6 Node 13 Node defines the base address of the SEC 6 block. 15 configuration registers for the SEC 6 block. 16 For example, In C293, we could see three SEC 6 node. 28 Definition: A standard property. Define the 'ERA' of the SEC 48 address and length of the SEC 6 configuration registers. [all …]
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_sockmap_kern.h | 38 struct bpf_map_def SEC("maps") sock_map = { 45 struct bpf_map_def SEC("maps") sock_map_txmsg = { 52 struct bpf_map_def SEC("maps") sock_map_redir = { 59 struct bpf_map_def SEC("maps") sock_apply_bytes = { 66 struct bpf_map_def SEC("maps") sock_cork_bytes = { 73 struct bpf_map_def SEC("maps") sock_pull_bytes = { 80 struct bpf_map_def SEC("maps") sock_redir_flags = { 87 struct bpf_map_def SEC("maps") sock_skb_opts = { 94 SEC("sk_skb1") 100 SEC("sk_skb2") [all …]
|
D | test_stacktrace_map.c | 11 struct bpf_map_def SEC("maps") control_map = { 18 struct bpf_map_def SEC("maps") stackid_hmap = { 25 struct bpf_map_def SEC("maps") stackmap = { 32 struct bpf_map_def SEC("maps") stack_amap = { 51 SEC("tracepoint/sched/sched_switch") 74 char _license[] SEC("license") = "GPL"; 75 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
|
D | sockmap_verdict_prog.c | 6 int _version SEC("version") = 1; 15 struct bpf_map_def SEC("maps") sock_map_rx = { 22 struct bpf_map_def SEC("maps") sock_map_tx = { 29 struct bpf_map_def SEC("maps") sock_map_msg = { 36 struct bpf_map_def SEC("maps") sock_map_break = { 43 SEC("sk_skb2") 73 char _license[] SEC("license") = "GPL";
|
D | test_stacktrace_build_id.c | 11 struct bpf_map_def SEC("maps") control_map = { 18 struct bpf_map_def SEC("maps") stackid_hmap = { 25 struct bpf_map_def SEC("maps") stackmap = { 34 struct bpf_map_def SEC("maps") stack_amap = { 50 SEC("tracepoint/random/urandom_read") 75 char _license[] SEC("license") = "GPL"; 76 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
|
D | test_tunnel_kern.c | 30 int _version SEC("version") = 1; 46 SEC("gre_set_tunnel") 68 SEC("gre_get_tunnel") 85 SEC("ip6gretap_set_tunnel") 109 SEC("ip6gretap_get_tunnel") 129 SEC("erspan_set_tunnel") 172 SEC("erspan_get_tunnel") 213 SEC("ip4ip6erspan_set_tunnel") 257 SEC("ip4ip6erspan_get_tunnel") 299 SEC("vxlan_set_tunnel") [all …]
|
D | get_cgroup_id_kern.c | 7 struct bpf_map_def SEC("maps") cg_ids = { 14 struct bpf_map_def SEC("maps") pidmap = { 21 SEC("tracepoint/syscalls/sys_enter_nanosleep") 39 char _license[] SEC("license") = "GPL"; 40 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
|
D | socket_cookie_prog.c | 10 struct bpf_map_def SEC("maps") socket_cookies = { 17 SEC("cgroup/connect6") 33 SEC("sockops") 58 int _version SEC("version") = 1; 60 char _license[] SEC("license") = "GPL";
|
/Linux-v4.19/tools/perf/include/bpf/ |
D | bpf.h | 21 #define SEC(NAME) __attribute__((section(NAME), used)) macro 24 SEC(#function "=" #function " " #vars) function 27 SEC("syscalls:sys_enter_" #name) syscall_enter_ ## name 30 char _license[] SEC("license") = #name; \ 31 int _version SEC("version") = LINUX_VERSION_CODE;
|
/Linux-v4.19/tools/perf/tests/ |
D | bpf-script-test-relocation.c | 26 #define SEC(NAME) __attribute__((section(NAME), used)) macro 27 struct bpf_map_def SEC("maps") my_table = { 36 SEC("func=sys_write") 49 char _license[] SEC("license") = "GPL"; 50 int _version SEC("version") = LINUX_VERSION_CODE;
|
D | bpf-script-example.c | 26 #define SEC(NAME) __attribute__((section(NAME), used)) macro 27 struct bpf_map_def SEC("maps") flip_table = { 34 SEC("func=do_epoll_wait") 47 char _license[] SEC("license") = "GPL"; 48 int _version SEC("version") = LINUX_VERSION_CODE;
|
123456