Home
last modified time | relevance | path

Searched refs:SEC (Results 1 – 25 of 333) sorted by relevance

12345678910>>...14

/Linux-v5.10/samples/bpf/
Dspintest_kern.c20 } my_map SEC(".maps");
26 } my_map2 SEC(".maps");
33 } stackmap SEC(".maps");
49 SEC("kprobe/spin_unlock")PROG(p1)
50 SEC("kprobe/spin_lock")PROG(p2)
51 SEC("kprobe/mutex_spin_on_owner")PROG(p3)
52 SEC("kprobe/rwsem_spin_on_owner")PROG(p4)
53 SEC("kprobe/spin_unlock_irqrestore")PROG(p5)
54 SEC("kprobe/_raw_spin_unlock_irqrestore")PROG(p6)
55 SEC("kprobe/_raw_spin_unlock_bh")PROG(p7)
[all …]
Dmap_perf_test_kern.c24 } hash_map SEC(".maps");
31 } lru_hash_map SEC(".maps");
39 } nocommon_lru_hash_map SEC(".maps");
48 } inner_lru_hash_map SEC(".maps");
55 } array_of_lru_hashs SEC(".maps") = {
65 } percpu_hash_map SEC(".maps");
73 } hash_map_alloc SEC(".maps");
81 } percpu_hash_map_alloc SEC(".maps");
89 } lpm_trie_map_alloc SEC(".maps");
96 } array_map SEC(".maps");
[all …]
Dxdp_monitor_kern.c15 } redirect_err_cnt SEC(".maps");
23 } exception_cnt SEC(".maps");
68 SEC("tracepoint/xdp/xdp_redirect_err")
75 SEC("tracepoint/xdp/xdp_redirect_map_err")
82 SEC("tracepoint/xdp/xdp_redirect")
89 SEC("tracepoint/xdp/xdp_redirect_map")
105 SEC("tracepoint/xdp/xdp_exception")
137 } cpumap_enqueue_cnt SEC(".maps");
144 } cpumap_kthread_cnt SEC(".maps");
159 SEC("tracepoint/xdp/xdp_cpumap_enqueue")
[all …]
Dtracex6_kern.c11 } counters SEC(".maps");
18 } values SEC(".maps");
25 } values2 SEC(".maps");
27 SEC("kprobe/htab_map_get_next_key")
48 SEC("kprobe/htab_map_lookup_elem")
68 char _license[] SEC("license") = "GPL";
69 u32 _version SEC("version") = LINUX_VERSION_CODE;
Dtest_map_in_map_kern.c26 } port_a SEC(".maps");
34 } port_h SEC(".maps");
42 } reg_result_h SEC(".maps");
50 } inline_result_h SEC(".maps");
58 } a_of_port_a SEC(".maps");
66 } h_of_port_a SEC(".maps");
74 } h_of_port_h SEC(".maps");
106 SEC("kprobe/__sys_connect")
175 char _license[] SEC("license") = "GPL";
176 u32 _version SEC("version") = LINUX_VERSION_CODE;
/Linux-v5.10/Documentation/devicetree/bindings/crypto/
Dfsl-sec2.txt1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x
6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3)
10 - interrupts : the SEC's interrupt number
17 should be encoded following the SEC's Descriptor Header Dword
21 bit 1 = set if SEC has the ARC4 EU (AFEU)
22 bit 2 = set if SEC has the DES/3DES EU (DEU)
23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A)
24 bit 4 = set if SEC has the random number generator EU (RNG)
25 bit 5 = set if SEC has the public key EU (PKEU)
26 bit 6 = set if SEC has the AES EU (AESU)
[all …]
Dfsl-sec6.txt1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM).
2 Currently Freescale powerpc chip C29X is embedded with SEC 6.
3 SEC 6 device tree binding include:
4 -SEC 6 Node
9 SEC 6 Node
13 Node defines the base address of the SEC 6 block.
15 configuration registers for the SEC 6 block.
16 For example, In C293, we could see three SEC 6 node.
28 Definition: A standard property. Define the 'ERA' of the SEC
48 address and length of the SEC 6 configuration registers.
[all …]
/Linux-v5.10/tools/testing/selftests/bpf/progs/
Dtest_btf_map_in_map.c11 } inner_map1 SEC(".maps"),
12 inner_map2 SEC(".maps");
19 } inner_map_sz2 SEC(".maps");
35 } outer_arr SEC(".maps") = {
50 } inner_map3 SEC(".maps"),
51 inner_map4 SEC(".maps");
59 } inner_map5 SEC(".maps");
73 } outer_arr_dyn SEC(".maps") = {
90 } outer_hash SEC(".maps") = {
102 } sockarr_sz1 SEC(".maps");
[all …]
Dtailcall2.c11 } jmp_table SEC(".maps");
13 SEC("classifier/0")
20 SEC("classifier/1")
27 SEC("classifier/2")
33 SEC("classifier/3")
40 SEC("classifier/4")
47 SEC("classifier")
58 char __license[] SEC("license") = "GPL";
59 int _version SEC("version") = 1;
Dfentry_test.c7 char _license[] SEC("license") = "GPL";
10 SEC("fentry/bpf_fentry_test1")
18 SEC("fentry/bpf_fentry_test2")
26 SEC("fentry/bpf_fentry_test3")
34 SEC("fentry/bpf_fentry_test4")
42 SEC("fentry/bpf_fentry_test5")
51 SEC("fentry/bpf_fentry_test6")
64 SEC("fentry/bpf_fentry_test7")
73 SEC("fentry/bpf_fentry_test8")
Dtrigger_bench.c9 char _license[] SEC("license") = "GPL";
13 SEC("tp/syscalls/sys_enter_getpgid")
20 SEC("raw_tp/sys_enter")
28 SEC("kprobe/__x64_sys_getpgid")
35 SEC("fentry/__x64_sys_getpgid")
42 SEC("fentry.s/__x64_sys_getpgid")
49 SEC("fmod_ret/__x64_sys_getpgid")
Dfexit_test.c7 char _license[] SEC("license") = "GPL";
10 SEC("fexit/bpf_fentry_test1")
18 SEC("fexit/bpf_fentry_test2")
26 SEC("fexit/bpf_fentry_test3")
34 SEC("fexit/bpf_fentry_test4")
43 SEC("fexit/bpf_fentry_test5")
52 SEC("fexit/bpf_fentry_test6")
65 SEC("fexit/bpf_fentry_test7")
74 SEC("fexit/bpf_fentry_test8")
Dtest_sockmap_listen.c15 } sock_map SEC(".maps");
22 } sock_hash SEC(".maps");
29 } verdict_map SEC(".maps");
33 SEC("sk_skb/stream_parser")
39 SEC("sk_skb/stream_verdict")
58 SEC("sk_msg")
77 SEC("sk_reuseport")
97 int _version SEC("version") = 1;
98 char _license[] SEC("license") = "GPL";
Dtailcall_bpf2bpf4.c10 } jmp_table SEC(".maps");
35 SEC("classifier/1")
41 SEC("classifier/2")
48 SEC("classifier/0")
54 SEC("classifier")
60 char __license[] SEC("license") = "GPL";
61 int _version SEC("version") = 1;
Dtest_sockmap_kern.h36 } sock_map SEC(".maps");
43 } sock_map_txmsg SEC(".maps");
50 } sock_map_redir SEC(".maps");
57 } sock_apply_bytes SEC(".maps");
64 } sock_cork_bytes SEC(".maps");
71 } sock_bytes SEC(".maps");
78 } sock_redir_flags SEC(".maps");
85 } sock_skb_opts SEC(".maps");
92 } tls_sock_map SEC(".maps");
94 SEC("sk_skb1")
[all …]
Dtest_overhead.c12 SEC("kprobe/__set_task_comm")
18 SEC("kretprobe/__set_task_comm")
24 SEC("raw_tp/task_rename")
30 SEC("fentry/__set_task_comm")
36 SEC("fexit/__set_task_comm")
42 char _license[] SEC("license") = "GPL";
Dmap_ptr_kern.c110 } m_hash SEC(".maps");
146 } m_array SEC(".maps");
178 } m_prog_array SEC(".maps");
195 } m_perf_event_array SEC(".maps");
212 } m_percpu_hash SEC(".maps");
229 } m_percpu_array SEC(".maps");
250 } m_stack_trace SEC(".maps");
269 } m_cgroup_array SEC(".maps");
286 } m_lru_hash SEC(".maps");
303 } m_lru_percpu_hash SEC(".maps");
[all …]
Dtest_sk_lookup_kern.c18 int _version SEC("version") = 1;
19 char _license[] SEC("license") = "GPL";
56 SEC("classifier/sk_lookup_success")
82 SEC("classifier/sk_lookup_success_simple")
94 SEC("classifier/fail_use_after_free")
109 SEC("classifier/fail_modify_sk_pointer")
124 SEC("classifier/fail_modify_sk_or_null_pointer")
138 SEC("classifier/fail_no_release")
147 SEC("classifier/fail_release_twice")
159 SEC("classifier/fail_release_unchecked")
[all …]
Dfexit_bpf2bpf.c17 SEC("fexit/test_pkt_access")
32 SEC("fexit/test_pkt_access_subprog1")
65 SEC("fexit/test_pkt_access_subprog2")
89 SEC("fexit/test_pkt_access_subprog3")
104 SEC("freplace/get_skb_len")
116 SEC("freplace/get_skb_ifindex")
148 SEC("freplace/get_constant")
158 SEC("freplace/test_pkt_write_access_subprog")
181 char _license[] SEC("license") = "GPL";
Dsockmap_verdict_prog.c5 int _version SEC("version") = 1;
12 } sock_map_rx SEC(".maps");
19 } sock_map_tx SEC(".maps");
26 } sock_map_msg SEC(".maps");
33 } sock_map_break SEC(".maps");
35 SEC("sk_skb2")
65 char _license[] SEC("license") = "GPL";
Dtest_stacktrace_build_id.c16 } control_map SEC(".maps");
23 } stackid_hmap SEC(".maps");
33 } stackmap SEC(".maps");
40 } stack_amap SEC(".maps");
50 SEC("tracepoint/random/urandom_read")
75 char _license[] SEC("license") = "GPL";
76 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
Dlsm.c17 } array SEC(".maps");
24 } hash SEC(".maps");
31 } lru_hash SEC(".maps");
33 char _license[] SEC("license") = "GPL";
39 SEC("lsm/file_mprotect")
60 SEC("lsm.s/bprm_committed_creds")
86 SEC("lsm/task_free") /* lsm/ is ok, lsm.s/ fails */
94 SEC("fentry.s/__x64_sys_setdomainname")
Dtailcall_bpf2bpf3.c11 } jmp_table SEC(".maps");
36 SEC("classifier/0")
44 SEC("classifier/1")
52 SEC("classifier")
60 char __license[] SEC("license") = "GPL";
61 int _version SEC("version") = 1;
Dtest_attach_probe.c14 SEC("kprobe/sys_nanosleep")
21 SEC("kretprobe/sys_nanosleep")
28 SEC("uprobe/trigger_func")
35 SEC("uretprobe/trigger_func")
42 char _license[] SEC("license") = "GPL";
/Linux-v5.10/tools/perf/include/bpf/
Dbpf.h22 struct bpf_map SEC("maps") name = { \
50 #define SEC(NAME) __attribute__((section(NAME), used)) macro
53 SEC(#function "=" #function " " #vars) function
56 SEC("syscalls:sys_enter_" #name) syscall_enter_ ## name
59 SEC("syscalls:sys_exit_" #name) syscall_exit_ ## name
62 char _license[] SEC("license") = #name; \
63 int _version SEC("version") = LINUX_VERSION_CODE;

12345678910>>...14