/Linux-v5.10/samples/bpf/ |
D | tcp_bpf.readme | 2 programs. These programs attach to a cgroupv2. The following commands create 12 (attach) one of the tcp_*_kern.o programs: 19 The tcp_*_kern.o programs use special print functions to print logging 23 cgroupv2 to which the BPF programs are attached (i.e. under bash shell
|
/Linux-v5.10/tools/bpf/bpftool/Documentation/ |
D | bpftool-net.rst | 40 For programs attached to a particular cgroup, e.g., 45 bpf programs, users should consult other tools, e.g., iproute2. 48 all tc class/qdisc bpf program attachments. Both xdp programs and 49 tc programs are ordered based on ifindex number. If multiple bpf 50 programs attached to the same networking device through **tc filter**, 51 the order will be first all bpf programs attached to tc classes, then 52 all bpf programs attached to non clsact qdiscs, and finally all 53 bpf programs attached to root and clsact qdisc.
|
D | bpftool-gen.rst | 33 with BPF programs from userspace side. Generated code is 43 programs, skeleton provides a storage for BPF links (**struct 45 requested, supported BPF programs will be automatically 48 programs that can't be automatically attached by libbpf, 53 rely on libbpf support to detach programs and free up 75 specific maps, programs, etc. 91 programs, initializes global data maps. It corresponds to 101 programs of types supported by libbpf for auto-attachment 103 instantiated. For other BPF programs, user can manually 110 Detach and unload BPF programs, free up all the resources [all …]
|
D | bpftool-prog.rst | 61 Show information about loaded programs. If *PROG* is 62 specified show information only about given programs, 63 otherwise list all programs currently loaded on the system. 65 programs which will all be shown. 71 programs (such as the total time spent running the program, 80 programs. On such kernels bpftool will automatically emit this 84 Dump eBPF instructions of the programs from the kernel. By 90 programs which will all be dumped. However, if **file** or 100 If the programs have line_info available, the source line will 129 *OBJ* as *PATH*. **bpftool prog loadall** pins all programs [all …]
|
D | bpftool-cgroup.rst | 39 List all programs attached to the cgroup *CGROUP*. 44 If **effective** is specified retrieve effective programs that 50 attached programs. If *CGROUP_ROOT* is not specified, 57 If **effective** is specified retrieve effective programs that 75 Multiple programs are allowed to be attached to a cgroup with 122 Show file names of pinned programs.
|
D | common_options.rst | 8 for JIT-ted programs (**bpftool prog dump jited**) and usage of BPF 22 load programs.
|
/Linux-v5.10/Documentation/bpf/ |
D | drgn.rst | 23 `bpf_inspect.py`_ is a tool intended to inspect BPF programs and maps. It can 24 iterate over all programs and maps in the system and print basic information 27 The main use-case `bpf_inspect.py`_ covers is to show BPF programs of types 29 programs via ``freplace``/``fentry``/``fexit`` mechanisms, since there is no 35 List BPF programs (full names are obtained from BTF):: 49 Find BPF programs attached to BPF program ``test_pkt_access``:: 62 are multiple other tracing and ext programs attached to functions in 80 drgn script to list BPF programs or maps and their properties 90 prog (p) list BPF programs 97 information about BPF programs, maps and other objects.
|
D | bpf_design_QA.rst | 32 A: Because BPF programs are designed to run in the linux kernel 49 Q: Can BPF programs access instruction pointer or return address? 53 Q: Can BPF programs access stack pointer ? 69 BPF programs and programs call kernel helpers with zero overhead, 71 for JITed BPF programs that are indistinguishable from 112 versions will accept all bpf programs that were accepted by 160 workaround would be acceptable. Turned out that programs lose performance 179 programs for 32-bit architectures. 203 A: YES. BPF instructions, arguments to BPF programs, set of helper 205 of ABI. However there is one specific exception to tracing programs [all …]
|
D | bpf_lsm.rst | 8 These BPF programs allow runtime instrumentation of the LSM hooks by privileged 23 eBPF programs that use :doc:`/bpf/btf` do not need to include kernel headers 51 build environment matches the environment the BPF programs are 54 The ``vmlinux.h`` can then simply be included in the BPF programs without 57 The eBPF programs can be declared using the``BPF_PROG`` 97 eBPF programs can be loaded with the :manpage:`bpf(2)` syscall's 119 The LSM allows attachment of eBPF programs as LSM hooks using :manpage:`bpf(2)`
|
D | prog_sk_lookup.rst | 40 Multiple programs can be attached to one network namespace. Programs will be 46 The attached BPF sk_lookup programs run whenever the transport layer needs to 52 The attached BPF programs must return with either ``SK_PASS`` or ``SK_DROP`` 65 When multiple programs are attached, the end result is determined from return 66 codes of all the programs according to the following rules: 74 4. If all programs returned ``SK_PASS`` and none of them selected a socket,
|
D | map_cgroup_storage.rst | 9 storage. It is only available with ``CONFIG_CGROUP_BPF``, and to programs that 10 attach to cgroups; the programs are made available by the same Kconfig. The 39 ``struct bpf_cgroup_storage_key``, then programs of different attach types 49 can be accessed by multiple programs across different CPUs, and user should 140 program, sharing of this cgroup's storage with other BPF programs were 143 Since Linux 5.9, storage can be shared by multiple programs. When a program is
|
/Linux-v5.10/Documentation/networking/ |
D | atm.rst | 8 several user-mode programs are required to assist the kernel. These 9 programs and related material can be found via the ATM on Linux Web
|
/Linux-v5.10/drivers/media/radio/wl128x/ |
D | Kconfig | 12 In order to control your radio card, you will need to use programs 14 this API and pointers to "v4l2" programs may be found at
|
/Linux-v5.10/kernel/bpf/preload/ |
D | Kconfig | 15 This builds kernel module with several embedded BPF programs that are 17 useful in debugging and introspection of BPF programs and maps.
|
/Linux-v5.10/drivers/media/test-drivers/vidtv/ |
D | vidtv_channel.c | 419 struct vidtv_psi_table_pat_program *programs = NULL; in vidtv_channel_si_init() local 432 programs = vidtv_channel_pat_prog_cat_into_new(m); in vidtv_channel_si_init() 433 if (!programs) in vidtv_channel_si_init() 458 programs->service_id); in vidtv_channel_si_init() 463 vidtv_psi_pat_program_assign(m->si.pat, programs); in vidtv_channel_si_init() 495 vidtv_psi_pat_program_destroy(programs); in vidtv_channel_si_init()
|
/Linux-v5.10/LICENSES/exceptions/ |
D | GCC-exception-2.0 | 14 compiled version of this file into combinations with other programs, and to 15 distribute those programs without any restriction coming from the use of
|
/Linux-v5.10/Documentation/ABI/testing/ |
D | sysfs-devices | 16 Or rely on the uevent messages to notify programs of 22 programs must be able to handle such occurrences.
|
/Linux-v5.10/security/tomoyo/ |
D | Kconfig | 26 Some programs access thousands of objects, so running 27 such programs in "learning mode" dulls the system response 29 This is the safeguard for such programs.
|
/Linux-v5.10/Documentation/admin-guide/ |
D | serial-console.rst | 97 and your console is NOT the virtual console some programs will fail. 98 Those are programs that want to access the VT interface, and use 99 ``/dev/console instead of /dev/tty0``. Some of those programs are:: 103 It should be fixed in modern versions of these programs though.
|
/Linux-v5.10/sound/core/seq/ |
D | Kconfig | 11 Many programs require this feature, so you should enable it 37 Many programs still use the OSS API, so say Y.
|
/Linux-v5.10/scripts/kconfig/ |
D | .gitignore | 6 # configuration programs
|
/Linux-v5.10/Documentation/kbuild/ |
D | headers_install.rst | 6 form suitable for use by userspace programs. 9 programs attempting to use kernel services. These kernel header files are
|
/Linux-v5.10/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 15 CAP_SETUID is granted to programs running as root or those running as a non-root 27 especially since programs often only call setuid() to drop privileges to a 42 non-root programs can drop to even-lesser-privileged uids. This is especially 69 namespace and give programs in the tree setid capabilities. In this way, 70 programs in the tree could change to any desired UID/GID in the context of their
|
/Linux-v5.10/drivers/media/radio/ |
D | Kconfig | 36 In order to control your radio card, you will need to use programs 38 this API and pointers to "v4l2" programs may be found at 76 In order to control your radio card, you will need to use programs 78 this API and pointers to "v4l" programs may be found at 94 In order to control your radio card, you will need to use programs 96 this API and pointers to "v4l" programs may be found at 111 In order to control your radio card, you will need to use programs 113 this API and pointers to "v4l" programs may be found at 218 In order to control your radio card, you will need to use programs 220 this API and pointers to "v4l2" programs may be found at
|
/Linux-v5.10/Documentation/admin-guide/hw-vuln/ |
D | spectre.rst | 256 User programs should use address space randomization to make attacks 478 User programs can mitigate Spectre variant 1 using LFENCE or "bounds 481 For Spectre variant 2 mitigation, individual user programs 485 programs can disable their indirect branch speculation via prctl() 493 on x86. All sand-boxed SECCOMP programs have indirect branch 501 User programs should use address space randomization 662 2. Protect sensitive programs 665 For security-sensitive programs that have secrets (e.g. crypto 670 3. Sandbox untrusted programs 673 Untrusted programs that could be a source of attacks can be cordoned [all …]
|