Home
last modified time | relevance | path

Searched refs:programs (Results 1 – 25 of 265) sorted by relevance

1234567891011

/Linux-v5.4/samples/bpf/
Dtcp_bpf.readme2 programs. These programs attach to a cgroupv2. The following commands create
12 (attach) one of the tcp_*_kern.o programs:
19 The tcp_*_kern.o programs use special print functions to print logging
23 cgroupv2 to which the BPF programs are attached (i.e. under bash shell
/Linux-v5.4/Documentation/bpf/
Dbpf_design_QA.rst32 A: Because BPF programs are designed to run in the linux kernel
49 Q: Can BPF programs access instruction pointer or return address?
53 Q: Can BPF programs access stack pointer ?
69 BPF programs and programs call kernel helpers with zero overhead,
71 for JITed BPF programs that are indistinguishable from
112 versions will accept all bpf programs that were accepted by
160 workaround would be acceptable. Turned out that programs lose performance
179 programs for 32-bit architectures.
203 A: YES. BPF instructions, arguments to BPF programs, set of helper
205 of ABI. However there is one specific exception to tracing programs
[all …]
/Linux-v5.4/tools/bpf/bpftool/Documentation/
Dbpftool-net.rst40 For programs attached to a particular cgroup, e.g.,
45 bpf programs, users should consult other tools, e.g., iproute2.
48 all tc class/qdisc bpf program attachments. Both xdp programs and
49 tc programs are ordered based on ifindex number. If multiple bpf
50 programs attached to the same networking device through **tc filter**,
51 the order will be first all bpf programs attached to tc classes, then
52 all bpf programs attached to non clsact qdiscs, and finally all
53 bpf programs attached to root and clsact qdisc.
Dbpftool-cgroup.rst39 List all programs attached to the cgroup *CGROUP*.
44 If **effective** is specified retrieve effective programs that
50 attached programs. If *CGROUP_ROOT* is not specified,
57 If **effective** is specified retrieve effective programs that
75 Multiple programs are allowed to be attached to a cgroup with
129 Show file names of pinned programs.
Dbpftool-prog.rst55 Show information about loaded programs. If *PROG* is
57 list all programs currently loaded on the system.
63 programs (such as the total time spent running the program,
110 *OBJ* as *PATH*. **bpftool prog loadall** pins all programs
144 Hit <Ctrl+C> to stop printing. BPF programs can write to this
147 streaming data from BPF programs to user space, one can use
202 When showing BPF programs, show file names of pinned
203 programs.
215 attempting to load programs.
Dbpftool.rst5 tool for inspection and simple manipulation of eBPF programs and maps
72 attempting to load programs.
/Linux-v5.4/Documentation/networking/
Datm.txt2 several user-mode programs are required to assist the kernel. These
3 programs and related material can be found via the ATM on Linux Web
/Linux-v5.4/drivers/media/radio/wl128x/
DKconfig13 In order to control your radio card, you will need to use programs
15 this API and pointers to "v4l2" programs may be found at
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-devices16 Or rely on the uevent messages to notify programs of
22 programs must be able to handle such occurrences.
Dsysfs-class11 All programs that use this directory tree must be able
/Linux-v5.4/LICENSES/exceptions/
DGCC-exception-2.014 compiled version of this file into combinations with other programs, and to
15 distribute those programs without any restriction coming from the use of
/Linux-v5.4/drivers/ptp/
DKconfig53 programs are getting hardware time stamps on the PTP Ethernet
66 clock. This clock is only useful if your PTP programs are
85 clock. This clock is only useful if your PTP programs are
103 This clock is only useful if your PTP programs are getting
/Linux-v5.4/security/tomoyo/
DKconfig26 Some programs access thousands of objects, so running
27 such programs in "learning mode" dulls the system response
29 This is the safeguard for such programs.
/Linux-v5.4/Documentation/admin-guide/
Dserial-console.rst97 and your console is NOT the virtual console some programs will fail.
98 Those are programs that want to access the VT interface, and use
99 ``/dev/console instead of /dev/tty0``. Some of those programs are::
103 It should be fixed in modern versions of these programs though.
/Linux-v5.4/sound/core/seq/
DKconfig11 Many programs require this feature, so you should enable it
37 Many programs still use the OSS API, so say Y.
/Linux-v5.4/scripts/kconfig/
D.gitignore8 # configuration programs
/Linux-v5.4/Documentation/admin-guide/LSM/
DSafeSetID.rst15 CAP_SETUID is granted to programs running as root or those running as a non-root
27 especially since programs often only call setuid() to drop privileges to a
42 non-root programs can drop to even-lesser-privileged uids. This is especially
69 namespace and give programs in the tree setid capabilities. In this way,
70 programs in the tree could change to any desired UID/GID in the context of their
/Linux-v5.4/Documentation/kbuild/
Dheaders_install.rst6 form suitable for use by userspace programs.
9 programs attempting to use kernel services. These kernel header files are
Dkbuild.rst66 Additional flags to be passed to $(HOSTCC) when building host programs.
70 Additional flags to be passed to $(HOSTCXX) when building host programs.
74 Additional flags to be passed when linking host programs.
78 Additional libraries to link against when building host programs.
/Linux-v5.4/drivers/media/radio/
DKconfig36 In order to control your radio card, you will need to use programs
38 this API and pointers to "v4l2" programs may be found at
76 In order to control your radio card, you will need to use programs
78 this API and pointers to "v4l" programs may be found at
94 In order to control your radio card, you will need to use programs
96 this API and pointers to "v4l" programs may be found at
111 In order to control your radio card, you will need to use programs
113 this API and pointers to "v4l" programs may be found at
218 In order to control your radio card, you will need to use programs
220 this API and pointers to "v4l2" programs may be found at
/Linux-v5.4/Documentation/admin-guide/hw-vuln/
Dspectre.rst256 User programs should use address space randomization to make attacks
478 User programs can mitigate Spectre variant 1 using LFENCE or "bounds
481 For Spectre variant 2 mitigation, individual user programs
485 programs can disable their indirect branch speculation via prctl()
493 on x86. All sand-boxed SECCOMP programs have indirect branch
501 User programs should use address space randomization
662 2. Protect sensitive programs
665 For security-sensitive programs that have secrets (e.g. crypto
670 3. Sandbox untrusted programs
673 Untrusted programs that could be a source of attacks can be cordoned
[all …]
/Linux-v5.4/net/xdp/
DKconfig7 XDP sockets allows a channel between XDP programs and
/Linux-v5.4/Documentation/ABI/
DREADME4 interfaces should be used by userspace programs in different ways.
14 defined to be stable. Userspace programs are free to use these
26 programs can start to rely on these interfaces, but they must be
/Linux-v5.4/Documentation/userspace-api/
Dno_new_privs.rst7 programs and file capabilities. To prevent the parent program from
48 execve and can change the behavior of newly-executed programs.
/Linux-v5.4/drivers/misc/cxl/
DKconfig28 userspace programs to access these accelerators via /dev/cxl/afuM.N

1234567891011