/Linux-v6.1/drivers/pwm/ |
D | pwm-stmpe.c | 104 u16 program[3] = { in stmpe_24xx_pwm_config() local 157 program[0] = SMAX; /* off all the time */ in stmpe_24xx_pwm_config() 160 program[0] = LOAD | 0xff; /* LOAD 0xff */ in stmpe_24xx_pwm_config() 165 program[0] = SMIN; /* on all the time */ in stmpe_24xx_pwm_config() 168 program[0] = LOAD | 0x00; /* LOAD 0x00 */ in stmpe_24xx_pwm_config() 198 program[0] = LOAD | value; in stmpe_24xx_pwm_config() 199 program[1] = 0x0000; in stmpe_24xx_pwm_config() 212 program[0] = PRESCALE_512 | STEPTIME_1 | incdec; in stmpe_24xx_pwm_config() 215 program[1] = BRANCH; in stmpe_24xx_pwm_config() 220 pwm->hwpwm, value, last, program[0], program[1], in stmpe_24xx_pwm_config() [all …]
|
/Linux-v6.1/tools/testing/selftests/bpf/ |
D | DENYLIST.s390x | 10 d_path # failed to auto-attach program 'prog_stat': -524 … 41 task_local_storage # failed to auto-attach program 'trace_exit_creds': -524 … 43 test_bprm_opts # failed to auto-attach program 'secure_exec': -524 … 44 test_ima # failed to auto-attach program 'ima': -524 … 45 test_local_storage # failed to auto-attach program 'unlink_hook': -524 … 49 timer # failed to auto-attach program 'test1': -524 … 51 timer_mim # failed to auto-attach program 'test1': -524 … 52 trace_ext # failed to auto-attach program 'test_pkt_md_access_new': … 57 vmlinux # failed to auto-attach program 'handle__fentry': -524 … 59 xdp_bonding # failed to auto-attach program 'trace_on_entry': -524 … [all …]
|
/Linux-v6.1/Documentation/bpf/ |
D | prog_sk_lookup.rst | 4 BPF sk_lookup program 7 BPF sk_lookup program type (``BPF_PROG_TYPE_SK_LOOKUP``) introduces programmability 11 When invoked BPF sk_lookup program can select a socket that will receive the 19 BPF sk_lookup program type was introduced to address setup scenarios where 36 BPF sk_lookup program can be attached to a network namespace with 53 verdict code. As for other BPF program types that are network filters, 58 A BPF sk_lookup program can also select a socket to receive the packet by 59 calling ``bpf_sk_assign()`` BPF helper. Typically, the program looks up a socket 62 selection. Selecting a socket only takes effect if the program has terminated 68 1. If any program returned ``SK_PASS`` and selected a valid socket, the socket [all …]
|
D | bpf_prog_run.rst | 19 execute a BPF program in the kernel and return the results to userspace. This 44 object and (for program types operating on network packets) a buffer containing 45 the packet data that the BPF program will operate on. The kernel will then 46 execute the program and return the results to userspace. Note that programs will 48 will not actually be redirected or dropped, the program return code will just be 57 be processed by the kernel after the execution of the XDP program as if they 59 ``BPF_F_TEST_XDP_LIVE_FRAMES`` flag when supplying an XDP program to 63 XDP program many times (suitable for, e.g., running as a traffic generator), 67 - When executing an XDP program in live frame mode, the result of the execution 69 operation indicated by the program's return code (drop the packet, redirect [all …]
|
D | prog_cgroup_sockopt.rst | 7 ``BPF_PROG_TYPE_CGROUP_SOCKOPT`` program type can be attached to two 26 If BPF program sets ``optlen`` to -1, the control will be returned 38 * ``1`` - success, continue with next BPF program in the cgroup chain. 62 the BPF program from the parent cgroup). 76 the programs are executed from the bottom up: B, A. First program 79 control will be passed to the second (A) program which will see the 82 Same for ``BPF_CGROUP_SETSOCKOPT``: if the program is attached to 85 then the next program in the chain (A) will see those changes, 91 When the ``optval`` is greater than the ``PAGE_SIZE``, the BPF program 96 done by the BPF program to the ``optval`` are ignored. [all …]
|
D | map_cgroup_storage.rst | 11 storage is identified by the cgroup the program is attached to. 13 The map provide a local storage at the cgroup that the BPF program is attached 34 ``attach_type`` is the program's attach type. 42 To access the storage in a program, use ``bpf_get_local_storage``:: 67 int program(struct __sk_buff *skb) 102 int program(struct __sk_buff *skb) 131 for a single ``CGROUP_STORAGE`` map, there can be at most one program loaded 132 that uses the map. A program may be attached to multiple cgroups or have 137 non-per-CPU) and the BPF program during load verification time. As a result, 138 each map can only be used by one BPF program and each BPF program can only use [all …]
|
D | prog_cgroup_sysctl.rst | 7 This document describes ``BPF_PROG_TYPE_CGROUP_SYSCTL`` program type that 17 ``BPF_PROG_TYPE_CGROUP_SYSCTL`` program to a cgroup. 23 BPF program:: 49 ``BPF_PROG_TYPE_CGROUP_SYSCTL`` program must return one of the following 55 If program returns ``0`` user space will get ``-1`` from ``read(2)`` or 65 ``/proc/sys`` into provided by BPF program buffer; 68 sysctl into provided by BPF program buffer. This helper is available on both 78 has to be overridden BPF program can set ``file_pos`` to zero before calling 83 BPF program sees sysctl value same way as user space does in proc filesystem, 98 See `test_sysctl_prog.c`_ for an example of BPF program in C that access [all …]
|
D | prog_lsm.rst | 15 The example shows an eBPF program that can be attached to the ``file_mprotect`` 24 headers for accessing information from the attached eBPF program's context. 25 They can simply declare the structures in the eBPF program and only specify 61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must 63 * ``mprotect_audit`` is the name of the eBPF program 71 /* ret is the return value from the previous BPF program 93 eBPF program. 114 and the program can be loaded by including ``my_prog.skel.h`` and using 124 The program can be detached from the LSM hook by *destroying* the ``link`` 133 An example eBPF program can be found in
|
D | linux-notes.rst | 27 the program context is a pointer to a networking packet. ``BPF_ABS`` 41 These instructions have an implicit program exit condition as well. If an 42 eBPF program attempts access data beyond the packet boundary, the 43 program execution will be aborted.
|
/Linux-v6.1/tools/bpf/bpftool/Documentation/ |
D | bpftool-cgroup.rst | 52 Output will start with program ID followed by attach type, 53 attach flags and program name. 66 program ID, attach type, attach flags and program name. 73 Attach program *PROG* to the cgroup *CGROUP* with attach type 77 some bpf program, the program in this cgroup yields to sub-cgroup 78 program; **multi** if a sub-cgroup installs some bpf program, 79 that cgroup program gets run in addition to the program in this 82 Only one program is allowed to be attached to a cgroup with 84 program will release old program and attach the new one.
|
D | bpftool-prog.rst | 75 Output will start with program ID followed by program type and 79 programs (such as the total time spent running the program, 83 program run. Activation or deactivation of the feature is 99 **visual** is specified, *PROG* must match a single program. 114 Dump jited image (host machine code) of the program. 118 *PROG* must match a single program when **file** is specified. 128 Pin program *PROG* as *FILE*. 135 Load bpf program(s) from binary *OBJ* and pin as *PATH*. 136 **bpftool prog load** pins only the first program from the 139 **type** is optional, if not specified program type will be [all …]
|
D | bpftool-net.rst | 38 List bpf program attachments in the kernel networking subsystem. 42 program types **BPF_PROG_TYPE_SCHED_CLS**, 51 The current output will start with all xdp program attachments, followed by 52 all tc class/qdisc bpf program attachments. Both xdp programs and 60 Attach bpf program *PROG* to network interface *NAME* with 61 type specified by *ATTACH_TYPE*. Previously attached bpf program 72 Detach bpf program attached to network interface *NAME* with 73 type specified by *ATTACH_TYPE*. To detach bpf program, same
|
/Linux-v6.1/security/tomoyo/ |
D | domain.c | 231 && p1->program == p2->program; in tomoyo_same_transition_control() 247 char *program = param->data; in tomoyo_write_transition_control() local 248 char *domainname = strstr(program, " from "); in tomoyo_write_transition_control() 255 domainname = program; in tomoyo_write_transition_control() 256 program = NULL; in tomoyo_write_transition_control() 258 if (program && strcmp(program, "any")) { in tomoyo_write_transition_control() 259 if (!tomoyo_correct_path(program)) in tomoyo_write_transition_control() 261 e.program = tomoyo_get_name(program); in tomoyo_write_transition_control() 262 if (!e.program) in tomoyo_write_transition_control() 280 tomoyo_put_name(e.program); in tomoyo_write_transition_control() [all …]
|
/Linux-v6.1/include/trace/events/ |
D | sunrpc.h | 146 const char *program, 150 TP_ARGS(clnt, xprt, program, server), 156 __string(program, program) 164 __assign_str(program, program); 171 __get_str(program), __get_str(server)) 176 const char *program, 181 TP_ARGS(program, server, error), 185 __string(program, program) 191 __assign_str(program, program); 196 __get_str(program), __get_str(server), __entry->error) [all …]
|
/Linux-v6.1/drivers/media/test-drivers/vidtv/ |
D | vidtv_psi.c | 860 struct vidtv_psi_table_pat_program *program; in vidtv_psi_pat_program_init() local 863 program = kzalloc(sizeof(*program), GFP_KERNEL); in vidtv_psi_pat_program_init() 864 if (!program) in vidtv_psi_pat_program_init() 867 program->service_id = cpu_to_be16(service_id); in vidtv_psi_pat_program_init() 870 program->bitfield = cpu_to_be16((RESERVED << 13) | program_map_pid); in vidtv_psi_pat_program_init() 871 program->next = NULL; in vidtv_psi_pat_program_init() 877 head->next = program; in vidtv_psi_pat_program_init() 880 return program; in vidtv_psi_pat_program_init() 901 struct vidtv_psi_table_pat_program *program; in vidtv_psi_pat_program_assign() local 906 program = p; in vidtv_psi_pat_program_assign() [all …]
|
/Linux-v6.1/Documentation/admin-guide/nfs/ |
D | nfs-idmapper.rst | 34 This will direct all id_resolver requests to the program /usr/sbin/nfs.idmap. 47 program. If you would like to use your own program for a uid lookup then you 52 ``create id_resolver uid:* * /some/other/program %k %d 600`` 56 Notice that the new line was added above the line for the generic program. 57 request-key will find the first matching line and corresponding program. In 58 this case, /some/other/program will handle all uid lookups and 69 hand". This program takes two arguments, a serialized key and a key
|
/Linux-v6.1/tools/testing/selftests/bpf/prog_tests/ |
D | raw_tp_writable_reject_nbd_invalid.c | 12 const struct bpf_insn program[] = { in test_raw_tp_writable_reject_nbd_invalid() local 28 program, sizeof(program) / sizeof(struct bpf_insn), in test_raw_tp_writable_reject_nbd_invalid()
|
/Linux-v6.1/Documentation/misc-devices/ |
D | spear-pcie-gadget.rst | 30 and then program its various registers to configure it as a particular device 68 bar0 is SYSRAM1(E0800000). Always program bar size before bar 90 program vendor id as 0x104a:: 94 program device id as 0xCD80:: 98 program BAR0 size as 1MB:: 108 can also be made visible to PCIe host. E.g., if you program base address of UART 116 program interrupt type : INTA:: 142 if MSI is to be used as interrupt, program no of msi vector needed (say4)::
|
/Linux-v6.1/Documentation/admin-guide/ |
D | java.rst | 8 other program after you have done the following: 60 You, too, need the little program after the script. Compile like:: 66 Both the javawrapper shellscript and the javaclassname program 171 * This program is free software; you can redistribute it and/or modify 176 * This program is distributed in the hope that it will be useful, 182 * along with this program; if not, write to the Free Software 210 #define seek_error() error("%s: Cannot seek\n", program) 211 #define corrupt_error() error("%s: Class file corrupt\n", program) 212 #define eof_error() error("%s: Unexpected end of file\n", program) 213 #define utf8_error() error("%s: Only ASCII 1-255 supported\n", program); [all …]
|
/Linux-v6.1/net/netfilter/ |
D | xt_bpf.c | 27 struct sock_fprog_kern program; in __bpf_mt_check_bytecode() local 32 program.len = len; in __bpf_mt_check_bytecode() 33 program.filter = insns; in __bpf_mt_check_bytecode() 35 if (bpf_prog_create(ret, &program)) { in __bpf_mt_check_bytecode()
|
/Linux-v6.1/drivers/net/wireless/marvell/libertas/ |
D | LICENSE | 4 This program is free software; you can redistribute it and/or modify it 8 This program is distributed in the hope that it will be useful, but WITHOUT 14 this program; if not, write to the Free Software Foundation, Inc., 59
|
/Linux-v6.1/drivers/comedi/drivers/ |
D | dt2815.c | 187 unsigned int program; in dt2815_attach() local 189 program = (it->options[4] & 0x3) << 3 | 0x7; in dt2815_attach() 190 outb(program, dev->iobase + DT2815_DATA); in dt2815_attach() 192 program, i); in dt2815_attach()
|
/Linux-v6.1/arch/nios2/boot/compressed/ |
D | vmlinux.scr | 4 * This program is free software; you can redistribute it and/or modify 9 * This program is distributed in the hope that it will be useful, 15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
|
/Linux-v6.1/arch/arm/nwfpe/ |
D | fpmodule.inl | 7 This program is free software; you can redistribute it and/or modify 12 This program is distributed in the hope that it will be useful, 18 along with this program; if not, write to the Free Software 25 As a result the program counter has been advanced to the next
|
/Linux-v6.1/Documentation/driver-api/fpga/ |
D | fpga-programming.rst | 18 * program the FPGA using info passed in :c:expr:`fpga_region->info`. 22 The struct fpga_image_info specifies what FPGA image to program. It is 26 How to program an FPGA using a region 42 * program. 88 * fpga_image_info() - Specifies what FPGA image to program
|