Searched refs:SEC (Results 1 – 25 of 333) sorted by relevance
12345678910>>...14
| /Linux-v5.10/samples/bpf/ |
| D | spintest_kern.c | 20 } my_map SEC(".maps"); 26 } my_map2 SEC(".maps"); 33 } stackmap SEC(".maps"); 49 SEC("kprobe/spin_unlock")PROG(p1) 50 SEC("kprobe/spin_lock")PROG(p2) 51 SEC("kprobe/mutex_spin_on_owner")PROG(p3) 52 SEC("kprobe/rwsem_spin_on_owner")PROG(p4) 53 SEC("kprobe/spin_unlock_irqrestore")PROG(p5) 54 SEC("kprobe/_raw_spin_unlock_irqrestore")PROG(p6) 55 SEC("kprobe/_raw_spin_unlock_bh")PROG(p7) [all …]
|
| D | map_perf_test_kern.c | 24 } hash_map SEC(".maps"); 31 } lru_hash_map SEC(".maps"); 39 } nocommon_lru_hash_map SEC(".maps"); 48 } inner_lru_hash_map SEC(".maps"); 55 } array_of_lru_hashs SEC(".maps") = { 65 } percpu_hash_map SEC(".maps"); 73 } hash_map_alloc SEC(".maps"); 81 } percpu_hash_map_alloc SEC(".maps"); 89 } lpm_trie_map_alloc SEC(".maps"); 96 } array_map SEC(".maps"); [all …]
|
| D | xdp_monitor_kern.c | 15 } redirect_err_cnt SEC(".maps"); 23 } exception_cnt SEC(".maps"); 68 SEC("tracepoint/xdp/xdp_redirect_err") 75 SEC("tracepoint/xdp/xdp_redirect_map_err") 82 SEC("tracepoint/xdp/xdp_redirect") 89 SEC("tracepoint/xdp/xdp_redirect_map") 105 SEC("tracepoint/xdp/xdp_exception") 137 } cpumap_enqueue_cnt SEC(".maps"); 144 } cpumap_kthread_cnt SEC(".maps"); 159 SEC("tracepoint/xdp/xdp_cpumap_enqueue") [all …]
|
| D | tracex6_kern.c | 11 } counters SEC(".maps"); 18 } values SEC(".maps"); 25 } values2 SEC(".maps"); 27 SEC("kprobe/htab_map_get_next_key") 48 SEC("kprobe/htab_map_lookup_elem") 68 char _license[] SEC("license") = "GPL"; 69 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
| D | test_map_in_map_kern.c | 26 } port_a SEC(".maps"); 34 } port_h SEC(".maps"); 42 } reg_result_h SEC(".maps"); 50 } inline_result_h SEC(".maps"); 58 } a_of_port_a SEC(".maps"); 66 } h_of_port_a SEC(".maps"); 74 } h_of_port_h SEC(".maps"); 106 SEC("kprobe/__sys_connect") 175 char _license[] SEC("license") = "GPL"; 176 u32 _version SEC("version") = LINUX_VERSION_CODE;
|
| /Linux-v5.10/Documentation/devicetree/bindings/crypto/ |
| D | fsl-sec2.txt | 1 Freescale SoC SEC Security Engines versions 1.x-2.x-3.x 6 SEC versions, high to low, e.g., "fsl,sec2.1", "fsl,sec2.0" (SEC2/3) 10 - interrupts : the SEC's interrupt number 17 should be encoded following the SEC's Descriptor Header Dword 21 bit 1 = set if SEC has the ARC4 EU (AFEU) 22 bit 2 = set if SEC has the DES/3DES EU (DEU) 23 bit 3 = set if SEC has the message digest EU (MDEU/MDEU-A) 24 bit 4 = set if SEC has the random number generator EU (RNG) 25 bit 5 = set if SEC has the public key EU (PKEU) 26 bit 6 = set if SEC has the AES EU (AESU) [all …]
|
| D | fsl-sec6.txt | 1 SEC 6 is as Freescale's Cryptographic Accelerator and Assurance Module (CAAM). 2 Currently Freescale powerpc chip C29X is embedded with SEC 6. 3 SEC 6 device tree binding include: 4 -SEC 6 Node 9 SEC 6 Node 13 Node defines the base address of the SEC 6 block. 15 configuration registers for the SEC 6 block. 16 For example, In C293, we could see three SEC 6 node. 28 Definition: A standard property. Define the 'ERA' of the SEC 48 address and length of the SEC 6 configuration registers. [all …]
|
| /Linux-v5.10/tools/testing/selftests/bpf/progs/ |
| D | test_btf_map_in_map.c | 11 } inner_map1 SEC(".maps"), 12 inner_map2 SEC(".maps"); 19 } inner_map_sz2 SEC(".maps"); 35 } outer_arr SEC(".maps") = { 50 } inner_map3 SEC(".maps"), 51 inner_map4 SEC(".maps"); 59 } inner_map5 SEC(".maps"); 73 } outer_arr_dyn SEC(".maps") = { 90 } outer_hash SEC(".maps") = { 102 } sockarr_sz1 SEC(".maps"); [all …]
|
| D | tailcall2.c | 11 } jmp_table SEC(".maps"); 13 SEC("classifier/0") 20 SEC("classifier/1") 27 SEC("classifier/2") 33 SEC("classifier/3") 40 SEC("classifier/4") 47 SEC("classifier") 58 char __license[] SEC("license") = "GPL"; 59 int _version SEC("version") = 1;
|
| D | fentry_test.c | 7 char _license[] SEC("license") = "GPL"; 10 SEC("fentry/bpf_fentry_test1") 18 SEC("fentry/bpf_fentry_test2") 26 SEC("fentry/bpf_fentry_test3") 34 SEC("fentry/bpf_fentry_test4") 42 SEC("fentry/bpf_fentry_test5") 51 SEC("fentry/bpf_fentry_test6") 64 SEC("fentry/bpf_fentry_test7") 73 SEC("fentry/bpf_fentry_test8")
|
| D | trigger_bench.c | 9 char _license[] SEC("license") = "GPL"; 13 SEC("tp/syscalls/sys_enter_getpgid") 20 SEC("raw_tp/sys_enter") 28 SEC("kprobe/__x64_sys_getpgid") 35 SEC("fentry/__x64_sys_getpgid") 42 SEC("fentry.s/__x64_sys_getpgid") 49 SEC("fmod_ret/__x64_sys_getpgid")
|
| D | fexit_test.c | 7 char _license[] SEC("license") = "GPL"; 10 SEC("fexit/bpf_fentry_test1") 18 SEC("fexit/bpf_fentry_test2") 26 SEC("fexit/bpf_fentry_test3") 34 SEC("fexit/bpf_fentry_test4") 43 SEC("fexit/bpf_fentry_test5") 52 SEC("fexit/bpf_fentry_test6") 65 SEC("fexit/bpf_fentry_test7") 74 SEC("fexit/bpf_fentry_test8")
|
| D | test_sockmap_listen.c | 15 } sock_map SEC(".maps"); 22 } sock_hash SEC(".maps"); 29 } verdict_map SEC(".maps"); 33 SEC("sk_skb/stream_parser") 39 SEC("sk_skb/stream_verdict") 58 SEC("sk_msg") 77 SEC("sk_reuseport") 97 int _version SEC("version") = 1; 98 char _license[] SEC("license") = "GPL";
|
| D | tailcall_bpf2bpf4.c | 10 } jmp_table SEC(".maps"); 35 SEC("classifier/1") 41 SEC("classifier/2") 48 SEC("classifier/0") 54 SEC("classifier") 60 char __license[] SEC("license") = "GPL"; 61 int _version SEC("version") = 1;
|
| D | test_sockmap_kern.h | 36 } sock_map SEC(".maps"); 43 } sock_map_txmsg SEC(".maps"); 50 } sock_map_redir SEC(".maps"); 57 } sock_apply_bytes SEC(".maps"); 64 } sock_cork_bytes SEC(".maps"); 71 } sock_bytes SEC(".maps"); 78 } sock_redir_flags SEC(".maps"); 85 } sock_skb_opts SEC(".maps"); 92 } tls_sock_map SEC(".maps"); 94 SEC("sk_skb1") [all …]
|
| D | test_overhead.c | 12 SEC("kprobe/__set_task_comm") 18 SEC("kretprobe/__set_task_comm") 24 SEC("raw_tp/task_rename") 30 SEC("fentry/__set_task_comm") 36 SEC("fexit/__set_task_comm") 42 char _license[] SEC("license") = "GPL";
|
| D | map_ptr_kern.c | 110 } m_hash SEC(".maps"); 146 } m_array SEC(".maps"); 178 } m_prog_array SEC(".maps"); 195 } m_perf_event_array SEC(".maps"); 212 } m_percpu_hash SEC(".maps"); 229 } m_percpu_array SEC(".maps"); 250 } m_stack_trace SEC(".maps"); 269 } m_cgroup_array SEC(".maps"); 286 } m_lru_hash SEC(".maps"); 303 } m_lru_percpu_hash SEC(".maps"); [all …]
|
| D | test_sk_lookup_kern.c | 18 int _version SEC("version") = 1; 19 char _license[] SEC("license") = "GPL"; 56 SEC("classifier/sk_lookup_success") 82 SEC("classifier/sk_lookup_success_simple") 94 SEC("classifier/fail_use_after_free") 109 SEC("classifier/fail_modify_sk_pointer") 124 SEC("classifier/fail_modify_sk_or_null_pointer") 138 SEC("classifier/fail_no_release") 147 SEC("classifier/fail_release_twice") 159 SEC("classifier/fail_release_unchecked") [all …]
|
| D | fexit_bpf2bpf.c | 17 SEC("fexit/test_pkt_access") 32 SEC("fexit/test_pkt_access_subprog1") 65 SEC("fexit/test_pkt_access_subprog2") 89 SEC("fexit/test_pkt_access_subprog3") 104 SEC("freplace/get_skb_len") 116 SEC("freplace/get_skb_ifindex") 148 SEC("freplace/get_constant") 158 SEC("freplace/test_pkt_write_access_subprog") 181 char _license[] SEC("license") = "GPL";
|
| D | sockmap_verdict_prog.c | 5 int _version SEC("version") = 1; 12 } sock_map_rx SEC(".maps"); 19 } sock_map_tx SEC(".maps"); 26 } sock_map_msg SEC(".maps"); 33 } sock_map_break SEC(".maps"); 35 SEC("sk_skb2") 65 char _license[] SEC("license") = "GPL";
|
| D | test_stacktrace_build_id.c | 16 } control_map SEC(".maps"); 23 } stackid_hmap SEC(".maps"); 33 } stackmap SEC(".maps"); 40 } stack_amap SEC(".maps"); 50 SEC("tracepoint/random/urandom_read") 75 char _license[] SEC("license") = "GPL"; 76 __u32 _version SEC("version") = 1; /* ignored by tracepoints, required by libbpf.a */
|
| D | lsm.c | 17 } array SEC(".maps"); 24 } hash SEC(".maps"); 31 } lru_hash SEC(".maps"); 33 char _license[] SEC("license") = "GPL"; 39 SEC("lsm/file_mprotect") 60 SEC("lsm.s/bprm_committed_creds") 86 SEC("lsm/task_free") /* lsm/ is ok, lsm.s/ fails */ 94 SEC("fentry.s/__x64_sys_setdomainname")
|
| D | tailcall_bpf2bpf3.c | 11 } jmp_table SEC(".maps"); 36 SEC("classifier/0") 44 SEC("classifier/1") 52 SEC("classifier") 60 char __license[] SEC("license") = "GPL"; 61 int _version SEC("version") = 1;
|
| D | test_attach_probe.c | 14 SEC("kprobe/sys_nanosleep") 21 SEC("kretprobe/sys_nanosleep") 28 SEC("uprobe/trigger_func") 35 SEC("uretprobe/trigger_func") 42 char _license[] SEC("license") = "GPL";
|
| /Linux-v5.10/tools/perf/include/bpf/ |
| D | bpf.h | 22 struct bpf_map SEC("maps") name = { \ 50 #define SEC(NAME) __attribute__((section(NAME), used)) macro 53 SEC(#function "=" #function " " #vars) function 56 SEC("syscalls:sys_enter_" #name) syscall_enter_ ## name 59 SEC("syscalls:sys_exit_" #name) syscall_exit_ ## name 62 char _license[] SEC("license") = #name; \ 63 int _version SEC("version") = LINUX_VERSION_CODE;
|
12345678910>>...14