#[non_exhaustive]#[repr(u32)]pub enum ProgramType {
Show 33 variants
Unspec = 0,
SocketFilter = 1,
Kprobe = 2,
SchedCls = 3,
SchedAct = 4,
Tracepoint = 5,
Xdp = 6,
PerfEvent = 7,
CgroupSkb = 8,
CgroupSock = 9,
LwtIn = 10,
LwtOut = 11,
LwtXmit = 12,
SockOps = 13,
SkSkb = 14,
CgroupDevice = 15,
SkMsg = 16,
RawTracepoint = 17,
CgroupSockAddr = 18,
LwtSeg6local = 19,
LircMode2 = 20,
SkReuseport = 21,
FlowDissector = 22,
CgroupSysctl = 23,
RawTracepointWritable = 24,
CgroupSockopt = 25,
Tracing = 26,
StructOps = 27,
Ext = 28,
Lsm = 29,
SkLookup = 30,
Syscall = 31,
Unknown = 4_294_967_295,
}
Expand description
Type of a Program
. Maps to enum bpf_prog_type
in kernel uapi.
Variants (Non-exhaustive)§
This enum is marked as non-exhaustive
Non-exhaustive enums could have additional variants added in future. Therefore, when matching against variants of non-exhaustive enums, an extra wildcard arm must be added to account for any future variants.
Unspec = 0
SocketFilter = 1
Kprobe = 2
SchedCls = 3
SchedAct = 4
Tracepoint = 5
Xdp = 6
PerfEvent = 7
CgroupSkb = 8
CgroupSock = 9
LwtIn = 10
LwtOut = 11
LwtXmit = 12
SockOps = 13
SkSkb = 14
CgroupDevice = 15
SkMsg = 16
RawTracepoint = 17
CgroupSockAddr = 18
LwtSeg6local = 19
LircMode2 = 20
SkReuseport = 21
FlowDissector = 22
CgroupSysctl = 23
RawTracepointWritable = 24
CgroupSockopt = 25
Tracing = 26
StructOps = 27
Ext = 28
Lsm = 29
SkLookup = 30
Syscall = 31
Unknown = 4_294_967_295
See MapType::Unknown
Implementations§
Source§impl ProgramType
impl ProgramType
Sourcepub fn is_supported(&self) -> Result<bool>
pub fn is_supported(&self) -> Result<bool>
Detects if host kernel supports this BPF program type
Make sure the process has required set of CAP_* permissions (or runs as root) when performing feature checking.
Sourcepub fn is_helper_supported(&self, helper_id: bpf_func_id) -> Result<bool>
pub fn is_helper_supported(&self, helper_id: bpf_func_id) -> Result<bool>
Detects if host kernel supports the use of a given BPF helper from this BPF program type.
helper_id
- BPF helper ID (enum bpf_func_id) to check support for
Make sure the process has required set of CAP_* permissions (or runs as root) when performing feature checking.
Trait Implementations§
Source§impl Clone for ProgramType
impl Clone for ProgramType
Source§fn clone(&self) -> ProgramType
fn clone(&self) -> ProgramType
Returns a copy of the value. Read more
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from
source
. Read moreSource§impl Debug for ProgramType
impl Debug for ProgramType
Source§impl From<u32> for ProgramType
impl From<u32> for ProgramType
impl Copy for ProgramType
Auto Trait Implementations§
impl Freeze for ProgramType
impl RefUnwindSafe for ProgramType
impl Send for ProgramType
impl Sync for ProgramType
impl Unpin for ProgramType
impl UnwindSafe for ProgramType
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
🔬This is a nightly-only experimental API. (
clone_to_uninit
)