OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:bpf
(Results
1 - 25
of
32
) sorted by null
1
2
/external/libpcap/ChmodBPF/
ChmodBPF
10
# to create
BPF
devices with particular owners or groups.
22
chgrp admin /dev/
bpf
*
23
chmod g+rw /dev/
bpf
*
/external/dhcpcd/mk/
os-BSD.mk
4
SRC_PF=
bpf
.c
/external/libpcap/
Android.mk
6
bpf
/net/bpf_filter.c\
pcap-enet.c
25
#include <pcap-
bpf
.h>
pcap.h
51
#include <pcap-
bpf
.h>
66
* Compatibility for systems that have a
bpf
.h that
67
* predates the
bpf
typedefs for 64-bit support.
275
/* XXX this guy lives in the
bpf
tree */
pcap1.h
48
#include <pcap-
bpf
.h>
63
* Compatibility for systems that have a
bpf
.h that
64
* predates the
bpf
typedefs for 64-bit support.
265
/* XXX this guy lives in the
bpf
tree */
pcap-bpf.c
23
"@(#) $Header: /tcpdump/master/libpcap/pcap-
bpf
.c,v 1.86.2.12 2007/06/15 17:57:27 guy Exp $ (LBL)";
43
* Make "pcap.h" not include "pcap-
bpf
.h"; we are going to include the
51
* Prevent
bpf
.h from redefining the DLT_ values to their
56
#include <net/
bpf
.h>
74
#define BPF_NAME "
bpf
"
77
#define BPF_NODE "/dev/
bpf
"
83
#include <net/
bpf
.h>
121
* "ps_drop" counts packets dropped inside the
BPF
device
182
* operation in the
bpf
kernel extension
262
* Short-circuit evaluation: if using
BPF
filte
[
all
...]
/external/dnsmasq/src/
Android.mk
6
LOCAL_SRC_FILES :=
bpf
.c cache.c dbus.c dhcp.c dnsmasq.c forward.c helper.c lease.c log.c \
bpf.c
134
#include <net/
bpf
.h>
145
sprintf(ifreq.iov_base, "/dev/
bpf
%d", i++);
150
die(_("cannot create DHCP
BPF
socket: %s"), NULL, EC_BADNET);
/external/chromium_org/sandbox/
seccomp_bpf.target.darwin-arm.mk
27
sandbox/linux/seccomp-
bpf
/basicblock.cc \
28
sandbox/linux/seccomp-
bpf
/codegen.cc \
29
sandbox/linux/seccomp-
bpf
/die.cc \
30
sandbox/linux/seccomp-
bpf
/errorcode.cc \
31
sandbox/linux/seccomp-
bpf
/sandbox_bpf.cc \
32
sandbox/linux/seccomp-
bpf
/syscall.cc \
33
sandbox/linux/seccomp-
bpf
/syscall_iterator.cc \
34
sandbox/linux/seccomp-
bpf
/trap.cc \
35
sandbox/linux/seccomp-
bpf
/verifier.cc
seccomp_bpf.target.darwin-x86.mk
27
sandbox/linux/seccomp-
bpf
/basicblock.cc \
28
sandbox/linux/seccomp-
bpf
/codegen.cc \
29
sandbox/linux/seccomp-
bpf
/die.cc \
30
sandbox/linux/seccomp-
bpf
/errorcode.cc \
31
sandbox/linux/seccomp-
bpf
/sandbox_bpf.cc \
32
sandbox/linux/seccomp-
bpf
/syscall.cc \
33
sandbox/linux/seccomp-
bpf
/syscall_iterator.cc \
34
sandbox/linux/seccomp-
bpf
/trap.cc \
35
sandbox/linux/seccomp-
bpf
/verifier.cc
seccomp_bpf.target.linux-arm.mk
27
sandbox/linux/seccomp-
bpf
/basicblock.cc \
28
sandbox/linux/seccomp-
bpf
/codegen.cc \
29
sandbox/linux/seccomp-
bpf
/die.cc \
30
sandbox/linux/seccomp-
bpf
/errorcode.cc \
31
sandbox/linux/seccomp-
bpf
/sandbox_bpf.cc \
32
sandbox/linux/seccomp-
bpf
/syscall.cc \
33
sandbox/linux/seccomp-
bpf
/syscall_iterator.cc \
34
sandbox/linux/seccomp-
bpf
/trap.cc \
35
sandbox/linux/seccomp-
bpf
/verifier.cc
seccomp_bpf.target.linux-x86.mk
27
sandbox/linux/seccomp-
bpf
/basicblock.cc \
28
sandbox/linux/seccomp-
bpf
/codegen.cc \
29
sandbox/linux/seccomp-
bpf
/die.cc \
30
sandbox/linux/seccomp-
bpf
/errorcode.cc \
31
sandbox/linux/seccomp-
bpf
/sandbox_bpf.cc \
32
sandbox/linux/seccomp-
bpf
/syscall.cc \
33
sandbox/linux/seccomp-
bpf
/syscall_iterator.cc \
34
sandbox/linux/seccomp-
bpf
/trap.cc \
35
sandbox/linux/seccomp-
bpf
/verifier.cc
seccomp_bpf_helpers.target.darwin-arm.mk
26
sandbox/linux/seccomp-
bpf
-helpers/baseline_policy.cc \
27
sandbox/linux/seccomp-
bpf
-helpers/sigsys_handlers.cc \
28
sandbox/linux/seccomp-
bpf
-helpers/syscall_parameters_restrictions.cc \
29
sandbox/linux/seccomp-
bpf
-helpers/syscall_sets.cc
seccomp_bpf_helpers.target.darwin-x86.mk
26
sandbox/linux/seccomp-
bpf
-helpers/baseline_policy.cc \
27
sandbox/linux/seccomp-
bpf
-helpers/sigsys_handlers.cc \
28
sandbox/linux/seccomp-
bpf
-helpers/syscall_parameters_restrictions.cc \
29
sandbox/linux/seccomp-
bpf
-helpers/syscall_sets.cc
seccomp_bpf_helpers.target.linux-arm.mk
26
sandbox/linux/seccomp-
bpf
-helpers/baseline_policy.cc \
27
sandbox/linux/seccomp-
bpf
-helpers/sigsys_handlers.cc \
28
sandbox/linux/seccomp-
bpf
-helpers/syscall_parameters_restrictions.cc \
29
sandbox/linux/seccomp-
bpf
-helpers/syscall_sets.cc
seccomp_bpf_helpers.target.linux-x86.mk
26
sandbox/linux/seccomp-
bpf
-helpers/baseline_policy.cc \
27
sandbox/linux/seccomp-
bpf
-helpers/sigsys_handlers.cc \
28
sandbox/linux/seccomp-
bpf
-helpers/syscall_parameters_restrictions.cc \
29
sandbox/linux/seccomp-
bpf
-helpers/syscall_sets.cc
/external/dnsmasq/bld/
Makefile
4
dnsmasq.o dhcp.o lease.o rfc2131.o netlink.o dbus.o
bpf
.o \
/external/chromium_org/components/tracing/
child_trace_message_filter.cc
103
float
bpf
= TraceLog::GetInstance()->GetBufferPercentFull();
local
105
channel_->Send(new TracingHostMsg_TraceBufferPercentFullReply(
bpf
));
/external/chromium_org/sandbox/linux/seccomp-bpf/
codegen_unittest.cc
11
#include "sandbox/linux/seccomp-
bpf
/codegen.h"
12
#include "sandbox/linux/seccomp-
bpf
/sandbox_bpf.h"
47
// Create the most basic valid
BPF
program:
84
// Creates a basic
BPF
program that we'll use to test some of the code:
176
// well-formed
BPF
program.
177
// Perform a depth-first traversal of the
BPF
program an verify that all
371
// we also serialize the graph and the resulting
BPF
program and compare
408
SandboxUnittestHelper::Program
bpf
;
local
409
codegen->Compile(prg, &
bpf
);
411
// Serialize the resulting
BPF
instructions
[
all
...]
sandbox_bpf.cc
5
#include "sandbox/linux/seccomp-
bpf
/sandbox_bpf.h"
27
#include "sandbox/linux/seccomp-
bpf
/codegen.h"
28
#include "sandbox/linux/seccomp-
bpf
/sandbox_bpf_policy.h"
29
#include "sandbox/linux/seccomp-
bpf
/syscall.h"
30
#include "sandbox/linux/seccomp-
bpf
/syscall_iterator.h"
31
#include "sandbox/linux/seccomp-
bpf
/verifier.h"
90
// vsyscall=emulate and some versions of the seccomp
BPF
patch
152
// Checks whether the "insn" returns an errno value from a
BPF
filter. If so,
158
// something that kernel-side
BPF
filters can do, as they cannot inspect
174
// made by RedirectToUserspace(). This is part of the framework that allows
BPF
516
struct sock_filter
bpf
[program->size()];
local
[
all
...]
/external/libpcap/packaging/
pcap.spec
51
#install -m 644 -o root pcap-
bpf
.h $RPM_BUILD_ROOT/usr/include/net
63
/usr/include/pcap-
bpf
.h
/external/dhcpcd/
bpf.c
32
#include <net/
bpf
.h>
49
#include "
bpf
-filter.h"
71
snprintf(device, PATH_MAX, "/dev/
bpf
%d", n++);
84
syslog(LOG_ERR, "
BPF
version mismatch - recompile");
93
/* Get the required
BPF
buffer length from the kernel. */
159
/*
BPF
requires that we read the entire buffer.
/external/ppp/pppd/
Makefile.linux
174
ifneq ($(wildcard /usr/include/pcap-
bpf
.h),)
demand.c
47
#include <pcap-
bpf
.h>
Completed in 818 milliseconds
1
2