/external/libchrome/sandbox/linux/seccomp-bpf/ |
sandbox_bpf.cc | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 25 #include "sandbox/linux/seccomp-bpf/die.h" 26 #include "sandbox/linux/seccomp-bpf/syscall.h" 27 #include "sandbox/linux/seccomp-bpf/trap.h" 241 // installed the BPF filter program in the kernel. Depending on the 246 struct sock_filter bpf[program.size()]; local 248 bpf}; 249 memcpy(bpf, &program[0], sizeof(bpf)); 261 // Install BPF filter program. If the thread state indicates multi-threadin [all...] |
/frameworks/base/services/tests/servicestests/jni/ |
apf_jni.cpp | 82 // Compile "filter" to a BPF program 83 bpf_program bpf; local 84 if (pcap_compile(pcap.get(), &bpf, filter.c_str(), 0, PCAP_NETMASK_UNKNOWN)) { 89 // Translate BPF program to human-readable format 90 const struct bpf_insn* insn = bpf.bf_insns; 91 for (uint32_t i = 0; i < bpf.bf_len; i++) { 106 // Open pcap file for BPF filtering 123 // Compile "filter" to a BPF program 124 bpf_program bpf; local 125 if (pcap_compile(bpf_pcap.get(), &bpf, filter.c_str(), 0, PCAP_NETMASK_UNKNOWN)) [all...] |
/external/avahi/avahi-autoipd/ |
main.c | 628 struct bpf_program bpf; local 647 * Using a timeout for BPF is fairly portable across BSDs. On most 696 err = pcap_compile(pp, &bpf, filter, 1, 0); 703 err = pcap_setfilter(pp, &bpf); 709 pcap_freecode(&bpf); [all...] |
/external/iproute2/tc/ |
tc_bpf.c | 2 * tc_bpf.c BPF common code 38 #include <linux/bpf.h> 70 static int bpf(int cmd, union bpf_attr *attr, unsigned int size) function 75 fprintf(stderr, "No bpf syscall, kernel headers too old?\n"); 91 return bpf(BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr)); 281 if (mount("bpf", target, "bpf", 0, NULL)) { 282 fprintf(stderr, "mount -t bpf bpf %s failed: %s\n", 397 mnt = bpf_find_mntpt("bpf", BPF_FS_MAGIC, bpf_mnt, sizeof(bpf_mnt) [all...] |