HomeSort by relevance Sort by last modified time
    Searched defs:bpf (Results 1 - 3 of 3) sorted by null

  /external/libchrome/sandbox/linux/seccomp-bpf/
sandbox_bpf.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
25 #include "sandbox/linux/seccomp-bpf/die.h"
26 #include "sandbox/linux/seccomp-bpf/syscall.h"
27 #include "sandbox/linux/seccomp-bpf/trap.h"
240 // installed the BPF filter program in the kernel. Depending on the
245 struct sock_filter bpf[program.size()]; local
247 bpf};
248 memcpy(bpf, &program[0], sizeof(bpf));
260 // Install BPF filter program. If the thread state indicates multi-threadin
    [all...]
  /frameworks/base/tests/net/jni/
apf_jni.cpp 82 // Compile "filter" to a BPF program
83 bpf_program bpf; local
84 if (pcap_compile(pcap.get(), &bpf, filter.c_str(), 0, PCAP_NETMASK_UNKNOWN)) {
89 // Translate BPF program to human-readable format
90 const struct bpf_insn* insn = bpf.bf_insns;
91 for (uint32_t i = 0; i < bpf.bf_len; i++) {
106 // Open pcap file for BPF filtering
123 // Compile "filter" to a BPF program
124 bpf_program bpf; local
125 if (pcap_compile(bpf_pcap.get(), &bpf, filter.c_str(), 0, PCAP_NETMASK_UNKNOWN))
    [all...]
  /external/iproute2/tc/
tc_bpf.c 2 * tc_bpf.c BPF common code
38 #include <linux/bpf.h>
70 static int bpf(int cmd, union bpf_attr *attr, unsigned int size) function
75 fprintf(stderr, "No bpf syscall, kernel headers too old?\n");
91 return bpf(BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr));
281 if (mount("bpf", target, "bpf", 0, NULL)) {
282 fprintf(stderr, "mount -t bpf bpf %s failed: %s\n",
397 mnt = bpf_find_mntpt("bpf", BPF_FS_MAGIC, bpf_mnt, sizeof(bpf_mnt)
    [all...]

Completed in 64 milliseconds