/external/adeb/bcc/misc/ |
D | lockstat.py | 207 bpf_program = BPF(text=bpf_source) variable 208 bpf_program.attach_kprobe(event="SyS_futex", fn_name="sys_futex_enter") 209 bpf_program.attach_kretprobe(event="SyS_futex", fn_name="sys_futex_exit") 212 global bpf_program 215 s = bpf_program.sym(addr, pid, show_offset=True) 233 s = bpf_program.sym(addr, pid, show_offset=True) 236 global bpf_program 237 stats = bpf_program["lock_stats"] 239 stack_traces = bpf_program['stack_traces'] 263 comms = bpf_program["tgid_comm"] [all …]
|
/external/bcc/tools/old/ |
D | memleak.py | 228 bpf_program = BPF(text=bpf_source) variable 232 bpf_program.attach_uprobe(name="c", sym="malloc", 234 bpf_program.attach_uretprobe(name="c", sym="malloc", 236 bpf_program.attach_uprobe(name="c", sym="free", 240 bpf_program.attach_kprobe(event="__kmalloc", fn_name="alloc_enter") 241 bpf_program.attach_kretprobe(event="__kmalloc", fn_name="alloc_exit") 242 bpf_program.attach_kprobe(event="kfree", fn_name="free_enter") 248 allocs = bpf_program.get_table("allocs") 252 stack = decode_stack(bpf_program, pid, info) 269 print(bpf_program.trace_fields())
|
/external/iptables/extensions/ |
D | libxt_bpf.c | 93 const char *bpf_program) in bpf_parse_string() argument 102 if (sscanf(bpf_program, "%hu%c", &len, &sp) != 2 || in bpf_parse_string() 115 token = bpf_program; in bpf_parse_string() 160 bpf_parse_string(bi->bpf_program, &bi->bpf_program_num_elem, in bpf_parse() 161 ARRAY_SIZE(bi->bpf_program), cb->arg); in bpf_parse() 175 bpf_parse_string(bi->bpf_program, &bi->bpf_program_num_elem, in bpf_parse_v1() 176 ARRAY_SIZE(bi->bpf_program), cb->arg); in bpf_parse_v1() 206 bpf_save_code(info->bpf_program, info->bpf_program_num_elem); in bpf_save() 214 bpf_save_code(info->bpf_program, info->bpf_program_num_elem); in bpf_save_v1() 246 bpf_print_code(info->bpf_program, info->bpf_program_num_elem, '\0'); in bpf_print() [all …]
|
/external/tcpdump/ |
D | interface.h | 75 struct bpf_program; 77 extern void bpf_dump(const struct bpf_program *, int);
|
D | bpf_dump.c | 33 bpf_dump(const struct bpf_program *p, int option) in bpf_dump()
|
/external/iptables/include/linux/netfilter/ |
D | xt_bpf.h | 15 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; member 32 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; member
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_bpf.h | 16 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; member 34 struct sock_filter bpf_program[XT_BPF_MAX_NUM_INSTR]; member
|
/external/libpcap/pcap/ |
D | pcap.h | 446 PCAP_API int pcap_setfilter(pcap_t *, struct bpf_program *); 456 PCAP_API int pcap_compile(pcap_t *, struct bpf_program *, const char *, int, 458 PCAP_API int pcap_compile_nopcap(int, int, struct bpf_program *, 460 PCAP_API void pcap_freecode(struct bpf_program *); 461 PCAP_API int pcap_offline_filter(const struct bpf_program *, 527 PCAP_API void bpf_dump(const struct bpf_program *, int);
|
/external/scapy/scapy/modules/ |
D | winpcapy.py | 60 class bpf_program(Structure): class 62 bpf_program._fields_ = [('bf_len', u_int), 369 pcap_compile.argtypes = [POINTER(pcap_t), POINTER(bpf_program), STRING, c_int, bpf_u_int32] 375 pcap_compile_nopcap.argtypes = [c_int, c_int, POINTER(bpf_program), STRING, c_int, bpf_u_int32] 381 pcap_setfilter.argtypes = [POINTER(pcap_t), POINTER(bpf_program)] 387 pcap_freecode.argtypes = [POINTER(bpf_program)] 622 pcap_offline_filter.argtypes = [POINTER(bpf_program),POINTER(pcap_pkthdr),POINTER(u_char)]
|
/external/ppp/pppd/include/net/ |
D | if_ppp.h | 133 #define PPPIOCSPASS _IOW('t', 71, struct bpf_program) /* set pass filter */ 134 #define PPPIOCSACTIVE _IOW('t', 70, struct bpf_program) /* set active filt */
|
/external/scapy/scapy/arch/ |
D | common.py | 34 class bpf_program(Structure): class 81 return bpf_program(size, bip)
|
/external/libpcap/ |
D | pcap-int.h | 123 typedef int (*setfilter_op_t)(pcap_t *, struct bpf_program *); 243 struct bpf_program fcode; 495 int install_bpf_program(pcap_t *, struct bpf_program *);
|
D | pcap-septel.c | 44 static int septel_setfilter(pcap_t *p, struct bpf_program *fp); 292 static int septel_setfilter(pcap_t *p, struct bpf_program *fp) { in septel_setfilter()
|
D | bpf_dump.c | 32 bpf_dump(const struct bpf_program *p, int option) in bpf_dump()
|
/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/ |
D | fexit_bpf2bpf.c | 13 struct bpf_program **prog = NULL; in test_fexit_bpf2bpf_common() 28 prog = calloc(sizeof(struct bpf_program *), prog_cnt); in test_fexit_bpf2bpf_common()
|
D | tailcalls.c | 12 struct bpf_program *prog; in test_tailcall_1() 150 struct bpf_program *prog; in test_tailcall_2() 228 struct bpf_program *prog; in test_tailcall_3() 306 struct bpf_program *prog; in test_tailcall_4() 394 struct bpf_program *prog; in test_tailcall_5()
|
D | test_overhead.c | 64 struct bpf_program *kprobe_prog, *kretprobe_prog, *raw_tp_prog; in test_test_overhead() 65 struct bpf_program *fentry_prog, *fexit_prog; in test_test_overhead()
|
D | attach_probe.c | 57 struct bpf_program *kprobe_prog, *kretprobe_prog; in test_attach_probe() 58 struct bpf_program *uprobe_prog, *uretprobe_prog; in test_attach_probe()
|
D | reference_tracking.c | 13 struct bpf_program *prog; in test_reference_tracking()
|
D | sockopt_multi.c | 9 struct bpf_program *prog; in prog_attach() 38 struct bpf_program *prog; in prog_detach()
|
/external/iptables/utils/ |
D | nfbpf_compile.c | 17 struct bpf_program program; in main()
|
/external/ppp/pppd/include/ |
D | pcap-int.h | 95 struct bpf_program fcode;
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | flow_dissector_load.h | 16 struct bpf_program *prog, *main_prog; in bpf_flow_load()
|
/external/ppp/pppd/ |
D | pppd.h | 345 extern struct bpf_program pass_filter; /* Filter for pkts to pass */ 346 extern struct bpf_program active_filter; /* Filter for link-active pkts */ 687 int set_filters __P((struct bpf_program *pass, struct bpf_program *active));
|
/external/libpcap/testprogs/ |
D | valgrindtest.c | 242 struct bpf_program bad_fcode; in main() 248 struct bpf_program fcode; in main()
|