Searched refs:filter (Results 1 – 15 of 15) sorted by relevance
| /samples/seccomp/ |
| A D | bpf-helper.c | 20 struct sock_filter *filter, size_t count) in bpf_resolve_jumps() argument 32 struct sock_filter *instr = &filter[offset]; in bpf_resolve_jumps() 90 void seccomp_bpf_print(struct sock_filter *filter, size_t count) in seccomp_bpf_print() argument 92 struct sock_filter *end = filter + count; in seccomp_bpf_print() 93 for ( ; filter < end; ++filter) in seccomp_bpf_print() 95 filter->code, filter->jt, filter->jf, filter->k); in seccomp_bpf_print()
|
| A D | dropper.c | 30 struct sock_filter filter[] = { in install_filter() local 42 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])), in install_filter() 43 .filter = filter, in install_filter() 47 filter[4] = kill; in install_filter()
|
| A D | bpf-fancy.c | 35 struct sock_filter filter[] = { in main() local 82 .filter = filter, in main() 83 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])), in main() 86 bpf_resolve_jumps(&l, filter, sizeof(filter)/sizeof(*filter)); in main()
|
| A D | bpf-direct.c | 113 struct sock_filter filter[] = { in install_filter() local 146 .len = (unsigned short)(sizeof(filter)/sizeof(filter[0])), in install_filter() 147 .filter = filter, in install_filter()
|
| A D | user-trap.c | 92 struct sock_filter filter[] = { in user_trap_syscall() local 101 .len = (unsigned short)ARRAY_SIZE(filter), in user_trap_syscall() 102 .filter = filter, in user_trap_syscall()
|
| A D | bpf-helper.h | 36 struct sock_filter *filter, size_t count); 38 void seccomp_bpf_print(struct sock_filter *filter, size_t count);
|
| /samples/bpf/ |
| A D | tracex5_user.c | 24 struct sock_filter filter[] = { in install_accept_all_seccomp() local 28 .len = (unsigned short)ARRAY_SIZE(filter), in install_accept_all_seccomp() 29 .filter = filter, in install_accept_all_seccomp()
|
| A D | xdp2skb_meta.sh | 148 call_tc filter show dev $device ingress 164 call_tc_allow_fail filter del dev $device ingress 188 call_tc filter add dev $device ingress \
|
| A D | tc_l2_redirect.sh | 46 $IP netns exec ns2 $TC filter add dev vens2 ingress bpf da obj $REDIRECT_BPF sec drop_non_tun_vip 64 $TC filter add dev ve2 ingress bpf da obj $REDIRECT_BPF sec l2_to_iptun_ingress_forward 102 $TC filter add dev ve2 egress bpf da obj $REDIRECT_BPF sec l2_to_iptun_ingress_redirect 106 $TC filter add dev ve1 ingress bpf da obj $REDIRECT_BPF sec l2_to_iptun_ingress_redirect 139 $TC filter add dev ve2 egress bpf da obj $REDIRECT_BPF sec l2_to_ip6tun_ingress_redirect 143 $TC filter add dev ve1 ingress bpf da obj $REDIRECT_BPF sec l2_to_ip6tun_ingress_redirect
|
| A D | test_cls_bpf.sh | 18 tc filter add dev $IFC ingress bpf da obj $1 sec $2
|
| A D | Makefile | 132 ARM_ARCH_SELECTOR := $(filter -D__LINUX_ARM_ARCH__%, $(KBUILD_CFLAGS)) 348 -c $(filter %.bpf.c,$^) -o $@
|
| /samples/damon/ |
| A D | mtier.c | 81 struct damos_filter *filter; in damon_sample_mtier_build_ctx() local 162 filter = damos_new_filter(DAMOS_FILTER_TYPE_YOUNG, true, promote); in damon_sample_mtier_build_ctx() 163 if (!filter) in damon_sample_mtier_build_ctx() 165 damos_add_filter(scheme, filter); in damon_sample_mtier_build_ctx()
|
| /samples/watch_queue/ |
| A D | watch_test.c | 144 static struct watch_notification_filter filter = { variable 169 if (ioctl(fd, IOC_WATCH_QUEUE_SET_FILTER, &filter) == -1) { in main()
|
| /samples/hid/ |
| A D | Makefile | 30 ARM_ARCH_SELECTOR := $(filter -D__LINUX_ARM_ARCH__%, $(KBUILD_CFLAGS)) 205 -c $(filter %.bpf.c,$^) -o $@
|
| /samples/ |
| A D | Kconfig | 181 BPF filter construction.
|
Completed in 22 milliseconds