HomeSort by relevance Sort by last modified time
    Searched defs:bpf (Results 1 - 3 of 3) sorted by null

  /external/chromium_org/components/tracing/
child_trace_message_filter.cc 106 float bpf = TraceLog::GetInstance()->GetBufferPercentFull(); local
108 sender_->Send(new TracingHostMsg_TraceBufferPercentFullReply(bpf));
  /external/chromium_org/sandbox/linux/seccomp-bpf/
codegen_unittest.cc 11 #include "sandbox/linux/seccomp-bpf/codegen.h"
12 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
43 // Create the most basic valid BPF program:
80 // Creates a basic BPF program that we'll use to test some of the code:
269 // well-formed BPF program.
270 // Perform a depth-first traversal of the BPF program an verify that all
463 // we also serialize the graph and the resulting BPF program and compare
499 SandboxUnittestHelper::Program bpf; local
500 codegen->Compile(prg, &bpf);
502 // Serialize the resulting BPF instructions
    [all...]
sandbox_bpf.cc 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
28 #include "sandbox/linux/seccomp-bpf/codegen.h"
29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
30 #include "sandbox/linux/seccomp-bpf/syscall.h"
31 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
32 #include "sandbox/linux/seccomp-bpf/verifier.h"
102 // vsyscall=emulate and some versions of the seccomp BPF patch
164 // Checks whether the "insn" returns an errno value from a BPF filter. If so,
170 // something that kernel-side BPF filters can do, as they cannot inspect
186 // made by RedirectToUserspace(). This is part of the framework that allows BPF
517 struct sock_filter bpf[program->size()]; local
    [all...]

Completed in 70 milliseconds