OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:bpf
(Results
1 - 3
of
3
) sorted by null
/external/chromium_org/components/tracing/
child_trace_message_filter.cc
106
float
bpf
= TraceLog::GetInstance()->GetBufferPercentFull();
local
108
sender_->Send(new TracingHostMsg_TraceBufferPercentFullReply(
bpf
));
/external/chromium_org/sandbox/linux/seccomp-bpf/
codegen_unittest.cc
11
#include "sandbox/linux/seccomp-
bpf
/codegen.h"
12
#include "sandbox/linux/seccomp-
bpf
/sandbox_bpf.h"
43
// Create the most basic valid
BPF
program:
80
// Creates a basic
BPF
program that we'll use to test some of the code:
269
// well-formed
BPF
program.
270
// Perform a depth-first traversal of the
BPF
program an verify that all
463
// we also serialize the graph and the resulting
BPF
program and compare
499
SandboxUnittestHelper::Program
bpf
;
local
500
codegen->Compile(prg, &
bpf
);
502
// Serialize the resulting
BPF
instructions
[
all
...]
sandbox_bpf.cc
5
#include "sandbox/linux/seccomp-
bpf
/sandbox_bpf.h"
28
#include "sandbox/linux/seccomp-
bpf
/codegen.h"
29
#include "sandbox/linux/seccomp-
bpf
/sandbox_bpf_policy.h"
30
#include "sandbox/linux/seccomp-
bpf
/syscall.h"
31
#include "sandbox/linux/seccomp-
bpf
/syscall_iterator.h"
32
#include "sandbox/linux/seccomp-
bpf
/verifier.h"
102
// vsyscall=emulate and some versions of the seccomp
BPF
patch
164
// Checks whether the "insn" returns an errno value from a
BPF
filter. If so,
170
// something that kernel-side
BPF
filters can do, as they cannot inspect
186
// made by RedirectToUserspace(). This is part of the framework that allows
BPF
517
struct sock_filter
bpf
[program->size()];
local
[
all
...]
Completed in 70 milliseconds