Searched refs:allow_prog (Results 1 – 2 of 2) sorted by relevance
/Linux-v4.19/samples/bpf/ |
D | test_cgrp2_attach2.c | 65 int drop_prog, allow_prog, foo = 0, bar = 0, rc = 0; in test_foo_bar() local 67 allow_prog = prog_load(1); in test_foo_bar() 68 if (!allow_prog) in test_foo_bar() 106 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 124 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 139 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 145 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 162 if (bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 167 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 173 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() [all …]
|
/Linux-v4.19/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 2792 struct sock_fprog allow_prog = { in TEST_SIGNAL() local 2808 &allow_prog); in TEST_SIGNAL() 2820 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &allow_prog); in TEST_SIGNAL() 2825 &allow_prog); in TEST_SIGNAL()
|