Home
last modified time | relevance | path

Searched refs:allow_prog (Results 1 – 2 of 2) sorted by relevance

/Linux-v4.19/samples/bpf/
Dtest_cgrp2_attach2.c65 int drop_prog, allow_prog, foo = 0, bar = 0, rc = 0; in test_foo_bar() local
67 allow_prog = prog_load(1); in test_foo_bar()
68 if (!allow_prog) in test_foo_bar()
106 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
124 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
139 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
145 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar()
162 if (bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar()
167 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar()
173 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
[all …]
/Linux-v4.19/tools/testing/selftests/seccomp/
Dseccomp_bpf.c2792 struct sock_fprog allow_prog = { in TEST_SIGNAL() local
2808 &allow_prog); in TEST_SIGNAL()
2820 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &allow_prog); in TEST_SIGNAL()
2825 &allow_prog); in TEST_SIGNAL()