Searched refs:allow_prog (Results 1 – 4 of 4) sorted by relevance
/Linux-v5.10/tools/testing/selftests/bpf/prog_tests/ |
D | cgroup_attach_multi.c | 82 int allow_prog[7] = {-1}; in test_cgroup_attach_multi() local 87 for (i = 0; i < ARRAY_SIZE(allow_prog); i++) { in test_cgroup_attach_multi() 88 allow_prog[i] = prog_load_cnt(1, 1 << i); in test_cgroup_attach_multi() 89 if (CHECK(allow_prog[i] < 0, "prog_load", in test_cgroup_attach_multi() 116 if (CHECK(bpf_prog_attach(allow_prog[0], cg1, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_multi() 121 if (CHECK(!bpf_prog_attach(allow_prog[0], cg1, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_multi() 126 if (CHECK(bpf_prog_attach(allow_prog[1], cg1, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_multi() 131 if (CHECK(bpf_prog_attach(allow_prog[2], cg2, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_multi() 136 if (CHECK(bpf_prog_attach(allow_prog[3], cg3, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_multi() 141 if (CHECK(bpf_prog_attach(allow_prog[4], cg4, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_multi() [all …]
|
D | cgroup_attach_autodetach.c | 27 int allow_prog[2] = {-1}; in test_cgroup_attach_autodetach() local 33 for (i = 0; i < ARRAY_SIZE(allow_prog); i++) { in test_cgroup_attach_autodetach() 34 allow_prog[i] = prog_load(); in test_cgroup_attach_autodetach() 35 if (CHECK(allow_prog[i] < 0, "prog_load", in test_cgroup_attach_autodetach() 51 for (i = 0; i < ARRAY_SIZE(allow_prog); i++) in test_cgroup_attach_autodetach() 52 if (CHECK(bpf_prog_attach(allow_prog[i], cg, in test_cgroup_attach_autodetach() 72 for (i = 0; i < ARRAY_SIZE(allow_prog); i++) { in test_cgroup_attach_autodetach() 73 close(allow_prog[i]); in test_cgroup_attach_autodetach() 74 allow_prog[i] = -1; in test_cgroup_attach_autodetach() 104 for (i = 0; i < ARRAY_SIZE(allow_prog); i++) in test_cgroup_attach_autodetach() [all …]
|
D | cgroup_attach_override.c | 28 int drop_prog = -1, allow_prog = -1, foo = -1, bar = -1; in test_cgroup_attach_override() local 31 allow_prog = prog_load(1); in test_cgroup_attach_override() 32 if (CHECK(allow_prog < 0, "prog_load_allow", in test_cgroup_attach_override() 63 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_override() 81 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_override() 95 if (CHECK(bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_override() 101 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0), in test_cgroup_attach_override() 116 if (CHECK(bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0), in test_cgroup_attach_override() 121 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0), in test_cgroup_attach_override() 126 if (CHECK(!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_cgroup_attach_override() [all …]
|
/Linux-v5.10/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 3110 struct sock_fprog allow_prog = { in TEST_SIGNAL() local 3126 &allow_prog); in TEST_SIGNAL() 3138 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &allow_prog); in TEST_SIGNAL() 3143 &allow_prog); in TEST_SIGNAL()
|