Home
last modified time | relevance | path

Searched refs:allow_prog (Results 1 – 2 of 2) sorted by relevance

/Linux-v5.4/tools/testing/selftests/bpf/
Dtest_cgroup_attach.c74 int drop_prog, allow_prog, foo = 0, bar = 0, rc = 0; in test_foo_bar() local
76 allow_prog = prog_load(1); in test_foo_bar()
77 if (!allow_prog) in test_foo_bar()
115 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
133 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
148 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
154 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar()
171 if (bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar()
176 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar()
182 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar()
[all …]
/Linux-v5.4/tools/testing/selftests/seccomp/
Dseccomp_bpf.c2912 struct sock_fprog allow_prog = { in TEST_SIGNAL() local
2928 &allow_prog); in TEST_SIGNAL()
2940 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &allow_prog); in TEST_SIGNAL()
2945 &allow_prog); in TEST_SIGNAL()