Searched refs:allow_prog (Results 1 – 2 of 2) sorted by relevance
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_cgroup_attach.c | 74 int drop_prog, allow_prog, foo = 0, bar = 0, rc = 0; in test_foo_bar() local 76 allow_prog = prog_load(1); in test_foo_bar() 77 if (!allow_prog) in test_foo_bar() 115 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 133 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 148 if (bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() 154 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 171 if (bpf_prog_attach(allow_prog, foo, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 176 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, 0)) { in test_foo_bar() 182 if (!bpf_prog_attach(allow_prog, bar, BPF_CGROUP_INET_EGRESS, in test_foo_bar() [all …]
|
/external/linux-kselftest/tools/testing/selftests/seccomp/ |
D | seccomp_bpf.c | 2950 struct sock_fprog allow_prog = { 2966 &allow_prog); 2978 ret = seccomp(SECCOMP_SET_MODE_FILTER, 0, &allow_prog); 2983 &allow_prog);
|