2026-01-14 09:59 UTC+0100 ~ "Alexis Lothoré (eBPF Foundation)" <[email protected]> > The test_bpftool_map.sh script tests that maps read/write accesses > are being properly allowed/refused by the kernel depending on a specific > fmod_ret program being attached on security_bpf_map function. > > Rewrite this test to integrate it in the new test_bpftool runner. The > new test spawns a few subtests: > > #1/1 maps_access/unprotected_unpinned: OK > #1/2 maps_access/unprotected_pinned: OK > #1/3 maps_access/protected_unpinned: OK > #1/4 maps_access/protected_pinned: OK > #1/5 maps_access/nested_maps: OK > #1/6 maps_access/btf_list: OK > #1 maps_access: OK > #2/1 metadata/metadata_unused: OK > #2/2 metadata/metadata_used: OK > #2 metadata: OK > Summary: 2 PASSED, 0 FAILED > > Signed-off-by: Alexis Lothoré (eBPF Foundation) <[email protected]>
Acked-by: Quentin Monnet <[email protected]>

