2026-01-14 09:59 UTC+0100 ~ "Alexis Lothoré (eBPF Foundation)"
<[email protected]>
> The test_bpftool_map.sh script tests that maps read/write accesses
> are being properly allowed/refused by the kernel depending on a specific
> fmod_ret program being attached on security_bpf_map function.
> 
> Rewrite this test to integrate it in the new test_bpftool runner. The
> new test spawns a few subtests:
> 
>   #1/1        maps_access/unprotected_unpinned: OK
>   #1/2        maps_access/unprotected_pinned: OK
>   #1/3        maps_access/protected_unpinned: OK
>   #1/4        maps_access/protected_pinned: OK
>   #1/5        maps_access/nested_maps: OK
>   #1/6        maps_access/btf_list: OK
>   #1  maps_access: OK
>   #2/1        metadata/metadata_unused: OK
>   #2/2        metadata/metadata_used: OK
>   #2  metadata: OK
>   Summary: 2 PASSED, 0 FAILED
> 
> Signed-off-by: Alexis LothorĂ© (eBPF Foundation) <[email protected]>


Acked-by: Quentin Monnet <[email protected]>

Reply via email to