diff options
author | Stanislav Fomichev <sdf@google.com> | 2019-06-12 10:30:37 -0700 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2019-06-15 01:21:56 +0200 |
commit | fb85c4a730af221339c1dde1a434b73da0dfc3ed (patch) | |
tree | fce01722704a787ffdcfdeba1b5dc3d305359c84 /tools/lib/bpf/bpf_prog_linfo.c | |
parent | d30bd78ce8ba1f093aa4877ed06601d0debd872b (diff) | |
download | linux-fb85c4a730af221339c1dde1a434b73da0dfc3ed.tar.gz linux-fb85c4a730af221339c1dde1a434b73da0dfc3ed.tar.bz2 linux-fb85c4a730af221339c1dde1a434b73da0dfc3ed.zip |
bpf: export bpf_sock for BPF_PROG_TYPE_CGROUP_SOCK_ADDR prog type
And let it use bpf_sk_storage_{get,delete} helpers to access socket
storage. Kernel context (struct bpf_sock_addr_kern) already has sk
member, so I just expose it to the BPF hooks. Using PTR_TO_SOCKET
instead of PTR_TO_SOCK_COMMON should be safe because the hook is
called on bind/connect.
Cc: Martin Lau <kafai@fb.com>
Signed-off-by: Stanislav Fomichev <sdf@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'tools/lib/bpf/bpf_prog_linfo.c')
0 files changed, 0 insertions, 0 deletions