aboutsummaryrefslogtreecommitdiff
path: root/tools/lib/bpf/bpf_prog_linfo.c
diff options
context:
space:
mode:
authorStanislav Fomichev <sdf@google.com>2019-06-12 10:30:37 -0700
committerDaniel Borkmann <daniel@iogearbox.net>2019-06-15 01:21:56 +0200
commitfb85c4a730af221339c1dde1a434b73da0dfc3ed (patch)
treefce01722704a787ffdcfdeba1b5dc3d305359c84 /tools/lib/bpf/bpf_prog_linfo.c
parentd30bd78ce8ba1f093aa4877ed06601d0debd872b (diff)
downloadlinux-fb85c4a730af221339c1dde1a434b73da0dfc3ed.tar.gz
linux-fb85c4a730af221339c1dde1a434b73da0dfc3ed.tar.bz2
linux-fb85c4a730af221339c1dde1a434b73da0dfc3ed.zip
bpf: export bpf_sock for BPF_PROG_TYPE_CGROUP_SOCK_ADDR prog type
And let it use bpf_sk_storage_{get,delete} helpers to access socket storage. Kernel context (struct bpf_sock_addr_kern) already has sk member, so I just expose it to the BPF hooks. Using PTR_TO_SOCKET instead of PTR_TO_SOCK_COMMON should be safe because the hook is called on bind/connect. Cc: Martin Lau <kafai@fb.com> Signed-off-by: Stanislav Fomichev <sdf@google.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'tools/lib/bpf/bpf_prog_linfo.c')
0 files changed, 0 insertions, 0 deletions