lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 4 Dec 2020 12:36:06 +0100 From: Florent Revest <revest@...omium.org> To: bpf@...r.kernel.org Cc: viro@...iv.linux.org.uk, davem@...emloft.net, kuba@...nel.org, ast@...nel.org, daniel@...earbox.net, kafai@...com, yhs@...com, andrii@...nel.org, kpsingh@...omium.org, revest@...gle.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, KP Singh <kpsingh@...gle.com> Subject: [PATCH bpf-next v5 3/6] bpf: Expose bpf_sk_storage_* to iterator programs Iterators are currently used to expose kernel information to userspace over fast procfs-like files but iterators could also be used to manipulate local storage. For example, the task_file iterator could be used to initialize a socket local storage with associations between processes and sockets or to selectively delete local storage values. Signed-off-by: Florent Revest <revest@...gle.com> Acked-by: Martin KaFai Lau <kafai@...com> Acked-by: KP Singh <kpsingh@...gle.com> --- net/core/bpf_sk_storage.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/core/bpf_sk_storage.c b/net/core/bpf_sk_storage.c index a32037daa933..4edd033e899c 100644 --- a/net/core/bpf_sk_storage.c +++ b/net/core/bpf_sk_storage.c @@ -394,6 +394,7 @@ static bool bpf_sk_storage_tracing_allowed(const struct bpf_prog *prog) * use the bpf_sk_storage_(get|delete) helper. */ switch (prog->expected_attach_type) { + case BPF_TRACE_ITER: case BPF_TRACE_RAW_TP: /* bpf_sk_storage has no trace point */ return true; -- 2.29.2.576.ga3fc446d84-goog
Powered by blists - more mailing lists