mirror_ubuntu-kernels/tools/testing
Stanislav Fomichev 4c3384d7ab bpf: Enable bpf_{g,s}etsockopt in BPF_CGROUP_UDP{4,6}_RECVMSG
Those hooks run as BPF_CGROUP_RUN_SA_PROG_LOCK and operate on a locked socket.

Note that we could remove the switch for prog->expected_attach_type altogether
since all current sock_addr attach types are covered. However, it makes sense
to keep it as a safe-guard in case new sock_addr attach types are added that
might not operate on a locked socket. Therefore, avoid to let this slip through.

Signed-off-by: Stanislav Fomichev <sdf@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20210127232853.3753823-5-sdf@google.com
2021-01-29 02:09:31 +01:00
..
fault-injection
ktest Kbuild updates for v5.11 2020-12-22 14:02:39 -08:00
kunit kunit: tool: Force the use of the 'tty' console for UML 2021-01-04 09:18:38 -07:00
nvdimm x86, libnvdimm/test: Remove COPY_MC_TEST 2020-10-26 18:08:35 +01:00
radix-tree ida: Free allocated bitmap in error path 2020-10-07 09:11:33 -04:00
scatterlist RDMA 5.11 pull request 2020-12-16 13:42:26 -08:00
selftests bpf: Enable bpf_{g,s}etsockopt in BPF_CGROUP_UDP{4,6}_RECVMSG 2021-01-29 02:09:31 +01:00
vsock SPDX patches for 5.7-rc1. 2020-04-03 13:12:26 -07:00