diff options
| author | Martin KaFai Lau <[email protected]> | 2020-08-20 19:00:33 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2020-08-24 21:35:00 +0000 |
| commit | 7656d68455891f7fc6689f95415fd59e7a1d629b (patch) | |
| tree | 256a095608155286f836b9019ee268225b404224 /net/ipv4/tcp_fastopen.c | |
| parent | tcp: bpf: Add TCP_BPF_RTO_MIN for bpf_setsockopt (diff) | |
| download | kernel-7656d68455891f7fc6689f95415fd59e7a1d629b.tar.gz kernel-7656d68455891f7fc6689f95415fd59e7a1d629b.zip | |
tcp: Add saw_unknown to struct tcp_options_received
In a later patch, the bpf prog only wants to be called to handle
a header option if that particular header option cannot be handled by
the kernel. This unknown option could be written by the peer's bpf-prog.
It could also be a new standard option that the running kernel does not
support it while a bpf-prog can handle it.
This patch adds a "saw_unknown" bit to "struct tcp_options_received"
and it uses an existing one byte hole to do that. "saw_unknown" will
be set in tcp_parse_options() if it sees an option that the kernel
cannot handle.
Signed-off-by: Martin KaFai Lau <[email protected]>
Signed-off-by: Alexei Starovoitov <[email protected]>
Reviewed-by: Eric Dumazet <[email protected]>
Acked-by: John Fastabend <[email protected]>
Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'net/ipv4/tcp_fastopen.c')
0 files changed, 0 insertions, 0 deletions
