diff options
| author | Alexei Starovoitov <[email protected]> | 2019-06-27 22:25:17 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2019-06-27 22:25:18 +0000 |
| commit | 2ec1899e99b4959bd2a46fd3993220e4f1a5397f (patch) | |
| tree | c6690684ef434a3c3759f419ef9a5492e3644dc9 /tools/lib/bpf/str_error.c | |
| parent | Merge branch 'bpf-af-xdp-mlx5e' (diff) | |
| parent | bpftool: support cgroup sockopt (diff) | |
| download | kernel-2ec1899e99b4959bd2a46fd3993220e4f1a5397f.tar.gz kernel-2ec1899e99b4959bd2a46fd3993220e4f1a5397f.zip | |
Merge branch 'bpf-sockopt-hooks'
Stanislav Fomichev says:
====================
This series implements two new per-cgroup hooks: getsockopt and
setsockopt along with a new sockopt program type. The idea is pretty
similar to recently introduced cgroup sysctl hooks, but
implementation is simpler (no need to convert to/from strings).
What this can be applied to:
* move business logic of what tos/priority/etc can be set by
containers (either pass or reject)
* handle existing options (or introduce new ones) differently by
propagating some information in cgroup/socket local storage
Compared to a simple syscall/{g,s}etsockopt tracepoint, those
hooks are context aware. Meaning, they can access underlying socket
and use cgroup and socket local storage.
v9:
* allow overwriting setsocktop arguments (Alexei Starovoitov)
(see individual changes for more changelog details)
====================
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'tools/lib/bpf/str_error.c')
0 files changed, 0 insertions, 0 deletions
