diff options
author | Will Drewry <wad@chromium.org> | 2012-04-12 16:47:52 -0500 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2012-04-14 11:13:19 +1000 |
commit | 46b325c7eb01482674406701825ff67f561ccdd4 (patch) | |
tree | 3c6b4d424148c79820506bc2cda71b389798fbdb /net/compat.c | |
parent | c29bceb3967398cf2ac8bf8edf9634fdb722df7d (diff) | |
download | linux-46b325c7eb01482674406701825ff67f561ccdd4.tar.gz linux-46b325c7eb01482674406701825ff67f561ccdd4.tar.bz2 linux-46b325c7eb01482674406701825ff67f561ccdd4.zip |
sk_run_filter: add BPF_S_ANC_SECCOMP_LD_W
Introduces a new BPF ancillary instruction that all LD calls will be
mapped through when skb_run_filter() is being used for seccomp BPF. The
rewriting will be done using a secondary chk_filter function that is run
after skb_chk_filter.
The code change is guarded by CONFIG_SECCOMP_FILTER which is added,
along with the seccomp_bpf_load() function later in this series.
This is based on http://lkml.org/lkml/2012/3/2/141
Suggested-by: Indan Zupancic <indan@nul.nu>
Signed-off-by: Will Drewry <wad@chromium.org>
Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
Acked-by: Eric Paris <eparis@redhat.com>
v18: rebase
...
v15: include seccomp.h explicitly for when seccomp_bpf_load exists.
v14: First cut using a single additional instruction
... v13: made bpf functions generic.
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'net/compat.c')
0 files changed, 0 insertions, 0 deletions