Home
last modified time | relevance | path

Searched hist:a52e95abf772b43c9226e9a72d3c1353903ba96f (Results 1 – 2 of 2) sorted by relevance

/openbmc/linux/include/uapi/linux/
H A Dinet_diag.hdiff a52e95abf772b43c9226e9a72d3c1353903ba96f Wed Aug 24 01:46:26 CDT 2016 Lorenzo Colitti <lorenzo@google.com> net: diag: allow socket bytecode filters to match socket marks

This allows a privileged process to filter by socket mark when
dumping sockets via INET_DIAG_BY_FAMILY. This is useful on
systems that use mark-based routing such as Android.

The ability to filter socket marks requires CAP_NET_ADMIN, which
is consistent with other privileged operations allowed by the
SOCK_DIAG interface such as the ability to destroy sockets and
the ability to inspect BPF filters attached to packet sockets.

Tested: https://android-review.googlesource.com/261350
Signed-off-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
/openbmc/linux/net/ipv4/
H A Dinet_diag.cdiff a52e95abf772b43c9226e9a72d3c1353903ba96f Wed Aug 24 01:46:26 CDT 2016 Lorenzo Colitti <lorenzo@google.com> net: diag: allow socket bytecode filters to match socket marks

This allows a privileged process to filter by socket mark when
dumping sockets via INET_DIAG_BY_FAMILY. This is useful on
systems that use mark-based routing such as Android.

The ability to filter socket marks requires CAP_NET_ADMIN, which
is consistent with other privileged operations allowed by the
SOCK_DIAG interface such as the ability to destroy sockets and
the ability to inspect BPF filters attached to packet sockets.

Tested: https://android-review.googlesource.com/261350
Signed-off-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>