lsm+expected_attach_type=BPF_LSM_CGROUP_SOCK Signed-off-by: Stanislav Fomichev <sdf@xxxxxxxxxx> --- tools/lib/bpf/libbpf.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c index 2262bcdfee92..840a0274240c 100644 --- a/tools/lib/bpf/libbpf.c +++ b/tools/lib/bpf/libbpf.c @@ -8615,6 +8615,7 @@ static const struct bpf_sec_def section_defs[] = { SEC_DEF("freplace/", EXT, 0, SEC_ATTACH_BTF, attach_trace), SEC_DEF("lsm/", LSM, BPF_LSM_MAC, SEC_ATTACH_BTF, attach_lsm), SEC_DEF("lsm.s/", LSM, BPF_LSM_MAC, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_lsm), + SEC_DEF("lsm_cgroup_sock/", LSM, BPF_LSM_CGROUP_SOCK, SEC_ATTACH_BTF, attach_lsm), SEC_DEF("iter/", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF, attach_iter), SEC_DEF("iter.s/", TRACING, BPF_TRACE_ITER, SEC_ATTACH_BTF | SEC_SLEEPABLE, attach_iter), SEC_DEF("syscall", SYSCALL, 0, SEC_SLEEPABLE), @@ -8930,6 +8931,7 @@ void btf_get_kernel_prefix_kind(enum bpf_attach_type attach_type, *kind = BTF_KIND_TYPEDEF; break; case BPF_LSM_MAC: + case BPF_LSM_CGROUP_SOCK: *prefix = BTF_LSM_PREFIX; *kind = BTF_KIND_FUNC; break; -- 2.35.1.265.g69c8d7142f-goog