From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6E0BBC433E3 for ; Mon, 18 May 2020 22:46:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 471A620756 for ; Mon, 18 May 2020 22:46:03 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728420AbgERWqC (ORCPT ); Mon, 18 May 2020 18:46:02 -0400 Received: from www62.your-server.de ([213.133.104.62]:57872 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728281AbgERWqB (ORCPT ); Mon, 18 May 2020 18:46:01 -0400 Received: from 75.57.196.178.dynamic.wline.res.cust.swisscom.ch ([178.196.57.75] helo=localhost) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1jaoWC-0000c3-Vq; Tue, 19 May 2020 00:45:57 +0200 From: Daniel Borkmann To: ast@kernel.org Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, rdna@fb.com, sdf@google.com, andrii.nakryiko@gmail.com, Daniel Borkmann Subject: [PATCH bpf-next v2 0/4] Add get{peer,sock}name cgroup attach types Date: Tue, 19 May 2020 00:45:44 +0200 Message-Id: X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.2/25816/Mon May 18 14:17:08 2020) Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org Trivial patch to add get{peer,sock}name cgroup attach types to the BPF sock_addr programs in order to enable rewriting sockaddr structs from both calls along with libbpf and bpftool support as well as selftests. Thanks! v1 -> v2: - use __u16 for ports in start_server_with_port() signature and in expected_{local,peer} ports in the test case (Andrey) - Added both Andrii's and Andrey's ACKs Daniel Borkmann (4): bpf: add get{peer,sock}name attach types for sock_addr bpf, libbpf: enable get{peer,sock}name attach types bpf, bpftool: enable get{peer,sock}name attach types bpf, testing: add get{peer,sock}name selftests to test_progs include/linux/bpf-cgroup.h | 1 + include/uapi/linux/bpf.h | 4 + kernel/bpf/syscall.c | 12 ++ kernel/bpf/verifier.c | 6 +- net/core/filter.c | 4 + net/ipv4/af_inet.c | 8 +- net/ipv6/af_inet6.c | 9 +- .../bpftool/Documentation/bpftool-cgroup.rst | 10 +- .../bpftool/Documentation/bpftool-prog.rst | 3 +- tools/bpf/bpftool/bash-completion/bpftool | 15 ++- tools/bpf/bpftool/cgroup.c | 7 +- tools/bpf/bpftool/main.h | 4 + tools/bpf/bpftool/prog.c | 6 +- tools/include/uapi/linux/bpf.h | 4 + tools/lib/bpf/libbpf.c | 8 ++ tools/testing/selftests/bpf/network_helpers.c | 11 +- tools/testing/selftests/bpf/network_helpers.h | 1 + .../bpf/prog_tests/connect_force_port.c | 107 +++++++++++++----- .../selftests/bpf/progs/connect_force_port4.c | 59 +++++++++- .../selftests/bpf/progs/connect_force_port6.c | 70 +++++++++++- 20 files changed, 295 insertions(+), 54 deletions(-) -- 2.21.0