[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 09 Sep 2022 17:50:16 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: YiFei Zhu <zhuyifei@...gle.com>
Cc: bpf@...r.kernel.org, netdev@...r.kernel.org, ast@...nel.org,
daniel@...earbox.net, sdf@...gle.com, martin.lau@...ux.dev,
john.fastabend@...il.com, jolsa@...nel.org, davem@...emloft.net,
yoshfuji@...ux-ipv6.org, dsahern@...nel.org, edumazet@...gle.com,
kuba@...nel.org, pabeni@...hat.com
Subject: Re: [PATCH v4 bpf-next 0/3] cgroup/connect{4,6} programs for unprivileged
ICMP ping
Hello:
This series was applied to bpf/bpf-next.git (master)
by Martin KaFai Lau <martin.lau@...nel.org>:
On Fri, 9 Sep 2022 00:49:38 +0000 you wrote:
> Usually when a TCP/UDP connection is initiated, we can bind the socket
> to a specific IP attached to an interface in a cgroup/connect hook.
> But for pings, this is impossible, as the hook is not being called.
>
> This series adds the invocation for cgroup/connect{4,6} programs to
> unprivileged ICMP ping (i.e. ping sockets created with SOCK_DGRAM
> IPPROTO_ICMP(V6) as opposed to SOCK_RAW). This also adds a test to
> verify that the hooks are being called and invoking bpf_bind() from
> within the hook actually binds the socket.
>
> [...]
Here is the summary with links:
- [v4,bpf-next,1/3] bpf: Invoke cgroup/connect{4,6} programs for unprivileged ICMP ping
https://git.kernel.org/bpf/bpf-next/c/0ffe2412531e
- [v4,bpf-next,2/3] selftests/bpf: Deduplicate write_sysctl() to test_progs.c
https://git.kernel.org/bpf/bpf-next/c/e42921c3c346
- [v4,bpf-next,3/3] selftests/bpf: Ensure cgroup/connect{4,6} programs can bind unpriv ICMP ping
https://git.kernel.org/bpf/bpf-next/c/58c449a96946
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists