Message ID | cover.1662682323.git.zhuyifei@google.com (mailing list archive) |
---|---|
Headers | show |
Series | cgroup/connect{4,6} programs for unprivileged ICMP ping | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Martin KaFai Lau <martin.lau@kernel.org>: On Fri, 9 Sep 2022 00:49:38 +0000 you wrote: > Usually when a TCP/UDP connection is initiated, we can bind the socket > to a specific IP attached to an interface in a cgroup/connect hook. > But for pings, this is impossible, as the hook is not being called. > > This series adds the invocation for cgroup/connect{4,6} programs to > unprivileged ICMP ping (i.e. ping sockets created with SOCK_DGRAM > IPPROTO_ICMP(V6) as opposed to SOCK_RAW). This also adds a test to > verify that the hooks are being called and invoking bpf_bind() from > within the hook actually binds the socket. > > [...] Here is the summary with links: - [v4,bpf-next,1/3] bpf: Invoke cgroup/connect{4,6} programs for unprivileged ICMP ping https://git.kernel.org/bpf/bpf-next/c/0ffe2412531e - [v4,bpf-next,2/3] selftests/bpf: Deduplicate write_sysctl() to test_progs.c https://git.kernel.org/bpf/bpf-next/c/e42921c3c346 - [v4,bpf-next,3/3] selftests/bpf: Ensure cgroup/connect{4,6} programs can bind unpriv ICMP ping https://git.kernel.org/bpf/bpf-next/c/58c449a96946 You are awesome, thank you!