From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.3 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_GIT,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3598EC433DF for ; Mon, 6 Jul 2020 23:01:33 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0B22520723 for ; Mon, 6 Jul 2020 23:01:33 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="jsQXGmYd" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726946AbgGFXBc (ORCPT ); Mon, 6 Jul 2020 19:01:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50370 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726903AbgGFXBb (ORCPT ); Mon, 6 Jul 2020 19:01:31 -0400 Received: from mail-qk1-x74a.google.com (mail-qk1-x74a.google.com [IPv6:2607:f8b0:4864:20::74a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 714EBC061794 for ; Mon, 6 Jul 2020 16:01:31 -0700 (PDT) Received: by mail-qk1-x74a.google.com with SMTP id q6so18745413qke.21 for ; Mon, 06 Jul 2020 16:01:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=zfjWJ6Kwfn0uVYtL+zJHmMiVSetjlcrktQ7Z2CR+TLw=; b=jsQXGmYdGz1XXDJ6DR6B6MSGIXnxDQzudZ1PQb4CYwATq0QpefcW0n5Qiz1J6xkGZp 7W/dDwZHXObRsMfa5zhl7xttaAbzB8EwBs7tUZGDIrphEvuiAqAwUmlLo/dSLqIPv2g8 z8CSJ5u5F6SwEg9k1G8V6EudiUiwQRb2srffPTVYdyvRthT4l61b1wXCvmOyY6cCxvkJ XZ0shoYnz1+1CyKu3j+OQFhCYFLOCA7epi4PHAXjzvjWvST4aFkmCa6ReRGWCgxxVdGl cNGdQU+nbhiyNFM3DF2Zls8Efkx/2Zx6cqXAT0CS+ld+UOMDGy+fMNYw0S76k1zTf1AS lcaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=zfjWJ6Kwfn0uVYtL+zJHmMiVSetjlcrktQ7Z2CR+TLw=; b=m8vdSuSebVjtwWUqNXXsYN/8mRM1CCdDcQi9dsSJuCbr8iHL5+ExcRtq4Wm4YhnpwF NanC3GWTPpfQzhIlBAbp48bO9uNSe2PRSvdSho5U48f1bbX44AL6tNcsHAOkI0bxTdu+ rxC+amxtfLja4EEZfzWjy88Y2G1d8hxRfixsyVS5jDWBZ3deS2idioTuFQgvc3BVf6wy RsmjlD7uRR/p5BLiN/wTWDFB9pnwYFWOLtkLGAEzklkQrvaDPQU+5NzGua3HqWTFXmpl GaQ1ogGTSuRY7zEyHHU3Xq/HD92dto13vJvZXTjNUWggk60Fl7vXBxEdhP2+3wGhcdif b80Q== X-Gm-Message-State: AOAM532t1M4GxziU0tyxt7ue4/KKH9fCfouzdi50AyT5slhPdbqlESOy Ee8VNBIUzXoroxqDrhKoxcOkUuvMLlLSgyin4tV843Z5b+VeFVe90HEay97YYPsnyxXIWwSOYEA XgGvQfG1PU3OzIbJJCrH5u7MAGQMYmq0HDmQW/I92k0GBUOThw9KiNw== X-Google-Smtp-Source: ABdhPJxmFW+V4kCByhY3xRy3EjvLT7oS2yjf5u9n4aXpfm0+SrhHDB57xuzQrylcU3o5ta/sIjw0vqo= X-Received: by 2002:a0c:f281:: with SMTP id k1mr44316612qvl.219.1594076490419; Mon, 06 Jul 2020 16:01:30 -0700 (PDT) Date: Mon, 6 Jul 2020 16:01:24 -0700 Message-Id: <20200706230128.4073544-1-sdf@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.27.0.212.ge8ba1cc988-goog Subject: [PATCH bpf-next v4 0/4] bpf: add BPF_CGROUP_INET_SOCK_RELEASE hook From: Stanislav Fomichev To: netdev@vger.kernel.org, bpf@vger.kernel.org Cc: davem@davemloft.net, ast@kernel.org, daniel@iogearbox.net, Stanislav Fomichev Content-Type: text/plain; charset="UTF-8" Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Sometimes it's handy to know when the socket gets freed. In particular, we'd like to try to use a smarter allocation of ports for bpf_bind and explore the possibility of limiting the number of SOCK_DGRAM sockets the process can have. There is already existing BPF_CGROUP_INET_SOCK_CREATE hook that triggers upon socket creation; let's add new hook (BPF_CGROUP_INET_SOCK_RELEASE) that triggers on socket release. v4: * initialize global BPF vars (Andrii Nakryiko) * simplify error handling (Andrii Nakryiko) v3: * s/CHECK_FAIL/CHECK/ (Andrii Nakryiko) * s/bpf_prog_attach/bpf_program__attach_cgroup/ (Andrii Nakryiko) * fix &in_use in BPF program (Andrii Nakryiko) v2: * fix compile issue with CONFIG_CGROUP_BPF=n (kernel test robot) Stanislav Fomichev (4): bpf: add BPF_CGROUP_INET_SOCK_RELEASE hook libbpf: add support for BPF_CGROUP_INET_SOCK_RELEASE bpftool: add support for BPF_CGROUP_INET_SOCK_RELEASE selftests/bpf: test BPF_CGROUP_INET_SOCK_RELEASE include/linux/bpf-cgroup.h | 4 + include/uapi/linux/bpf.h | 1 + kernel/bpf/syscall.c | 3 + net/core/filter.c | 1 + net/ipv4/af_inet.c | 3 + tools/bpf/bpftool/common.c | 1 + tools/include/uapi/linux/bpf.h | 1 + tools/lib/bpf/libbpf.c | 4 + .../selftests/bpf/prog_tests/udp_limit.c | 75 +++++++++++++++++++ tools/testing/selftests/bpf/progs/udp_limit.c | 42 +++++++++++ 10 files changed, 135 insertions(+) create mode 100644 tools/testing/selftests/bpf/prog_tests/udp_limit.c create mode 100644 tools/testing/selftests/bpf/progs/udp_limit.c -- 2.27.0.212.ge8ba1cc988-goog