From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A571CC433EF for ; Wed, 10 Nov 2021 11:10:45 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 8D946610D2 for ; Wed, 10 Nov 2021 11:10:45 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231319AbhKJLNb (ORCPT ); Wed, 10 Nov 2021 06:13:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52746 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231389AbhKJLNQ (ORCPT ); Wed, 10 Nov 2021 06:13:16 -0500 Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2EF38C061766 for ; Wed, 10 Nov 2021 03:10:21 -0800 (PST) Received: by mail-wr1-x42b.google.com with SMTP id i5so3365386wrb.2 for ; Wed, 10 Nov 2021 03:10:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=IUDHpGzMacjmb5vscFO1ZQI4jzKJdqLW2tjJmDZCTGY=; b=e0HGi1o0OW/CvRSmXyNNsAPjmzbmcCZyI3r6zSN7bHdb6aCtmwXCBsLshGnMo7bdq3 AajkSrzaAkmVg5MdXNrS0MoxO9faGxPOsmGA1537LCjC+8dRgjaGG1mivCGrMz8u22N4 yk2Z47tR/xXTbHq/ghVLn6B2LLRwa6dBbYXxk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=IUDHpGzMacjmb5vscFO1ZQI4jzKJdqLW2tjJmDZCTGY=; b=xoHzdTG7FtUQ4D1bNCeGSTfRFDgGDDxXZU2mmlGwTr+AtIriIJuZRHk/MZ2R3McjhV ZZ2XhnoSwgXmqSkd52SFwkcuRY006rLC2vvGy+hqNC/vEjHDbSL4anyKelCpyZsdzOyp 7bJ9op/+uyIhR5erOh7noXveYsP87kc1YrfFNrHQgsPXzhRba5qB7K5wOdyVChwypbLn Uy/KRu/1d9rBOOOUYjcKZD8fVrKbCTdiduglB2xDvN0wjeEMMrHtNXe8TUonCBiBNnAR 4xhq0lm9OnnGfmkVVz3QLviF1ZexDXkmxdCLT5KkRMes74WMGOIM7r70gEk5NAGOao6o yNXQ== X-Gm-Message-State: AOAM530L9MeF1HFsIGX0hdUx1d+96IJ/HO8sWfDqAijMDkFEn7fhHzLE H9Z9cRFqEbVxKcKJyjtpj1gQgg== X-Google-Smtp-Source: ABdhPJw/PkgMUja9aiApBdcdEdqp64kZuxk4Z/t9mZCQEtFh04MMnZf92NvjhSGpv9hE/1Q8SpaXdg== X-Received: by 2002:a5d:550c:: with SMTP id b12mr18659969wrv.427.1636542619771; Wed, 10 Nov 2021 03:10:19 -0800 (PST) Received: from kharboze.dr-pashinator-m-d.gmail.com.beta.tailscale.net (cust97-dsl60.idnet.net. [212.69.60.97]) by smtp.gmail.com with ESMTPSA id m14sm18780682wrp.28.2021.11.10.03.10.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Nov 2021 03:10:19 -0800 (PST) From: Mark Pashmfouroush To: markpash@cloudflare.com, Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko Cc: kernel-team@cloudflare.com, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: [PATCH bpf-next v3 0/2] Get ingress_ifindex in BPF_SK_LOOKUP prog type Date: Wed, 10 Nov 2021 11:10:14 +0000 Message-Id: <20211110111016.5670-1-markpash@cloudflare.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org BPF_SK_LOOKUP users may want to have access to the ifindex of the skb which triggered the socket lookup. This may be useful for selectively applying programmable socket lookup logic to packets that arrive on a specific interface, or excluding packets from an interface. v3: - Rename ifindex field to ingress_ifindex for consistency. (Yonghong) v2: - Fix inaccurate comment (Alexei) - Add more details to commit messages (John) Mark Pashmfouroush (2): bpf: Add ingress_ifindex to bpf_sk_lookup selftests/bpf: Add tests for accessing ingress_ifindex in bpf_sk_lookup include/linux/filter.h | 7 ++-- include/uapi/linux/bpf.h | 1 + net/core/filter.c | 7 ++++ net/ipv4/inet_hashtables.c | 8 ++--- net/ipv4/udp.c | 8 ++--- net/ipv6/inet6_hashtables.c | 8 ++--- net/ipv6/udp.c | 8 ++--- tools/include/uapi/linux/bpf.h | 1 + .../selftests/bpf/prog_tests/sk_lookup.c | 31 ++++++++++++++++++ .../selftests/bpf/progs/test_sk_lookup.c | 8 +++++ .../selftests/bpf/verifier/ctx_sk_lookup.c | 32 +++++++++++++++++++ 11 files changed, 101 insertions(+), 18 deletions(-) -- 2.31.1