Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp390884pxk; Fri, 11 Sep 2020 09:38:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxlB9IXMPUYub3yB1QnrCQ3MOYOme776M27cQcr5RSMUf11+LpldSjaNIB0/Bs7638M+2HT X-Received: by 2002:a17:906:d9d9:: with SMTP id qk25mr2801797ejb.51.1599842293828; Fri, 11 Sep 2020 09:38:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599842293; cv=none; d=google.com; s=arc-20160816; b=nqsk4F0UmiAHOZlz0WmMg9Hm3VJd7gBtMocdPvBBojur4Z7YxfYGYbb4JdUDbnImRL huCdGoBRho/8lfX+FjwLABtXKiAKPMuC/wlE1a7M/apxMrTCxE1koRq2kSouHSYCwv8O ogvfJohjvZmbOgyQgO0qbJFJH+Lednom06e3fiX5X0vXdi05tFe7q0Lfjttg1HWQp2sg iqt5g6NvD5GJ7fR2eeCp5ezAYsqM7fs6R5t+4D3gfihg0PTwscfI7AEOW08EWbE6lMlF vWSjuKD5zt3iF1kmYZemcmmV9Xq7EcV1ySm4EN8Xxo06gISndw6IMrqLb2hxvFM1kZNL JTkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=b0QD34+bxOAz0p5Ruf1S0pwezgoC99GUrOiFTRHr1WU=; b=RlMY0h9Iry/WhNHNqCYwQY9euyDbRwoPhuxucGE3mzsfqDCvxDCpvScAuTr2IG9J2w y40eog4HdK+6ipqhaCWS2y60j4It2F6gROXEBSOe14x57uSm+ZZcThNh09UdZfuYuSgo /jrz5YJgiTeayF1+NU14iqJ6gDQYJumiAwWE9HhQzw16mLv7ssRUCcDfklAim2MHG7qS SzNtNMM8OrpiFCoeR5YruRsaJEUz5t1YowKPtmrLiePeLlUW3q8prjBK+cI1dNY+3OEb wrg/Ft6Zj9XFWtaTa8nnZRmKwuWBQuzRAqc1g9XhsR/MhgbSKezP8OLpTDDx0jYKDbsS 5FFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tessares-net.20150623.gappssmtp.com header.s=20150623 header.b=s7+XJKuz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x18si1758746ejd.495.2020.09.11.09.37.50; Fri, 11 Sep 2020 09:38:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@tessares-net.20150623.gappssmtp.com header.s=20150623 header.b=s7+XJKuz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726432AbgIKQhV (ORCPT + 99 others); Fri, 11 Sep 2020 12:37:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59516 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726078AbgIKPM6 (ORCPT ); Fri, 11 Sep 2020 11:12:58 -0400 Received: from mail-ed1-x543.google.com (mail-ed1-x543.google.com [IPv6:2a00:1450:4864:20::543]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BBE1FC06136D for ; Fri, 11 Sep 2020 07:31:32 -0700 (PDT) Received: by mail-ed1-x543.google.com with SMTP id w1so10206335edr.3 for ; Fri, 11 Sep 2020 07:31:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tessares-net.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=b0QD34+bxOAz0p5Ruf1S0pwezgoC99GUrOiFTRHr1WU=; b=s7+XJKuz3oEy3pnN/elhmjMP3fwttIcgzseKr38icNThXbOY0LirJo1to8ih0eNwQA 1KVmgArwT9O0ardNtiHkXQr8ohGLQ3earWaQz2bNkJyavHpjUOfqH+Rutql5evnZd+Wh ElzqI1mWKCmB58u26vkRGzBC30VJZaPuMrtCYlhX61qRdr1KXozuXbPHYa6PCfyjzIaD fvfOOfdUXUj4+OUuH2PQ2U1nJ34ARaYMY27CZuB+H1DB8Dwubq3h+SEl5oAvEQ3z2Pde LMYbLS+kf5N+T2N3Psx1V3ZEDhgWCrTGE48hCzhGy1NvpqiM/I1E80W0/usazP+4Lz07 5TWA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=b0QD34+bxOAz0p5Ruf1S0pwezgoC99GUrOiFTRHr1WU=; b=QVWyasIyxej2UCapLXELwJv5o7h8TERqIOKelwd460cXgkmtiCuZNPNc92e4O2Y40+ C9aLP+G//HpcDc0lpXh0WV1DwP0tyPAEw2y+PZr/hCi2RUpOWxfWi3lzZk9381Qlv1Dg OUc9e4qIxmfvEbY+QRV75QsVbz1VqCUjQCkcoAtYeZtovhC7QxX9QzyrwkQ03w6EDvqH CMh7WGt5fattuQBIkTfZtEbu4gP+5fK71s7gLwLDVH81egNQ+QnWWBQ0/Kt9jHOuisfb NE+le1VS3j/B7Vn+bHWdJpK3pkAxyylSAdrhlVZEin8EhPwuEo7RID4HexJfW8NLr/3z fg2Q== X-Gm-Message-State: AOAM530u0IIh9gAWTFlZpsIMV+3L3FLGv7Sbdroa83pZhn9Y/FNDztLP E9Kv3mgdFcn4TjEKb6j3PARuHw== X-Received: by 2002:a05:6402:1710:: with SMTP id y16mr2416437edu.197.1599834691462; Fri, 11 Sep 2020 07:31:31 -0700 (PDT) Received: from localhost.localdomain ([87.66.33.240]) by smtp.gmail.com with ESMTPSA id y21sm1716261eju.46.2020.09.11.07.31.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Sep 2020 07:31:30 -0700 (PDT) From: Nicolas Rybowski To: Alexei Starovoitov , Andrii Nakryiko , Daniel Borkmann , "David S. Miller" , Jakub Kicinski , John Fastabend , KP Singh , Martin KaFai Lau , Mat Martineau , Matthieu Baerts , Shuah Khan , Song Liu , Yonghong Song Cc: Nicolas Rybowski , bpf@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, mptcp@lists.01.org, netdev@vger.kernel.org Subject: [PATCH bpf-next v2 0/5] bpf: add MPTCP subflow support Date: Fri, 11 Sep 2020 16:30:21 +0200 Message-Id: <20200911143022.414783-6-nicolas.rybowski@tessares.net> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200911143022.414783-1-nicolas.rybowski@tessares.net> References: <20200911143022.414783-1-nicolas.rybowski@tessares.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Previously it was not possible to make a distinction between plain TCP sockets and MPTCP subflow sockets on the BPF_PROG_TYPE_SOCK_OPS hook. This patch series now enables a fine control of subflow sockets. In its current state, it allows to put different sockopt on each subflow from a same MPTCP connection (socket mark, TCP congestion algorithm, ...) using BPF programs. It should also be the basis of exposing MPTCP-specific fields through BPF. v1 -> v2: - add basic mandatory selftests for the new helper and is_mptcp field (Alexei) - rebase on latest bpf-next Nicolas Rybowski (5): bpf: expose is_mptcp flag to bpf_tcp_sock mptcp: attach subflow socket to parent cgroup bpf: add 'bpf_mptcp_sock' structure and helper bpf: selftests: add MPTCP test base bpf: selftests: add bpf_mptcp_sock() verifier tests include/linux/bpf.h | 33 +++++ include/uapi/linux/bpf.h | 15 +++ kernel/bpf/verifier.c | 30 +++++ net/core/filter.c | 13 +- net/mptcp/Makefile | 2 + net/mptcp/bpf.c | 72 +++++++++++ net/mptcp/subflow.c | 27 ++++ scripts/bpf_helpers_doc.py | 2 + tools/include/uapi/linux/bpf.h | 15 +++ tools/testing/selftests/bpf/config | 1 + tools/testing/selftests/bpf/network_helpers.c | 37 +++++- tools/testing/selftests/bpf/network_helpers.h | 3 + .../testing/selftests/bpf/prog_tests/mptcp.c | 119 ++++++++++++++++++ tools/testing/selftests/bpf/progs/mptcp.c | 48 +++++++ tools/testing/selftests/bpf/verifier/sock.c | 63 ++++++++++ 15 files changed, 474 insertions(+), 6 deletions(-) create mode 100644 net/mptcp/bpf.c create mode 100644 tools/testing/selftests/bpf/prog_tests/mptcp.c create mode 100644 tools/testing/selftests/bpf/progs/mptcp.c -- 2.28.0