On 06/26, Alexei Starovoitov wrote: > On Mon, Jun 24, 2019 at 09:24:21AM -0700, Stanislav Fomichev wrote: > > Implement new BPF_PROG_TYPE_CGROUP_SOCKOPT program type and > > BPF_CGROUP_{G,S}ETSOCKOPT cgroup hooks. > > > > BPF_CGROUP_SETSOCKOPT get a read-only view of the setsockopt arguments. > > BPF_CGROUP_GETSOCKOPT can modify the supplied buffer. > > Both of them reuse existing PTR_TO_PACKET{,_END} infrastructure. > > getsockopt side looks good to me. > I tried to convince myself that readonly setsockopt is fine for now, > but it feels we need to make it writeable from the start. > I agree with your reasoning that doing copy_to_user is no good, > but we can do certainly do set_fs(KERNEL_DS) game. > The same way as kernel_setsockopt() is doing. > It seems quite useful to modify 'optval' before passing it to kernel. > Then bpf prog would be able to specify sane values for SO_SNDBUF > instead of rejecting them. > The alternative would be to allow bpf prog to call setsockopt > from inside, but sock is locked when prog is running, > so unlocking within helper is not going to be clean. > wdyt? Sure, I can take a look if you think that it would be useful in general. Looks like set_fs should do the trick. (I was thinking about exporting something like the existing bpf_setsockopt to a setsockopt hooks, but I agree, it comes with its own bag of problems).