mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
344b093258
full diffs: -fc5a7d91d5...62a13ae87c
-b2de5d10e3
...v1.0.0 -604eaf189e
...13995c7128ccc8e51e9a6bd2b551020a27180abd notable changes in libnetwork: - docker/libnetwork#2366 Bump vishvananda/netlink to 1.0.0 - docker/libnetwork#2339 controller: Check if IPTables is enabled for arrangeUserFilterRule - addresses docker/libnetwork#2158 dockerd when run with --iptables=false modifies iptables by adding DOCKER-USER - addresses moby/moby#35777 With iptables=false dockerd still creates DOCKER-USER chain and rules - addresses docker/for-linux#136 dockerd --iptables=false adds DOCKER-USER chain and modify FORWARD chain anyway - docker/libnetwork#2394 Make DNS records and queries case-insensitive - addresses moby/moby#28689 Embedded DNS is case-sensitive - addresses moby/moby#21169 hostnames with new networking are case-sensitive Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
53 lines
1.1 KiB
Go
53 lines
1.1 KiB
Go
package netlink
|
|
|
|
import (
|
|
"unsafe"
|
|
|
|
"golang.org/x/sys/unix"
|
|
)
|
|
|
|
type BpfProgType uint32
|
|
|
|
const (
|
|
BPF_PROG_TYPE_UNSPEC BpfProgType = iota
|
|
BPF_PROG_TYPE_SOCKET_FILTER
|
|
BPF_PROG_TYPE_KPROBE
|
|
BPF_PROG_TYPE_SCHED_CLS
|
|
BPF_PROG_TYPE_SCHED_ACT
|
|
BPF_PROG_TYPE_TRACEPOINT
|
|
BPF_PROG_TYPE_XDP
|
|
)
|
|
|
|
type BPFAttr struct {
|
|
ProgType uint32
|
|
InsnCnt uint32
|
|
Insns uintptr
|
|
License uintptr
|
|
LogLevel uint32
|
|
LogSize uint32
|
|
LogBuf uintptr
|
|
KernVersion uint32
|
|
}
|
|
|
|
// loadSimpleBpf loads a trivial bpf program for testing purposes.
|
|
func loadSimpleBpf(progType BpfProgType, ret uint32) (int, error) {
|
|
insns := []uint64{
|
|
0x00000000000000b7 | (uint64(ret) << 32),
|
|
0x0000000000000095,
|
|
}
|
|
license := []byte{'A', 'S', 'L', '2', '\x00'}
|
|
attr := BPFAttr{
|
|
ProgType: uint32(progType),
|
|
InsnCnt: uint32(len(insns)),
|
|
Insns: uintptr(unsafe.Pointer(&insns[0])),
|
|
License: uintptr(unsafe.Pointer(&license[0])),
|
|
}
|
|
fd, _, errno := unix.Syscall(unix.SYS_BPF,
|
|
5, /* bpf cmd */
|
|
uintptr(unsafe.Pointer(&attr)),
|
|
unsafe.Sizeof(attr))
|
|
if errno != 0 {
|
|
return 0, errno
|
|
}
|
|
return int(fd), nil
|
|
}
|