lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <AM6PR03MB5848C2304B17658423B4B81D99932@AM6PR03MB5848.eurprd03.prod.outlook.com>
Date: Tue,  3 Sep 2024 23:07:25 +0100
From: Juntong Deng <juntong.deng@...look.com>
To: ast@...nel.org,
	daniel@...earbox.net,
	john.fastabend@...il.com,
	andrii@...nel.org,
	martin.lau@...ux.dev,
	eddyz87@...il.com,
	song@...nel.org,
	yonghong.song@...ux.dev,
	kpsingh@...nel.org,
	sdf@...ichev.me,
	haoluo@...gle.com,
	jolsa@...nel.org,
	memxor@...il.com,
	snorcht@...il.com
Cc: bpf@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: [RFC PATCH bpf-next 1/2] bpf: Add open-coded style iterator kfuncs for bpf dynamic pointers

This patch adds open coded style bpf dynamic pointer iterator kfuncs
bpf_iter_dynptr_{new,next,destroy} for iterating over all data in the
memory region referenced by dynamic pointer.

The idea of bpf dynamic pointer iterator comes from skb data iterator
[0], we need a way to get all the data in skb. Adding iterator for bpf
dynamic pointer is a more general choice than adding separate skb data
iterator.

Each iteration (next) copies the data to the specified buffer and
updates the offset, with the pointer to the length of the read data
(errno if errors occurred) as the return value. Note that the offset
in iterator does not affect the offset in dynamic pointer.

The bpf dynamic pointer iterator has a getter kfunc,
bpf_iter_dynptr_get_last_offset, which is used to get the offset
of the last iteration.

The bpf dynamic pointer iterator has a setter kfunc,
bpf_iter_dynptr_set_buffer, which is used to set the buffer and buffer
size to be used when copying data in the iteration.

[0]: https://lore.kernel.org/bpf/AM6PR03MB5848DE102F47F592D8B479E999A52@AM6PR03MB5848.eurprd03.prod.outlook.com/

Signed-off-by: Juntong Deng <juntong.deng@...look.com>
---
 kernel/bpf/helpers.c | 110 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 110 insertions(+)

diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c
index 3956be5d6440..1f7204b54ba9 100644
--- a/kernel/bpf/helpers.c
+++ b/kernel/bpf/helpers.c
@@ -2729,6 +2729,111 @@ __bpf_kfunc int bpf_dynptr_clone(const struct bpf_dynptr *p,
 	return 0;
 }
 
+struct bpf_iter_dynptr {
+	__u64 __opaque[4];
+} __aligned(8);
+
+struct bpf_iter_dynptr_kern {
+	struct bpf_dynptr_kern *dynptr;
+	void *buffer;
+	u32 buffer_len;
+	u32 offset;
+	int read_len;
+} __aligned(8);
+
+__bpf_kfunc int bpf_iter_dynptr_new(struct bpf_iter_dynptr *it, struct bpf_dynptr *p,
+				    u32 offset, void *buffer, u32 buffer__szk)
+{
+	struct bpf_iter_dynptr_kern *kit = (void *)it;
+	struct bpf_dynptr_kern *ptr = (struct bpf_dynptr_kern *)p;
+
+	BUILD_BUG_ON(sizeof(struct bpf_iter_dynptr_kern) > sizeof(struct bpf_iter_dynptr));
+	BUILD_BUG_ON(__alignof__(struct bpf_iter_dynptr_kern) !=
+		     __alignof__(struct bpf_iter_dynptr));
+
+	if (!ptr->data)
+		return -EINVAL;
+
+	if (!buffer || buffer__szk <= 0)
+		return -EINVAL;
+
+	if (offset >= __bpf_dynptr_size(ptr))
+		return -E2BIG;
+
+	kit->dynptr = ptr;
+	kit->buffer = buffer;
+	kit->buffer_len = buffer__szk;
+	kit->offset = offset;
+	kit->read_len = 0;
+
+	return 0;
+}
+
+__bpf_kfunc int *bpf_iter_dynptr_next(struct bpf_iter_dynptr *it)
+{
+	struct bpf_iter_dynptr_kern *kit = (void *)it;
+	int read_len, ret;
+	u32 size;
+
+	if (!kit->dynptr)
+		return NULL;
+
+	if (!kit->dynptr->data)
+		return NULL;
+
+	if (unlikely(kit->read_len < 0))
+		return NULL;
+
+	size = __bpf_dynptr_size(kit->dynptr);
+
+	if (kit->offset >= size)
+		return NULL;
+
+	read_len = (kit->offset + kit->buffer_len > size) ? size - kit->offset : kit->buffer_len;
+
+	ret = bpf_dynptr_read((u64)kit->buffer, read_len, (u64)kit->dynptr, kit->offset, 0);
+	if (unlikely(ret != 0)) {
+		/* if errors occur in bpf_dynptr_read, the errno is returned via read_len
+		 * and NULL is returned in the next iteration to exit the iteration loop.
+		 */
+		kit->read_len = ret;
+		goto out;
+	}
+
+	kit->read_len = read_len;
+	kit->offset += read_len;
+out:
+	return &kit->read_len;
+}
+
+__bpf_kfunc int bpf_iter_dynptr_set_buffer(struct bpf_iter_dynptr *it__iter,
+					   void *buffer, u32 buffer__szk)
+{
+	struct bpf_iter_dynptr_kern *kit = (void *)it__iter;
+
+	if (!buffer || buffer__szk <= 0)
+		return -EINVAL;
+
+	kit->buffer = buffer;
+	kit->buffer_len = buffer__szk;
+
+	return 0;
+}
+
+__bpf_kfunc u32 bpf_iter_dynptr_get_last_offset(struct bpf_iter_dynptr *it__iter)
+{
+	struct bpf_iter_dynptr_kern *kit = (void *)it__iter;
+
+	if (!kit->dynptr)
+		return 0;
+
+	return kit->offset - kit->read_len;
+}
+
+__bpf_kfunc void bpf_iter_dynptr_destroy(struct bpf_iter_dynptr *it)
+{
+}
+
 __bpf_kfunc void *bpf_cast_to_kern_ctx(void *obj)
 {
 	return obj;
@@ -3080,6 +3185,11 @@ BTF_ID_FLAGS(func, bpf_dynptr_is_null)
 BTF_ID_FLAGS(func, bpf_dynptr_is_rdonly)
 BTF_ID_FLAGS(func, bpf_dynptr_size)
 BTF_ID_FLAGS(func, bpf_dynptr_clone)
+BTF_ID_FLAGS(func, bpf_iter_dynptr_new, KF_ITER_NEW)
+BTF_ID_FLAGS(func, bpf_iter_dynptr_next, KF_ITER_NEXT | KF_RET_NULL)
+BTF_ID_FLAGS(func, bpf_iter_dynptr_get_last_offset)
+BTF_ID_FLAGS(func, bpf_iter_dynptr_set_buffer)
+BTF_ID_FLAGS(func, bpf_iter_dynptr_destroy, KF_ITER_DESTROY)
 BTF_ID_FLAGS(func, bpf_modify_return_test_tp)
 BTF_ID_FLAGS(func, bpf_wq_init)
 BTF_ID_FLAGS(func, bpf_wq_set_callback_impl)
-- 
2.39.2


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ