lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 29 Mar 2015 18:18:01 -0700 From: Alexei Starovoitov <ast@...mgrid.com> To: Jamal Hadi Salim <jhs@...atatu.com>, "David S. Miller" <davem@...emloft.net> CC: Daniel Borkmann <daniel@...earbox.net>, Jiri Pirko <jiri@...nulli.us>, linux-api@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCH net-next] tc: bpf: generalize pedit action On 3/29/15 5:52 PM, Jamal Hadi Salim wrote: > On 03/26/15 22:53, Alexei Starovoitov wrote: >> existing TC action 'pedit' can munge any bits of the packet. >> Generalize it for use in bpf programs attached as cls_bpf and act_bpf via >> bpf_skb_store_bytes() helper function. >> >> Signed-off-by: Alexei Starovoitov <ast@...mgrid.com> >> --- >> >> pedit is limited to 32-bit masked rewrites. Here let it be flexible. >> >> ptr = skb_header_pointer(skb, offset, len, buf); >> memcpy(ptr, from, len); >> if (ptr == buf) >> skb_store_bits(skb, offset, ptr, len); >> >> ^^ logic is the same as in pedit. >> shifts, mask, invert style of rewrite is easily done by the program. >> Just like arbitrary parsing of the packet and applying rewrites on >> demand. >> > > Alexei/Daniel - I am backlogged on email; however, i didn quiet follow: > Is there another patch to pedit that help achieve the above? not really. If you meant adding 'array of bytes' attribute to pedit, it won't be sufficient from program point of view. Programs are deciding what and when to write, whereas pedit is static. I'm working on csum helper patch and a set of examples that will demonstrate the possibilities. I believe Daniel is preparing examples as well for different use cases. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists