From: Martin KaFai Lau <martin.lau@linux.dev>
To: Joanne Koong <joannelkoong@gmail.com>
Cc: andrii@kernel.org, daniel@iogearbox.net, ast@kernel.org,
martin.lau@kernel.org, kuba@kernel.org, memxor@gmail.com,
toke@redhat.com, netdev@vger.kernel.org, kernel-team@fb.com,
bpf@vger.kernel.org
Subject: Re: [PATCH bpf-next v6 1/3] bpf: Add skb dynptrs
Date: Wed, 19 Oct 2022 23:40:11 -0700 [thread overview]
Message-ID: <de696460-ab5c-0770-017a-2af06eab5187@linux.dev> (raw)
In-Reply-To: <8f900712-8dcc-5f39-7a66-b6b2e4162f94@linux.dev>
On 10/19/22 11:34 PM, Martin KaFai Lau wrote:
> On 10/19/22 1:22 PM, Joanne Koong wrote:
>> On Fri, Sep 9, 2022 at 4:12 PM Martin KaFai Lau <martin.lau@linux.dev> wrote:
>>>
>>> On 9/7/22 11:31 AM, Joanne Koong wrote:
>>>> For bpf prog types that don't support writes on skb data, the dynptr is
>>>> read-only (bpf_dynptr_write() will return an error and bpf_dynptr_data()
>>>> will return NULL; for a read-only data slice, there will be a separate
>>>> API bpf_dynptr_data_rdonly(), which will be added in the near future).
>>>>
>>> I just caught up on the v4 discussion about loadtime-vs-runtime error on
>>> write. From a user perspective, I am not concerned on which error.
>>> Either way, I will quickly find out the packet header is not changed.
>>>
>>> For the dynptr init helper bpf_dynptr_from_skb(), the user does not need
>>> to know its skb is read-only or not and uses the same helper. The
>>> verifier in this case uses its knowledge on the skb context and uses
>>> bpf_dynptr_from_skb_rdonly_proto or bpf_dynptr_from_skb_rdwr_proto
>>> accordingly.
>>>
>>> Now for the slice helper, the user needs to remember its skb is read
>>> only (or not) and uses bpf_dynptr_data() vs bpf_dynptr_data_rdonly()
>>> accordingly. Yes, if it only needs to read, the user can always stay
>>> with bpf_dynptr_data_rdonly (which is not the initially supported one
>>> though). However, it is still unnecessary burden and surprise to user.
>>> It is likely it will silently turn everything into bpf_dynptr_read()
>>> against the user intention. eg:
>>>
>>> if (bpf_dynptr_from_skb(skb, 0, &dynptr))
>>> return 0;
>>> ip6h = bpf_dynptr_data(&dynptr, 0, sizeof(*ip6h));
>>> if (!ip6h) {
>>> /* Unlikely case, in non-linear section, just bpf_dynptr_read()
>>> * Oops...actually bpf_dynptr_data_rdonly() should be used.
>>> */
>>> bpf_dynptr_read(buf, sizeof(*ip6h), &dynptr, 0, 0);
>>> ip6h = buf;
>>> }
>>>
>>
>> I see your point. I agree that it'd be best if we could prevent this
>> burden on the user, but I think the trade-off would be that if we have
>> bpf_dynptr_data return data slices that are read-only and data slices
>> that are writable (where rd-only vs. writable is tracked by verifier),
>> then in the future we won't be able to support dynptrs that are
>> dynamically read-only (since to reject at load time, the verifier must
>> know statically whether the dynptr is read-only or not). I'm not sure
>> how likely it is that we'd run into a case where we'll need dynamic
>> read-only dynptrs though. What are your thoughts on this?
>
> Out of all dynptr helpers, bpf_dynptr_data() is pretty much the only important
> function for header parsing because of the runtime offset. This offset is good
> to be tracked in runtime to avoid smart compiler getting in the way. imo,
> making this helper less usage surprise is important. If the verifier can help,
> then static checking is useful here.
>
> It is hard to comment without a real use case on when we want to flip a dynptr
> to rdonly in a dynamic/runtime way. Thus, comparing with the example like the
> skb here, my preference is pretty obvious :)
> Beside, a quick thought is doing this static checking now should now stop the
typo: should *not* stop the... :(
> dynamic rdonly flip later. I imagine it will be a helper call like
> bpf_dynptr_set_rdonly(). The verifier should be able to track this helper call.
next prev parent reply other threads:[~2022-10-20 6:40 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-07 18:31 [PATCH bpf-next v6 0/3] Add skb + xdp dynptrs Joanne Koong
2022-09-07 18:31 ` [PATCH bpf-next v6 1/3] bpf: Add skb dynptrs Joanne Koong
2022-09-09 23:12 ` Martin KaFai Lau
2022-10-19 20:22 ` Joanne Koong
2022-10-20 6:34 ` Martin KaFai Lau
2022-10-20 6:40 ` Martin KaFai Lau [this message]
2022-10-20 19:30 ` Joanne Koong
2022-09-07 18:31 ` [PATCH bpf-next v6 2/3] bpf: Add xdp dynptrs Joanne Koong
2022-09-07 18:31 ` [PATCH bpf-next v6 3/3] selftests/bpf: tests for using dynptrs to parse skb and xdp buffers Joanne Koong
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=de696460-ab5c-0770-017a-2af06eab5187@linux.dev \
--to=martin.lau@linux.dev \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=joannelkoong@gmail.com \
--cc=kernel-team@fb.com \
--cc=kuba@kernel.org \
--cc=martin.lau@kernel.org \
--cc=memxor@gmail.com \
--cc=netdev@vger.kernel.org \
--cc=toke@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox