Files
linux-cryptodev-2.6/include/uapi/linux
Andrii Nakryiko 6018e1f407 bpf: implement numbers iterator
Implement the first open-coded iterator type over a range of integers.

It's public API consists of:
  - bpf_iter_num_new() constructor, which accepts [start, end) range
    (that is, start is inclusive, end is exclusive).
  - bpf_iter_num_next() which will keep returning read-only pointer to int
    until the range is exhausted, at which point NULL will be returned.
    If bpf_iter_num_next() is kept calling after this, NULL will be
    persistently returned.
  - bpf_iter_num_destroy() destructor, which needs to be called at some
    point to clean up iterator state. BPF verifier enforces that iterator
    destructor is called at some point before BPF program exits.

Note that `start = end = X` is a valid combination to setup an empty
iterator. bpf_iter_num_new() will return 0 (success) for any such
combination.

If bpf_iter_num_new() detects invalid combination of input arguments, it
returns error, resets iterator state to, effectively, empty iterator, so
any subsequent call to bpf_iter_num_next() will keep returning NULL.

BPF verifier has no knowledge that returned integers are in the
[start, end) value range, as both `start` and `end` are not statically
known and enforced: they are runtime values.

While the implementation is pretty trivial, some care needs to be taken
to avoid overflows and underflows. Subsequent selftests will validate
correctness of [start, end) semantics, especially around extremes
(INT_MIN and INT_MAX).

Similarly to bpf_loop(), we enforce that no more than BPF_MAX_LOOPS can
be specified.

bpf_iter_num_{new,next,destroy}() is a logical evolution from bounded
BPF loops and bpf_loop() helper and is the basis for implementing
ergonomic BPF loops with no statically known or verified bounds.
Subsequent patches implement bpf_for() macro, demonstrating how this can
be wrapped into something that works and feels like a normal for() loop
in C language.

Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/r/20230308184121.1165081-5-andrii@kernel.org
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2023-03-08 16:19:51 -08:00
..
2022-09-15 09:08:09 +02:00
2022-04-19 13:13:47 +01:00
2021-11-01 13:36:08 +00:00
2022-08-11 10:31:19 -07:00
2023-03-08 16:19:51 -08:00
2022-06-07 10:20:42 -07:00
2021-11-26 16:48:59 +01:00
2023-02-10 17:54:45 -08:00
2023-01-20 09:33:22 +00:00
2022-08-23 14:54:54 -05:00
2023-01-20 12:23:07 +00:00
2022-04-04 08:55:23 +02:00
2023-01-18 17:12:37 -08:00
2021-10-07 13:51:11 +02:00
2022-08-10 13:49:50 +01:00
2023-02-16 13:50:50 +01:00
2022-03-11 08:28:05 -08:00
2021-11-15 07:53:10 -08:00
2021-06-03 15:31:34 -07:00
2022-06-03 20:09:27 +08:00
2022-09-20 09:13:38 +02:00
2022-10-19 09:01:44 +02:00
2022-12-01 20:06:06 -08:00
2022-09-07 16:46:03 +02:00
2021-07-06 10:37:46 -05:00
2022-09-20 09:13:38 +02:00
2023-01-04 14:44:13 -07:00
2023-01-26 10:52:18 +01:00
2022-11-17 11:04:23 -08:00
2022-09-27 17:29:09 -07:00
2023-02-20 19:26:56 -05:00
2021-06-12 13:16:45 -07:00
2022-12-05 10:30:47 +01:00