Home
last modified time | relevance | path

Searched hist:"6728 aea7216c0c06c98e2e58d753a5e8b2ae1c6f" (Results 1 – 8 of 8) sorted by relevance

/linux/net/netfilter/
H A Dnf_conntrack_bpf.cdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
/linux/net/bpf/
H A Dbpf_dummy_struct_ops.cdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
/linux/net/ipv4/
H A Dbpf_tcp_ca.cdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
/linux/kernel/bpf/
H A Dbtf.cdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
H A Dverifier.cdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
/linux/include/linux/
H A Dfilter.hdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
H A Dbpf.hdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
/linux/net/core/
H A Dfilter.cdiff 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f Mon Nov 14 20:15:28 CET 2022 Kumar Kartikeya Dwivedi <memxor@gmail.com> bpf: Refactor btf_struct_access

Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.

Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>