lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 5 May 2020 14:19:07 -0700 From: Andrii Nakryiko <andrii.nakryiko@...il.com> To: Yonghong Song <yhs@...com> Cc: Andrii Nakryiko <andriin@...com>, bpf <bpf@...r.kernel.org>, Martin KaFai Lau <kafai@...com>, Networking <netdev@...r.kernel.org>, Alexei Starovoitov <ast@...com>, Daniel Borkmann <daniel@...earbox.net>, Kernel Team <kernel-team@...com> Subject: Re: [PATCH bpf-next v2 01/20] bpf: implement an interface to register bpf_iter targets On Sun, May 3, 2020 at 11:26 PM Yonghong Song <yhs@...com> wrote: > > The target can call bpf_iter_reg_target() to register itself. > The needed information: > target: target name > seq_ops: the seq_file operations for the target > init_seq_private target callback to initialize seq_priv during file open > fini_seq_private target callback to clean up seq_priv during file release > seq_priv_size: the private_data size needed by the seq_file > operations > > The target name represents a target which provides a seq_ops > for iterating objects. > > The target can provide two callback functions, init_seq_private > and fini_seq_private, called during file open/release time. > For example, /proc/net/{tcp6, ipv6_route, netlink, ...}, net > name space needs to be setup properly during file open and > released properly during file release. > > Signed-off-by: Yonghong Song <yhs@...com> > --- LGTM. Acked-by: Andrii Nakryiko <andriin@...com> > include/linux/bpf.h | 14 ++++++++++++++ > kernel/bpf/Makefile | 2 +- > kernel/bpf/bpf_iter.c | 40 ++++++++++++++++++++++++++++++++++++++++ > 3 files changed, 55 insertions(+), 1 deletion(-) > create mode 100644 kernel/bpf/bpf_iter.c > [...]
Powered by blists - more mailing lists