[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20200513193833.536oc5neayhiisvi@ast-mbp.dhcp.thefacebook.com>
Date: Wed, 13 May 2020 12:38:33 -0700
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: Yonghong Song <yhs@...com>
Cc: Andrii Nakryiko <andriin@...com>, bpf@...r.kernel.org,
Martin KaFai Lau <kafai@...com>, netdev@...r.kernel.org,
Alexei Starovoitov <ast@...com>,
Daniel Borkmann <daniel@...earbox.net>, kernel-team@...com
Subject: Re: [PATCH bpf-next v2 0/7] bpf: misc fixes for bpf_iter
On Wed, May 13, 2020 at 11:02:15AM -0700, Yonghong Song wrote:
> Commit ae24345da54e ("bpf: Implement an interface to register
> bpf_iter targets") and its subsequent commits in the same patch set
> introduced bpf iterator, a way to run bpf program when iterating
> kernel data structures.
>
> This patch set addressed some followup issues. One big change
> is to allow target to pass ctx arg register types to verifier
> for verification purpose. Please see individual patch for details.
>
> Changelogs:
> v1 -> v2:
> . add "const" qualifier to struct bpf_iter_reg for
> bpf_iter_[un]reg_target, and this results in
> additional "const" qualifiers in some other places
> . drop the patch which will issue WARN_ONCE if
> seq_ops->show() returns a positive value.
> If this does happen, code review should spot
> this or author does know what he is doing.
> In the future, we do want to implement a
> mechanism to find out all registered targets
> so we will be aware of new additions.
Applied, Thanks
Powered by blists - more mailing lists