diff options
author | Kumar Kartikeya Dwivedi <memxor@gmail.com> | 2022-11-15 00:45:28 +0530 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2022-11-14 21:52:45 -0800 |
commit | 6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f (patch) | |
tree | 4397a958819a861067daa29aaa3c3a4983ffc89e /io_uring/net.h | |
parent | 894f2a8b1673a355a1a7507a4dfa6a3c836d07c1 (diff) | |
download | linux-6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f.tar.gz linux-6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f.tar.bz2 linux-6728aea7216c0c06c98e2e58d753a5e8b2ae1c6f.zip |
bpf: Refactor btf_struct_access
Instead of having to pass multiple arguments that describe the register,
pass the bpf_reg_state into the btf_struct_access callback. Currently,
all call sites simply reuse the btf and btf_id of the reg they want to
check the access of. The only exception to this pattern is the callsite
in check_ptr_to_map_access, hence for that case create a dummy reg to
simulate PTR_TO_BTF_ID access.
Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-8-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'io_uring/net.h')
0 files changed, 0 insertions, 0 deletions