summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/prog_tests/ringbuf.c
diff options
context:
space:
mode:
authorDave Marchevsky <davemarchevsky@fb.com>2022-10-20 09:07:18 -0700
committerAlexei Starovoitov <ast@kernel.org>2022-10-21 19:22:42 -0700
commit9ef40974a82a474321a4c2dd75d395943930c638 (patch)
treecc77dc523a1ca75655d34f68fecf65e1ad926724 /tools/testing/selftests/bpf/prog_tests/ringbuf.c
parent2f97bcd0aa433cbff954e52345d7182f706e020e (diff)
downloadlinux-9ef40974a82a474321a4c2dd75d395943930c638.tar.gz
linux-9ef40974a82a474321a4c2dd75d395943930c638.tar.bz2
linux-9ef40974a82a474321a4c2dd75d395943930c638.zip
bpf: Allow ringbuf memory to be used as map key
This patch adds support for the following pattern: struct some_data *data = bpf_ringbuf_reserve(&ringbuf, sizeof(struct some_data, 0)); if (!data) return; bpf_map_lookup_elem(&another_map, &data->some_field); bpf_ringbuf_submit(data); Currently the verifier does not consider bpf_ringbuf_reserve's PTR_TO_MEM | MEM_ALLOC ret type a valid key input to bpf_map_lookup_elem. Since PTR_TO_MEM is by definition a valid region of memory, it is safe to use it as a key for lookups. Signed-off-by: Dave Marchevsky <davemarchevsky@fb.com> Acked-by: Yonghong Song <yhs@fb.com> Acked-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/r/20221020160721.4030492-1-davemarchevsky@fb.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/ringbuf.c')
0 files changed, 0 insertions, 0 deletions