diff options
| author | Alexei Starovoitov <ast@kernel.org> | 2023-03-02 20:14:41 -0800 |
|---|---|---|
| committer | Daniel Borkmann <daniel@iogearbox.net> | 2023-03-03 17:42:20 +0100 |
| commit | 03b77e17aeb22a5935ea20d585ca6a1f2947e62b (patch) | |
| tree | 05dc31ff00b9fb0aabb5709080a5d72eb06d0d66 /tools/testing/selftests/bpf/progs/cb_refs.c | |
| parent | 944459e88b4f5c71683b56710f96e39756afae31 (diff) | |
| download | linux-03b77e17aeb22a5935ea20d585ca6a1f2947e62b.tar.gz linux-03b77e17aeb22a5935ea20d585ca6a1f2947e62b.tar.bz2 linux-03b77e17aeb22a5935ea20d585ca6a1f2947e62b.zip | |
bpf: Rename __kptr_ref -> __kptr and __kptr -> __kptr_untrusted.
__kptr meant to store PTR_UNTRUSTED kernel pointers inside bpf maps.
The concept felt useful, but didn't get much traction,
since bpf_rdonly_cast() was added soon after and bpf programs received
a simpler way to access PTR_UNTRUSTED kernel pointers
without going through restrictive __kptr usage.
Rename __kptr_ref -> __kptr and __kptr -> __kptr_untrusted to indicate
its intended usage.
The main goal of __kptr_untrusted was to read/write such pointers
directly while bpf_kptr_xchg was a mechanism to access refcnted
kernel pointers. The next patch will allow RCU protected __kptr access
with direct read. At that point __kptr_untrusted will be deprecated.
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: David Vernet <void@manifault.com>
Link: https://lore.kernel.org/bpf/20230303041446.3630-2-alexei.starovoitov@gmail.com
Diffstat (limited to 'tools/testing/selftests/bpf/progs/cb_refs.c')
| -rw-r--r-- | tools/testing/selftests/bpf/progs/cb_refs.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/testing/selftests/bpf/progs/cb_refs.c b/tools/testing/selftests/bpf/progs/cb_refs.c index 7653df1bc787..ce96b33e38d6 100644 --- a/tools/testing/selftests/bpf/progs/cb_refs.c +++ b/tools/testing/selftests/bpf/progs/cb_refs.c @@ -4,7 +4,7 @@ #include <bpf/bpf_helpers.h> struct map_value { - struct prog_test_ref_kfunc __kptr_ref *ptr; + struct prog_test_ref_kfunc __kptr *ptr; }; struct { |
