All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH bpf-next 00/13] bpf: implement bpf iterator for map elements
@ 2020-07-13 16:17 Yonghong Song
  2020-07-13 16:17 ` [PATCH bpf-next 01/13] bpf: refactor bpf_iter_reg to have separate seq_info member Yonghong Song
                   ` (12 more replies)
  0 siblings, 13 replies; 24+ messages in thread
From: Yonghong Song @ 2020-07-13 16:17 UTC (permalink / raw)
  To: bpf, netdev
  Cc: Alexei Starovoitov, Daniel Borkmann, kernel-team, Martin KaFai Lau

Bpf iterator is introduced in Commit ae24345da54e
("bpf: Implement an interface to register bpf_iter targets")
which iterates through a particular kernel data
structure and bpf program will be called for each
traversed kernel object.

Bpf iterator has been implemented for task, task_file,
bpf_map, ipv6_route, netlink, tcp and udp so far.

For map elements, there are two ways to traverse all elements from
user space:
  1. using BPF_MAP_GET_NEXT_KEY bpf subcommand to get elements
     one by one.
  2. using BPF_MAP_LOOKUP_BATCH bpf subcommand to get a batch of
     elements.
Both these approaches need to copy data from kernel to user space
in order to do inspection.

This patch implements bpf iterator for map elements.
User can have a bpf program in kernel to run with each map element,
do checking, filtering, aggregation, etc. without copying data
to user space.

Patch #1 and #2 are refactoring. Patch #3 implements readonly buffer
support in verifier. Patches #4 - #7 implements map element support
for hash, percpu hash, lru hash lru percpu hash, array, percpu array
and sock local storage maps. Patches #8 - #9 are libbpf and bpftool
support. Patches #10 - #13 are selftests for implemented
map element iterators.

Yonghong Song (13):
  bpf: refactor bpf_iter_reg to have separate seq_info member
  bpf: refactor to provide aux info to bpf_iter_init_seq_priv_t
  bpf: support readonly buffer in verifier
  bpf: implement bpf iterator for map elements
  bpf: implement bpf iterator for hash maps
  bpf: implement bpf iterator for array maps
  bpf: implement bpf iterator for sock local storage map
  tools/libbpf: add support for bpf map element iterator
  tools/bpftool: add bpftool support for bpf map element iterator
  selftests/bpf: add test for bpf hash map iterators
  selftests/bpf: add test for bpf array map iterators
  selftests/bpf: add a test for bpf sk_storage_map iterator
  selftests/bpf: add a test for out of bound rdonly buf access

 fs/proc/proc_net.c                            |   2 +-
 include/linux/bpf.h                           |  43 +-
 include/linux/bpf_verifier.h                  |   2 +
 include/linux/proc_fs.h                       |   3 +-
 include/uapi/linux/bpf.h                      |   7 +
 kernel/bpf/arraymap.c                         | 140 ++++++
 kernel/bpf/bpf_iter.c                         |  89 +++-
 kernel/bpf/btf.c                              |  13 +
 kernel/bpf/hashtab.c                          | 191 ++++++++
 kernel/bpf/map_iter.c                         |  62 ++-
 kernel/bpf/task_iter.c                        |  18 +-
 kernel/bpf/verifier.c                         |  74 ++-
 net/core/bpf_sk_storage.c                     | 203 +++++++++
 net/ipv4/tcp_ipv4.c                           |  12 +-
 net/ipv4/udp.c                                |  12 +-
 net/ipv6/route.c                              |   8 +-
 net/netlink/af_netlink.c                      |   8 +-
 .../bpftool/Documentation/bpftool-iter.rst    |  16 +-
 tools/bpf/bpftool/iter.c                      |  32 +-
 tools/include/uapi/linux/bpf.h                |   7 +
 tools/lib/bpf/bpf.c                           |   1 +
 tools/lib/bpf/bpf.h                           |   3 +-
 tools/lib/bpf/libbpf.c                        |  10 +-
 tools/lib/bpf/libbpf.h                        |   3 +-
 .../selftests/bpf/prog_tests/bpf_iter.c       | 422 ++++++++++++++++++
 .../bpf/progs/bpf_iter_bpf_array_map.c        |  38 ++
 .../bpf/progs/bpf_iter_bpf_hash_map.c         | 100 +++++
 .../bpf/progs/bpf_iter_bpf_percpu_array_map.c |  48 ++
 .../bpf/progs/bpf_iter_bpf_percpu_hash_map.c  |  51 +++
 .../bpf/progs/bpf_iter_bpf_sk_storage_map.c   |  35 ++
 .../selftests/bpf/progs/bpf_iter_test_kern5.c |  36 ++
 31 files changed, 1624 insertions(+), 65 deletions(-)
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_bpf_array_map.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_bpf_hash_map.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_bpf_percpu_array_map.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_bpf_percpu_hash_map.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_bpf_sk_storage_map.c
 create mode 100644 tools/testing/selftests/bpf/progs/bpf_iter_test_kern5.c

-- 
2.24.1


^ permalink raw reply	[flat|nested] 24+ messages in thread
* Re: [PATCH bpf-next 05/13] bpf: implement bpf iterator for hash maps
@ 2020-07-14  7:08 kernel test robot
  0 siblings, 0 replies; 24+ messages in thread
From: kernel test robot @ 2020-07-14  7:08 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 13569 bytes --]

CC: kbuild-all(a)lists.01.org
In-Reply-To: <20200713161744.3076960-1-yhs@fb.com>
References: <20200713161744.3076960-1-yhs@fb.com>
TO: Yonghong Song <yhs@fb.com>
TO: bpf(a)vger.kernel.org
TO: netdev(a)vger.kernel.org
CC: Alexei Starovoitov <ast@kernel.org>
CC: Daniel Borkmann <daniel@iogearbox.net>
CC: kernel-team(a)fb.com
CC: Martin KaFai Lau <kafai@fb.com>

Hi Yonghong,

I love your patch! Perhaps something to improve:

[auto build test WARNING on bpf-next/master]

url:    https://github.com/0day-ci/linux/commits/Yonghong-Song/bpf-implement-bpf-iterator-for-map-elements/20200714-002048
base:   https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git master
:::::: branch date: 15 hours ago
:::::: commit date: 15 hours ago
config: microblaze-randconfig-s031-20200714 (attached as .config)
compiler: microblaze-linux-gcc (GCC) 9.3.0
reproduce:
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # apt-get install sparse
        # sparse version: v0.6.2-41-g14e84ffc-dirty
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-9.3.0 make.cross C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' ARCH=microblaze 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>


sparse warnings: (new ones prefixed by >>)

   kernel/bpf/hashtab.c:622:19: sparse: sparse: subtraction of functions? Share your drugs
   kernel/bpf/hashtab.c:663:19: sparse: sparse: subtraction of functions? Share your drugs
   kernel/bpf/hashtab.c:1345:24: sparse: sparse: incorrect type in initializer (different address spaces) @@     expected void *ubatch @@     got void [noderef] __user * @@
   kernel/bpf/hashtab.c:1345:24: sparse:     expected void *ubatch
   kernel/bpf/hashtab.c:1345:24: sparse:     got void [noderef] __user *
   kernel/bpf/hashtab.c:1374:46: sparse: sparse: incorrect type in argument 2 (different address spaces) @@     expected void const [noderef] __user *from @@     got void *ubatch @@
   kernel/bpf/hashtab.c:1374:46: sparse:     expected void const [noderef] __user *from
   kernel/bpf/hashtab.c:1374:46: sparse:     got void *ubatch
   kernel/bpf/hashtab.c:1535:16: sparse: sparse: incorrect type in assignment (different address spaces) @@     expected void *ubatch @@     got void [noderef] __user * @@
   kernel/bpf/hashtab.c:1535:16: sparse:     expected void *ubatch
   kernel/bpf/hashtab.c:1535:16: sparse:     got void [noderef] __user *
   kernel/bpf/hashtab.c:1536:26: sparse: sparse: incorrect type in argument 1 (different address spaces) @@     expected void [noderef] __user *to @@     got void *ubatch @@
   kernel/bpf/hashtab.c:1536:26: sparse:     expected void [noderef] __user *to
   kernel/bpf/hashtab.c:1536:26: sparse:     got void *ubatch
   kernel/bpf/hashtab.c:2075:19: sparse: sparse: subtraction of functions? Share your drugs
   kernel/bpf/hashtab.c:1407:9: sparse: sparse: context imbalance in '__htab_map_lookup_and_delete_batch' - different lock contexts for basic block
>> kernel/bpf/hashtab.c:1649:17: sparse: sparse: context imbalance in 'bpf_hash_map_seq_find_next' - unexpected unlock
>> kernel/bpf/hashtab.c:1753:35: sparse: sparse: context imbalance in 'bpf_hash_map_seq_stop' - unexpected unlock

# https://github.com/0day-ci/linux/commit/6d3930f639dd699e23551c0fb98a74a0a413d2a9
git remote add linux-review https://github.com/0day-ci/linux
git remote update linux-review
git checkout 6d3930f639dd699e23551c0fb98a74a0a413d2a9
vim +/bpf_hash_map_seq_find_next +1649 kernel/bpf/hashtab.c

6d3930f639dd69 Yonghong Song 2020-07-13  1623  
6d3930f639dd69 Yonghong Song 2020-07-13  1624  static struct htab_elem *
6d3930f639dd69 Yonghong Song 2020-07-13  1625  bpf_hash_map_seq_find_next(struct bpf_iter_seq_hash_map_info *info,
6d3930f639dd69 Yonghong Song 2020-07-13  1626  			   struct htab_elem *prev_elem)
6d3930f639dd69 Yonghong Song 2020-07-13  1627  {
6d3930f639dd69 Yonghong Song 2020-07-13  1628  	const struct bpf_htab *htab = info->htab;
6d3930f639dd69 Yonghong Song 2020-07-13  1629  	unsigned long flags = info->flags;
6d3930f639dd69 Yonghong Song 2020-07-13  1630  	u32 skip_elems = info->skip_elems;
6d3930f639dd69 Yonghong Song 2020-07-13  1631  	u32 bucket_id = info->bucket_id;
6d3930f639dd69 Yonghong Song 2020-07-13  1632  	struct hlist_nulls_head *head;
6d3930f639dd69 Yonghong Song 2020-07-13  1633  	struct hlist_nulls_node *n;
6d3930f639dd69 Yonghong Song 2020-07-13  1634  	struct htab_elem *elem;
6d3930f639dd69 Yonghong Song 2020-07-13  1635  	struct bucket *b;
6d3930f639dd69 Yonghong Song 2020-07-13  1636  	u32 i, count;
6d3930f639dd69 Yonghong Song 2020-07-13  1637  
6d3930f639dd69 Yonghong Song 2020-07-13  1638  	if (bucket_id >= htab->n_buckets)
6d3930f639dd69 Yonghong Song 2020-07-13  1639  		return NULL;
6d3930f639dd69 Yonghong Song 2020-07-13  1640  
6d3930f639dd69 Yonghong Song 2020-07-13  1641  	/* try to find next elem in the same bucket */
6d3930f639dd69 Yonghong Song 2020-07-13  1642  	if (prev_elem) {
6d3930f639dd69 Yonghong Song 2020-07-13  1643  		n = rcu_dereference_raw(hlist_nulls_next_rcu(&prev_elem->hash_node));
6d3930f639dd69 Yonghong Song 2020-07-13  1644  		elem = hlist_nulls_entry_safe(n, struct htab_elem, hash_node);
6d3930f639dd69 Yonghong Song 2020-07-13  1645  		if (elem)
6d3930f639dd69 Yonghong Song 2020-07-13  1646  			return elem;
6d3930f639dd69 Yonghong Song 2020-07-13  1647  
6d3930f639dd69 Yonghong Song 2020-07-13  1648  		/* not found, unlock and go to the next bucket */
6d3930f639dd69 Yonghong Song 2020-07-13 @1649  		b = &htab->buckets[bucket_id++];
6d3930f639dd69 Yonghong Song 2020-07-13  1650  		htab_unlock_bucket(htab, b, flags);
6d3930f639dd69 Yonghong Song 2020-07-13  1651  		skip_elems = 0;
6d3930f639dd69 Yonghong Song 2020-07-13  1652  	}
6d3930f639dd69 Yonghong Song 2020-07-13  1653  
6d3930f639dd69 Yonghong Song 2020-07-13  1654  	for (i = bucket_id; i < htab->n_buckets; i++) {
6d3930f639dd69 Yonghong Song 2020-07-13  1655  		b = &htab->buckets[i];
6d3930f639dd69 Yonghong Song 2020-07-13  1656  		flags = htab_lock_bucket(htab, b);
6d3930f639dd69 Yonghong Song 2020-07-13  1657  
6d3930f639dd69 Yonghong Song 2020-07-13  1658  		count = 0;
6d3930f639dd69 Yonghong Song 2020-07-13  1659  		head = &b->head;
6d3930f639dd69 Yonghong Song 2020-07-13  1660  		hlist_nulls_for_each_entry_rcu(elem, n, head, hash_node) {
6d3930f639dd69 Yonghong Song 2020-07-13  1661  			if (count >= skip_elems) {
6d3930f639dd69 Yonghong Song 2020-07-13  1662  				info->flags = flags;
6d3930f639dd69 Yonghong Song 2020-07-13  1663  				info->bucket_id = i;
6d3930f639dd69 Yonghong Song 2020-07-13  1664  				info->skip_elems = count;
6d3930f639dd69 Yonghong Song 2020-07-13  1665  				return elem;
6d3930f639dd69 Yonghong Song 2020-07-13  1666  			}
6d3930f639dd69 Yonghong Song 2020-07-13  1667  			count++;
6d3930f639dd69 Yonghong Song 2020-07-13  1668  		}
6d3930f639dd69 Yonghong Song 2020-07-13  1669  
6d3930f639dd69 Yonghong Song 2020-07-13  1670  		htab_unlock_bucket(htab, b, flags);
6d3930f639dd69 Yonghong Song 2020-07-13  1671  		skip_elems = 0;
6d3930f639dd69 Yonghong Song 2020-07-13  1672  	}
6d3930f639dd69 Yonghong Song 2020-07-13  1673  
6d3930f639dd69 Yonghong Song 2020-07-13  1674  	info->bucket_id = i;
6d3930f639dd69 Yonghong Song 2020-07-13  1675  	info->skip_elems = 0;
6d3930f639dd69 Yonghong Song 2020-07-13  1676  	return NULL;
6d3930f639dd69 Yonghong Song 2020-07-13  1677  }
6d3930f639dd69 Yonghong Song 2020-07-13  1678  
6d3930f639dd69 Yonghong Song 2020-07-13  1679  static void *bpf_hash_map_seq_start(struct seq_file *seq, loff_t *pos)
6d3930f639dd69 Yonghong Song 2020-07-13  1680  {
6d3930f639dd69 Yonghong Song 2020-07-13  1681  	struct bpf_iter_seq_hash_map_info *info = seq->private;
6d3930f639dd69 Yonghong Song 2020-07-13  1682  	struct htab_elem *elem;
6d3930f639dd69 Yonghong Song 2020-07-13  1683  
6d3930f639dd69 Yonghong Song 2020-07-13  1684  	elem = bpf_hash_map_seq_find_next(info, NULL);
6d3930f639dd69 Yonghong Song 2020-07-13  1685  	if (!elem)
6d3930f639dd69 Yonghong Song 2020-07-13  1686  		return NULL;
6d3930f639dd69 Yonghong Song 2020-07-13  1687  
6d3930f639dd69 Yonghong Song 2020-07-13  1688  	if (*pos == 0)
6d3930f639dd69 Yonghong Song 2020-07-13  1689  		++*pos;
6d3930f639dd69 Yonghong Song 2020-07-13  1690  	return elem;
6d3930f639dd69 Yonghong Song 2020-07-13  1691  }
6d3930f639dd69 Yonghong Song 2020-07-13  1692  
6d3930f639dd69 Yonghong Song 2020-07-13  1693  static void *bpf_hash_map_seq_next(struct seq_file *seq, void *v, loff_t *pos)
6d3930f639dd69 Yonghong Song 2020-07-13  1694  {
6d3930f639dd69 Yonghong Song 2020-07-13  1695  	struct bpf_iter_seq_hash_map_info *info = seq->private;
6d3930f639dd69 Yonghong Song 2020-07-13  1696  
6d3930f639dd69 Yonghong Song 2020-07-13  1697  	++*pos;
6d3930f639dd69 Yonghong Song 2020-07-13  1698  	++info->skip_elems;
6d3930f639dd69 Yonghong Song 2020-07-13  1699  	return bpf_hash_map_seq_find_next(info, v);
6d3930f639dd69 Yonghong Song 2020-07-13  1700  }
6d3930f639dd69 Yonghong Song 2020-07-13  1701  
6d3930f639dd69 Yonghong Song 2020-07-13  1702  static int __bpf_hash_map_seq_show(struct seq_file *seq, struct htab_elem *elem)
6d3930f639dd69 Yonghong Song 2020-07-13  1703  {
6d3930f639dd69 Yonghong Song 2020-07-13  1704  	struct bpf_iter_seq_hash_map_info *info = seq->private;
6d3930f639dd69 Yonghong Song 2020-07-13  1705  	u32 roundup_key_size, roundup_value_size;
6d3930f639dd69 Yonghong Song 2020-07-13  1706  	struct bpf_iter__bpf_map_elem ctx = {};
6d3930f639dd69 Yonghong Song 2020-07-13  1707  	struct bpf_map *map = info->map;
6d3930f639dd69 Yonghong Song 2020-07-13  1708  	struct bpf_iter_meta meta;
6d3930f639dd69 Yonghong Song 2020-07-13  1709  	int ret = 0, off = 0, cpu;
6d3930f639dd69 Yonghong Song 2020-07-13  1710  	struct bpf_prog *prog;
6d3930f639dd69 Yonghong Song 2020-07-13  1711  	void __percpu *pptr;
6d3930f639dd69 Yonghong Song 2020-07-13  1712  
6d3930f639dd69 Yonghong Song 2020-07-13  1713  	meta.seq = seq;
6d3930f639dd69 Yonghong Song 2020-07-13  1714  	prog = bpf_iter_get_info(&meta, elem == NULL);
6d3930f639dd69 Yonghong Song 2020-07-13  1715  	if (prog) {
6d3930f639dd69 Yonghong Song 2020-07-13  1716  		ctx.meta = &meta;
6d3930f639dd69 Yonghong Song 2020-07-13  1717  		ctx.map = info->map;
6d3930f639dd69 Yonghong Song 2020-07-13  1718  		if (elem) {
6d3930f639dd69 Yonghong Song 2020-07-13  1719  			roundup_key_size = round_up(map->key_size, 8);
6d3930f639dd69 Yonghong Song 2020-07-13  1720  			ctx.key = elem->key;
6d3930f639dd69 Yonghong Song 2020-07-13  1721  			if (!info->percpu_value_buf) {
6d3930f639dd69 Yonghong Song 2020-07-13  1722  				ctx.value = elem->key + roundup_key_size;
6d3930f639dd69 Yonghong Song 2020-07-13  1723  			} else {
6d3930f639dd69 Yonghong Song 2020-07-13  1724  				roundup_value_size = round_up(map->value_size, 8);
6d3930f639dd69 Yonghong Song 2020-07-13  1725  				pptr = htab_elem_get_ptr(elem, map->key_size);
6d3930f639dd69 Yonghong Song 2020-07-13  1726  				for_each_possible_cpu(cpu) {
6d3930f639dd69 Yonghong Song 2020-07-13  1727  					bpf_long_memcpy(info->percpu_value_buf + off,
6d3930f639dd69 Yonghong Song 2020-07-13  1728  							per_cpu_ptr(pptr, cpu),
6d3930f639dd69 Yonghong Song 2020-07-13  1729  							roundup_value_size);
6d3930f639dd69 Yonghong Song 2020-07-13  1730  					off += roundup_value_size;
6d3930f639dd69 Yonghong Song 2020-07-13  1731  				}
6d3930f639dd69 Yonghong Song 2020-07-13  1732  				ctx.value = info->percpu_value_buf;
6d3930f639dd69 Yonghong Song 2020-07-13  1733  			}
6d3930f639dd69 Yonghong Song 2020-07-13  1734  		}
6d3930f639dd69 Yonghong Song 2020-07-13  1735  		ret = bpf_iter_run_prog(prog, &ctx);
6d3930f639dd69 Yonghong Song 2020-07-13  1736  	}
6d3930f639dd69 Yonghong Song 2020-07-13  1737  
6d3930f639dd69 Yonghong Song 2020-07-13  1738  	return ret;
6d3930f639dd69 Yonghong Song 2020-07-13  1739  }
6d3930f639dd69 Yonghong Song 2020-07-13  1740  
6d3930f639dd69 Yonghong Song 2020-07-13  1741  static int bpf_hash_map_seq_show(struct seq_file *seq, void *v)
6d3930f639dd69 Yonghong Song 2020-07-13  1742  {
6d3930f639dd69 Yonghong Song 2020-07-13  1743  	return __bpf_hash_map_seq_show(seq, v);
6d3930f639dd69 Yonghong Song 2020-07-13  1744  }
6d3930f639dd69 Yonghong Song 2020-07-13  1745  
6d3930f639dd69 Yonghong Song 2020-07-13  1746  static void bpf_hash_map_seq_stop(struct seq_file *seq, void *v)
6d3930f639dd69 Yonghong Song 2020-07-13  1747  {
6d3930f639dd69 Yonghong Song 2020-07-13  1748  	struct bpf_iter_seq_hash_map_info *info = seq->private;
6d3930f639dd69 Yonghong Song 2020-07-13  1749  
6d3930f639dd69 Yonghong Song 2020-07-13  1750  	if (!v)
6d3930f639dd69 Yonghong Song 2020-07-13  1751  		(void)__bpf_hash_map_seq_show(seq, NULL);
6d3930f639dd69 Yonghong Song 2020-07-13  1752  	else
6d3930f639dd69 Yonghong Song 2020-07-13 @1753  		htab_unlock_bucket(info->htab,
6d3930f639dd69 Yonghong Song 2020-07-13  1754  				   &info->htab->buckets[info->bucket_id],
6d3930f639dd69 Yonghong Song 2020-07-13  1755  				   info->flags);
6d3930f639dd69 Yonghong Song 2020-07-13  1756  }
6d3930f639dd69 Yonghong Song 2020-07-13  1757  

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org

[-- Attachment #2: config.gz --]
[-- Type: application/gzip, Size: 24972 bytes --]

^ permalink raw reply	[flat|nested] 24+ messages in thread

end of thread, other threads:[~2020-07-17 18:53 UTC | newest]

Thread overview: 24+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-13 16:17 [PATCH bpf-next 00/13] bpf: implement bpf iterator for map elements Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 01/13] bpf: refactor bpf_iter_reg to have separate seq_info member Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 02/13] bpf: refactor to provide aux info to bpf_iter_init_seq_priv_t Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 03/13] bpf: support readonly buffer in verifier Yonghong Song
2020-07-13 23:25   ` Alexei Starovoitov
2020-07-15 17:34     ` Yonghong Song
2020-07-15 17:52       ` Alexei Starovoitov
2020-07-13 16:17 ` [PATCH bpf-next 04/13] bpf: implement bpf iterator for map elements Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 05/13] bpf: implement bpf iterator for hash maps Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 06/13] bpf: implement bpf iterator for array maps Yonghong Song
2020-07-13 18:49   ` kernel test robot
2020-07-13 18:49     ` kernel test robot
2020-07-13 16:17 ` [PATCH bpf-next 07/13] bpf: implement bpf iterator for sock local storage map Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 08/13] tools/libbpf: add support for bpf map element iterator Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 09/13] tools/bpftool: add bpftool " Yonghong Song
2020-07-16 16:39   ` Quentin Monnet
2020-07-16 17:42     ` Yonghong Song
2020-07-17 12:57       ` Quentin Monnet
2020-07-17 18:52         ` Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 10/13] selftests/bpf: add test for bpf hash map iterators Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 11/13] selftests/bpf: add test for bpf array " Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 12/13] selftests/bpf: add a test for bpf sk_storage_map iterator Yonghong Song
2020-07-13 16:17 ` [PATCH bpf-next 13/13] selftests/bpf: add a test for out of bound rdonly buf access Yonghong Song
2020-07-14  7:08 [PATCH bpf-next 05/13] bpf: implement bpf iterator for hash maps kernel test robot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.