From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_CR_TRAILER,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71B71C433E9 for ; Thu, 14 Jan 2021 02:05:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3490023447 for ; Thu, 14 Jan 2021 02:05:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729948AbhANCEu (ORCPT ); Wed, 13 Jan 2021 21:04:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:45618 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729365AbhAMWbL (ORCPT ); Wed, 13 Jan 2021 17:31:11 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 75534233FD for ; Wed, 13 Jan 2021 22:29:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1610576967; bh=mHvKCEj3/7nBBxrW4tVVo0k16Rhddoa7YQd2OFic81Y=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=FVFcyxYuFODJwc1NmCq6dGYUEoqC8dzhGHg0FuoCqh5X/YZZkUMGkePdU8HMTwX/t jfKtp1SjnptuInY/ZByd0inH/ALCBa4jES85UEPmrbobY0vm1aRGAjO1FX2Hjxu0yS gLVKbjdZ8mBUhuVzF9QyrZVXqPKwznB+/+Qrgc6Zy0l6P1LiCMOyS3DX5e7yvD9Cgf x8n3IsFITJilMRqyu8twyH4Ke/Wufmh+GciuVls7JYHwIcTqszFYFWxmznlp+cqVZC Qow/5H0y6+He63QtAcrQ1Cb8GkDm5mUvGfJBTBt6UJVGX7xH0DJqn4bAlEud9gFEhx a8xdjguWtOnYQ== Received: by mail-lj1-f173.google.com with SMTP id e7so4337973ljg.10 for ; Wed, 13 Jan 2021 14:29:27 -0800 (PST) X-Gm-Message-State: AOAM530ZRuzD151hUU+K9BHDUjQxbkRRBj7MvI+jTY6HPqWnEP+FFqVG RzhVfLsDcf80nBx+OpUNw0ti1eUBi62n6hUbLyqyIw== X-Google-Smtp-Source: ABdhPJwSFcQoW+n63mgov3Msp2haXfpDPP8xwUvqAEp/d3ESBqh434XmbQzSCR2/v+Bz6JmsJNnCb6xYp2oVwbjPD3g= X-Received: by 2002:a2e:b5dc:: with SMTP id g28mr1848338ljn.112.1610576965768; Wed, 13 Jan 2021 14:29:25 -0800 (PST) MIME-Version: 1.0 References: <20210113053810.13518-1-gilad.reti@gmail.com> In-Reply-To: <20210113053810.13518-1-gilad.reti@gmail.com> From: KP Singh Date: Wed, 13 Jan 2021 23:29:16 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH bpf v2 1/2] bpf: support PTR_TO_MEM{,_OR_NULL} register spilling To: Gilad Reti Cc: bpf , Yonghong Song , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , John Fastabend , Shuah Khan , Networking , open list , linux-kselftest@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 13, 2021 at 6:38 AM Gilad Reti wrote: > > Add support for pointer to mem register spilling, to allow the verifier > to track pointers to valid memory addresses. Such pointers are returned > for example by a successful call of the bpf_ringbuf_reserve helper. > > The patch was partially contributed by CyberArk Software, Inc. > > Fixes: 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") > Suggested-by: Yonghong Song > Signed-off-by: Gilad Reti Acked-by: KP Singh