Message ID | 20230304011247.566040-1-eddyz87@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | bpf: allow ctx writes using BPF_ST_MEM instruction | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Sat, 4 Mar 2023 03:12:44 +0200 you wrote: > Changes v1 -> v2, suggested by Alexei: > - Resolved conflict with recent commit: > 6fcd486b3a0a ("bpf: Refactor RCU enforcement in the verifier"); > - Variable `ctx_access` removed in function `convert_ctx_accesses()`; > - Macro `BPF_COPY_STORE` renamed to `BPF_EMIT_STORE` and fixed to > correctly extract original store instruction class from code. > > [...] Here is the summary with links: - [bpf-next,v2,1/3] bpf: allow ctx writes using BPF_ST_MEM instruction https://git.kernel.org/bpf/bpf-next/c/0d80a619c113 - [bpf-next,v2,2/3] selftests/bpf: test if pointer type is tracked for BPF_ST_MEM https://git.kernel.org/bpf/bpf-next/c/806f81cd1ee3 - [bpf-next,v2,3/3] selftests/bpf: Disassembler tests for verifier.c:convert_ctx_access() https://git.kernel.org/bpf/bpf-next/c/71cf4d027ad5 You are awesome, thank you!