diff options
| author | David S. Miller <davem@davemloft.net> | 2017-01-09 16:56:28 -0500 |
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2017-01-09 16:56:28 -0500 |
| commit | c22e5c125b7a00fdd177e0caba4f432eb66c8a73 (patch) | |
| tree | ad8a37b775d317d2f8166e61a8c689c75a9af7ab /include/linux | |
| parent | f3a3e248f3f7cd9a4bed334022704d7e7fc781bf (diff) | |
| parent | 39f19ebbf57b403695f7b5f9cf322fe1ddb5d7fb (diff) | |
Merge branch 'bpf-verifier-improvements'
Alexei Starovoitov says:
====================
bpf: verifier improvements
A number of bpf verifier improvements from Gianluca.
See individual patches for details.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/linux')
| -rw-r--r-- | include/linux/bpf.h | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/include/linux/bpf.h b/include/linux/bpf.h index f74ae68086dc..94ea8d2383e6 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -69,14 +69,14 @@ enum bpf_arg_type { /* the following constraints used to prototype bpf_memcmp() and other * functions that access data on eBPF program stack */ - ARG_PTR_TO_STACK, /* any pointer to eBPF program stack */ - ARG_PTR_TO_RAW_STACK, /* any pointer to eBPF program stack, area does not - * need to be initialized, helper function must fill - * all bytes or clear them in error case. + ARG_PTR_TO_MEM, /* pointer to valid memory (stack, packet, map value) */ + ARG_PTR_TO_UNINIT_MEM, /* pointer to memory does not need to be initialized, + * helper function must fill all bytes or clear + * them in error case. */ - ARG_CONST_STACK_SIZE, /* number of bytes accessed from stack */ - ARG_CONST_STACK_SIZE_OR_ZERO, /* number of bytes accessed from stack or 0 */ + ARG_CONST_SIZE, /* number of bytes accessed from memory */ + ARG_CONST_SIZE_OR_ZERO, /* number of bytes accessed from memory or 0 */ ARG_PTR_TO_CTX, /* pointer to context */ ARG_ANYTHING, /* any (initialized) argument is ok */ |
