Message ID | 20240405143041.632519-1-void@manifault.com (mailing list archive) |
---|---|
Headers | show |
Series | bpf: Allow invoking kfuncs from BPF_PROG_TYPE_SYSCALL progs | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@kernel.org>: On Fri, 5 Apr 2024 09:30:39 -0500 you wrote: > Currently, a set of core BPF kfuncs (e.g. bpf_task_*, bpf_cgroup_*, > bpf_cpumask_*, etc) cannot be invoked from BPF_PROG_TYPE_SYSCALL > programs. The whitelist approach taken for enabling kfuncs makes sense: > it not safe to call these kfuncs from every program type. For example, > it may not be safe to call bpf_task_acquire() in an fentry to > free_task(). > > [...] Here is the summary with links: - [bpf-next,v2,1/2] bpf: Allow invoking kfuncs from BPF_PROG_TYPE_SYSCALL progs https://git.kernel.org/bpf/bpf-next/c/a8e03b6bbb2c - [bpf-next,v2,2/2] selftests/bpf: Verify calling core kfuncs from BPF_PROG_TYPE_SYCALL https://git.kernel.org/bpf/bpf-next/c/1bc724af00cc You are awesome, thank you!