Received: by 2002:ab2:3350:0:b0:1f4:6588:b3a7 with SMTP id o16csp13698lqe; Fri, 5 Apr 2024 11:00:39 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXDwpVsvs1jbYPaO8TwdwdxnKmdwLVwAbrnHvB3MPpK7J+53r6k9nlRRIfTUK3uD5e07CUBOrN92akDRpSSnmJt+vYemKLWpoli7Mh3hQ== X-Google-Smtp-Source: AGHT+IFbs7uipTmdV9y9oNCFtaPLiSB6u64SrwcKoAfaIJnf9dxuVLbZUvmcYFQBrqji0kYUpK/K X-Received: by 2002:a17:907:76a9:b0:a46:e0a8:d5d3 with SMTP id jw9-20020a17090776a900b00a46e0a8d5d3mr1313800ejc.22.1712340039156; Fri, 05 Apr 2024 11:00:39 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712340039; cv=pass; d=google.com; s=arc-20160816; b=XjwBrVo3aMHwV0SUGhOcAFIt0O8ogpecLDZQVNCjYlXRuxo2ljww+Zhr0PwWNGgGHd DGqAlHjdXejPnZQWiEjZR2gyoQqE8Z+JmHQB0JtGu08DmsPpwpbrdqDFU0oWOPcnfkGq jhdij37NVZZYY2D23oypyZmp8BQUe6jB7luvCyYJzMmr8I9rRwPyXjDG9tkh4D8Qn4np bzXHRvcSYJ3JPamkjOeObr6gBIj2KQzoiHJ3oIGJLuJ8UCChEBkqTNRuhM8TpugMVR9n 7zF01K7t0PVVQBie/d2YthwKduEX8cg8ZC6GgwSJ2+NYzvdVVvGvb6xQoDsN1hfRG9ZT Ii8w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:date:message-id:from:subject :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=dtWXY7TuapRLkoMRD6ZyWbYDbUuG94YnZUvwnjQXASk=; fh=egbD3fZEoqguwapaE+RZ40Fo6w4+zAjMn/QBe/dk9L8=; b=IO4slSM71QWZe/8XaTGhZUPWwpdDx38fhO0746OSO4MX726wyIPVww7yeur4YoUFXy hrWwYARzmhSLq+UJ/3H8njurGCtdzPWvYAQUbAqPGIdEcGTsGgrqs/aDOtbnKRSYfW66 h1e6TXajb8E0B6TdfCj9r4YMi001mgewoWm1Q30LNw4wXBeO20LbIIghcHYGTx5DfnVh rU063FTRmS4HGJBgAfsj8I8SVDIQEmnNIs7lYk/oIcrVD/bcZ+JTveU6urEaWsIR6J6o gpf4Y8Br/Cer4b0BsFHPsyY5WNg6qQAClJ5yqKeFEMYWSyCopbWPIsQocHAy/ffvEAwg 7Zrw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DFLz+VJk; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-133446-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-133446-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id f19-20020a170906085300b00a51a20c3aafsi870985ejd.1043.2024.04.05.11.00.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 05 Apr 2024 11:00:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-133446-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DFLz+VJk; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-133446-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-133446-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id DC5311F245A0 for ; Fri, 5 Apr 2024 18:00:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 28A1D171E6C; Fri, 5 Apr 2024 18:00:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="DFLz+VJk" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4D2221DFEB; Fri, 5 Apr 2024 18:00:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712340029; cv=none; b=CXr6xyK9uqZ+0qUqhmfaHZZxv3+5Sa/cWirA4yMhYUYDyoh1i5NdgOX3L/Ftf2Mn9bheEMiXFUAfnVyVfBVrmTmgnKDwYz6nNgYLBhbxeWqADAzp2dqxM1y2sRizXbwIyuDe9JLtlSm9St3akfFLykEEEcCDzJY/HrT3r5MkpR8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712340029; c=relaxed/simple; bh=Wwti1x3AI9lHvX7vovmnr2R3ixVUqD5YSxNppd9rzEk=; h=Content-Type:MIME-Version:Subject:From:Message-Id:Date:References: In-Reply-To:To:Cc; b=MfgqVWwpBue1ev0s7KDVZZANalRHtb6m25kzvZKsJ5AFDiwn6nf/8PATyv9OL+HlQBxDVLRNDdjYtn17v38D/9EiPEthlhwvgoevL3aPaqvSjPDhZ+4lBuqIOBU25FcNlZRni4XeJF94clYYzJ4L3bm3MTr7+Ve1HBaKopqLCA0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=DFLz+VJk; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPS id B37B9C43390; Fri, 5 Apr 2024 18:00:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1712340028; bh=Wwti1x3AI9lHvX7vovmnr2R3ixVUqD5YSxNppd9rzEk=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=DFLz+VJk6eKVZUve1j65gczJySvRp54J1p/958VkgyduxSHQh5fsqa0lUtGApEDE/ b8J8x4ke5i8V8oOGUssAeGGsPTElBJOfWgkKkklr5hjCY8DTsw7CGVUGIAexZsaban Nyr4qwpx4p4O24GzoNaxQ3AENIPWf6vXSwVVXLQrvVVNaADHzmRE/Wnh/3vK0uB55W kfnmqU8I0O302qgwGmLpTo+naSkUvis0aelmVrZ4evNe8N8qQnoceE67mGqFvmeYQ3 XiiC3W3kidYibZKUZvf/0nmDTOrLpmzmhUQ5slweTUqt8UjMzac9S0bt6UM5HOuZdv dtMtN5nQU9r0g== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 9EFD3C395F6; Fri, 5 Apr 2024 18:00:28 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH bpf-next v2 0/2] bpf: Allow invoking kfuncs from BPF_PROG_TYPE_SYSCALL progs From: patchwork-bot+netdevbpf@kernel.org Message-Id: <171234002864.5871.233926232355884228.git-patchwork-notify@kernel.org> Date: Fri, 05 Apr 2024 18:00:28 +0000 References: <20240405143041.632519-1-void@manifault.com> In-Reply-To: <20240405143041.632519-1-void@manifault.com> To: David Vernet Cc: bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, linux-kernel@vger.kernel.org, kernel-team@meta.com Hello: This series was applied to bpf/bpf-next.git (master) by Andrii Nakryiko : On Fri, 5 Apr 2024 09:30:39 -0500 you wrote: > Currently, a set of core BPF kfuncs (e.g. bpf_task_*, bpf_cgroup_*, > bpf_cpumask_*, etc) cannot be invoked from BPF_PROG_TYPE_SYSCALL > programs. The whitelist approach taken for enabling kfuncs makes sense: > it not safe to call these kfuncs from every program type. For example, > it may not be safe to call bpf_task_acquire() in an fentry to > free_task(). > > [...] Here is the summary with links: - [bpf-next,v2,1/2] bpf: Allow invoking kfuncs from BPF_PROG_TYPE_SYSCALL progs https://git.kernel.org/bpf/bpf-next/c/a8e03b6bbb2c - [bpf-next,v2,2/2] selftests/bpf: Verify calling core kfuncs from BPF_PROG_TYPE_SYCALL https://git.kernel.org/bpf/bpf-next/c/1bc724af00cc You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html