diff options
author | Anton Protopopov <aspsk@isovalent.com> | 2024-12-13 13:09:31 +0000 |
---|---|---|
committer | Andrii Nakryiko <andrii@kernel.org> | 2024-12-13 14:48:36 -0800 |
commit | 4d3ae294f900fb7232fb6c890dbd3176b8a5f121 (patch) | |
tree | 5c95ffae365d7f4987bce5ef0ac06c9234961923 /kernel/bpf/syscall.c | |
parent | 76145f7255326761dafb76721a785799d8a00d5f (diff) | |
download | linux-4d3ae294f900fb7232fb6c890dbd3176b8a5f121.tar.gz linux-4d3ae294f900fb7232fb6c890dbd3176b8a5f121.tar.bz2 linux-4d3ae294f900fb7232fb6c890dbd3176b8a5f121.zip |
bpf: Add fd_array_cnt attribute for prog_load
The fd_array attribute of the BPF_PROG_LOAD syscall may contain a set
of file descriptors: maps or btfs. This field was introduced as a
sparse array. Introduce a new attribute, fd_array_cnt, which, if
present, indicates that the fd_array is a continuous array of the
corresponding length.
If fd_array_cnt is non-zero, then every map in the fd_array will be
bound to the program, as if it was used by the program. This
functionality is similar to the BPF_PROG_BIND_MAP syscall, but such
maps can be used by the verifier during the program load.
Signed-off-by: Anton Protopopov <aspsk@isovalent.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20241213130934.1087929-5-aspsk@isovalent.com
Diffstat (limited to 'kernel/bpf/syscall.c')
-rw-r--r-- | kernel/bpf/syscall.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index 5684e8ce132d..4e88797fdbeb 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -2730,7 +2730,7 @@ static bool is_perfmon_prog_type(enum bpf_prog_type prog_type) } /* last field in 'union bpf_attr' used by this command */ -#define BPF_PROG_LOAD_LAST_FIELD prog_token_fd +#define BPF_PROG_LOAD_LAST_FIELD fd_array_cnt static int bpf_prog_load(union bpf_attr *attr, bpfptr_t uattr, u32 uattr_size) { |